000040)='./file0/file0\x00', 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000080)={0x2b, 0x6, 0x0, {0x1, 0x0, 0x2, 0x0, 'fd'}}, 0x2b) lsetxattr$trusted_overlay_redirect(&(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000340)=ANY=[], 0xfffffffffffffcd6) 11:46:26 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg(r0, &(0x7f0000001d80)=[{{&(0x7f0000000000)=@in6={0xa, 0x4e21, 0x0, @loopback}, 0x80, 0x0}}, {{&(0x7f0000000a80)=@in6={0xa, 0x4e21, 0x0, @mcast1, 0xffffffffffff8000}, 0x80, 0x0}}], 0x2, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x101000, 0x0) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f00000000c0)=""/11) 11:46:26 executing program 4: r0 = socket$inet6(0xa, 0x806, 0x0) r1 = epoll_create1(0x0) ppoll(&(0x7f0000000040)=[{r0, 0x6}], 0x1, &(0x7f00000001c0), &(0x7f0000000200)={0x40}, 0x8) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) write$FUSE_WRITE(r2, &(0x7f0000000100)={0x18, 0x0, 0x5}, 0x18) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000ec3ff4)) getsockopt$IP_VS_SO_GET_DESTS(r2, 0x0, 0x484, &(0x7f0000000140)=""/109, &(0x7f0000000080)=0x312) shutdown(r0, 0x1) mknod(&(0x7f0000000000)='./file0\x00', 0x204, 0x5) shutdown(r0, 0x0) setsockopt$inet_opts(r2, 0x0, 0xd, &(0x7f0000000280)="0789d32df3707fab9a5f82f465c9ffdf960da7df07a10376aff5c37395bc8c516c80977e048c2d89937f48f5d5156ae5a9618d9d1bdd733a34d373ac3fea3f56b76b6ed92dd81ad3b024e8601baae4cfb4a864203d342d4b6d922c47b93d194d308e629fa11a57015cb0a37fecc9609da14b07c59fd0321889", 0x79) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000240)=0x18000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000300)={0x0, 0xb3, "b386989b9d807084e5bdf0bfbd2a9592a31ec6bb7c76a90654d702b1d20f6e26ca8118166f25cd464243d29907940ed8afeebf31c0a4580e4c10210219379a512e2922cc6f46b3d6995b1cb2950a348befbc0e6b7b57c22bb6e8a4a4174f7a6c455794fa3eeee294578e8d3d5d470ec32c9fd30976215dd1843f0c52ddcf5046ab4c06ccb6d96055186e6dd913551541dd55d9a5e60c7c479acf4440c50106d3cf5943f3572e03a08859e0a59aeac31cc49a12"}, &(0x7f00000003c0)=0xbb) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000400)=@assoc_id=r3, 0x4) ppoll(&(0x7f0000bc0fd0)=[{r1}], 0x1, &(0x7f0000c03ff0), 0x0, 0x0) 11:46:27 executing program 4: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="2c0000001600010000000000000000000a000000", @ANYRES32=0x0, @ANYBLOB="01000002fe4a"], 0x2c}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 11:46:27 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x1, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r3 = userfaultfd(0x0) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) setsockopt$inet_mreqsrc(r2, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@remote}, 0x6) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x301, 0x0) getsockopt$bt_BT_SECURITY(r4, 0x112, 0x4, &(0x7f0000000040), 0x2) write(r4, &(0x7f00000000c0)="f58c71bbade08282626ac7a1b1e3688ac2f365958411e729495eb4b8383568fa243662e5c4385c879ce94b7f1d89c5d2ff2a69ce6316348ac5134bc1fd9d5e1350f20d90571c5ea90db45a9f3392fd627c4791993b85d89b45729a1fad9f", 0x5e) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000280)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}}, 0x0, 0x40, 0x0, "15eb5a0d7690990bf6672ab83b5521efd7ab9c853969d34a4968a49773dfb95de75107aff0f0a4a26d249eb019598b726384d623d1761f6820034d8e11014d1dcf390116babd6b1921048a454abf2f11"}, 0xd8) close(r2) dup3(r0, r3, 0x0) 11:46:27 executing program 2: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x101400, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x273, 0xb, 0x0, 0x1db) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000400)=[@text32={0x20, &(0x7f0000000880)="b805000000b98b9400000f01c19a01000000b0000f43d1b8000000000f23d80f21f835800000900f23f80f060f2140b9800000c00f3235000800000f3066ba4300b8f1ffffffefb9800000c00f3235002000000f30c4c3295f4da400", 0x5c}], 0x1, 0x0, &(0x7f0000000040), 0xfb) ioctl$KVM_IRQ_LINE(r0, 0x4008ae61, &(0x7f0000000040)={0x8, 0x4}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 11:46:27 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x2, 0x0) fcntl$notify(r0, 0x402, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3, 0x0, 0xc}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x15, &(0x7f0000000400)={r1, 0x0, 0x0}, 0x18) r2 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x5, 0x4000) ioctl$EVIOCRMFF(r2, 0x40044581, &(0x7f00000000c0)=0x8eb) [ 448.157421] netlink: 20 bytes leftover after parsing attributes in process `syz-executor4'. 11:46:27 executing program 4: unshare(0x20400) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) fcntl$setsig(r0, 0xa, 0xd94f) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x505201, 0x0) renameat2(r0, &(0x7f0000000000)='./file0\x00', r1, &(0x7f0000000080)='./file0\x00', 0x7) 11:46:27 executing program 1: openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000000c0), 0x8) 11:46:27 executing program 3: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000480)='/dev/nullb0\x00', 0xc000, 0x0) preadv(r0, &(0x7f0000000b00)=[{0x0}, {&(0x7f0000000600)=""/71, 0xffffff4d}, {0x0}, {&(0x7f0000000140)=""/151, 0x97}], 0x329, 0x0) 11:46:27 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000000)="0a5c2d0240316285717070") r1 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) r3 = socket(0x8, 0x802, 0x5) setsockopt$inet_sctp_SCTP_INITMSG(r3, 0x84, 0x2, &(0x7f0000000040)={0x43a, 0x0, 0x9, 0x3}, 0x8) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0xb, 0x0, 0x0) 11:46:27 executing program 1: unshare(0x400) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000180)={0x0, r0, 0x0, 0x3}, 0x14) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) fremovexattr(r1, &(0x7f0000000100)=@random={'trusted.', '/proc/self/net/pfkey\x00'}) r2 = shmget(0x3, 0x4000, 0x78000000, &(0x7f0000ffc000/0x4000)=nil) shmctl$IPC_INFO(r2, 0x3, &(0x7f0000000200)=""/232) fcntl$getflags(r1, 0x401) socket$nl_route(0x10, 0x3, 0x0) 11:46:27 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_0\x00', 0x400}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x8, 0x4, &(0x7f00000000c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x81, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f0000000100)=@gettaction={0x100, 0x32, 0x314, 0x70bd2a, 0x25dfdbff, {}, [@action_dump_flags=@TCA_ROOT_FLAGS={0xc, 0x2, {0x1}}, @action_dump_flags=@TCA_ROOT_TIME_DELTA={0x8}, @action_gd=@TCA_ACT_TAB={0x68, 0x1, [{0x10, 0x1c, @TCA_ACT_INDEX={0x8, 0x3, 0x9a6}}, {0x14, 0x15, @TCA_ACT_KIND={0xc, 0x1, 'skbedit\x00'}}, {0x10, 0xb, @TCA_ACT_INDEX={0x8, 0x3, 0x6}}, {0x10, 0x9, @TCA_ACT_INDEX={0x8, 0x3, 0x6000000000}}, {0x10, 0x3, @TCA_ACT_INDEX={0x8, 0x3, 0x8}}, {0x10, 0x11, @TCA_ACT_INDEX={0x8, 0x3, 0x4}}]}, @action_gd=@TCA_ACT_TAB={0x24, 0x1, [{0x10, 0x15, @TCA_ACT_INDEX={0x8, 0x3, 0x400}}, {0x10, 0xf, @TCA_ACT_INDEX={0x8, 0x3, 0x1}}]}, @action_gd=@TCA_ACT_TAB={0x3c, 0x1, [{0x18, 0xb, @TCA_ACT_KIND={0x10, 0x1, 'connmark\x00'}}, {0x10, 0x13, @TCA_ACT_INDEX={0x8, 0x3, 0x5}}, {0x10, 0x20, @TCA_ACT_KIND={0x8, 0x1, 'ife\x00'}}]}, @action_dump_flags=@TCA_ROOT_TIME_DELTA={0x8, 0x4, 0x80000001}, @action_dump_flags=@TCA_ROOT_TIME_DELTA={0x8, 0x4, 0x80000001}]}, 0x100}}, 0x4000000) 11:46:27 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x3878e3cbef760998) ioctl(r0, 0x7f, &(0x7f0000000180)="3c801e6038c66482d2b1a8cc3f64b87acef178f644316f65602681302ee931226feb024240b6633f83986a16a9afc7f5d8d1d928d2be978314991481f1eddaf75c9b24ef2c71e2f6b937a269b43ab14bbd00c41bed8e754f9375ad13f24cf0f18d830ebc50b7b91a27c7b08cd522fcce1213045815fc") syz_open_dev$video(&(0x7f0000000140)='/dev/video#\x00', 0x8, 0x2) getsockopt$inet6_buf(r0, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) 11:46:27 executing program 5: ioctl$TIOCMBIS(0xffffffffffffffff, 0x5416, &(0x7f0000000040)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x20, 0x0) ioctl$KVM_SET_LAPIC(r1, 0x4400ae8f, &(0x7f0000000480)={"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"}) r2 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000fd0ffc)=0x3) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x11813, r0, 0x0) ioctl$EXT4_IOC_RESIZE_FS(r1, 0x40086610, &(0x7f0000000080)=0x6) ioctl$FIONREAD(r2, 0x80047456, &(0x7f0000000440)) 11:46:27 executing program 1: r0 = msgget$private(0x0, 0x1) msgsnd(r0, &(0x7f0000000100)=ANY=[@ANYRES16], 0x1, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) msgsnd(r0, &(0x7f0000000000)={0x1}, 0x8, 0x0) msgrcv(r0, &(0x7f0000000040)={0x0, ""/103}, 0x6f, 0x0, 0x0) msgrcv(r0, &(0x7f0000745000)={0x0, ""/4096}, 0x230, 0x0, 0x0) 11:46:27 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002ff7)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000001000)=""/246) ioctl$EVIOCGREP(r0, 0xc008744c, &(0x7f0000003000)=""/174) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000000)={'filter\x00'}, &(0x7f0000000080)=0x54) 11:46:28 executing program 2: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x101400, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x273, 0xb, 0x0, 0x1db) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000400)=[@text32={0x20, &(0x7f0000000880)="b805000000b98b9400000f01c19a01000000b0000f43d1b8000000000f23d80f21f835800000900f23f80f060f2140b9800000c00f3235000800000f3066ba4300b8f1ffffffefb9800000c00f3235002000000f30c4c3295f4da400", 0x5c}], 0x1, 0x0, &(0x7f0000000040), 0xfb) ioctl$KVM_IRQ_LINE(r0, 0x4008ae61, &(0x7f0000000040)={0x8, 0x4}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 11:46:28 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x1, 0x2) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000180)='trusted.overlay.upper\x00', &(0x7f00000001c0)=ANY=[@ANYBLOB="00fb7002e38a7c3e6f02c436fac1c9c6d761d1fc0b1689411be159b5952efd2372387ccaee0b8336f9090ba3b3d3e0388cba4542ce3fbfb0339bcd7276c02ee937c06e06b407a9a49789e3ac3c6854e79c6c76723be1eb259b6cd593d165d88fd9bdcb86a2"], 0x70, 0x2) ioctl$VIDIOC_G_TUNER(r0, 0xc054561d, &(0x7f00000000c0)={0x1, "b18ca829807dabe52521a98fe2f62c9677dd2117b1f02ee4c967bcc23325f0ad", 0x3, 0x200, 0x0, 0x0, 0x15}) getsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000000), &(0x7f0000000040)=0xb) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000300)=ANY=[]) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000240)) fcntl$addseals(r0, 0x409, 0xf) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000140)={'sit0\x00', 0x8000}) 11:46:28 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000500)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000001c0)={0x14, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="11634840", @ANYRES64=0x0, @ANYBLOB="006660fe730c0100000000000000"], 0x384, 0x0, &(0x7f0000000180)}) 11:46:28 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) write$uinput_user_dev(r2, &(0x7f0000000400)={'syz1\x00', {}, 0xffffffffffffffff}, 0x45c) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000040)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0xb3, 0x4, 0x3, "6cab838687cb56c0fb9845591e2be054", "806e1b19dedf71a9034baefd6d4c56f85d32b03cb07d8514c0a314ad0b7955e07e0274cfeffa9c217e676111eeb265fb5f14b04b90dee76417a06bf4b2aae620baab1c6a5ef07b6f4732c8c05f20bb2e9a1e263a55ae0200d2337c502a046323f5e54860d4cf780f4cf8b242ccedf75905b9e8163b52d8a59803ca6a9f4892ecbf86ab16ecfcb763bbcd19dfa8d71775155a3b2a1d02ffdf93ab9d27a5f1"}, 0xb3, 0x3) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) 11:46:28 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002ff7)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000001000)=""/246) ioctl$EVIOCGREP(r0, 0xc008744c, &(0x7f0000003000)=""/174) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000000)={'filter\x00'}, &(0x7f0000000080)=0x54) [ 449.938149] input input29: cannot allocate more than FF_MAX_EFFECTS effects [ 449.982090] binder: send failed reply for transaction 22 to 14542:14543 [ 449.992334] binder: undelivered TRANSACTION_ERROR: 29189 11:46:29 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000100)=0xc) setfsuid(r1) 11:46:29 executing program 5: r0 = socket(0x10, 0x80003, 0xc) write(r0, &(0x7f00000002c0)="1f000a000302fffffd3b54c007110010f30501000b0100ffffffffffff0000", 0x1f) r1 = syz_open_dev$usbmon(&(0x7f0000000340)='/dev/usbmon#\x00', 0x90, 0x400100) write$USERIO_CMD_SEND_INTERRUPT(r1, &(0x7f0000000380)={0x2, 0x605}, 0x2) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000080)={0x0, @in6={{0xa, 0x4e24, 0x1, @empty, 0x8}}, 0x5f7, 0x9, 0x76, 0x5, 0x7836}, &(0x7f0000000140)=0x98) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000180)={0xfffffffffffffff7, 0x0, 0x8000, 0x8, 0xeb, 0x3, 0x8, 0x101, r2}, 0x20) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000000)=0x800, 0x4) getsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f00000001c0), &(0x7f0000000200)=0x10) getsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, &(0x7f0000000040)=0xf412, &(0x7f0000000300)=0x2) r3 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x3, 0x480000) ioctl$VIDIOC_G_INPUT(r3, 0x80045626, &(0x7f0000000280)) 11:46:29 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.controllers\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000040), 0x4) r1 = socket$can_raw(0x1d, 0x3, 0x1) unshare(0x20400) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000400)={'vcan0\x00', 0x0}) r3 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r3, 0x11b, 0x3, &(0x7f00000000c0)=0x2, 0x4) bind$xdp(r3, &(0x7f0000000080)={0x2c, 0x5, r2, 0x0, 0xffffffffffffff9c}, 0x10) 11:46:29 executing program 1: r0 = socket(0x0, 0x200000007ff, 0x0) write(r0, &(0x7f0000000000)="240000001a0025f00018000480ed0500800000e0d45cffffffffff0008000f0008000000", 0x24) 11:46:29 executing program 3: r0 = socket$inet(0x2, 0xa, 0x0) bind$inet(r0, &(0x7f0000134000)={0x2, 0x4e21, @local}, 0x10) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='ip6_vti0\x00') 11:46:29 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002ff7)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000001000)=""/246) ioctl$EVIOCGREP(r0, 0xc008744c, &(0x7f0000003000)=""/174) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000000)={'filter\x00'}, &(0x7f0000000080)=0x54) [ 450.182745] syz-executor3 uses obsolete (PF_INET,SOCK_PACKET) 11:46:29 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) munmap(&(0x7f0000fff000/0x1000)=nil, 0x1000) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x8000000000000000, 0x0, @dev, 0x4}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='\x92aap\x00\x00\x00\x00\xcem\"\xcegT\xa0Y\x84\xff8\x84\xa9X\x1f\xa5\xfc\xdd\xc8\xaeB\x8b\xb4\xf7H\xb61s#\xa2\xa9\x90\x96\xe0\xeb\x96\xe0}\xe2V\xb0\xe7,\x9d\xdf\xb3\x82\x00lvW\x9du\xfd\xb5\xc0\xf2\v\xc3Wm\xe8l\xd5\xf8 \xe4\xc6\x19\xed\xc3V\xd7=\xb3aK\x1e\xbc\xb7\xc1T\x9d-\xfe\x0f\x9cn\xa1\x85i\fz\x9dW&\x8a\x8e\xf4O\x9f\x17)\xf7\x91\x82u\xf2.\xeb3\xf3\x02:\xb0\x83\xc4\xb2\x8c}8\xe1\xff\x02\xde&\xc0_r0\x01<4\x91,4\x98\xa65\x82H\xactX\xfb}\xd9\xba\x84er\xd01\x0f\x15\xbb\xff\xa2\xed\xbd\x84B\x92\xed\xfbI\xc6\x9a\xe0\x1d\xd1\x8f\x16\xf8\t\x9eB\x17\'\xf2\xe8h\xa9[\x02DoJ\xf66l\xcc\xbfQ\xbcF\xd2\xb7a\x86') sendfile(r0, r1, &(0x7f0000000040)=0x100000, 0x8001) 11:46:29 executing program 2: r0 = syz_open_dev$usb(&(0x7f00000003c0)='/dev/bus/usb/00#/00#\x00', 0x40000fffffb, 0x802) fstatfs(0xffffffffffffffff, 0x0) timerfd_gettime(r0, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000180)={0x100323}) pread64(r0, &(0x7f0000000000)=""/180, 0xb4, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$EVIOCRMFF(r0, 0x40044581, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f00000000c0)={0x3, 0x3ff, 0xffffffffffffffff, 0x3, 0x2}) 11:46:29 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) getsockopt$packet_int(r0, 0x107, 0xe, &(0x7f0000004bc0), &(0x7f0000004c00)=0x4) 11:46:29 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002ff7)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000001000)=""/246) ioctl$EVIOCGREP(r0, 0xc008744c, &(0x7f0000003000)=""/174) [ 450.408635] vhci_hcd: invalid port number 0 11:46:29 executing program 3: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x12, r2, 0x7) ioctl$FIONREAD(r1, 0x541b, &(0x7f0000000080)) fsetxattr$security_smack_entry(r1, &(0x7f0000000040)='security.SMACK64MMAP\x00', &(0x7f00000000c0)='}]mime_type]&^\x05\x00', 0x10, 0x2) ioctl$SG_GET_NUM_WAITING(r0, 0x227d, &(0x7f0000000100)) 11:46:29 executing program 0: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0xffffffffffff659c, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f00000000c0), 0x4) r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r1, 0x10d, 0xe2, &(0x7f0000000040), &(0x7f0000000080)=0x4) [ 450.478057] vhci_hcd: invalid port number 0 11:46:29 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fchdir(r0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000140)=ANY=[@ANYBLOB="0000040000005ed988a5cfc70000"], 0x8) getsockopt$inet6_opts(r0, 0x29, 0x37, 0x0, &(0x7f0000000040)) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x101, 0x0) ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000100)=0x31d) ioctl$EVIOCGABS0(r1, 0x80184540, &(0x7f0000000080)=""/57) 11:46:29 executing program 2: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000000)={0x1ff, 0x2, 0x0, {0x5}}) 11:46:29 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000340)={@in6, 0x0, 0x5, 0x0, "808d54ae55ceea4576ecd041bc7e3e661fc71cc4bac3e7234564cab117d38655c9cf795b394999cb47b1d5160ba8b787bebb0c79ca0b7f4fd08178a008517280e126feab8b349c25cf8159976d7b9d78"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @local}}, 0x0, 0x7, 0x0, "4877bb1f56d48eb1fa5fac76a792a929a57f6062b013ec6b7a9ee231ea85a1c7f5c8fdf3bcaf6c5bb203dab4011d7c6096609012d3e979295204ae936681b23832f302a5020f3f6af0b1d2fb5a00eb09"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x1, 0x0, "1c56400ef08dc0d7f6ffea3199772f0577915623cdca191dcc06ee3e04cd4eb98b6e444bdb49a176ca0be49468681ed3a055edd05610db8ffb464f1417af72c5677bdc0183e8da9f6e9d0d8071771351"}, 0xd8) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067fffffff81004e220000000058000b4824ca944f64009400050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 11:46:29 executing program 3: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)={0xaa, 0x54}) r1 = epoll_create1(0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r2, 0x6, 0xb, 0x0, &(0x7f0000012000)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) dup3(r1, r0, 0x0) 11:46:29 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002ff7)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGREP(r0, 0xc008744c, &(0x7f0000003000)=""/174) 11:46:29 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x24, 0x0, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x100, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000100)={0x0, 0x40}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000180)=@assoc_value={r2, 0x1}, 0x8) readahead(r1, 0x3, 0x1) r3 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0xfff, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x2, "9fad"}, &(0x7f0000000080)=0x26) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r3, 0x84, 0x17, &(0x7f00000001c0)={r2, 0x6, 0x80, "cf9ca13750ea804a30d0f016f0df8b508d008135c96a3b0972cf1f517ef6de2066a308d9688bf07492fb9491a80dc9ac51ba903cbccc8a59d8645444e5cfa66d3bff608b4df70b238cc1f4960c644ef38cc37c124b3d83538a0cdbf38fbb676d0bac76c7081ed6e99d74acd5e69c07e05f2c0398f4d21efccc2856bcd9cb949f"}, 0x88) ioctl$EVIOCSABS20(r3, 0x401845e0, &(0x7f0000000280)={0xc7, 0xe53b, 0x73af, 0x101, 0x9, 0x7}) 11:46:29 executing program 5: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x3, 0x0) r1 = getpgid(0x0) r2 = gettid() kcmp(r1, r2, 0x2, r0, r0) r3 = open(&(0x7f0000000000)='./file0\x00', 0x10000, 0x2) ioctl$PPPIOCGFLAGS(r3, 0x8004745a, &(0x7f0000000100)) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000580)={0x1, @win={{0xc4c}, 0x0, 0x0, &(0x7f0000000080)={{}, &(0x7f0000000040)}, 0x0, &(0x7f0000000100)}}) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000140)={0x2, 0xb, 0x4, 0x1000, {0x0, 0x7530}, {0x7, 0x8, 0x2, 0x2, 0x9, 0x1ff, "77c2d355"}, 0x0, 0x3, @fd=r3, 0x4}) 11:46:29 executing program 2: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) mmap(&(0x7f0000ff9000/0x2000)=nil, 0x2000, 0x0, 0x8052, r0, 0x0) madvise(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000000010) ioctl$SG_SET_FORCE_PACK_ID(r0, 0x227b, &(0x7f0000000040)=0x1) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)={0xaa, 0x18}) 11:46:30 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002ff7)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGREP(r0, 0xc008744c, &(0x7f0000003000)=""/174) 11:46:30 executing program 0: syz_emit_ethernet(0x3a, &(0x7f0000000040)={@local, @link_local, [{[{0x9100, 0x8, 0x5, 0x4}], {0x8100, 0x9259, 0x2}}], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0xffffff2f, 0x0, @rand_addr, @multicast1}, @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "4cd1f6", 0x0, "071ccd"}}}}}}, &(0x7f0000000000)={0x2}) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x0, 0x0) ioctl$EVIOCSFF(r0, 0x40304580, &(0x7f00000000c0)={0x57, 0x4, 0xfff, {0x9, 0x9}, {0x0, 0x5}, @const={0x200, {0x200, 0x4, 0x80000000, 0x500000000000}}}) 11:46:30 executing program 3: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x8000, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = getgid() ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000240)={{0x2, 0x4e23, @broadcast}, {0x307, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}, 0x12, {0x2, 0x4e22, @multicast1}, 'team_slave_0\x00'}) prctl$PR_SET_ENDIAN(0x14, 0x3) write$FUSE_CREATE_OPEN(r0, &(0x7f0000000180)={0xa0, 0x0, 0x6, {{0x4, 0x3, 0x10001, 0xff, 0x17c5, 0x3, {0x3, 0x5, 0x3, 0x9, 0x9, 0x7, 0x1, 0x6, 0xffffffff, 0x9, 0x0, r1, r2, 0xc0000, 0xffffffffffffffc1}}, {0x0, 0x4}}}, 0xa0) r3 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x80, 0x800) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f00000000c0)={'erspan0\x00', 0x400}) 11:46:30 executing program 2: r0 = socket(0x1e, 0x2, 0x0) syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) unshare(0x20400) syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x0) select(0x40, &(0x7f0000001300), &(0x7f0000001340), &(0x7f0000001380)={0x3f}, &(0x7f00000013c0)={0x0, 0x2710}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0x1009}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000100)={0x4, 0x8, 0xfa00, {r1}}, 0x10) 11:46:30 executing program 5: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x3, 0x0) r1 = getpgid(0x0) r2 = gettid() kcmp(r1, r2, 0x2, r0, r0) r3 = open(&(0x7f0000000000)='./file0\x00', 0x10000, 0x2) ioctl$PPPIOCGFLAGS(r3, 0x8004745a, &(0x7f0000000100)) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000580)={0x1, @win={{0xc4c}, 0x0, 0x0, &(0x7f0000000080)={{}, &(0x7f0000000040)}, 0x0, &(0x7f0000000100)}}) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000140)={0x2, 0xb, 0x4, 0x1000, {0x0, 0x7530}, {0x7, 0x8, 0x2, 0x2, 0x9, 0x1ff, "77c2d355"}, 0x0, 0x3, @fd=r3, 0x4}) 11:46:30 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xb9\xb3\xf8h>\xcf\x89\xde\xe9\x01\xd2\xdau\xc0\x1f\x02\x00\xf5\x8d&\xd7\xa0q\xfb53\x1c\xe3\x9cZ\xee\xffP\x83\xcf\a\xddFE\\\x91MJ\xff\x1e|\xf7\xedW\xc0\xc2\x05o\\\xa9\xfc\xf0<\xbf\x82\xbd\x13SG73\x92E\xd3\xc7\x06A\xbeb\x81\xd7\xe1\xb4\xb7\t\x91\x14\xc5q\x87\"\x98\xdd\x7f! \xe2\xb6\xfa*.*,\x9cn\x004u\vya\xfa,\x15\x84\xc0\xb5\xa5\x00\xae\n\xc3\x9b\xc7jx\xd9\x15\x82fu\x9fvj>\x8c\x84\xc0\x9c\xf3\xad\x88\x82\x94\x7f\xfa\x1f\xb4\xc0Pr{\xeb\x12\xc5~\x06\xffY\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x89$W\x8a\xd4\x9e\xa1\x14LtH\xd6@\xaa\x88\xa6jq\xb7}s\xa9$\xff\x02\x7f\xdc\xb5P\x16\x16S\xd4\xcbW\b\x83\x85$\x82\x86\xf5\xbe\x9d\x87f\xc7\f)\xe6\xf5\x06=\xfet\xa1\xb0\xb5 y\x15\x90H!\vM\'\x1a\xc9L\x88\x9b\x06<\xa3J\tW\x9a\xf061\xf1(\xe6\xdd,\x96m\xae\xcd|o~\x0fN\xbc\xaf\x80%\f\xfa\xb0q\x84\x83\x80x\xc7\x1d\x80\x9d\x06\xdc\v\xacu\xdb\x81E%\xd1\xd1\xac\xafL\xb6\xf4\x89\x0f9s\x82\xaecf\x97\xf6\x88\tN8\xdb\\\"w\x0fS\alc\r\xf9\xbbL\x14\x91\x89\xff\xa9u\xf5 \x871\x1c[\xaa\xfc\x11\xc9\v\xdc%\xfc\x80;q\x15=\xdc9\x95\xb2\xdfI\xcd\xd7\x84\xbc[\xea@\x86\x10p\xda\xdb9^\x85\xc9<\xdf\xa0\x8e') setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f00000002c0)=0xffffffff958b17a2, 0x4) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0xfffffffffffffffc, 0x12, r0, 0x0) syz_kvm_setup_cpu$x86(r0, r0, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000240)=[@text64={0x40, &(0x7f0000000040)="471452420f35450f08f4c4a2fd2a942b000001008f69f8956f0bc4c1c5c2709b000f3066400f760e400f01cf", 0x2c}], 0x1, 0x50, &(0x7f0000000280)=[@flags], 0x1) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)) 11:46:30 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x7) r2 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x0, 0x2000) write$UHID_DESTROY(r2, &(0x7f0000000040), 0x4) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r2, 0x10e, 0x2, 0x0, 0xfffffffffffffd72) ioctl$KVM_GET_CLOCK(r2, 0x8030ae7c, &(0x7f0000000080)) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) 11:46:30 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002ff7)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGREP(r0, 0xc008744c, &(0x7f0000003000)=""/174) 11:46:30 executing program 3: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x2, 0x6, 0x0, 0x0, 0x2}, 0xfffffdf7}}, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x40000, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmmsg(r0, &(0x7f0000000180), 0x400000000000117, 0x0) 11:46:30 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') r2 = socket(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) listen(r2, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(r1, 0xc008551b, &(0x7f0000000040)={0x2, 0x8, [0x0, 0x83]}) sendfile(r0, r1, 0x0, 0x7fffffff) 11:46:30 executing program 1: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, &(0x7f0000000000)) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000080)=@add_del={0x2, &(0x7f0000000040)='ifb0\x00'}) get_robust_list(0x0, &(0x7f0000000340)=&(0x7f00000002c0)={&(0x7f00000001c0)={&(0x7f0000000180)}, 0x0, &(0x7f0000000280)={&(0x7f0000000240)}}, &(0x7f0000000700)=0x18) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000300)={0x1, 0x0, &(0x7f0000000380)=""/84, &(0x7f0000000140)=""/5, &(0x7f0000000400)=""/162}) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000005c0)=""/193, &(0x7f0000000540)=""/97, &(0x7f00000004c0)=""/127}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000700)=ANY=[]) socketpair$unix(0x1, 0x40000000001, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f00000006c0)=0x1) ioctl$VHOST_SET_LOG_BASE(r0, 0x4008af04, &(0x7f0000000780)=&(0x7f0000000740)) 11:46:30 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000100)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lchown(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) close(r0) 11:46:30 executing program 2: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000280)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000000)={0x0, 0x9, 0x0, "e5f9fe8eb2df5e42090cca28e845b2eabd7ce740a1468fe351a06e3de92acc3c"}) 11:46:30 executing program 4: ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000001000)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0xc008744c, &(0x7f0000003000)=""/174) 11:46:30 executing program 3: getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f0000000180)=ANY=[@ANYBLOB="c41844b9d8"], 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0xffffffffffffffff) stat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f000002f000/0x18000)=nil, 0x0, 0xffffffffffffff42, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 11:46:30 executing program 2: r0 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x9, 0x101000) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000140)={"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"}) ioctl$UI_SET_PHYS(r0, 0x4008556c, &(0x7f0000000080)='syz0\x00') link(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000600)='./file0\x00') prctl$PR_SET_FPEMU(0xa, 0x1) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000640)=0x20000) r1 = syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_G_CTRL(r1, 0xc008561b, &(0x7f0000000000)={0x98f909}) ioctl$VIDIOC_G_JPEGCOMP(r1, 0x808c563d, &(0x7f0000000540)) 11:46:30 executing program 4: ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000001000)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0xc008744c, &(0x7f0000003000)=""/174) 11:46:31 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video35\x00', 0x2, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x34000}, 0xc, &(0x7f0000000080)={&(0x7f00000002c0)={0x2c, 0x2b, 0x8000000001, 0x0, 0x0, {0xfffffffffffffffe}, [@nested={0x18, 0x0, [@typed={0x4102, 0x0, @ipv6=@ipv4={[0x0, 0x0, 0x0, 0x13], [], @remote}}]}]}, 0x20}}, 0x0) 11:46:31 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x6, 0x40102) ioctl$VIDIOC_SUBDEV_G_FMT(r0, 0xc0585604, &(0x7f0000000100)={0x0, 0x0, {0x1ff, 0xffff, 0x5001, 0x0, 0xa, 0x8, 0x0, 0x1}}) r1 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x5, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x200000, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0x9, 0x4) close(r2) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, &(0x7f0000000080)=0x4000) ioctl$VIDIOC_SUBDEV_G_FMT(r1, 0xc0585605, &(0x7f0000000200)={0x0, 0x0, {0x0, 0x0, 0x300b}}) 11:46:31 executing program 4: ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000001000)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0xc008744c, &(0x7f0000003000)=""/174) 11:46:31 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x100082) r1 = memfd_create(&(0x7f0000000180)='[trusted$\x00', 0x5) semctl$SEM_STAT(0x0, 0x0, 0x12, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x181100, 0x0) pwritev(r1, &(0x7f00000000c0)=[{&(0x7f00000005c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, 0x0, 0x20000102000007) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x7, 0x2005, 0x0, 0x0, 0x0, 0x0, "b92481f2b6049517f74de08916cf213343b15d035fc2fe51426f3c9125e1da89cad2929cd06aca1bd4b0a988279268e61234ff8a41cd19abd481eb55130d64ca", "a3510a8deb27705deb2fac58f4f379ddd8e50e8d868ee0425ecfc1c6f4a716df3e4be867d973bcc3e056a1a04eafdeacbd0e434a62db69a6bd53316c42f16b21", "f0642b0793a51cd04ad5c00d6cf24b506d17a8df96c5968a4226e09f847e4b08"}) 11:46:31 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_buf(r0, 0x0, 0x2f, &(0x7f00000000c0)=""/145, 0xfffffffffffffffd) ioctl$SIOCSIFMTU(r0, 0x8922, &(0x7f0000000000)={'bridge_slave_1\x00', 0x4}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000180)={0x0, 0x1f, 0x6, 0x8, 0x4, [{0x6e, 0x9, 0x8, 0x0, 0x0, 0x86}, {0xef3, 0x6, 0x3ff, 0x0, 0x0, 0x3}, {0x55, 0x100, 0x200, 0x0, 0x0, 0x4}, {0x4, 0x0, 0x80, 0x0, 0x0, 0x8}]}) 11:46:31 executing program 3: r0 = getpgrp(0x0) r1 = perf_event_open(&(0x7f0000000000)={0x2, 0x158, 0xf80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x7, 0x0, 0x0, 0xffffffffffffe4b1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000000}, r0, 0x2, 0xffffffffffffff9c, 0xfffffffffffffffe) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x4, 0xa011, r1, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) ioctl$VIDIOC_S_PRIORITY(r2, 0x40045644, 0x3) 11:46:31 executing program 2: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000469ffc)=0x803, 0x4) sendto$inet(r0, &(0x7f0000edf000), 0x0, 0x0, &(0x7f0000000040), 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) dup3(r1, r0, 0x0) 11:46:31 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000001000)=""/246) ioctl$EVIOCGREP(r0, 0xc008744c, &(0x7f0000003000)=""/174) 11:46:31 executing program 5: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x0, 0x2) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0xbb3f3d108f16a8d8, 0x0) getsockname$inet(r0, &(0x7f0000000080), &(0x7f00000000c0)=0x10) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x6) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000280)="153f6234488dd25d7660") r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000280)={'stack ', '::\n'}, 0x654) 11:46:31 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$EXT4_IOC_RESIZE_FS(r0, 0x40086610, &(0x7f0000000080)=0x100000800) write(r0, &(0x7f00000001c0)="02b0de88e0cdd0e860cbf60f0500ac84a72bca9be47ebad7e625dad8a9969a31b29e3523ac3cbe860df21c5984c38a5d7daa85cf5f8376a59c08d57ece951122946a170fb8126cbeb425da394021bfcd01302f9ecf53b678600d55", 0x5b) 11:46:31 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000001000)=""/246) ioctl$EVIOCGREP(r0, 0xc008744c, &(0x7f0000003000)=""/174) [ 452.497166] audit: type=1400 audit(1545219991.549:39): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=3A3A0A60 pid=14719 comm="syz-executor5" 11:46:31 executing program 1: seccomp(0x0, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000003080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00000000c0)) r1 = syz_open_pts(r0, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x200000, 0x0) r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rfkill\x00', 0x101001, 0x0) ioctl$TUNSETSTEERINGEBPF(r2, 0x800454e0, &(0x7f0000000240)=r3) r4 = syz_open_pts(r0, 0x0) ioctl$int_in(r1, 0x5452, &(0x7f0000000040)=0xffffffff80000000) ioctl$int_in(r4, 0x5452, &(0x7f0000000000)=0x7) r5 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) connect$inet6(r5, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0x16}}, 0x1c) sendmmsg(r5, &(0x7f00000002c0), 0x4cc, 0x20007ffc) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000003380)=[{&(0x7f0000000140)=@abs, 0x6e, &(0x7f0000000600)=[{&(0x7f00000004c0)}], 0x1, &(0x7f0000000880)=[@cred={0x20}], 0x20}], 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$FUSE_INIT(r3, &(0x7f0000000280)={0x50, 0x0, 0x2, {0x7, 0x1c, 0x961b, 0x1200, 0x5, 0x1, 0x9, 0xcb}}, 0x50) r7 = syz_open_pts(r0, 0xb) setsockopt$inet6_tcp_TCP_MD5SIG(r7, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x4e21, 0x7, @mcast1, 0x8}}, 0x0, 0xffffffffffffffff, 0x0, "ef09c4eaa020dd31ba62e4c7f0dcc5431facf0bba50f5532e954b414a1ebd64ac92cc1cd82d4bb1a308479ad31bfa89c2d5a42cd40053fbcb78889b39029c9565611fc0acfa52388d40574cd8cc1b7a2"}, 0xd8) dup2(r0, r7) [ 452.564833] audit: type=1400 audit(1545219991.579:40): apparmor="DENIED" operation="stack_onexec" info="label not found" error=-2 profile="unconfined" name=3A3A0A60 pid=14719 comm="syz-executor5" [ 452.590239] bridge_slave_1: mtu less than device minimum 11:46:31 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f00000000c0), &(0x7f0000000100)=0x4) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000140), &(0x7f0000000180)=0x4) getsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000000)=""/90, &(0x7f0000000080)=0x44) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f00000001c0)={0x5}, 0x4) 11:46:31 executing program 5: r0 = socket$netlink(0x10, 0x3, 0xfffffffffffffffd) sendmsg$nl_route(r0, &(0x7f0000004fc8)={&(0x7f0000016000), 0xc, &(0x7f000000b000)={&(0x7f0000000580)=@newlink={0x20, 0x10, 0xc01}, 0x20}}, 0x0) recvmsg(r0, &(0x7f0000000340)={&(0x7f0000000040)=@xdp, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000600)=""/4096, 0x1000}, {&(0x7f00000000c0)=""/98, 0x62}, {&(0x7f0000000140)=""/58, 0x3a}, {&(0x7f0000000180)=""/62, 0x3e}], 0x4, &(0x7f0000000200)=""/30, 0x1e}, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/dlm_plock\x00', 0x40, 0x0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000480)={0x0, 0x1000, 0x20, 0xffffffff, 0x10001}, &(0x7f00000004c0)=0x18) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000001600)={r2, @in6={{0xa, 0x4e22, 0x7, @empty, 0xfffffffffffffff9}}, [0x3, 0x9, 0x5, 0x0, 0x9f2c, 0x4, 0x6, 0x9, 0x6, 0x1, 0xcab, 0x1598, 0x200, 0x6, 0x9555]}, &(0x7f0000000500)=0x100) r3 = syz_open_dev$mice(&(0x7f0000000240)='/dev/input/mice\x00', 0x0, 0x406000) write$cgroup_type(r3, &(0x7f0000000380)='threaded\x00', 0x9) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={&(0x7f0000000000), 0xc, &(0x7f00000002c0)={&(0x7f0000000280)=@getqdisc={0x24, 0x26, 0x201}, 0x24}}, 0x0) [ 452.649997] bridge_slave_1: mtu less than device minimum 11:46:31 executing program 2: unshare(0x44000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x8, 0x4, 0x7fff, 0x2}]}) bpf$MAP_CREATE(0x0, 0x0, 0x646966d48d0de658) r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000180)={{{@in=@multicast2, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000000080)=0x1) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@local, @in6=@ipv4={[], [], @multicast1}, 0x4e21, 0x4, 0x4e23, 0x7fffffff, 0x2, 0xa0, 0xa0, 0xaf, r1, r2}, {0x7ff, 0x101, 0x8, 0x5, 0x7fffffff, 0x9, 0x0, 0x7}, {0x0, 0x5, 0xfffffffeffffffff, 0x3}, 0x3f, 0x6e6bb7, 0x3, 0x1, 0x1, 0x3}, {{@in6=@dev={0xfe, 0x80, [], 0xc}, 0x4d4, 0x2b}, 0x2, @in=@loopback, 0x3503, 0x7, 0x3, 0x3ff, 0x5407, 0x5, 0x3ff}}, 0xe8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x6d, &(0x7f0000000040), &(0x7f0000000140)=0x8) [ 452.733277] audit: type=1326 audit(1545219991.789:41): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14736 comm="syz-executor1" exe="/root/syz-executor1" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0x0 11:46:31 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000001000)=""/246) ioctl$EVIOCGREP(r0, 0xc008744c, &(0x7f0000003000)=""/174) 11:46:31 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'lo\x00\x01\x00\x00\x00\x05\x00\x00\x00\x00\x1d\x00', 0x0}) r2 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x0, 0x2) recvmsg$kcm(r2, &(0x7f0000000240)={&(0x7f0000000040)=@rc, 0x80, &(0x7f00000000c0)=[{&(0x7f00000001c0)=""/96, 0x60}, {&(0x7f00000002c0)=""/149, 0x95}, {&(0x7f0000000380)=""/4096, 0x1000}], 0x3}, 0x2) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)=@ipv6_newaddr={0x2c, 0x14, 0x101, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r1}, [@IFA_ADDRESS={0x14, 0x1, @loopback}]}, 0x2c}}, 0x0) 11:46:32 executing program 5: r0 = fcntl$getown(0xffffffffffffff9c, 0x9) r1 = syz_open_procfs(r0, &(0x7f0000000240)='clear_refs\x00') exit(0x1000) ioctl$KVM_ASSIGN_SET_MSIX_NR(r1, 0x4008ae73, &(0x7f0000000000)={0x7f, 0x6}) fsetxattr(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00'], &(0x7f0000000100)='/cgroupem1%\x00', 0xc, 0x0) [ 452.967384] IPVS: ftp: loaded support on port[0] = 21 11:46:32 executing program 3: setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={@dev, @multicast1, @broadcast}, 0xc) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000007c0)=ANY=[], &(0x7f0000000240)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) mknod$loop(&(0x7f00000000c0)='./file0/file0\x00', 0x0, 0xffffffffffffffff) r0 = socket(0x1, 0x0, 0x6) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000180)=0x0) fcntl$setownex(r0, 0xf, &(0x7f00000001c0)={0x2, r1}) r2 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) r3 = dup3(r2, r2, 0x80000) ioctl$NBD_DO_IT(r3, 0xab03) write$binfmt_elf64(r2, &(0x7f0000000100)=ANY=[@ANYRES16, @ANYRES64=r2], 0xfed3) ioctl$SG_SET_FORCE_PACK_ID(r2, 0x227b, &(0x7f0000000280)=0x1) readv(r2, &(0x7f00000002c0), 0x1) 11:46:32 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002ff7)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000001000)=""/246) ioctl$EVIOCGREP(r0, 0xc008744c, &(0x7f0000003000)=""/174) 11:46:32 executing program 0: syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) 11:46:32 executing program 3: unshare(0x20400) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp\x00', 0x0, 0x0) setsockopt(r0, 0xff, 0x8001, &(0x7f0000000080)="041f6b6f18226fd439374eec138018bae676c2349d6772e39d084f56f95ae8a27b8fa4951f986e03b9852b1d3ba83206e13af5c341682086d3abbacacaeb2a5f6457b03b6c279d1e3600ad9894b5cb3c490bb07494257d10f4ed6bb1b3f1db97f1", 0x61) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='map\x00\x00~6\xf5\b\xd2g\xab\fz\xfe\x9f?\x00U\x1de\x9d\xa3p:\xc5{\x8e\xda\xc9\xfc\x8c]\x01\x83B\vg\x8f\xa5\x04\x00', r0}, 0x10) 11:46:32 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002ff7)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000001000)=""/246) ioctl$EVIOCGREP(r0, 0xc008744c, &(0x7f0000003000)=""/174) [ 453.525459] audit: type=1326 audit(1545219992.579:42): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14736 comm="syz-executor1" exe="/root/syz-executor1" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45a4ca code=0x0 11:46:32 executing program 0: r0 = shmget$private(0x0, 0x2000, 0x400, &(0x7f0000ffc000/0x2000)=nil) shmctl$IPC_STAT(r0, 0x2, &(0x7f0000000000)=""/168) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=@ipv6_delrule={0x30, 0x21, 0xfdb0c858e588edd, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FIB_RULE_POLICY=@FRA_DPORT_RANGE={0x8, 0x18, {0x4e20, 0x4e24}}, @FIB_RULE_POLICY=@FRA_SPORT_RANGE={0x8, 0x17, {0x4e21, 0x4e22}}]}, 0x30}}, 0x0) 11:46:32 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002ff7)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000001000)=""/246) ioctl$EVIOCGREP(r0, 0xc008744c, &(0x7f0000003000)=""/174) 11:46:32 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000140)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x87\xf6\xb6y1uoG\x18\xdc\xc8*R6\x84\xfb\xfbU\t\x00\x00\x00\x00\x00\x00\x00\xe83=\x00\x00\x00\x00\x00\x00\x00\x92\x86 t\x93\xb4\xa5\x8d\xbd\xb5<\x1a\x90\xa3U\xb9{\xba\x99\xdf(\x9a%\xef\x0eO5\xcd\xbf\xe7\n\x13\xc3+(<\x02\x83|S0\xed\x0f9:\xc8\xb5\xa0\"\x00x\xe9\x1f\xe9\xee\x17\x88%\x19\xe3\x9d\x9d|P,\xb5+\x84\xaa\x1cZd\xb1fj\xde\xc7\xf0\xd8D\xaf\x01\x01\x8e\x95X\xb9\xf5\xff\xff\xff\x7f+\xd3\x8e\x9d\xe1\x1e:!|\xa3%\xd2@M\x1b\xf3\xfe\xf1\x94\xffl~\x18\xedp\xa0\x10\x9fn\xcd\x9eK\x89\xf3\xa0\x1f\x93\xf3\xc0\x86\x04Y\xd5\xd5,\xc4\xf58y\xec\f\x16p\x9fs7\xb7\xc9\x85)\xe4\x1c\r\xdd\xe4\xe6\x91C\xec\x0e\x0e\"\xde\f\x99\xe3\xbaP\x0e\x94\xcd\x1fXl\x11\x13\xe3\xcf+>0\x8d\x01\xd4\xc3\xdf\x00\x0eDn\x05\x9dH\x9f\xa7\xceC\x18D\xe3\xf1\x1e\xb8\xa4\x9d\xae\xb9\x19\xa1\x1a\xa6\x13\x86q)/x\x85\x16\x8b2\xd5\x82dS\xd7\x16\xfc\xc6\xb3\xf6\x90\xa6\x14\x88\x1c;\xaex\x82(\xe0\xab\x91\xf0,\x9f=\xf2\x91g\xf0\xc9', 0x2, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f0000000340)='cpu.stat\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x4) ioctl$LOOP_SET_FD(r2, 0x4c00, r0) [ 454.079609] IPVS: ftp: loaded support on port[0] = 21 11:46:33 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000006580)='tls\x00', 0x95d59845436eab44) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) connect(r0, &(0x7f00000001c0)=@un=@file={0x0, './file0\x00'}, 0x3fa) sendmmsg(r0, &(0x7f0000005f00)=[{{&(0x7f0000004980)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000001500), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="18000000000000001a010000010000007d00000000000000cf1f47dced1c9d46332c995abd008365edcc782474b88a3489ef68b7c9e425a4d0cf8265579e1cde604562847f5a9f9450ca401f43e62c8398f71d9c1389b2ea05d903f480e3c2f139fb97fb8035df2d7bde"], 0x18}}], 0x1, 0x0) 11:46:33 executing program 3: unshare(0x20400) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp\x00', 0x0, 0x0) setsockopt(r0, 0xff, 0x8001, &(0x7f0000000080)="041f6b6f18226fd439374eec138018bae676c2349d6772e39d084f56f95ae8a27b8fa4951f986e03b9852b1d3ba83206e13af5c341682086d3abbacacaeb2a5f6457b03b6c279d1e3600ad9894b5cb3c490bb07494257d10f4ed6bb1b3f1db97f1", 0x61) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='map\x00\x00~6\xf5\b\xd2g\xab\fz\xfe\x9f?\x00U\x1de\x9d\xa3p:\xc5{\x8e\xda\xc9\xfc\x8c]\x01\x83B\vg\x8f\xa5\x04\x00', r0}, 0x10) 11:46:33 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002ff7)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, 0x0) ioctl$EVIOCGREP(r0, 0xc008744c, &(0x7f0000003000)=""/174) 11:46:33 executing program 1: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000100)='cpu.stat\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r0, r2, 0x0, 0x7fffffff) 11:46:33 executing program 0: r0 = shmget$private(0x0, 0x2000, 0x400, &(0x7f0000ffc000/0x2000)=nil) shmctl$IPC_STAT(r0, 0x2, &(0x7f0000000000)=""/168) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=@ipv6_delrule={0x30, 0x21, 0xfdb0c858e588edd, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FIB_RULE_POLICY=@FRA_DPORT_RANGE={0x8, 0x18, {0x4e20, 0x4e24}}, @FIB_RULE_POLICY=@FRA_SPORT_RANGE={0x8, 0x17, {0x4e21, 0x4e22}}]}, 0x30}}, 0x0) 11:46:33 executing program 5: r0 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r0, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x4e22, @remote}, 0x1, 0x1, 0x2}}, 0x2e) setsockopt$sock_void(r0, 0x1, 0x0, 0x0, 0x0) 11:46:33 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$PR_SET_THP_DISABLE(0x29, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000f40)={@loopback, @empty, 0x0}, &(0x7f0000000f80)=0xc) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000fc0)={'bridge_slave_1\x00', r1}) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r2, &(0x7f0000000240)={0x11, 0x10, 0xfa00, {0x0}}, 0x18) 11:46:33 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000498000)={&(0x7f0000d55000), 0xc, &(0x7f00008b7ff0)={&(0x7f00003c0fdc)=ANY=[@ANYBLOB="240000000001010000000000ffffffff02000000100002000c0001000500020000000000"], 0x24}}, 0x0) fstat(r0, &(0x7f0000000000)) 11:46:33 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002ff7)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, 0x0) ioctl$EVIOCGREP(r0, 0xc008744c, &(0x7f0000003000)=""/174) 11:46:33 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f0000001000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r0, 0xc1105511, &(0x7f0000000040)=0x70) 11:46:33 executing program 3: unshare(0x20400) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp\x00', 0x0, 0x0) setsockopt(r0, 0xff, 0x8001, &(0x7f0000000080)="041f6b6f18226fd439374eec138018bae676c2349d6772e39d084f56f95ae8a27b8fa4951f986e03b9852b1d3ba83206e13af5c341682086d3abbacacaeb2a5f6457b03b6c279d1e3600ad9894b5cb3c490bb07494257d10f4ed6bb1b3f1db97f1", 0x61) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='map\x00\x00~6\xf5\b\xd2g\xab\fz\xfe\x9f?\x00U\x1de\x9d\xa3p:\xc5{\x8e\xda\xc9\xfc\x8c]\x01\x83B\vg\x8f\xa5\x04\x00', r0}, 0x10) 11:46:33 executing program 2: r0 = socket$nl_generic(0xa, 0x5, 0x84) [ 454.792698] netlink: 'syz-executor0': attribute type 2 has an invalid length. ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000000)={'tun\b\x00', &(0x7f0000000240)=@ethtool_per_queue_op={0x4b, 0x7fff, [0xffffffffffffffff, 0xff, 0x3, 0x80000000, 0xa8c, 0x100000001, 0x3, 0x20000000000, 0xfffffffffffffff7, 0x200, 0x3, 0x80000001, 0x2, 0x37eb5ff0, 0x9, 0x0, 0xae9f, 0x7, 0x0, 0x100, 0xffff, 0x0, 0x8000, 0x0, 0x145, 0x7f, 0xd59f, 0xc2b7, 0x1, 0x4, 0x1, 0x5, 0x8974, 0x8, 0x1, 0x9, 0x3ff, 0x71807479, 0x4, 0x5, 0x3, 0xef, 0x4, 0x7, 0x8, 0x8, 0x70e3, 0xd1, 0x1, 0x8, 0x7f, 0x10001, 0x100000000, 0x3209f3c2, 0x1, 0x7, 0x2, 0x1, 0xfffffffffffffffb, 0x8, 0x0, 0x1c8655ee, 0x7, 0x100000001, 0x1, 0xffffffffffffff6b, 0x1ff, 0x2a, 0x80000001, 0x8, 0x1, 0x7, 0xffffffff80000001, 0x7ff, 0x4fe, 0x2c, 0x8, 0x800, 0x1, 0x9, 0x6, 0x0, 0x4, 0xaa9a, 0x800, 0xd4d2, 0x7, 0xfffffffffffffffd, 0x7ff, 0x4, 0x8, 0x7, 0x0, 0x3, 0x0, 0x2, 0x5, 0x3, 0x2, 0x3, 0xff, 0x800, 0x64c7, 0x800, 0xfffffffffffffffb, 0x7, 0x4, 0x200, 0x80, 0x81, 0x6adc, 0x1000000000000000, 0x20, 0xfff, 0xfff, 0x4, 0x6, 0x4, 0x8, 0x2, 0x0, 0x3, 0x1, 0x9, 0x64, 0x0, 0x7, 0x7, 0x50, 0x4, 0x80, 0x5, 0x3f, 0x7, 0x9, 0x7, 0x40, 0x72, 0x4e7, 0x7, 0x2, 0x9, 0x6, 0x0, 0x7, 0x5, 0xe36, 0x80000001, 0x8, 0xc9d, 0x0, 0x1, 0x800, 0x7ff, 0x40000000000000, 0x8, 0x8, 0x4, 0x100000001, 0x4, 0x7fffffff, 0x5e7c, 0x200, 0x8000, 0x4, 0x9, 0x58, 0x1, 0x5, 0x6a44, 0xbbda, 0x8001, 0x5, 0x3, 0x6, 0x2e2, 0x9, 0x9c, 0xfff, 0x399f, 0x6, 0x0, 0x80000000, 0x1, 0x1ced, 0x2000000000, 0xfff, 0x1, 0x8, 0x4000, 0xffffffff, 0x142, 0x101, 0x7ff, 0x7fff, 0x1000, 0xfffffffffffffff8, 0x6, 0xffff, 0x7, 0x80000000, 0xfff, 0xffffffffffff8001, 0x4, 0xd98f, 0x0, 0x70000000000, 0x80000001, 0x200, 0x8, 0x1f, 0x9, 0x7f, 0x3b11, 0x7, 0x1000, 0xf64, 0x5, 0x5, 0xe3, 0x3, 0xf5e, 0x80, 0x3f, 0x80, 0xfffffffffffffff8, 0xff, 0x1, 0x3, 0xffffffff, 0x4, 0x0, 0xffffffffffffff40, 0x0, 0x9, 0x3, 0xfff, 0x9, 0x502, 0x0, 0x401, 0x1, 0x9, 0x4, 0x1, 0x0, 0x8, 0x2, 0x9, 0x6, 0x6, 0x94, 0x8, 0x9, 0x1fd6, 0x6, 0x3, 0x3, 0x80, 0x0, 0x48ae, 0x3, 0x400, 0xa3, 0x7f, 0x70a, 0x20, 0x2, 0x6, 0x7, 0x4, 0xa2f, 0x2, 0x9, 0x3, 0x0, 0x200, 0x1, 0x30da00000000, 0x2, 0x8e98, 0x7, 0x20, 0xfff, 0x5, 0x5, 0x9, 0x8, 0x6, 0x4, 0x6, 0xa94, 0x100000000, 0x6, 0x6, 0x5, 0x7ff, 0x4, 0x8001, 0x6, 0x0, 0x6, 0x1, 0x3, 0x6, 0xffffffff, 0x401, 0x0, 0x6, 0x447f, 0x8, 0x0, 0xffff, 0x800, 0x6, 0x9, 0x10001, 0x401, 0x6, 0xffffffff, 0x7fff, 0xbc, 0x8001, 0x3, 0xffff, 0x8, 0xfffffffe0000, 0x3, 0x2, 0x3, 0x8, 0x1, 0x8, 0x7, 0x1, 0x100000000, 0x4, 0x4e, 0x7, 0x100, 0x8, 0x6, 0x3, 0x8, 0x2, 0x5, 0x4, 0x2, 0x80000000, 0x9, 0xfbf5, 0xf26, 0x8, 0x524a, 0x9, 0x1ff, 0x8, 0x4, 0x2, 0x0, 0x5, 0x6, 0x0, 0x3, 0x1000, 0xe62, 0x3, 0xffffffff, 0xfffffffffffffffe, 0x1f, 0x800, 0x5, 0x400, 0xfffffffffffffffd, 0x0, 0x401, 0x15, 0x7, 0x0, 0x1, 0x6, 0x9, 0x1a5, 0x1ff, 0x3, 0x7, 0x0, 0x8, 0xffffffff, 0xfff, 0x0, 0x8, 0x1, 0x0, 0x100000000, 0x2, 0x9, 0x80, 0x61d2c035, 0x0, 0x4, 0x0, 0x1b170153, 0x8a18, 0x4, 0x5, 0x4904ba7d, 0x2, 0x2, 0x0, 0x10df2ff2, 0x200, 0x5, 0xa0c, 0x1f, 0x264, 0x8, 0x8e4f, 0x77b9, 0x0, 0x1, 0x1, 0x0, 0x51c, 0x7f, 0x4, 0x2, 0x6, 0xffffffffffffff6d, 0x80000001, 0x101, 0xfffffffffffffff9, 0x6, 0x3, 0xbf, 0x2, 0x101, 0x80, 0x40, 0x7, 0x2, 0x6, 0x100000001, 0x4, 0x5, 0x101, 0x1, 0x8000, 0xffff, 0x6, 0x7f, 0x7, 0x0, 0x2, 0x44, 0x6, 0x2, 0x100, 0x2, 0x100000000, 0x7f, 0x10000000000000, 0x8, 0x200, 0x4, 0x5, 0x100000001, 0x2, 0xb0, 0x7ff, 0x0, 0xfff, 0x1000, 0xb09, 0x6, 0xffff, 0x20, 0x1, 0x6, 0x4, 0x1f, 0x3, 0x7, 0x1, 0x3, 0x3, 0x9, 0xfffffffffffffe00, 0x2, 0x1, 0x80000000, 0x0, 0x2, 0x7fff, 0x3, 0x9d86, 0x5, 0x7, 0x6, 0x7fff, 0x8, 0xd89, 0x2, 0x4, 0x7, 0x2, 0x9, 0x910, 0x40, 0x9, 0x2, 0xfc6, 0x91c, 0x5, 0x10001, 0x6a4, 0x8, 0x1be, 0x23, 0x3e1, 0x3, 0x4, 0x38bef48a, 0x200, 0x100000001, 0x3, 0x1, 0x1, 0x1, 0x2, 0x4, 0x200, 0x4, 0x7ff, 0x101, 0x2, 0x1, 0x0, 0xc91, 0x81, 0x5, 0x80, 0x80000001, 0x9, 0x0, 0x2, 0x401, 0x7, 0x6, 0x3b96c0d5, 0x40, 0x0, 0x4, 0x9, 0x80000001, 0x8b23, 0x67a, 0x1, 0x3f64, 0xffffffffffffffff, 0x53e1, 0x7, 0x0, 0x400, 0xe1, 0x7fffffff, 0x5, 0xe452, 0x20, 0x9a8, 0x38e0, 0x2, 0x2, 0x8001, 0xffffffff, 0x5, 0x4, 0x1, 0x7710, 0x7fff, 0xab40, 0x8001, 0x757e, 0x101, 0x3, 0x3, 0x100000000, 0x496e, 0x1571, 0x1, 0x0, 0x8001, 0x4, 0x101, 0x80, 0x7f, 0x1000, 0x640, 0x0, 0xe, 0x4, 0x100, 0x3, 0xfffffffffffffff8, 0x8, 0x2, 0x80000001, 0x4, 0x8, 0x8, 0x100000001, 0x401, 0x5, 0x100000000, 0x40, 0x5250, 0x6, 0x7, 0x0, 0x4, 0x200, 0xffffffff00000001, 0x401, 0x3ff, 0x9, 0x89, 0x6, 0x3b48, 0x6, 0x6, 0x7fff, 0x847b, 0x8, 0x5512, 0x6, 0x200, 0xd0000000, 0x81, 0xb8, 0xffffffffffff0000, 0x1, 0x5, 0x6, 0x71d, 0x401, 0x0, 0x0, 0x7fffffff, 0x1ff, 0x400, 0xffffffff, 0x2ce4ce5f, 0x2, 0x2, 0x3, 0x1, 0xffff, 0x1, 0x80000000, 0xffffffffffff2764, 0x800, 0x100000001, 0x1f, 0x0, 0x5, 0x6, 0x1000, 0x100000000, 0xbd05, 0x1f, 0x13, 0x6, 0x1000, 0x3, 0xd61, 0x3, 0x5, 0x10000, 0x5, 0x9, 0x2, 0x4, 0x1951, 0xfffffffffffeffff, 0x29b, 0x758b0c13, 0x3ff, 0xa96, 0x1, 0x0, 0x7fffffff, 0x716, 0x1, 0x9, 0x8000, 0x0, 0x66, 0x5, 0x1f, 0xa58c, 0x9, 0x97, 0xb5f3, 0x3, 0x101, 0xfa, 0x2, 0xdc2, 0x1, 0xed9, 0x1, 0x3, 0x7fff, 0x400, 0x4, 0x101, 0x80000000, 0x9, 0x8001, 0x5, 0x4, 0x1f, 0x1, 0x0, 0xfffffffffffffff8, 0xffffffffffff8001, 0x6ba7, 0x1, 0x9, 0xfffffffffffffffa, 0x7fff, 0x2, 0x0, 0x2, 0xfffffffffffffff7, 0x0, 0x9, 0x8, 0x0, 0x7, 0x2, 0x8000, 0x20, 0x4, 0x8, 0x1f7f, 0x101, 0x10000, 0x8001, 0x76, 0xe96, 0xeb, 0x1c, 0x10000, 0x1800, 0x2d22, 0x400, 0x5, 0x401, 0x200, 0x8, 0x0, 0x4, 0x2aa, 0x2, 0x6, 0x5, 0x5422, 0x8, 0x3, 0x4, 0xcf, 0x8, 0x1f, 0x100, 0x100, 0x5, 0x2, 0x200, 0x1, 0xffffffffffffff53, 0x96, 0x6, 0x2, 0x9, 0x8000, 0x100000001, 0x6, 0xfff, 0x9, 0x9, 0x1, 0x2, 0x7, 0xbca7, 0x1, 0x2, 0x8, 0x0, 0xdbf, 0x10001, 0x2, 0x0, 0x4, 0x4, 0xfffffffffffffff9, 0x6, 0x1, 0x2, 0x47a, 0x100000000, 0xffffffffffffffe1, 0x100000000, 0x100000000000, 0x10000, 0x3, 0x4, 0x101, 0xffffffffffff22ca, 0x8, 0x800, 0x5, 0xfffffffffffffffb, 0x0, 0x800, 0x2e79, 0x800, 0x7fff, 0x9, 0xffffffff, 0x2, 0xff, 0x0, 0x1, 0x2, 0x100000000, 0x7, 0x1, 0x341f, 0x401, 0x8, 0x0, 0x46a, 0xfffffffffffffffc, 0xff, 0x6, 0xffffffff00000000, 0x800, 0x101, 0xffffffff, 0xcb06, 0x100, 0xfffffffffffffffc, 0x4, 0x1, 0x8, 0x7, 0xa0e6, 0x1000, 0x1, 0x4c93, 0x10000, 0xfffffffffffffffd, 0x6, 0x1000, 0x5, 0x2, 0x8, 0x7a, 0x89f, 0x9, 0x65c8, 0x4, 0x4, 0xda87, 0x80000001, 0x5, 0x763a, 0x3, 0x1f, 0x175b, 0x7, 0x7fff, 0x5, 0x1000, 0xffffffffffffff81, 0xec, 0x5, 0x3f, 0x3, 0x6, 0xfff, 0x916c, 0x7fffffff, 0x2, 0x1, 0x10000, 0x100000001, 0xd17, 0x6, 0x9, 0x3, 0x3f, 0x1, 0x8, 0x6, 0x1, 0x0, 0xa3c1, 0xb, 0x70, 0x7, 0xfffffffffffffffb, 0x800, 0x2, 0x1ff, 0x5, 0x953, 0x100, 0xff, 0xffffffffffffff9f, 0x6923, 0x7f, 0x2, 0x10000000, 0x8, 0x7, 0x3, 0x100, 0x1, 0x8000, 0x4, 0x1, 0x1, 0x7, 0x8001, 0x517, 0xffffffffffffffff, 0x3, 0xffffffff, 0x9, 0x40, 0x5, 0x8000, 0xff, 0x4, 0x7fff, 0x7, 0xffffffffffffff00, 0x2, 0x2, 0x5, 0x3, 0x636, 0x4, 0x10001, 0x101, 0xa37, 0x1ff, 0x3, 0x9c1a, 0x645, 0xc1, 0x100000000, 0xbaf, 0x9, 0x81, 0xbf6, 0x2, 0x6, 0x9, 0x7, 0xff, 0x2, 0x80, 0x2, 0x0, 0x7, 0x3ff, 0x1, 0x50, 0x6, 0xc02, 0x800, 0x8, 0x40, 0x681e, 0xbde, 0x1f, 0x3ff, 0x4d1a9065, 0x4, 0x7, 0xfff, 0x7fff, 0x168, 0x1, 0xffff, 0x80, 0x4, 0x4, 0x100000000, 0x78, 0xfffffffffffffffb, 0x7, 0x7, 0x8b2, 0x7, 0x3ff, 0xfff, 0x2532, 0x3, 0x783c, 0x1, 0xa1, 0x1, 0x8, 0x1000, 0x1ff, 0xff, 0x3, 0x800, 0x6, 0x3, 0x7, 0x81, 0x0, 0xffff, 0x9, 0x3, 0xef773e7, 0x30b4, 0x8, 0x8, 0x2, 0xffffffff, 0x34, 0x8, 0x80, 0x101, 0x3ff, 0x1, 0x0, 0x3f, 0x80000001, 0x1000000, 0x9, 0x1, 0x7, 0xfffffffffffffd34, 0xdc2, 0xffff, 0x4, 0x1, 0x330, 0x9, 0x1, 0x5, 0x7fffffff, 0x4, 0x7a8b, 0x0, 0x4, 0x4, 0xa1, 0x9, 0x4, 0x8, 0xae, 0x3d, 0x3, 0x7, 0x3ff, 0x9, 0x400, 0x4, 0x13b2, 0x80000000, 0xfffffffffffffff7, 0x1, 0xffffffffffffffff, 0x6, 0xea44, 0x2, 0x0, 0xfff, 0xffff, 0x6, 0x0, 0x20, 0x4, 0x8000, 0xfffffffffffffffc, 0xffffffff97dc26fc, 0x80000001, 0x3, 0x0, 0x9, 0x0, 0x2, 0x2, 0x100000001, 0x10000, 0xfffffffffffffffb, 0x5, 0x2, 0x4, 0x3, 0x800, 0xffff, 0xf3, 0x6c, 0x0, 0x4, 0x178, 0x7c12, 0x0, 0x1, 0xfc2, 0x9, 0x0, 0x7fff, 0x9, 0x7, 0x3, 0x5b, 0x3, 0x2, 0x9, 0x6, 0x3f, 0x4, 0x0, 0xb7, 0x9, 0x6, 0x101, 0x20, 0x698, 0xfff, 0x81, 0xffff, 0x1, 0x1, 0x3ff, 0x5, 0xffffffffffffff27, 0x7, 0x80000000, 0x6cb2, 0x2, 0x8, 0xff, 0x80000000, 0x4, 0x401, 0x9, 0x6, 0x0, 0x1f, 0x101, 0xf0, 0x800, 0xcca, 0x89, 0xfffffffffffffeff, 0x6, 0x0, 0x0, 0x9, 0xffffffffffff8000, 0xde, 0x2, 0x5, 0x48, 0x5, 0x0, 0x5, 0x3, 0x80000001, 0xfff, 0x0, 0x2, 0x6, 0x8, 0x8, 0x3b, 0x1, 0x3, 0xffffffff, 0x9, 0x4f, 0x9, 0x7, 0x10001, 0x139, 0x3, 0xff, 0x5, 0x20, 0x3, 0x3ff, 0x8, 0x2, 0xffff, 0x9, 0x9, 0x800, 0x8, 0x9, 0x2337, 0x4, 0x8, 0x5, 0x8, 0x9, 0x7, 0x80000001, 0x1, 0x200, 0xfffffffffffffff9, 0x10001, 0x3, 0x9, 0x1, 0x1, 0x9, 0x9, 0x4b, 0x7f, 0x4, 0x1, 0xfffffffffffffff8, 0x5, 0x7ff, 0x1, 0x7fffffff, 0x1f, 0x9, 0x80000001, 0x3, 0x6, 0x10000, 0x0, 0x2, 0x9, 0x20, 0x7ff, 0x1, 0xfff, 0xffffffffffffffca, 0x4, 0x4, 0x2, 0x3, 0x3, 0x367a, 0x7, 0x7, 0x3, 0xfff, 0x2, 0x0, 0x1, 0x8831, 0x0, 0x1, 0x522cb408, 0x40, 0x80, 0xec11, 0x101, 0x69a, 0x1f, 0x800, 0x6, 0x4, 0x8, 0xc38, 0xfff, 0x2, 0x6, 0x2, 0x3f, 0x200, 0xd7, 0x7, 0x102000000, 0x4d, 0x4, 0x5, 0x599, 0xbe8000000000, 0x20, 0x9, 0x9, 0x7, 0x3, 0x1a8, 0xed, 0xff, 0x80, 0x358d, 0x0, 0x7, 0x2ab06a64, 0x6, 0x20, 0x6, 0xfff, 0x5e46, 0x100000001, 0x1, 0x1, 0x40e9, 0x8, 0x8, 0x7ff, 0xd1c, 0xfffffffffffffffa, 0x9, 0x8000, 0xff, 0x7, 0x4, 0xffff, 0x5, 0x5, 0x6, 0x4, 0x6, 0xffff, 0x2, 0x7, 0x5c7b, 0x8, 0x7, 0x2, 0x8, 0x10000, 0x4, 0x6, 0x40, 0x6, 0x100, 0x800, 0x3, 0x0, 0x100000000, 0x4ca75f3e, 0xfcd, 0x8, 0xffffffffffffffff, 0x9, 0x3ff, 0x60, 0xffff, 0x2, 0x3, 0x401, 0x1, 0x8, 0xe4, 0x2, 0x81, 0x7, 0x6, 0x9d1, 0x5, 0x2, 0x80, 0x1, 0x80000000, 0xffffffff, 0x8, 0x4, 0x100000000, 0x3, 0x1000, 0x8, 0x101, 0xd3, 0x3, 0x8, 0x800, 0x0, 0x4, 0xe25, 0x308690ea, 0xffffffff, 0x3, 0xfffffffffffffffc, 0x9, 0x3ff, 0x5, 0xffffffff, 0x2, 0x8, 0x2, 0x8, 0x3f, 0x0, 0x1, 0x1ff, 0x1, 0xfffffffffffffffc, 0x5, 0x5, 0x7, 0x100, 0x800, 0x1, 0x7, 0x8001, 0x1, 0x4, 0x8, 0x3f, 0x0, 0x7fffffff, 0x59, 0xcf, 0x4, 0x1ef, 0xffffffffffffffff, 0x4, 0x6, 0x1, 0x400, 0x23c, 0x2, 0x0, 0xfffffffffffff262, 0xfffffffffffffff7, 0x3f, 0x7, 0x4, 0x5, 0x572, 0x7ff, 0x1f800000, 0x5, 0x4, 0x9, 0xfffffffffffffffa, 0x8001, 0xfffffffffffffff9, 0xd61, 0x3, 0xff, 0x80, 0x5, 0x7, 0x7, 0x0, 0x0, 0x7, 0x3, 0x2e, 0x6, 0x7, 0x3, 0x3, 0x80000000, 0x5, 0x4, 0x2, 0x8, 0x4, 0x7fff, 0x8, 0x400, 0x6ee22936, 0x9, 0x4, 0x10000, 0x0, 0x3, 0x3, 0x1000, 0x7, 0x0, 0xf2a, 0x400, 0x8, 0x0, 0xffffffff, 0x10001, 0x8000, 0xff, 0x80000000, 0x9, 0x3, 0x5, 0x4, 0x2, 0x1, 0x5, 0x5, 0x5, 0xcc3, 0x2ce3, 0x1, 0x0, 0x3, 0x400, 0x2, 0x9, 0x3, 0x100000000, 0x362, 0x8a000, 0x5, 0x1000, 0x7fffffff, 0x4, 0x2b8b, 0x3, 0xe0, 0xfffffffffffffffb, 0x9f, 0x80000001, 0x800, 0x0, 0x4501, 0xd44, 0x2, 0x98, 0x4, 0x3, 0x5, 0x7f, 0x5a, 0x4, 0x8, 0x9, 0xc915, 0xfffffffffffffffc, 0x80, 0x2, 0x401, 0x6, 0x1, 0xc35, 0x7ff, 0x7b2, 0x2, 0x9, 0x8, 0x100000000, 0x8000, 0x4, 0x6, 0x6, 0x5, 0x5, 0x973, 0x7fff, 0x3, 0x3, 0x1, 0x9a, 0x2, 0x5, 0x3, 0x1, 0x4, 0x1ff, 0xff, 0x100000000, 0xffffffffffffff9a, 0x7f, 0xff, 0x1, 0x2, 0xc6, 0x3, 0x2, 0x2, 0x800, 0x180000, 0x20, 0x8c5, 0x0, 0x3ff, 0x1, 0x3f, 0x6, 0xfdf, 0x3, 0x7f, 0x4, 0x8, 0x2, 0x2, 0x800, 0x3ff, 0x6, 0x10001, 0x4, 0x8, 0x76, 0x100000001, 0x2, 0x1c7f, 0x100000000, 0x9, 0xfffffffeffffffff, 0x4, 0x9a, 0xffffffff7fffffff, 0x8001, 0x9, 0x3, 0x10000, 0x1, 0x5, 0x9, 0x3, 0x4, 0x63, 0x80000001, 0x7, 0x8c, 0x3, 0x37c, 0x3, 0x9, 0x2, 0x8000, 0x1c5, 0x1, 0x0, 0x8, 0x5, 0x100, 0x81, 0xc624, 0x1, 0x7, 0x0, 0x3, 0xfff, 0x1, 0x81, 0xc74, 0x8001, 0x2, 0x4, 0x0, 0x7, 0x1, 0x2, 0x10, 0x9, 0x1, 0x9, 0x6, 0x0, 0x101, 0xffffffff, 0x1, 0x3f, 0xffffffff, 0x8, 0x8f3c, 0xe000000000000000, 0x10001, 0x86, 0x0, 0x4, 0x5, 0x51, 0x1f, 0x400, 0x2, 0x80, 0x9, 0x1ff, 0x6, 0x2, 0x3, 0x4, 0x8, 0x7, 0xffff, 0x3, 0x6, 0x72e, 0x3f, 0x7, 0x8d2, 0x8, 0x3, 0x5, 0x2, 0x4, 0x0, 0x100000001, 0x0, 0x6, 0x100, 0x85, 0x2, 0x6, 0x0, 0x800, 0x7, 0xcf6, 0x85c, 0x3, 0x80000001, 0x4, 0x8, 0x4, 0x40, 0x8, 0x100, 0x1ff, 0x4, 0x9, 0x49e6, 0x2, 0x401, 0x0, 0x4, 0x6, 0x100, 0x0, 0x40, 0x0, 0xaf, 0x9, 0xabbb, 0x289c3b0b, 0x99e, 0x1, 0x1, 0x6, 0x81, 0x100000001, 0x7, 0xbc, 0x80000000, 0x9, 0x7, 0x200, 0x3108dba2, 0x100000000, 0xc76, 0x5c, 0x800, 0x401, 0x9, 0x8d2, 0x1, 0x1, 0x0, 0xfffffffffffffa6e, 0x0, 0xff, 0x100, 0x4, 0x6, 0x3, 0xff, 0x6, 0x401, 0x0, 0x40e9, 0x4, 0x8001, 0x1ff, 0x0, 0x3f, 0x80, 0x18000000000000, 0x1, 0x1ff, 0x2, 0x7ff, 0x200, 0x81, 0xdb98, 0x8, 0x80000001, 0x7, 0x3a, 0x8, 0xfffffffffffffffa, 0x3, 0x8b, 0x5, 0x2, 0x9, 0x8001, 0xd51f, 0x4, 0x7, 0x4, 0x200, 0xfffffffffffffffd, 0x0, 0x80000000, 0xfff, 0x0, 0x8, 0x4, 0x3f9, 0x7, 0x200, 0x7fff, 0x4f, 0x800, 0x2, 0x0, 0x7, 0x1, 0x2c6e, 0x400, 0x7fff, 0x2, 0x8, 0x20, 0x8, 0xfffffffffffffff9, 0x80, 0x1, 0x9, 0x0, 0x7, 0x0, 0x6, 0x3, 0x3, 0x100000001, 0x8, 0x800, 0x3f, 0x8, 0x9, 0x7, 0x2, 0x9, 0x5, 0x3c, 0x9bb, 0x1, 0x200, 0x763, 0x3, 0xffffffff, 0xfffffffffffffffd, 0x3ff, 0x100000000, 0x1, 0x7, 0x6, 0x1, 0x6, 0xffffffff, 0x1ff, 0x8, 0xd022, 0xd96, 0x768d, 0xfffffffffffff8bd, 0x4, 0x7, 0x100000001, 0x10000, 0x800, 0x61, 0x1a, 0x80000001, 0xfffffffffffffffe, 0x7, 0x47af, 0x1000, 0x400, 0x1ff, 0xdfc7, 0x7, 0x49, 0x1ff, 0x0, 0x3, 0x8, 0x100, 0x5, 0xb6, 0xf0, 0x1, 0xffffffff, 0x30f, 0x5, 0x50c9, 0x6, 0x0, 0x0, 0x9, 0x4a, 0x3, 0x3, 0x20, 0x8, 0x5, 0x0, 0x4, 0x1000, 0x1, 0x7, 0x7, 0xffffffff, 0x1, 0x7, 0xd9, 0x8, 0x1000, 0x2e92c2e1, 0x2, 0x6b, 0x10000, 0x1000, 0x92, 0x80, 0x8, 0x10001, 0x3, 0x100000000, 0x8, 0x0, 0x6, 0x10000, 0xa31f, 0x0, 0xe00000000, 0x6, 0x80000001, 0x4, 0x63d2000000, 0x1b1, 0x2, 0x4, 0x6, 0x0, 0x81, 0x7, 0x7, 0xfbd6, 0x8, 0x1, 0x800, 0x1, 0xf4, 0x7, 0x6, 0xffffffffffffffff, 0x2, 0x6, 0x9, 0x0, 0x6, 0x5, 0x0, 0x61, 0x9, 0x3, 0x2, 0xffffffffffffffff, 0x4, 0x401, 0x1, 0x7fff, 0x2, 0x7, 0x3, 0x401, 0x6, 0x5, 0x43c2, 0x8, 0x7, 0x7, 0x1, 0x80, 0x100000000, 0x0, 0xb66, 0x8, 0x7f, 0x0, 0x1, 0x1000, 0x7, 0xc, 0x1, 0x9, 0x7fff, 0x6, 0xf8, 0x100000000, 0x0, 0x5, 0x1f, 0x5, 0x1, 0x81, 0x3, 0x3e8, 0x9, 0x2, 0x6, 0x30000000000000, 0x4, 0x9, 0x7fffffff, 0x80000001, 0x5, 0x8, 0x4, 0x1, 0xffff, 0x6, 0x7, 0x7, 0x9, 0x100000000, 0xa4a, 0x100000000, 0x80000000, 0x100, 0xfff, 0x640, 0x7, 0x7, 0x5, 0xfffffffffffffffd, 0x8000, 0x2, 0x7, 0x40, 0x2, 0xe84, 0x3, 0x7, 0x17, 0x6, 0x3, 0x661c, 0x0, 0x4, 0x8000, 0x1, 0x2, 0x81, 0x1000, 0xb0e, 0x7, 0x1d, 0x101, 0x5546394f, 0x0, 0x1000, 0x1, 0x6, 0x100, 0x3, 0x1, 0x8001, 0x7fff, 0x4, 0x100000000, 0x3f, 0x23, 0x3, 0x7, 0x6, 0x3, 0xffff, 0x100000001, 0x7fff, 0x9, 0x1e88, 0x3, 0x2, 0x3ff, 0xe90, 0x5, 0x7f, 0x10001, 0x7, 0x2, 0x2, 0x59, 0xffff, 0x6, 0x7fff, 0x7ff, 0x433c, 0x4, 0x2, 0x7, 0x0, 0x5, 0xe663, 0x1dc, 0x45, 0x400, 0x9, 0x8, 0x3, 0x7fff, 0x79, 0x3, 0x4, 0x5, 0x8001, 0x10001, 0x2, 0xc0, 0x1, 0xa23, 0x1, 0x80, 0x9, 0xffffffffffff0feb, 0xbbd, 0x400, 0xfffffffffffeffff, 0x10000, 0x5, 0xfff, 0x5, 0xfffffffffffff000, 0x4, 0x101, 0x7, 0x8000, 0x8, 0xe253, 0x7, 0x5, 0x800, 0x5a, 0x5, 0x63, 0x4a, 0x1, 0xb3, 0x80000001, 0x1ff, 0x7, 0x8b4, 0x10001, 0x2, 0x9, 0x6, 0x5c, 0x4, 0x7f, 0x2, 0x800, 0x3, 0x7ff, 0x670, 0x3, 0x1, 0xd837, 0xcd2, 0xffffffff, 0x3, 0x7, 0x8, 0x7fff, 0x8000, 0x7fff, 0x2, 0x6, 0x3f, 0x81, 0x500000000000000, 0x3f, 0x3d2d, 0x4, 0x8, 0x6, 0xfff, 0x3ff, 0x0, 0x101, 0x0, 0xff, 0x2, 0xa090, 0x1f64, 0x7fff, 0xff, 0xe754, 0x1, 0x8, 0x4, 0x7f, 0x3ff, 0xae2b, 0x1, 0x3, 0xed48, 0x5, 0x4, 0x0, 0xcf8, 0x7, 0x8, 0x4, 0xfffffffffffffff7, 0x10000, 0xfffffffffffffff8, 0x4, 0x7fff, 0x4, 0x1, 0xfffffffffffffeec, 0x1, 0xfffffffffffffe00, 0x1, 0x0, 0x0, 0x100, 0x40, 0x80000000, 0x100000001, 0x3ff, 0x7fffffff, 0x9, 0xffffffffffffff01, 0x9, 0x8, 0x8c5, 0x80000001, 0x800, 0x6, 0x2, 0x3f, 0x8a2, 0x8, 0x0, 0x1000000, 0x0, 0x5, 0x5, 0x89, 0x99b07d6000000000, 0x5, 0x1, 0x0, 0x2, 0x0, 0xff, 0xfffffffffffffffd, 0x9, 0x6, 0x0, 0x1, 0x3, 0x1000, 0x80000001, 0x8, 0x3, 0x2, 0x4, 0x7ff, 0x1, 0x10000, 0x4, 0x0, 0x10001, 0xfff, 0x1, 0x80, 0x7f, 0x101, 0x5, 0xfff, 0x9, 0x4, 0x100000001, 0x6, 0x2, 0xf8e0000, 0x3, 0x3d4e, 0x5fa, 0x9, 0x1, 0x80000001, 0x2, 0x6, 0x38b, 0x0, 0x2, 0x1, 0x400, 0x7f, 0x0, 0x0, 0x400, 0x7, 0x0, 0x9, 0x0, 0x1f, 0x100, 0x5, 0xfffffffffffffffb, 0x80, 0x8, 0x4, 0x51a2, 0x10000, 0x8, 0x0, 0xffffffffe9c257b0, 0x0, 0xffffffff, 0xffff, 0x7, 0x8001, 0x1f6, 0x3, 0x3, 0x80, 0x10000, 0x1f, 0x0, 0x7f, 0x7, 0x6, 0x1ff, 0x8001, 0x0, 0x200, 0x20, 0x0, 0x4, 0x9, 0x8, 0x9, 0x1, 0x28, 0x9, 0x4, 0x6, 0x4, 0xffffffffffffff7f, 0x1ff, 0x32f1cc32, 0x10000, 0x802, 0x80000001, 0x3, 0x401, 0x0, 0x8, 0x8, 0x5, 0x908, 0x1f, 0x8, 0x1, 0x50, 0xb9, 0x5, 0x7, 0x3, 0x1, 0x2, 0x1, 0x1, 0x8, 0x100000000, 0x1ff, 0x1, 0x36, 0xf50, 0x5, 0x8, 0xc8, 0xffffffffffff3ca0, 0x1, 0x1, 0x19933cf1, 0x1f, 0x4, 0x5, 0xfffffffffffffffc, 0x80, 0x2, 0xffffffff, 0x0, 0x800, 0x81, 0x9, 0xfffffffffffffff8, 0xffffffffffffd1ef, 0xb0, 0x2, 0x1, 0x9, 0xffffffffffff7e5c, 0x1, 0xfffffffffffeffff, 0x3ff, 0x9, 0x8001, 0x4, 0xfffffffffffffffd, 0x0, 0x7e, 0xd3, 0xfff, 0x7, 0x6, 0x0, 0x5, 0x20, 0x3, 0x9, 0x800, 0x6, 0x9da, 0x1ff, 0x3, 0x100000001, 0x1000, 0x4, 0x4, 0x1, 0x3, 0x0, 0x5, 0xc07, 0x401, 0x1ff, 0x9, 0x20, 0x8001, 0x4, 0xe50, 0x0, 0x82f5, 0xbd7e, 0x19eea6bf, 0x648, 0x2, 0xfffffffffffffffd, 0x5, 0x8, 0x5, 0x83c, 0x8, 0x723e, 0x100000000, 0x5, 0x5d, 0x3, 0x2d1, 0xcca, 0x4, 0xffffffffffffff70, 0x80000001, 0x0, 0x10001, 0x8, 0x3ff, 0x10, 0x0, 0x1, 0x7228, 0x20, 0x708103e1, 0x0, 0x4ba6, 0x4, 0x869d, 0x6, 0x3, 0x3, 0x0, 0x87, 0x7c000, 0xfffffffffffff800, 0x3, 0x4, 0x8, 0x7f, 0xffff, 0x1, 0x10000, 0x2, 0x2, 0x74a, 0x0, 0xdd, 0x1ff, 0x100000000, 0x1000000000000000, 0x5, 0x7f, 0x7, 0x3, 0x1, 0x1, 0x9, 0x1f, 0x32, 0x1, 0x8, 0xc68, 0xd54e, 0x4, 0x3, 0x0, 0xb3, 0x9, 0x2, 0x7fff, 0x397, 0x1000, 0x6, 0x100000001, 0x60dbe030, 0x80000000, 0x2, 0x7fffffff, 0x6, 0x4, 0x7, 0x32e4, 0x10000, 0x9, 0xff, 0x3, 0xffffffff00000000, 0x6, 0x0, 0x21c531c3, 0x200, 0x10001, 0xffffffff, 0x20, 0x9, 0x9, 0x4000000, 0x9, 0x6, 0x200, 0x7fff, 0x7, 0x9, 0x0, 0xffff, 0x1, 0x1000, 0x5, 0xb, 0x6, 0x4, 0x6, 0xd87, 0x2, 0x8, 0x7, 0x100000000, 0x8, 0x74, 0x100, 0x3, 0x4, 0xffff, 0x0, 0x6, 0x5, 0xffffffffffffff81, 0x8, 0x8001, 0x7fffffff, 0x26, 0x10000, 0x5, 0x2, 0x9, 0x8, 0x5, 0x40, 0x1, 0x9, 0xfffffffffffffffd, 0x0, 0x7f, 0x8, 0x349, 0x5, 0x4, 0x861, 0xb3, 0x44, 0x6, 0x8001, 0x7fd, 0x9, 0x8000, 0x7fffffff, 0x10000, 0x4, 0x7, 0x1, 0x2, 0x1958, 0x101, 0xffffffffffffffff, 0x79, 0x399, 0x5, 0x6, 0xfa, 0xfffffffffffffffe, 0x1ae2, 0x7, 0x5, 0x8, 0x7, 0x100000001, 0xc00000000000, 0x0, 0x3, 0x8, 0x9, 0xfe, 0x1, 0x6, 0xfffffffffffffffe, 0x9, 0x2, 0x8, 0x9, 0x0, 0x2, 0x257, 0x2, 0xe31, 0x1, 0xffffffff, 0xd3, 0x8, 0x9, 0x8, 0x7, 0x11, 0x2, 0x6, 0x9, 0xa602, 0x3, 0x2, 0x2, 0x8, 0x7fffffff, 0x9, 0x5, 0x0, 0x2, 0x0, 0xfffffffffffffff9, 0x0, 0x4, 0x52f, 0x5, 0x5, 0x0, 0x9, 0x8, 0x3, 0x80000001, 0x200, 0x3, 0x0, 0x1, 0x5, 0x0, 0x3, 0xce, 0x690, 0x1f, 0xfffffffffffffff7, 0xff, 0x80, 0x3, 0x7, 0x1f, 0xbf, 0x1, 0x1, 0x0, 0x4, 0x7, 0x1, 0x8, 0xfffffffffffffff9, 0xdad, 0x92, 0x6, 0x0, 0x6, 0x4, 0x8, 0x3, 0x3f, 0x0, 0x7, 0xfffffffffffffff7, 0xffffffffffff6cb3, 0x0, 0x5, 0x10001, 0x1, 0x5, 0x1f, 0xeb, 0x4, 0x5, 0x6, 0x3, 0x0, 0x0, 0x0, 0x8, 0x3, 0xffffffff80000000, 0x0, 0xff, 0x800000000, 0x7ff, 0x5, 0x2, 0x9, 0x9, 0x7fff, 0x7, 0x2, 0x80000000, 0x4, 0x9, 0x6f, 0x8, 0xfffffffffffffe00, 0xffff, 0x10001, 0x5, 0x84, 0xd47, 0x100, 0x5, 0x100000000, 0x7, 0x0, 0x0, 0x7fffffff, 0x6, 0x4, 0x6, 0x8, 0x7ff, 0x4, 0x1, 0x3ff, 0xfff, 0x8, 0x40, 0x9d6, 0x496e, 0x7f, 0x9, 0x1, 0xe63, 0x1000, 0x4, 0x400, 0x0, 0x0, 0x80000000, 0x0, 0x9, 0x5, 0xc1, 0xaa8, 0x101, 0x2, 0x939, 0xa3ed, 0x7ff, 0x4, 0x1, 0x0, 0x9, 0x5, 0x3, 0x0, 0x23, 0xfff, 0x8001, 0x10000, 0x16eae9f7, 0xffffffffffff8001, 0x6, 0x1, 0x0, 0x0, 0x1, 0x80, 0x7fffffff, 0x10000, 0x1, 0x7, 0xa3, 0x9, 0x2, 0x0, 0x8000, 0x0, 0x2000, 0x40, 0x4, 0xe6, 0x800, 0x283, 0x8000000000000000, 0x1, 0x1, 0x9, 0x4, 0x1ff, 0x400, 0x1, 0x1, 0x1, 0x101, 0x400, 0x800, 0x200, 0x66d, 0xff, 0x8, 0x8, 0x100000001, 0x3, 0x8, 0x80000000, 0x2, 0x6, 0x3c71, 0xd90c, 0x1ff, 0x2, 0x8, 0x1, 0x3, 0x100000000, 0x6, 0x100, 0x97, 0x7, 0xfed, 0x4, 0x18a, 0xfd3, 0x3ff, 0x401, 0x8, 0x1000, 0x400, 0x7, 0x20, 0x1, 0x400, 0x2, 0x272851a6, 0x81, 0x1ff, 0x400, 0x4, 0x2, 0x4, 0x20, 0x0, 0x3, 0x4, 0x7fffffff, 0x2c, 0xff, 0xfc00000000000000, 0x6, 0x40, 0x5, 0x4, 0x8001, 0x3, 0x8001, 0x401, 0x9f, 0xe000000000000000, 0x1000, 0xf, 0x9, 0x100000000, 0x9, 0x1, 0x4, 0xd5f, 0x1, 0x1, 0x0, 0x8, 0x80000000, 0xff, 0x0, 0xfffffffffffffffb, 0x9, 0x7, 0x8, 0x0, 0x1, 0x80000000, 0x1ff, 0x6, 0x4, 0x6, 0x5, 0x4, 0x1, 0x400, 0xffff, 0x9, 0x7, 0x6, 0x40, 0x3ff, 0xffffffffffffff5e, 0x6, 0x20, 0x5, 0x1, 0x1ff, 0x0, 0x1, 0x80, 0x7fff, 0x7, 0x4, 0x7, 0x40, 0x3, 0x2, 0x4, 0x80, 0xb66, 0x20, 0x7, 0x6e, 0xffffffff, 0x5, 0x7f, 0x2, 0x80000000000, 0x2, 0x279, 0x28, 0x2, 0x10001, 0x80000001, 0x8, 0xf4, 0x7fff, 0x2, 0x9, 0x8, 0xb0, 0x2, 0x5, 0xffff, 0x5, 0x2, 0x9, 0x74a5cc90, 0x0, 0x7, 0x5, 0x8, 0x7, 0x7fff, 0x23ec, 0x7fffffff, 0x4, 0x5, 0xe7, 0xaf, 0x4, 0x100, 0x801, 0x80000001, 0x0, 0x8, 0x5, 0x3, 0x40, 0x3dd, 0x7, 0x200, 0x0, 0x1ff, 0x2, 0x40, 0x2, 0x8, 0x5, 0xa5, 0xffffffff, 0x200, 0x3, 0x1400, 0x101, 0x401, 0x3ff, 0x4c703fdd, 0x0, 0x80000001, 0xe8, 0x5d08, 0xba, 0x8, 0x80, 0x2d4, 0x2, 0xfffffffffffffffb, 0x8c86, 0x9, 0x3, 0x4, 0x20, 0x1f, 0x100000001, 0x80000000, 0xfffffffffffffffc, 0x8, 0xda6, 0x7fff, 0x100000001, 0x5, 0x5ac, 0xbc3, 0x3, 0x3, 0x2, 0x3, 0x7, 0x1, 0xb791, 0x8, 0x2, 0x7, 0x5, 0xca06, 0x401, 0x9, 0x9, 0xfffffffffffffffe, 0x5, 0x800, 0x4fd8, 0x1, 0x7fffffff, 0x966d, 0x9, 0x4, 0x4, 0x8, 0x7, 0x1, 0x81, 0x7fffffff, 0x1000000000000000, 0xd1, 0x9, 0x2, 0x8, 0x3ff, 0x1, 0x6, 0x100000000, 0x9, 0x0, 0x5, 0xfffffffffffffff8, 0x3, 0x1, 0xa42, 0xdb, 0xfffffffffffff001, 0xe65, 0x6414, 0x1, 0x6, 0x7, 0x101, 0x1, 0x9, 0x9, 0x7, 0x3, 0x80000000, 0x10001, 0xffffffffffff8309, 0x4, 0x7fffffff, 0xa0f, 0x8, 0x153d, 0x11d, 0x6, 0xc137, 0x2, 0x0, 0xfffffffffffffffc, 0x200, 0x96c1, 0x4, 0x1ff, 0x10001, 0x4b, 0x7fff, 0x6, 0x3ff, 0x5, 0x6, 0x215d1c01, 0x101, 0x4, 0xffffffffffffff81, 0x2, 0x4, 0x7, 0x9881, 0x8, 0xbc, 0x100, 0x10001, 0xdc, 0x8, 0x4, 0x96, 0x4, 0x0, 0xfffffffffffffffc, 0x5, 0x0, 0x1, 0x1, 0x80, 0x7, 0x10001, 0x6, 0x2, 0x7f, 0x40, 0x1, 0x9, 0x5, 0x8, 0x8, 0x4c5f6c0f, 0x10000, 0x2d, 0x1, 0xffff, 0xff, 0x3f, 0x8, 0x10000, 0x3, 0x8001, 0x1, 0x5, 0x1, 0xf8c0, 0xb9, 0x81, 0x5, 0xb66, 0x6, 0x1000, 0x9, 0x0, 0x3, 0xfffffffffffffffa, 0x20, 0x1, 0x80000001, 0x8, 0x5, 0x6, 0x80, 0xffffffffffff60a8, 0x8000, 0x7f, 0x1, 0x8, 0x8001, 0x3f, 0x4c95f2c, 0x8, 0x6, 0x0, 0x8, 0x0, 0xde39, 0x1, 0x0, 0xf1, 0x7fff, 0xc3, 0x9, 0x1ff, 0x100, 0x1000000000, 0x9, 0x0, 0x7, 0x7fff, 0x8, 0x9, 0x5, 0x100000000, 0x5, 0x2, 0x5, 0x4, 0xffffffff, 0x3ff, 0x0, 0x22889723, 0x22, 0x80000001, 0x1, 0x8, 0x7, 0x1, 0x7fffffff, 0x7, 0x8, 0x0, 0x80000000, 0x3, 0x5be, 0x9, 0x343, 0x6, 0x2, 0x7, 0x7, 0x6, 0x80, 0x5, 0x1, 0x6, 0x9, 0x5, 0x1, 0x5, 0x6, 0x7, 0x6, 0x5, 0x3, 0x4, 0x1f, 0x7, 0x30ae, 0x0, 0x2, 0x3, 0x200, 0xa35, 0x3, 0x21, 0x85c, 0x0, 0x4, 0xffffffffffffffff, 0x1f, 0x0, 0x1c3, 0x24fdf1f2, 0x1, 0x7f, 0x20, 0xa3a, 0x0, 0x21, 0x4, 0x9e3, 0x74d85771, 0x5, 0x20, 0xec, 0x40, 0xc5, 0x401, 0x100000001, 0x5, 0x0, 0x9, 0x1, 0x56, 0xff, 0x9, 0x6, 0x83ce, 0x9, 0x0, 0x0, 0x1, 0x100000000, 0x7, 0x400, 0x0, 0x7, 0x5, 0x401, 0x2, 0xe1c, 0x6, 0x1, 0x37, 0x0, 0x6, 0x3, 0xffffffffffffff46, 0x8, 0x2fb, 0x200, 0x9, 0x1, 0x208, 0x4, 0x91, 0x2, 0x3f, 0x0, 0x1, 0x1, 0x200, 0x5, 0x8002, 0x7fffffff, 0xfffffffffffffff8, 0x400, 0x49e0, 0x7fffffff, 0x0, 0x3, 0x198, 0x8, 0x1000, 0x10001, 0x8000, 0x2, 0x3ff, 0x0, 0x101, 0x1f, 0x6, 0x1, 0x40, 0x100, 0x1, 0x401, 0x0, 0x100, 0x8, 0x7fff, 0x3, 0x1a8f, 0x1, 0x3, 0x7fff, 0x2, 0x2, 0x4, 0xef16, 0x1000, 0x5, 0x1, 0x9, 0x8, 0x3, 0x8, 0x6, 0x1, 0x9, 0x9, 0x7, 0x3, 0x50, 0x0, 0x9, 0x200, 0xffffffff, 0x1000, 0x4, 0x418d, 0x9, 0x9, 0x4372, 0xfc, 0x4, 0xffff, 0x6519, 0x6c, 0x3, 0x66, 0x3, 0x6, 0x4, 0x7, 0x6, 0x5, 0x0, 0x8, 0x8, 0x100000001, 0xdcd, 0x20, 0x7, 0x1, 0x7fffffff, 0x5, 0x9, 0x0, 0x9, 0x7ff, 0xdb86, 0x0, 0x1, 0xffffffff, 0xe8, 0x4, 0x0, 0x3, 0x0, 0x574, 0x7, 0xa29, 0x4, 0x1, 0x6, 0x7, 0xff, 0xe0, 0x82, 0x3d23, 0x7ff, 0x4, 0x34eb, 0x4, 0x1, 0x80000001, 0x64e, 0x3f61, 0x1, 0xffffffff00000001, 0x3, 0x1, 0x4, 0x100, 0x7, 0x6000000, 0x9, 0x1ff, 0x2, 0x10001, 0x1, 0x401, 0x0, 0x1, 0x20, 0x9, 0x6, 0x4, 0x0, 0x8, 0x100000001, 0x1, 0x2, 0x1, 0xc0, 0x5, 0x9, 0xcb4, 0x4, 0x81, 0x4000400000000000, 0x8001, 0x80, 0xd5, 0xfffffffffffffff8, 0x1, 0x6, 0x7, 0x9, 0x4, 0xc1ba, 0xf1d, 0x3, 0x5, 0x2, 0x8, 0x8, 0x445, 0x0, 0x0, 0x0, 0x87cd, 0x7fff, 0x200, 0x2, 0x6, 0xffff, 0x10000, 0xffffffffffff945a, 0x5, 0x0, 0x7, 0x7, 0x1, 0x0, 0x3fb, 0x4c6, 0x0, 0x4, 0x3, 0x80000000, 0x4, 0xffffffffffffffc7, 0x5, 0xfffffffffffff054, 0x10001, 0xfffffffffffffffe, 0x3, 0x8000, 0x0, 0x8, 0xfffffffffffffffc, 0x10001, 0x4, 0x5, 0x1, 0x24e51a40, 0xead1, 0x3, 0x8, 0x9, 0x1258, 0x7, 0x0, 0xffffffff, 0x4, 0x80000000000, 0x81, 0x1, 0x8, 0x3, 0x9, 0x9, 0x200, 0x8000, 0x4, 0x20, 0x6, 0x100000001, 0x6, 0xffffffffffffff7f, 0x9, 0x1, 0x9, 0x9, 0x1ff, 0x8, 0x100000000, 0x3f, 0x5, 0x7, 0xaba, 0x91, 0x50e6a0d8, 0x2, 0x8, 0x8001, 0x3, 0x100, 0x1, 0xda3, 0x7fffffff, 0x7fff, 0x6, 0x1, 0x6, 0x6, 0x2, 0x23, 0xd68, 0x3f, 0x800, 0x8, 0x7, 0x38c, 0x8, 0x8001, 0x8, 0xff, 0x10001, 0x2, 0x10000, 0x3, 0x0, 0x4, 0xa020, 0x4, 0x7, 0x9, 0x401, 0xffff, 0x7fff000000000000, 0x7fffffff, 0x20, 0x13f65ddc, 0x3, 0xfffffffffffffffb, 0xfffffffffffffd07, 0x5, 0xf78a, 0xffffffffffffff00, 0x0, 0xfffffffffffffffe, 0x515, 0x5, 0x80000000, 0x1000, 0x7, 0x2, 0x800, 0x33, 0x800000, 0x120000000, 0x101, 0x9, 0xff, 0x9, 0x5, 0x1, 0x20000000000, 0x81, 0x10000, 0xfffffffffffffff8, 0x0, 0x200, 0x7f, 0x7, 0x1, 0x6, 0x4, 0x10000, 0x8, 0x100000001, 0x8, 0x6, 0x7, 0x566, 0x4, 0x1, 0x891, 0x2, 0x100000000, 0x1f, 0x326a, 0x100000000, 0x11b, 0x9, 0xffff, 0x7fffffff, 0x4, 0x4, 0xfea6, 0x754a7823, 0x0, 0x0, 0x4, 0xfffffffffffff881, 0x21, 0x9087, 0x7, 0x100, 0x401, 0x1, 0x1, 0x4, 0x80000000, 0x3ff, 0x3, 0x7, 0x3b62ccf, 0x40, 0x5, 0x3, 0xde, 0x4, 0x1, 0x3cc, 0x8001, 0x2, 0x3, 0x8, 0xb2, 0x9a7, 0xdc37, 0x1627, 0x7, 0x10001, 0x1, 0x8, 0x120000000000000, 0x0, 0x9, 0x4, 0x2, 0x101, 0x3ff, 0x2283adda, 0x20, 0x3f, 0x199d, 0xad62, 0x2, 0x40, 0x4, 0x8, 0x80000001, 0x3, 0x7ff, 0x4, 0x81, 0x7, 0x800, 0x1, 0x101, 0x7fff, 0xedb4, 0x3, 0x91138be, 0x9, 0xf82, 0x3, 0x7, 0x3, 0x9, 0x8, 0x8a, 0x1, 0x34, 0x80000000, 0x2, 0x4, 0x942b, 0xfffffffffffffffb, 0x2, 0x0, 0x8, 0xff, 0x1, 0xffffffff, 0x10001, 0x6, 0x9, 0x5, 0x3, 0xf6, 0x1, 0x8, 0x20, 0x2, 0x6, 0xfffffffffffffff8, 0xf2, 0x5, 0x4, 0x8, 0x1000, 0x20, 0x8001, 0x0, 0x200, 0x1, 0x3f, 0x6, 0x0, 0x759, 0x6, 0xce1b, 0x8, 0x80000001, 0x6, 0x200, 0x4, 0xba6, 0x9, 0x5, 0x5, 0x8, 0x2, 0x7dd, 0x1f, 0xbaa, 0x1, 0x4, 0x4, 0x59f, 0x2, 0x3e0, 0x1, 0x4, 0x6, 0xffff, 0x3, 0x3295, 0x2, 0x5, 0xa9, 0x3c5, 0xfff, 0x401, 0x9, 0x5, 0x8, 0x5, 0x7a4c, 0xc63, 0xff, 0xfffffffeffffffff, 0xc000000000000, 0x5, 0x2, 0x200, 0x4ddfc84c, 0x3, 0x6, 0xffff, 0x8000, 0x8, 0x1, 0x1ff, 0x2, 0x401, 0x3, 0x40, 0x7ff, 0xffffffffffffffc1, 0x6, 0x0, 0x0, 0x3, 0x9, 0x10000, 0x7, 0x10000, 0x5, 0x8, 0x9, 0x800, 0x8, 0xbb0a, 0x800, 0x1f, 0x9, 0x1, 0x0, 0x5, 0x10000, 0x5, 0x4d, 0x2, 0x0, 0x8, 0x0, 0x7, 0x5133, 0x1, 0x0, 0x3, 0x2, 0xf25, 0x2, 0x100, 0x4, 0x314, 0x3, 0x3, 0x3, 0x2, 0xfffffffffffffff8, 0x5, 0x10001, 0x3, 0x8001, 0x5, 0x7, 0xfffffffffffffffe, 0x6, 0xeae, 0x3, 0x7, 0x3, 0x7ff, 0x1, 0x400, 0x10000, 0x2, 0x1ff, 0x81, 0x5, 0x6, 0xfffffffffffffffc, 0x4, 0xfffffffffffffffc, 0x9, 0x1, 0x8, 0x4, 0x100000001, 0x4, 0xfffffffffffffffd, 0x40, 0x8, 0x2, 0x80, 0x5, 0x1, 0x0, 0x9, 0x1000, 0x1085, 0xd420, 0x6, 0x20, 0x10001, 0x8, 0x0, 0x0, 0x2, 0x7, 0x1, 0x1f, 0xdd000, 0x1, 0x7, 0x4, 0x9, 0x7, 0x1, 0xffffffffffff0001, 0xa1d, 0xe8, 0xbc0f, 0x7, 0x4, 0x80000001, 0x9a3, 0x3, 0x3, 0x8000, 0x8, 0xffffffff, 0x200, 0xfffffffffffffffe, 0x6, 0x3, 0x3, 0xfffffffffffffff9, 0x2, 0x386, 0x1, 0xf2, 0x401, 0x3, 0x1, 0x4, 0x7fff, 0x81, 0x8, 0x6, 0x6, 0xfffffffffffffffc, 0x17, 0x3, 0x6, 0x8, 0x96, 0x0, 0x800, 0xcf, 0x400, 0x0, 0xd9, 0x100000001, 0x0, 0x6, 0x9, 0xffffffffffffff28, 0x2, 0x4, 0x3, 0x1560, 0x6, 0x5, 0x1000, 0x7ff, 0x6, 0x9, 0x9, 0xfff, 0xb46000000, 0x7, 0x0, 0x18, 0x6, 0x5, 0xffffffff, 0xdb, 0x2, 0xd3f1, 0xfffffffffffffffc, 0x1ff, 0xffff, 0x9, 0xffff, 0x0, 0x1, 0x4, 0x3c, 0xc8, 0x5, 0x7fffffff, 0x1, 0xff, 0x3, 0x0, 0x1ff, 0x8, 0x7fff, 0x5, 0x8, 0x55, 0x4, 0x37, 0x380000, 0x0, 0x5, 0x200, 0x6, 0x9, 0x80000000, 0x9, 0x1000, 0x10001, 0x401, 0x7, 0xfffffffffffffffa, 0x800, 0x1ff, 0x1, 0x3, 0x5, 0x3ff, 0x7f, 0x1, 0xe5f, 0x6c02, 0x7fffffff], "19fcd1719b2d6b79f55dd09b02ef36da8126ef7b2c7eece70a14e6960fadbf7026a7a525c408874ca53d3a4cecc15a5615c6cc9d89bc45cc81d2e2a5743f2e5e5248ec8f959fd4a219c2e1260e535893521cf718044e686107247ed62337b55fd336e7438c13193ffcf14f3b40186ab7fb56c32e31db188c1097b8bf9985934af777a500d3fe5ba6d6cf93cd90d573930b1458382d72b88c32facc1be238d56d84e3cc506b89be99f24f25d1ef2fe871f99e37c152eb46270f4a627bd0c2ef92045ac86333efebd34071e713ceb17e4c213e756863b9d9aeea3d61"}}) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000004340)='/dev/dlm_plock\x00', 0x1110fc, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x9}, &(0x7f0000000080)=0x8) r3 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000200)=@int=0x9, 0x4) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000140)=ANY=[@ANYRES32=r2, @ANYBLOB="7c0000005eec0d9681c3ef9e4517d173ee37f06f3328c430dd1eac9a033cb0d797da0543c5e784f1d5bfc392818c632c5fd278dfa0dc6c74a9ad2ecaf2a32bffb0a2f2ac28023be2693eef48f064e39187c1c72dab73cc02b3e5f0db6c7e0d5ffeb0f310d9190ba66638994b79709ac4afaf13d24a1be948c4321a0000000000"], &(0x7f00000000c0)=0x84) [ 454.869868] netlink: 'syz-executor0': attribute type 2 has an invalid length. 11:46:34 executing program 1: r0 = socket$inet6(0xa, 0x80001, 0x0) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x20000002012, r0, 0x0) io_setup(0x45, &(0x7f0000000000)) r1 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x92d, 0x20001) write$FUSE_GETXATTR(r1, &(0x7f0000000080)={0x18, 0x0, 0x8, {0x1}}, 0x18) 11:46:34 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002ff7)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, 0x0) ioctl$EVIOCGREP(r0, 0xc008744c, &(0x7f0000003000)=""/174) 11:46:34 executing program 5: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) syz_open_dev$cec(&(0x7f0000000200)='/dev/cec#\x00', 0x3, 0x2) pread64(r0, &(0x7f0000000140)=""/174, 0xae, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) r2 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x2f81, 0x80800) setsockopt$inet6_tcp_int(r2, 0x6, 0x7, &(0x7f0000000100)=0x40, 0x4) r3 = dup(r1) getsockopt$inet6_buf(r3, 0x29, 0x30, &(0x7f0000000040)=""/30, &(0x7f0000000080)=0x1e) 11:46:34 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCFLSH(r0, 0x540b, 0x20000003) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rtc0\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r1, 0x5386, &(0x7f0000000300)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x80480, 0x194) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000240)={0x0, 0xfffffffffffffffb, 0x64, 0x7b, @scatter={0x1, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/88, 0x58}]}, &(0x7f0000000100)="77af566f277dc9d2eab4c9cf8b2727569edf845a8dd38896039b404dfc1b278fe2b3b1d3931d50a7a93a6d7501d16a940cc16c47b4a15082b50decf70d2aa7dde28db65b48a4453a2a71bc44d80fdfc72173e1226c7fc6ed3726c61e5cdbcf5c8e80bb9c", &(0x7f0000000180)=""/2, 0x7, 0x20, 0x3, &(0x7f00000001c0)}) 11:46:34 executing program 3: unshare(0x20400) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp\x00', 0x0, 0x0) setsockopt(r0, 0xff, 0x8001, &(0x7f0000000080)="041f6b6f18226fd439374eec138018bae676c2349d6772e39d084f56f95ae8a27b8fa4951f986e03b9852b1d3ba83206e13af5c341682086d3abbacacaeb2a5f6457b03b6c279d1e3600ad9894b5cb3c490bb07494257d10f4ed6bb1b3f1db97f1", 0x61) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='map\x00\x00~6\xf5\b\xd2g\xab\fz\xfe\x9f?\x00U\x1de\x9d\xa3p:\xc5{\x8e\xda\xc9\xfc\x8c]\x01\x83B\vg\x8f\xa5\x04\x00', r0}, 0x10) 11:46:34 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup\x00;\xd3!}e\xa9\xf0z\xe7AL\x19P\xb4A\xe93\xee~\n\xd3\xb2\b\xfd \xc2\x8ep\xba\xd4\x86\xd56#\xd4\xe0\xd5\xa2\x15&\x19\a\x95dQ\x8a\x8d\b\x00\x00\x00\xe4\xde\xc45\x8b\x94\x00\x86\xd5\x03\x16\x86(Z\xea2\xfc\x88\x00\x00\x00\x00\x00\x00\x00\x00\x00\xa0\xea\x169\xab\xf0\xc4VKo\xf6&+\x9e\xb8\xaakq\xea6\x8f:\xc6\x1bE\xf8o\xa3k\xbeDm\xdc~B\x9eO\xc94j(}\xb2\'\xd1\xa33H\xcc\xc3j\xac\xe2Co\xe5i\xf5:,\f\xeeoD\xdd\x82\x84\xed\xb54{\xd26\x85X\xd2\'8\n\xee', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000280)='cgroup.max.depth\x00', 0x2, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x100, 0x0) pwrite64(r1, 0x0, 0x0, 0x0) 11:46:34 executing program 1: r0 = socket$inet6(0xa, 0x803, 0x100000000) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket$inet(0x10, 0x3, 0xc) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x100, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x1) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x20) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000010807031dfffd946ff20c0020200a0009000500021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000000000000000000000", 0x4c}], 0x1}, 0x0) ioctl$EVIOCGUNIQ(r1, 0x80404508, &(0x7f0000000000)=""/13) 11:46:34 executing program 0: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) mbind(&(0x7f000023b000/0x600000)=nil, 0x600000, 0x1, &(0x7f0000000000)=0x80000001, 0x6, 0x0) mprotect(&(0x7f0000db0000/0x3000)=nil, 0x3000, 0x0) mbind(&(0x7f0000297000/0x3000)=nil, 0x3000, 0x1, &(0x7f0000527ff8), 0x1, 0x0) 11:46:34 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002ff7)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000001000)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0xc008744c, &(0x7f0000003000)=""/174) [ 455.424429] netlink: 20 bytes leftover after parsing attributes in process `syz-executor1'. 11:46:34 executing program 2: symlink(&(0x7f0000000140)='..', &(0x7f00000000c0)='./file0\x00') umount2(&(0x7f0000000280)='./file0\x00', 0x0) 11:46:34 executing program 3: unshare(0x20400) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='map\x00\x00~6\xf5\b\xd2g\xab\fz\xfe\x9f?\x00U\x1de\x9d\xa3p:\xc5{\x8e\xda\xc9\xfc\x8c]\x01\x83B\vg\x8f\xa5\x04\x00', r0}, 0x10) 11:46:34 executing program 5: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) syz_open_dev$cec(&(0x7f0000000200)='/dev/cec#\x00', 0x3, 0x2) pread64(r0, &(0x7f0000000140)=""/174, 0xae, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) r2 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x2f81, 0x80800) setsockopt$inet6_tcp_int(r2, 0x6, 0x7, &(0x7f0000000100)=0x40, 0x4) r3 = dup(r1) getsockopt$inet6_buf(r3, 0x29, 0x30, &(0x7f0000000040)=""/30, &(0x7f0000000080)=0x1e) [ 455.653542] netlink: 20 bytes leftover after parsing attributes in process `syz-executor1'. 11:46:34 executing program 0: r0 = socket(0x11, 0x2, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) ioctl$TIOCOUTQ(r1, 0x5411, &(0x7f0000000040)) connect$vsock_dgram(r0, &(0x7f00000000c0)={0x28, 0x0, 0x100000003}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x111, 0x1001}}, 0x20) syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x4, 0x101400) write$RDMA_USER_CM_CMD_DISCONNECT(r1, &(0x7f0000000140)={0xa, 0x3, 0xfa00, {r2}}, 0x4a) 11:46:34 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002ff7)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000001000)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0xc008744c, &(0x7f0000003000)=""/174) 11:46:34 executing program 1: unshare(0x2000400) arch_prctl$ARCH_SET_GS(0x1001, 0x9) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/cgroup\x00') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setns(r0, 0x0) getpid() r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x400, 0x0) write$P9_RUNLINKAT(r2, &(0x7f0000000040)={0x7, 0x4d, 0x1}, 0x7) 11:46:34 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYRES64=r0, @ANYRESDEC=0x0, @ANYBLOB='\x00\x00']) read$FUSE(r0, &(0x7f0000000b40), 0x1000) read$FUSE(r0, &(0x7f0000003000), 0x1000) setxattr$system_posix_acl(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='system.posix_acl_access\xff', 0x0, 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x800000000, 0x2}, 0x10) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000840)={0x10, 0x0, 0x4}, 0x10) write$FUSE_INIT(r0, &(0x7f00000001c0)={0x50, 0xffffffffffffffda, 0x7, {0x7, 0x1c, 0x7fffffff, 0x21000, 0x800, 0x4, 0x7ff, 0x8}}, 0x50) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x40000, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x100000000, 0xc0000) ioctl$sock_inet_SIOCRTMSG(r1, 0x890d, &(0x7f0000000080)={0x0, {0x2, 0x4e22, @multicast2}, {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x15}}, {0x2, 0x4e23, @rand_addr=0x31cd}, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x8001, 0x100000001}) getpid() bind$alg(r1, &(0x7f0000000280)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts-twofish-avx\x00'}, 0x58) 11:46:35 executing program 5: recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f00000000c0), 0x0, &(0x7f0000001400)=""/4096, 0x1000}, 0x0) r1 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000140)=[@in6={0xa, 0x0, 0x0, @ipv4={[0xfec0], [], @dev}}], 0x1c) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f00000000c0), &(0x7f0000000100)=0x30) r2 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x34, 0x1) writev(r2, &(0x7f00000000c0), 0x10000000000000a4) 11:46:35 executing program 3: unshare(0x20400) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='map\x00\x00~6\xf5\b\xd2g\xab\fz\xfe\x9f?\x00U\x1de\x9d\xa3p:\xc5{\x8e\xda\xc9\xfc\x8c]\x01\x83B\vg\x8f\xa5\x04\x00'}, 0x10) 11:46:35 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f0000001000)='/dev/snd/controlC#\x00', 0x0, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x3ff, 0x200000) ioctl$DRM_IOCTL_MODE_SETCRTC(r1, 0xc06864a2, &(0x7f0000000080)={&(0x7f0000005000), 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, {0x0, 0x400, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, "b1abe2da02000000e1000000fc00000000000000dc98784b49e0007e00002fd9"}}) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000000)=0x3) fcntl$setstatus(r0, 0x4, 0x2000) ioctl$SNDRV_CTL_IOCTL_PVERSION(r1, 0xc1105517, &(0x7f0000001000)) 11:46:35 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002ff7)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000001000)=""/246) ioctl$EVIOCGREP(0xffffffffffffffff, 0xc008744c, &(0x7f0000003000)=""/174) 11:46:35 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x16}}, 0x36a) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x8000000035, 0x4) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x2be) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x101000, 0x0) ioctl$VIDIOC_LOG_STATUS(r1, 0x5646, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x26, &(0x7f0000000040)={@broadcast, @multicast1, @empty}, 0xc) sendmmsg(r0, &(0x7f0000004e00)=[{{0x0, 0x0, &(0x7f0000001f80), 0x0, &(0x7f0000000200)=[{0x10, 0x119}], 0x10}}], 0x1, 0x0) 11:46:35 executing program 2: mkdir(&(0x7f0000000000)='./file1\x00', 0x0) r0 = open(&(0x7f0000000040)='./file1\x00', 0x208601, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000340)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000003c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000080), r1, r0}}, 0x18) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000880)=0x14) ioctl$KVM_SET_BOOT_CPU_ID(r0, 0xae78, &(0x7f0000000300)=0x1) socket$nl_crypto(0x10, 0x3, 0x15) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f00000008c0)={@broadcast, @multicast2, r2}, 0xc) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000400)=0x7, 0x4) mount(&(0x7f0000000680)=ANY=[@ANYBLOB="0012f82ce03b2a0591b3cb79f77529"], &(0x7f0000000140)='./file1\x00', &(0x7f0000000180)='cgroup\x00', 0x0, &(0x7f0000000200)=',\'%\\em1\x00') mknod$loop(&(0x7f00000002c0)='./file1\x00', 0x2, 0x1) open(&(0x7f0000000280)='./file1\x00', 0x0, 0x10) r3 = request_key(&(0x7f0000000500)='cifs.spnego\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000580)='y\x00', 0xfffffffffffffffd) keyctl$get_security(0x11, r3, &(0x7f00000005c0)=""/135, 0x87) io_setup(0x7f, &(0x7f0000000440)=0x0) io_submit(r4, 0x1, &(0x7f00000004c0)=[&(0x7f0000000480)={0x0, 0x0, 0x0, 0x7, 0xfa77, r0, &(0x7f0000000900)="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", 0x1000, 0x8, 0x0, 0x1, r0}]) setxattr$trusted_overlay_origin(&(0x7f0000000100)='./file1\x00', &(0x7f00000001c0)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x3) 11:46:35 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='map\x00\x00~6\xf5\b\xd2g\xab\fz\xfe\x9f?\x00U\x1de\x9d\xa3p:\xc5{\x8e\xda\xc9\xfc\x8c]\x01\x83B\vg\x8f\xa5\x04\x00'}, 0x10) 11:46:35 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) shmget$private(0x0, 0x2000, 0x20, &(0x7f0000ffc000/0x2000)=nil) sendmsg$nl_route_sched(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000180)=@newqdisc={0x24, 0x24, 0xc05, 0x0, 0x0, {0x0, r1, {}, {0xfff2}}}, 0x24}}, 0x0) 11:46:35 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000c80)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_IRQCHIP(r1, 0x4008ae6a, &(0x7f0000000280)={0x0, 0xffff8000, @ioapic}) 11:46:35 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002ff7)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000001000)=""/246) ioctl$EVIOCGREP(r0, 0xc008744c, 0x0) 11:46:35 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='map\x00\x00~6\xf5\b\xd2g\xab\fz\xfe\x9f?\x00U\x1de\x9d\xa3p:\xc5{\x8e\xda\xc9\xfc\x8c]\x01\x83B\vg\x8f\xa5\x04\x00'}, 0x10) 11:46:35 executing program 5: socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r0, r1, 0x0) unshare(0x8000400) ppoll(&(0x7f0000000040)=[{}], 0x20000000000000f5, &(0x7f0000000200)={0x77359400}, &(0x7f00000001c0), 0x8) 11:46:35 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002ff7)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000001000)=""/246) ioctl$EVIOCGREP(r0, 0xc008744c, 0x0) 11:46:35 executing program 0: r0 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000000)) r1 = socket$inet_sctp(0x2, 0x8, 0x84) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x8}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000180)={r2, 0x5, 0x10}, 0xc) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000140)={r2}, 0x8) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000280)) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x1c, r4, 0x0, 0x70bd26, 0x25dfdbff, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x10) setresuid(r3, 0x0, 0x0) 11:46:35 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_int(r0, 0x29, 0x8000000043, 0x0, &(0x7f0000013000)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)=0x0) syz_open_procfs(r1, &(0x7f00000007c0)='net/ipv6_route\x00') stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EVIOCREVOKE(r6, 0x40044591, &(0x7f0000000540)=0xc0c5) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000440)=0xfffffffffffffe4e) socket$inet_smc(0x2b, 0x1, 0x0) getgroups(0x1, &(0x7f0000000480)=[r2]) r9 = socket(0xf, 0x7, 0x2) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r9, 0x84, 0xc, &(0x7f0000000280), &(0x7f00000004c0)=0x4) fstat(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) io_setup(0x2e, &(0x7f0000000600)=0x0) io_submit(r11, 0x1, &(0x7f0000000780)=[&(0x7f0000000740)={0x0, 0x0, 0x0, 0x1, 0x80, r9, &(0x7f0000000640)="fdc540ec6d5527570a6c25c70d4f57ac06e5a9b323da5c8da9810210d62ed010f174777327d7dd28a94e8e2f97ebc348c66ee7d0be8249f348bb7a52719b762f6da70875c697c0bc0742b6880239930f41b503e75ef5d5d8cd6bbaa3e1bc66e17631a22cfebd91bf81e1f3d4264fe3544342296675d9b7a412ccf7de40e52e33f26af09f9031812598f6129fb2be632747616ba00e9cc65874b44cada5b656b08383652fae1f1ba74a3504207a261312b89658ac82fbf8e04d39dc8afe5d5092cf5e1de9878cbcbcd388", 0xca, 0x7e, 0x0, 0x0, r6}]) getresgid(&(0x7f0000000340), &(0x7f0000000840), &(0x7f0000000500)=0x0) setsockopt$inet6_int(r0, 0x29, 0x3f, &(0x7f0000000240)=0x100000000, 0x4) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r5, 0x6, 0x21, &(0x7f0000000580)="9e6987dbbaf33863dd72d6dd710f2b95", 0x10) ioctl$TIOCMBIS(r5, 0x5416, &(0x7f00000005c0)=0x101) setgroups(0x8, &(0x7f0000000400)=[r2, r3, 0x0, r4, r7, r8, r10, r12]) setsockopt$inet_MCAST_MSFILTER(r9, 0x0, 0x30, &(0x7f0000000880)={0x5, {{0x2, 0x4e23, @local}}, 0x68504ae5c1d1b347, 0xa, [{{0x2, 0x4e21, @multicast2}}, {{0x2, 0x4e21, @loopback}}, {{0x2, 0x4e21, @empty}}, {{0x2, 0x4e24, @rand_addr=0x4c1}}, {{0x2, 0x4e22, @multicast2}}, {{0x2, 0x4e20, @local}}, {{0x2, 0x4e23, @multicast1}}, {{0x2, 0x4e23, @local}}, {{0x2, 0x4e24, @loopback}}, {{0x2, 0x4e24, @remote}}]}, 0x590) 11:46:35 executing program 1: r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x4ce, 0x2000) r1 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x7ff, 0x250280) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f00000000c0)={0x0, 0x100000000, 0xffff, 0x80000, r1}) perf_event_open(&(0x7f0000000180)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x34, 0x1) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f0000000200)={0x20000, {{0xa, 0x4e21, 0x8, @empty, 0x9db5}}}, 0x88) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x40080, 0x0) writev(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000011c0)="b5", 0x1}], 0x1) writev(r2, &(0x7f00000000c0), 0x10000000000000a4) 11:46:36 executing program 5: socket$inet6_sctp(0xa, 0x200000000000005, 0x84) 11:46:36 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002ff7)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000001000)=""/246) ioctl$EVIOCGREP(r0, 0xc008744c, 0x0) 11:46:36 executing program 3: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='map\x00\x00~6\xf5\b\xd2g\xab\fz\xfe\x9f?\x00U\x1de\x9d\xa3p:\xc5{\x8e\xda\xc9\xfc\x8c]\x01\x83B\vg\x8f\xa5\x04\x00'}, 0x10) 11:46:36 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x545a00, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000003400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000003440)=0x14) bind$packet(r0, &(0x7f0000003480)={0x11, 0x10, r1, 0x1, 0x4, 0x6, @remote}, 0x14) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x8, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1}]}, &(0x7f0000f6bffb)='\xa1\v\x8b\x0e', 0x1, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x1}, 0xffffffffffffff2d) r2 = request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f00000000c0)='\xa1\v\x8b\x0e', 0xfffffffffffffff9) keyctl$describe(0x6, r2, &(0x7f0000000100), 0x0) 11:46:36 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000000)={0x1, 0x0, [{0x40000000}]}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.events\x00', 0x0, 0x0) write$eventfd(r3, &(0x7f0000000080)=0xff, 0x8) 11:46:36 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x100000001, 0x4040) accept$packet(0xffffffffffffff9c, &(0x7f0000007580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000075c0)=0x14) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000007600)='/dev/dlm-monitor\x00', 0x0, 0x0) bind$xdp(r1, &(0x7f0000007640)={0x2c, 0x1, r2, 0xd, r3}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) ioctl$int_out(r0, 0x80804523, &(0x7f0000000040)) 11:46:36 executing program 1: ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000300)=ANY=[@ANYBLOB="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"]) r0 = syz_open_dev$dmmidi(&(0x7f0000056000)='/dev/dmmidi#\x00', 0x6f600000, 0x0) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x8}, 0xc) readv(r0, &(0x7f0000000040), 0x10000000000001df) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4007, 0x0) 11:46:36 executing program 3: unshare(0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='map\x00\x00~6\xf5\b\xd2g\xab\fz\xfe\x9f?\x00U\x1de\x9d\xa3p:\xc5{\x8e\xda\xc9\xfc\x8c]\x01\x83B\vg\x8f\xa5\x04\x00'}, 0x10) 11:46:36 executing program 2: r0 = getpid() r1 = getpgrp(r0) ioprio_set$pid(0x1, r1, 0x7fff) 11:46:36 executing program 4 (fault-call:2 fault-nth:0): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002ff7)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000001000)=""/246) ioctl$EVIOCGREP(r0, 0xc008744c, &(0x7f0000003000)=""/174) 11:46:36 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='\x00\x00\x00\x00\x00\xcd\x06\x00\x00\x00\x00\x00\x00') munmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000) fcntl$notify(r0, 0x402, 0x0) 11:46:36 executing program 5: unshare(0x400) r0 = socket$inet_smc(0x2b, 0x1, 0x0) shutdown(r0, 0x100000) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x100000001, 0x1) ioctl$KVM_PPC_GET_PVINFO(r1, 0x4080aea1, &(0x7f00000000c0)=""/92) write$binfmt_misc(r0, &(0x7f0000000040)={'syz0', "6c20ed022d18769ce2a5c17a1da39c90a4808a861f43f0c11cb186712c177636fedaff26d645a2e94d02a86d4836b397dab92a2bf67e1728c1d07970055e68a9827f4ca9967a59beb152f06eb21eb2f9890edaa5e30b623d14ce88ba93"}, 0x61) ioctl$SCSI_IOCTL_START_UNIT(r1, 0x5) 11:46:36 executing program 3: unshare(0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='map\x00\x00~6\xf5\b\xd2g\xab\fz\xfe\x9f?\x00U\x1de\x9d\xa3p:\xc5{\x8e\xda\xc9\xfc\x8c]\x01\x83B\vg\x8f\xa5\x04\x00'}, 0x10) 11:46:36 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r1 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000040)='team0\x00', 0x10) connect$bt_rfcomm(r1, &(0x7f0000000000)={0x1f, {0x20a, 0x451d, 0x101, 0x5a5, 0x2, 0xa0}, 0xff}, 0xa) sendto$unix(r1, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x6e) recvfrom$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_bt(r1, 0x8906, &(0x7f0000000080)) 11:46:36 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000040)={0x2, 0x0, @ioapic={0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x1, 0x0, [], 0x3ff}]}}) bpf$PROG_LOAD(0x5, 0x0, 0x0) sigaltstack(&(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000200)) r2 = socket$vsock_dgram(0x28, 0x2, 0x0) getsockname(r2, &(0x7f0000000140)=@xdp, &(0x7f00000001c0)=0x80) stat(0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(r3, r3) 11:46:37 executing program 3: unshare(0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='map\x00\x00~6\xf5\b\xd2g\xab\fz\xfe\x9f?\x00U\x1de\x9d\xa3p:\xc5{\x8e\xda\xc9\xfc\x8c]\x01\x83B\vg\x8f\xa5\x04\x00'}, 0x10) 11:46:37 executing program 4: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x402000, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)=""/99, &(0x7f0000000180), &(0x7f00000001c0)=""/86, 0x10f000}) write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2d, 'memory'}]}, 0x8) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002ff7)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000001000)=""/246) ioctl$EVIOCGREP(r1, 0xc008744c, &(0x7f0000003000)=""/174) syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x6, 0x2) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f00000000c0)) 11:46:37 executing program 1: unshare(0x20400) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x40, 0x0) ioctl$KVM_INTERRUPT(r0, 0x4004ae86, &(0x7f0000000080)=0x8) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ashmem\x00', 0x4000, 0x0) ioctl$ASHMEM_SET_NAME(r1, 0x40087707, &(0x7f0000000000)='\x00') 11:46:37 executing program 5: set_mempolicy(0xfffffffffffffffc, &(0x7f0000000140)=0x6680, 0x80040) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x1, 0x0) [ 458.168714] kvm: apic: phys broadcast and lowest prio 11:46:37 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[], &(0x7f0000000200)='./file0/../file0\x00', &(0x7f0000000540)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0x0}}, {{@in6=@loopback}}}, &(0x7f0000000240)=0xe8) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000280)={@mcast1, 0x27, r1}) 11:46:37 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) flock(r0, 0x4) 11:46:37 executing program 5: r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x6400000000000000, 0x80, &(0x7f0000000040)=@broute={'broute5\x00\x00\x06\x00', 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f00000000c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', '\x01ama\x00\x00\x00\x00J\xb2\xce\xc8\x00', @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) recvfrom$unix(r0, &(0x7f0000000c80)=""/31, 0x1f, 0x10000, &(0x7f0000000cc0)=@file={0x1, './file0\x00'}, 0x6e) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x4000, 0x0) ioctl$DRM_IOCTL_MAP_BUFS(r1, 0xc0186419, &(0x7f0000000c40)={0x8, &(0x7f0000000480)=""/247, &(0x7f0000000b80)=[{0x10000, 0x6b, 0x8, &(0x7f0000000580)=""/107}, {0x200, 0xf8, 0x6, &(0x7f0000000600)=""/248}, {0x80000000, 0x89, 0x55, &(0x7f0000000700)=""/137}, {0xff, 0x94, 0x1200, &(0x7f00000007c0)=""/148}, {0x2, 0xba, 0x2, &(0x7f0000000880)=""/186}, {0x0, 0xc9, 0x5, &(0x7f0000000940)=""/201}, {0x1, 0x49, 0x6, &(0x7f0000000a40)=""/73}, {0x1, 0x91, 0x4, &(0x7f0000000ac0)=""/145}]}) 11:46:37 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="23000000210081ae00060c00000f000002000003000000020000006fabca264e7d06a4", 0x23}], 0x1, &(0x7f00000000c0)}, 0x0) r1 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x6, 0x0) ioctl$EVIOCGKEY(r1, 0x80404518, &(0x7f0000000100)=""/87) 11:46:37 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002ff7)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000001000)=""/246) ioctl$EVIOCGREP(r0, 0xc008744c, &(0x7f0000003000)=""/174) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r0, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:46:37 executing program 3: unshare(0x20400) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 11:46:37 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) unshare(0xe000000) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000040)={0x3, 0x7, 0x5, 0x0, 0x6}) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000740)='ns/mnt\x00') setns(r1, 0x0) ioctl(r0, 0x800000000000937e, &(0x7f00000000c0)="010000000000000018040000075a90c7fc232ff41cd849832f") fcntl$F_GET_RW_HINT(r1, 0x40b, &(0x7f0000000100)) [ 458.685892] netlink: 7 bytes leftover after parsing attributes in process `syz-executor0'. [ 458.721934] xt_bpf: check failed: parse error [ 458.764276] netlink: 7 bytes leftover after parsing attributes in process `syz-executor0'. [ 458.798928] xt_bpf: check failed: parse error 11:46:37 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x40000000000013, 0x10, 0xe68}, 0x2c) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x4923b9d3, 0x100) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_GET(r1, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000082}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)={0x2b0, r2, 0x304, 0x70bd28, 0x25dfdbfc, {}, [@TIPC_NLA_NET={0x10, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x1}]}, @TIPC_NLA_NET={0x14, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x80}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x6}]}, @TIPC_NLA_MEDIA={0x74, 0x5, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x240000000000}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3f}]}]}, @TIPC_NLA_NET={0x3c, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x2}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x8}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x34}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x9}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x6}]}, @TIPC_NLA_BEARER={0x104, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_NAME={0xc, 0x1, @l2={'ib', 0x3a, 'lo\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x2, @loopback, 0x1}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0x0, @local, 0x84}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x4}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x7, @local, 0x7}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0x4, @mcast2, 0xcd1}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x1ff, @empty, 0x10000}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x3f, @dev={0xfe, 0x80, [], 0x1f}, 0x8001}}}}]}, @TIPC_NLA_LINK={0x44, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}]}]}, @TIPC_NLA_MON={0x54, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7edd}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfffffffffffffff9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}]}, @TIPC_NLA_SOCK={0x2c, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x3}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xfff}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x4}]}]}, 0x2b0}}, 0x20000000) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f00000001c0)={0x34, 0x0, &(0x7f0000000180)}) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0xf, 0xf05000, 0x7, 0xffffffffffffbb96, 0x26, r0, 0x3}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000280)={r0, &(0x7f0000000100), 0x0}, 0x18) ioctl$KVM_PPC_GET_SMMU_INFO(r1, 0x8250aea6, &(0x7f0000000240)=""/21) 11:46:38 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vhci(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r0, 0x40405515, &(0x7f0000000000)={0x7, 0x5, 0x0, 0x0, '\x00', 0x1}) ioctl$TIOCLINUX7(r0, 0x541c, &(0x7f00000000c0)={0x7, 0x8}) pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x0, 0x989680}, 0x0) 11:46:38 executing program 1: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x100000000000001, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000040)={0x6, 0xfffffffffffffff9, 0x100000001, 0x7f96a94f, 0x3, 0x7ff, 0x80000001, 0x1, 0x1, 0xda, 0x2, 0x5d}) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f00000000c0)={@host}) ioctl$KDSETLED(r0, 0x4b32, 0x7) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e23, 0x4, @loopback, 0x9}}}, &(0x7f0000000080)=0x84) faccessat(r0, &(0x7f00000001c0)='./file0\x00', 0x24, 0x100) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x5, &(0x7f0000000280)={r2, @in={{0x2, 0x4e20, @multicast1}}}, 0x84) 11:46:38 executing program 3: unshare(0x20400) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 11:46:38 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002ff7)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000001000)=""/246) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000180)={'ipddp0\x00', {0x2, 0x4e20, @multicast1}}) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x5c, r1, 0x221, 0x70bd2c, 0x25dfdbfc, {}, [@TIPC_NLA_NET={0x18, 0x7, [@TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xf5}]}, @TIPC_NLA_BEARER={0x30, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e20, @rand_addr=0x7}}, {0x14, 0x2, @in={0x2, 0x4e21, @loopback}}}}]}]}, 0x5c}}, 0x10) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f00000001c0)={0x3f, @broadcast, 0x4e21, 0x1, 'lblcr\x00', 0x20, 0x10000, 0x53}, 0x2c) ioctl$EVIOCGREP(r0, 0xc008744c, &(0x7f0000003000)=""/174) 11:46:38 executing program 0: r0 = socket$inet6(0xa, 0x807, 0xfffffffffffffffa) r1 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x101002) r2 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x8, 0x101040) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000040)={0x5e, 0x800c, 0x6, 0x7f, 0x0}, &(0x7f0000000200)=0x10) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000240)={r3, 0x3}, 0x8) sendmsg$tipc(r2, &(0x7f00000001c0)={0x0, 0x14d, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000080)="24bbf7c867c386c3ae9acc0670610d613c", 0x11}], 0x2, &(0x7f0000000180)="6e5d1f96711fb5bf31c66a96680cb4f107ae41052a90e8cf5eb560e3334449c4c297d3b0e9c7738d55706bfe791d96af36f65a97b2a82ba0a20b64", 0x3b, 0x4000}, 0x20000000) write$evdev(r1, &(0x7f00006f7fe8)=[{{0x77359400}, 0x1, 0x40000000000004c, 0x400000002}], 0x1004d) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 11:46:38 executing program 2: mkdir(&(0x7f0000000040)='./control\x00', 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x2, 0x20000) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x2100, 0x0) ioctl$VT_WAITACTIVE(r3, 0x5607) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setxattr$system_posix_acl(&(0x7f0000000180)='./control\x00', &(0x7f00000001c0)='system.posix_acl_default\x00', &(0x7f0000000200)=ANY=[@ANYRES16, @ANYRES32=0x0, @ANYRESHEX=r0], 0x3, 0x0) msgget$private(0x0, 0x1) sendto(r1, &(0x7f0000000240)="d6beed6e16d4c2481a5c16f80ab0ebb8c92e5c83c294358d62fc02ab8286245aa2d109679c52b9df79bcf808ff53cbfafd31f3c03ada89872231266cab0353d71a2985043bd053669b322ab66d16b15264925901c80c59fc42c44dda3c9e36914906e91d0151e28da2e78a33502d1c90dadb8320bba6bbddab965f3319f29f4ac09369b74e7caf7e3fc6308776e726418620725966b46d5a6d23dec9c24f2c8f711a64c9a4a7442ac80c652d2aab80d55b32458afea05a69373d47c22fbd7981c7c37511d853b446f0299933d673a0daf32ea74cd143", 0xd6, 0x40, &(0x7f0000000100)=@ethernet={0x307, @remote}, 0x80) open(&(0x7f0000000000)='./control\x00', 0xc40beb2474dfd22a, 0x0) 11:46:38 executing program 3: unshare(0x20400) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0}, 0x10) 11:46:38 executing program 5: r0 = memfd_create(&(0x7f0000000040)='ppp1selinux)\x00', 0x6) shutdown(r0, 0x1) unshare(0x24020400) r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x2, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r1, 0x810c5701, &(0x7f0000000140)) 11:46:38 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0xfffffffffffffffe, @local}, 0xffffffce) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) sendmmsg(r1, &(0x7f0000007fc0), 0x154, 0x800) ioctl$EVIOCGMTSLOTS(r1, 0x8040450a, &(0x7f0000000080)=""/187) 11:46:38 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002ff7)='/dev/ppp\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x2000000) mount(&(0x7f0000000540)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='f2fs\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000001000)=""/246) ioctl$EVIOCGREP(r2, 0xc008744c, &(0x7f0000000100)=""/174) 11:46:38 executing program 2: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40040000000031, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='\x00\x00^\xd3\x00\x00\x00') getdents64(r0, &(0x7f0000000000)=""/179, 0xb3) getsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f00000000c0)={@local, @empty, 0x0}, &(0x7f0000000140)=0xc) bind(r0, &(0x7f0000000240)=@xdp={0x2c, 0x7, r1, 0x21}, 0x80) 11:46:38 executing program 3: unshare(0x20400) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0}, 0x10) 11:46:38 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x2, 0x8000) ioctl$VIDIOC_CROPCAP(r1, 0xc02c563a, &(0x7f0000000380)={0x7, {0xc3d1, 0x7, 0x4, 0x1ff}, {0x0, 0x9, 0x4, 0x5}, {0x7, 0x4}}) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f0000000040)=0x1b5) fchmod(r0, 0x18) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000140)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000240)=0x1c) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000280)=@sack_info={r3, 0x5, 0x8000}, 0xc) preadv(r2, &(0x7f0000000480), 0x10000000000001cf, 0x0) r4 = shmget$private(0x0, 0x3000, 0x78000001, &(0x7f0000ffd000/0x3000)=nil) shmctl$SHM_LOCK(r4, 0xb) getsockopt$EBT_SO_GET_INFO(r2, 0x0, 0x80, &(0x7f0000000080)={'nat\x00'}, &(0x7f0000000100)=0x78) prctl$PR_SVE_SET_VL(0x32, 0x2c6e) linkat(r1, &(0x7f00000002c0)='./file0\x00', r1, &(0x7f0000000340)='./file0\x00', 0x400) 11:46:38 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$bt_BT_FLUSHABLE(r1, 0x112, 0x8, &(0x7f0000000080)=0xff, 0x4) ftruncate(r1, 0xfffffffffffffffa) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$EBT_SO_GET_ENTRIES(r2, 0x0, 0x81, &(0x7f0000001200)={'nat\x00', 0x0, 0x0, 0x2d8, [], 0x10000248, &(0x7f00000001c0), &(0x7f0000001500)=""/4096}, &(0x7f0000000000)=0x108) 11:46:38 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0xfefffffffffffffe, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) prctl$PR_GET_TIMERSLACK(0x1e) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000000)=[@text32={0x20, &(0x7f0000000080)="8fc87886b3002000000ec4c3ad7c984adf6c05d1c4e1f8ae5448aab9800000c00f3235000400000f3066b807018ed09a01000000c80066ba4300b800000080ef0fc75fd32636aa66b817000f00d0", 0x4e}], 0x1, 0x0, 0x0, 0x0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x200000, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffff9c, 0xc0106426, &(0x7f0000000200)={0x3, &(0x7f00000001c0)=[{}, {}, {0x0}]}) ioctl$DRM_IOCTL_UNLOCK(r3, 0x4008642b, &(0x7f0000000240)={r4, 0xe}) r5 = dup2(r0, r1) r6 = dup2(r5, r2) ioctl$DRM_IOCTL_GET_STATS(r6, 0x80f86406, &(0x7f0000000100)=""/90) 11:46:38 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002ff7)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000001000)=""/246) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$EVIOCGREP(r0, 0xc008744c, &(0x7f0000003000)=""/174) 11:46:39 executing program 2: r0 = msgget$private(0x0, 0x0) lstat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = syz_open_dev$audion(&(0x7f00000005c0)='/dev/audio#\x00', 0x8b7c, 0x400000) write$UHID_CREATE2(r3, &(0x7f0000000600)={0xb, 'syz1\x00', 'syz0\x00', 'syz1\x00', 0x23, 0xc0, 0xfff, 0x400, 0x81, 0x10001, "05c24f2f96c95e2b0790b2f84d3856c03ee0ec0bf6269dbca9ee844aba340228acd2c1"}, 0x13b) r4 = getegid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000200)={{{@in=@remote, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@broadcast}}, &(0x7f0000000080)=0xe8) getgroups(0x8, &(0x7f0000000180)=[r2, 0xee01, 0xffffffffffffffff, 0xee00, 0x0, 0xffffffffffffffff, 0xee00, 0xee00]) r7 = syz_open_procfs(0x0, &(0x7f0000000540)='coredump_filter\x00') setsockopt$packet_tx_ring(r7, 0x107, 0xd, &(0x7f0000000580)=@req3={0x7, 0x8, 0x3, 0x51df796e, 0x100000001, 0x5, 0x6f}, 0x1c) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000300)={0x0, 0x0}) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000340)=0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000000380)={{0x7, r1, r4, r5, r6, 0x10, 0x50f}, 0x4, 0xdddc, 0x0, 0x3, 0x2, 0x7f, r8, r9}) syz_emit_ethernet(0x1, &(0x7f00000001c0)=ANY=[@ANYBLOB="aaaaaaaaaaaa00000000000086dd601876bd0008000000000000000000000000000038000000ff0000000000000000000000000000410000000000089078"], &(0x7f00000000c0)={0x0, 0x0, [0x2]}) r10 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x10000, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000001600)={{{@in6=@dev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000001700)=0xe8) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000780)=@random={'btrfs.', '/dev/audio#\x00'}, &(0x7f00000007c0)=""/204, 0xcc) openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000500)='/dev/video37\x00', 0x2, 0x0) close(r10) lsetxattr$system_posix_acl(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)='system.p}E\x18\xaa/\xf7U\x88\xd7\x10os\xa4\x96_ac', &(0x7f0000000480)={{}, {0x1, 0x3}, [{0x2, 0x4, r1}, {0x2, 0x0, r5}, {0x2, 0x1, r5}, {0x2, 0x7, r5}, {0x2, 0x1, r5}, {0x2, 0x6, r11}], {0x4, 0x2}, [{0x8, 0x6, r2}], {0x10, 0x1}}, 0x5c, 0x2) setsockopt$inet_IP_XFRM_POLICY(r10, 0x0, 0x11, &(0x7f0000001740)={{{@in6=@remote, @in=@loopback, 0x4e22, 0x12, 0x4e20, 0x736, 0xa, 0x80, 0x0, 0xbf, 0x0, r11}, {0x8001, 0x1000, 0xfffffffffffffffb, 0x0, 0x9, 0xb000000000000000, 0x7, 0x200}, {0x9, 0x1, 0x3, 0x9}, 0x3, 0x6e6bb6, 0x2, 0x0, 0x0, 0x3}, {{@in=@dev={0xac, 0x14, 0x14, 0x1f}, 0x4d6, 0xff}, 0xa, @in=@empty, 0x3501, 0x1, 0x0, 0x0, 0x81, 0x6f, 0x1ff}}, 0xe8) syz_open_dev$vbi(&(0x7f00000008c0)='/dev/vbi#\x00', 0x1, 0x2) 11:46:39 executing program 3: unshare(0x20400) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0}, 0x10) 11:46:39 executing program 5: remap_file_pages(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x8, 0x0, 0xc822) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3e, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000005000/0x18000)=nil, &(0x7f0000000240)=[@textreal={0x8, &(0x7f0000000040)="0f425f69f20f38f10b650feda5000066b9800000c00f326635004000000f30b80d008ec86666de3c0f01cf260f01cb2665660f3a618c0060540fc76b39", 0x3d}], 0x1, 0x0, &(0x7f00000002c0), 0x0) 11:46:39 executing program 1: recvmsg(0xffffffffffffff9c, &(0x7f0000000000)={&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000100)=""/81, 0x51}, {&(0x7f00000001c0)=""/156, 0x9c}, {&(0x7f0000000280)=""/114, 0x72}, {&(0x7f0000000300)=""/93, 0x5d}, {&(0x7f0000000380)=""/201, 0xc9}, {&(0x7f0000000480)=""/115, 0x73}], 0x6, &(0x7f0000000580)=""/4096, 0x1000}, 0x1) r1 = accept4$unix(r0, 0x0, &(0x7f0000000040)=0x364, 0x80000) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000001600)={r1}) recvmmsg(0xffffffffffffffff, &(0x7f0000006880)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(r1, 0x8917, &(0x7f0000001580)={'team0\x00', {0x2, 0x4e24, @remote}}) 11:46:39 executing program 0: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') r2 = syz_open_dev$dmmidi(&(0x7f00000001c0)='/dev/dmmidi#\x00', 0xfff, 0x800) sendmsg$TIPC_CMD_SET_LINK_PRI(r2, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB='.}', @ANYRES16=r1, @ANYBLOB="100225bd7000fcdbdf25010000000000000008410000004c00187fffffff6574680000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x68}, 0x1, 0x0, 0x0, 0x4}, 0x4000000) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000580)={0x1, @pix_mp={0x0, 0x0, 0x30314247}}) 11:46:39 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x8000000000200, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x20) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000001000)=""/246) ioctl$EVIOCGREP(r0, 0xc008744c, &(0x7f0000003000)=""/174) 11:46:39 executing program 2: syz_emit_ethernet(0x2a, &(0x7f0000000300)={@local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0xf401, 0x0, @remote={0xac, 0x1c}, @local}, @igmp={0x3, 0x0, 0x0, @broadcast}}}}}, 0x0) setrlimit(0x0, &(0x7f0000000000)={0x7}) 11:46:39 executing program 5: r0 = socket$bt_bnep(0x1f, 0x3, 0x4) fgetxattr(r0, &(0x7f0000000040)=@known='trusted.overlay.redirect\x00', &(0x7f0000000080)=""/138, 0x8a) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x400200007fd, &(0x7f0000000000)={0x2, 0x4e23, @loopback}, 0x10) write$binfmt_elf64(r1, &(0x7f00000016c0)=ANY=[@ANYPTR], 0x8) r2 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0xc, 0x400) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000180)=0x10, 0x4) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x47, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1}, 0x0) 11:46:39 executing program 1: r0 = epoll_create1(0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x12100, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000002540)) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000700)={0xf}) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000040)) epoll_pwait(r0, &(0x7f0000000000)=[{}], 0x1, 0x0, &(0x7f0000000080), 0x8) 11:46:39 executing program 3 (fault-call:1 fault-nth:0): unshare(0x20400) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='map\x00\x00~6\xf5\b\xd2g\xab\fz\xfe\x9f?\x00U\x1de\x9d\xa3p:\xc5{\x8e\xda\xc9\xfc\x8c]\x01\x83B\vg\x8f\xa5\x04\x00'}, 0x10) 11:46:39 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x0, 0x0) ioctl$int_in(r0, 0x5421, &(0x7f0000001280)=0x3) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={0x0, 0x7ff}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f00000000c0)={r1, 0x2}, &(0x7f0000000100)=0x8) read$FUSE(r0, &(0x7f0000002180), 0x1000) ioctl$SCSI_IOCTL_GET_IDLUN(r0, 0x5382, &(0x7f0000000000)) read$FUSE(r0, &(0x7f0000000180), 0x1000) 11:46:39 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002ff7)='/dev/ppp\x00', 0x0, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0x4) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000000c0)=""/246) ioctl$EVIOCGREP(r0, 0xc008744c, &(0x7f0000003000)=""/174) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f0000000000)=""/178) [ 460.579945] FAULT_INJECTION: forcing a failure. [ 460.579945] name failslab, interval 1, probability 0, space 0, times 1 [ 460.591486] CPU: 1 PID: 15163 Comm: syz-executor3 Not tainted 4.20.0-rc7+ #3 [ 460.598714] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 460.608105] Call Trace: [ 460.610760] dump_stack+0x1c9/0x220 [ 460.614452] ? __should_failslab+0x278/0x2a0 [ 460.618937] should_fail+0xb5c/0xb70 [ 460.622723] __should_failslab+0x278/0x2a0 [ 460.627009] should_failslab+0x29/0x70 [ 460.630964] kmem_cache_alloc_trace+0x125/0xc30 [ 460.635741] ? __do_sys_bpf+0x1484/0xfdf0 [ 460.639944] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 460.645368] __do_sys_bpf+0x1484/0xfdf0 [ 460.649417] ? __fsnotify_parent+0x134/0x5a0 [ 460.653911] ? __sb_end_write+0xcc/0x150 [ 460.658054] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 460.663563] ? prepare_exit_to_usermode+0x137/0x460 [ 460.668655] ? syscall_return_slowpath+0x50/0x680 [ 460.673609] __se_sys_bpf+0x8e/0xa0 11:46:39 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x0, 0x200880) r1 = syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0xfefd, 0x8800) r2 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x1, 0x2) r3 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000140)='/dev/video35\x00', 0x2, 0x0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000180)={0x3, 0x6, 0x3, 0x0, 0x0, [{r1, 0x0, 0x1}, {r2, 0x0, 0x20}, {r3, 0x0, 0x400}]}) r4 = socket$vsock_dgram(0x28, 0x2, 0x0) syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x2, 0x400) sendmsg(r4, &(0x7f0000000480)={&(0x7f0000000000)=@nfc, 0x80, &(0x7f0000000080)}, 0x8001) [ 460.677296] __x64_sys_bpf+0x4a/0x70 [ 460.681096] do_syscall_64+0xcd/0x110 [ 460.684964] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 460.690219] RIP: 0033:0x457669 [ 460.693466] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 460.712426] RSP: 002b:00007ff606da6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 460.720186] RAX: ffffffffffffffda RBX: 00007ff606da6c90 RCX: 0000000000457669 11:46:39 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x10000, 0x0) ioctl$SG_SET_KEEP_ORPHAN(r0, 0x2287, &(0x7f0000000100)=0x400) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000200)={0x0, @in6, 0x0, 0x0, 0x800, 0x0, 0x92}, 0x98) sendto$inet(r1, &(0x7f00000002c0)='F', 0x1, 0x0, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, 0xffffff27) ioctl$VIDIOC_ENUMSTD(r1, 0xc0485619, &(0x7f0000000000)={0x4, 0xffffff, "6d88c1df902a809c828fb5ea75d395b9b848550156ee1497", {0x7fffffff, 0x920}, 0x9}) [ 460.727507] RDX: 0000000000000010 RSI: 0000000020000040 RDI: 0000000000000011 [ 460.734809] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 460.742124] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff606da76d4 [ 460.749445] R13: 00000000004bda7f R14: 00000000004cd378 R15: 0000000000000003 11:46:39 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) close(r0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="1b00000018000700e4050c00e69be20180a0d6f5c00fea0c73dd4a", 0x1b}], 0x1}, 0x0) 11:46:39 executing program 3 (fault-call:1 fault-nth:1): unshare(0x20400) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='map\x00\x00~6\xf5\b\xd2g\xab\fz\xfe\x9f?\x00U\x1de\x9d\xa3p:\xc5{\x8e\xda\xc9\xfc\x8c]\x01\x83B\vg\x8f\xa5\x04\x00'}, 0x10) 11:46:40 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x3, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000001000)=""/246) ioctl$EVIOCGREP(r0, 0xc008744c, &(0x7f0000003000)=""/174) 11:46:40 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x8000, 0x0) connect$pppoe(r1, &(0x7f0000000080)={0x18, 0x0, {0x0, @remote, 'dummy0\x00'}}, 0x1e) sendmsg$nl_xfrm(r0, &(0x7f0000000280)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f00000002c0)=@delsa={0x28, 0x11, 0x11, 0x0, 0x0, {@in6=@mcast1, 0x0, 0x0, 0x6c}}, 0x28}}, 0x0) 11:46:40 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000ab2000)=0x1002, 0x4) setsockopt$inet_int(r0, 0x0, 0x8, &(0x7f0000000040)=0x2, 0xfffffffffffffe18) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000)='trusted.overlay.nlink\x00', &(0x7f0000000180)={'U+', 0x8000}, 0x28, 0x2) sendto$inet(r0, &(0x7f0000000040), 0x1a3, 0x0, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) recvmsg(r0, &(0x7f0000000140)={&(0x7f00000000c0)=@nl=@unspec, 0x80, &(0x7f0000000640), 0x0, 0xfffffffffffffffd}, 0x40012021) 11:46:40 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x803, 0x4) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") r2 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') fchdir(r2) quotactl(0x2080000201, &(0x7f00000000c0)='./file2\x00', 0x0, &(0x7f0000000040)='-0') ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0xc0bc5351, &(0x7f00000001c0)={0x3f, 0x0, 'client0\x00', 0x0, "7b69765fc3692f0a", "030ab7e825f05fdcf3c2034c68b652aa9ddb94efa3bb000000089a7983e53ee8"}) 11:46:40 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='io.stat\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4080}, 0xc, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="b0000000fc5349f83c215b833b14000000005250", @ANYRES16=r1, @ANYBLOB="00022bbd7000fedbdf2501000000080100080004004e22000008000800090000001400030000000800000000000000000000000000080006000000000008000500090000005c00030008000300000000001400060000000000000000000000ffffe00000eb08000500ac14140d08000500ac1414aa0800040001800000140002007465716c30000000000000000000000008000500ac14141d080007004e200000"], 0xb0}, 0x1, 0x0, 0x0, 0x20008804}, 0x4000) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x4, 0x6, 0xc2f, 0x4, r0, 0x6}, 0x2c) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x0, 0x0) ioctl$int_in(r2, 0x800000c004500a, &(0x7f00000004c0)=0x400) ioctl$int_in(r2, 0x800000c0045002, &(0x7f0000000100)) readv(r2, &(0x7f0000000440)=[{&(0x7f00000005c0)=""/199, 0xc7}], 0x1) 11:46:40 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000280)='/dev/rtc0\x00', 0x0, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x3ff) r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1000000000000001) set_mempolicy(0x3, &(0x7f0000000080)=0x1, 0x4) r2 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0xfffffffffffffff7, 0x4000) ioctl$FS_IOC_FSGETXATTR(r1, 0x802c550a, &(0x7f0000000040)={0x2, 0x0, 0x0, 0x400500, 0xffffffff7ff0bdbe}) ioctl$FS_IOC_MEASURE_VERITY(r1, 0xc0046686, &(0x7f00000001c0)={0x0, 0x90, "1a87511f99e25862bdedfbb062d02ba49a5c2d465e149e1d901b16974a3c2c268350311114002927b75a9b809052c56520445a66408c7b1056308569d534e385fe09970158634dce439d2d704235879bb67df1978faaa0b0dfb89d473dccfc4efdd5c46eb8ef6ddb69f324059f9f398e0a17085a990388a474c943eee8425e09db44506c6ee8440138bd5ad95188e7f9"}) ioctl$DRM_IOCTL_GET_STATS(r2, 0x80f86406, &(0x7f0000000100)=""/134) 11:46:40 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002ff7)='/dev/ppp\x00', 0x0, 0x0) syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x4000) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000001000)=""/246) ioctl$EVIOCGREP(r0, 0xc008744c, &(0x7f0000003000)=""/174) ioctl$EVIOCGPROP(r0, 0x80404509, &(0x7f0000000000)=""/127) 11:46:40 executing program 1: r0 = socket(0xa, 0x80005, 0x0) ioctl(r0, 0x20000000008912, &(0x7f0000000240)="0a5c2d0240316285717070") r1 = socket$netlink(0x10, 0x3, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='/dev/input/mice\x00', r2}, 0x10) ioctl$KVM_NMI(r2, 0xae9a) sendmsg$nl_generic(r1, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000015ff0)={&(0x7f0000023000)={0x1c, 0x20, 0xaff, 0x0, 0x0, {0x1000a}, [@generic="fffffe0121"]}, 0x1c}}, 0x0) 11:46:40 executing program 0: sendmmsg(0xffffffffffffffff, &(0x7f0000004ac0)=[{{0x0, 0x0, &(0x7f00000052c0)=[{&(0x7f0000001f80)="40b6df0436eb6f67273407d815827e5567e0f0d44f482682f559b75109e1f0dcb64eb81564f58db3a0ea3aa9f361fb0941cccd9e99ff9d275b6b1f7f0f300d7363f1ae125569f7f158b3e9915eb8c5d35c67b073cba8a8ac6bacadd579f59d6908bb5ad63ba296527807b3749785a9258c6bdb0dc8bd46eafa36aae29a9a93", 0x7f}], 0x1}}], 0x1, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002000)="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", 0x12e) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, 0x5c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000)={0x0, 0x0, 0xd}, 0xfffffffffffffff7) r0 = accept4$unix(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000080)=0x6e, 0x800) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f00000000c0)={0x1, 0x2}, 0x8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r1, 0x29, 0x40, &(0x7f0000001fde), 0x4) 11:46:40 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x8000008040, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r1, 0xc06855c8, &(0x7f0000000040)={0x10, 0x1, {0x53, 0x7ff, 0x1, {0x5, 0xaf0}, {0x3, 0x6}, @const={0x100000001, {0x100000001, 0x7, 0x2, 0x8001}}}, {0x57, 0x7, 0xfffffffffffffff8, {0xfff, 0xf9fb}, {0x9, 0x2e}, @ramp={0x3, 0x0, {0x3, 0x7, 0x2, 0x100000000}}}}) sendto$inet6(r0, 0x0, 0x0, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) close(r0) [ 461.511469] vhci_hcd: invalid port number 71 [ 461.516248] vhci_hcd: default hub control req: 0000 va9e8 i0047 l18432 11:46:40 executing program 5: r0 = memfd_create(&(0x7f0000000240)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(\x91\xec\xda\"\x10\xe8\xc06_\x9d\b\xdeq\xc1\x18m\xfa\x93\xf8I\x01\x1e\xaa\x1f(\x9f\x1b\x12\xe74Y)/\x0f\xb4}\xb3\xb4\x1e\fmd\xe8m\xe53~\xdd6\xeeT\xaf\x8a\xf0\x92\xfa>', 0x0) write(r0, &(0x7f0000000540)="a60158c1d574ca1866c271777a1d8a022b93bb24bbb2c2c92af13a68dc3e9d4281a841a28976bff45fd4649998c1b165742b4a5d73eb4fb202dac4fd5bca10d7e0c27a7aa3c787f9", 0x48) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) sendfile(r0, r0, &(0x7f0000317000), 0xff8) sysfs$1(0x1, &(0x7f0000000040)='\x18\xe2\xa7\x0f\x00\x00\x1a\x00\x00\x00\x00\x00\x00\x00\f') 11:46:40 executing program 3: r0 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x1f, 0xe25d380f12e769f5) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180)='bridge_slave_0\x00', 0x10) unshare(0x20400) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='map\x00\x00~6\xf5\b\xd2g\xab\fz\xfe\x9f?\x00U\x1de\x9d\xa3p:\xc5{\x8e\xda\xc9\xfc\x8c]\x01\x83B\vg\x8f\xa5\x04\x00'}, 0x10) 11:46:40 executing program 0: r0 = eventfd(0x0) fcntl$setstatus(r0, 0x4, 0xc00) writev(r0, &(0x7f0000000a40)=[{&(0x7f00000004c0)="df015be2a1043cce", 0x8}], 0x1) writev(r0, &(0x7f0000000480)=[{&(0x7f0000000040)="0eff4a45de15627c", 0x8}], 0x1) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x1, 0x2000) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) fcntl$F_SET_FILE_RW_HINT(r2, 0x40e, &(0x7f0000000100)=0x7) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000000c0)={0x100000001, 0x2, 0x1, r2}) flock(r3, 0x0) 11:46:40 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) r1 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(r1, 0x0, 0x2e, &(0x7f0000000100)={0x1, {{0x2, 0x0, @multicast1}}, {{0x2, 0x4e22, @dev}}}, 0x108) setsockopt$inet_int(r0, 0x0, 0x4, &(0x7f0000000080)=0x1, 0x4) 11:46:40 executing program 4: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x40, 0x8000) r1 = getpid() sendmsg$nl_route(r0, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000240)={&(0x7f00000000c0)=ANY=[@ANYBLOB="540000000000000000000000f000000000000000", @ANYRES32=0x0, @ANYBLOB="000002000000060008001300", @ANYRES32=r1, @ANYBLOB="08002500baf6ffff0c000200aaaaaaaaaaaa000008001d000100000008001b002df600000800230002000000"], 0x54}, 0x1, 0x0, 0x0, 0x1}, 0x1) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002ff7)='/dev/ppp\x00', 0x208600, 0x0) ioctl$FS_IOC_GETFSLABEL(r2, 0x81009431, &(0x7f00000002c0)) ioctl$EVIOCGPROP(r2, 0xc004743e, &(0x7f0000000140)=""/246) ioctl$EVIOCGREP(r2, 0xc008744c, &(0x7f0000003000)=""/174) ioctl$FIONREAD(r2, 0x541b, &(0x7f0000000040)) 11:46:40 executing program 5: r0 = syz_open_dev$sndpcmc(&(0x7f0000000240)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000280)=""/92, 0x5}, {&(0x7f0000000080)=""/7, 0x7}, {&(0x7f0000000400)=""/4096, 0x1000}], 0x3, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000015c0)=[{{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000180)=""/34, 0x22}], 0x1}}], 0x1, 0x0, 0x0) ioctl$VIDIOC_S_CTRL(r0, 0xc008561c, &(0x7f00000000c0)={0x8, 0x6}) ioctl(r0, 0xc2604110, &(0x7f0000000000)="b60be09850e7fa9164681948a632ac99f03dcd88acc191a27c6a7ffe59bd7efb14c033e801ba74a3334ad5cc9777c562e1d59473d986b906448d112d0134225d3ab2d59867") 11:46:40 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000080)=0x200000000) write$vnet(r0, &(0x7f00000018c0)={0x1, {&(0x7f0000000100)=""/211, 0xd3, &(0x7f0000001800)=""/130, 0x0, 0x2}}, 0x68) ioctl$int_in(r0, 0x40000000af01, &(0x7f0000000300)) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001640)=""/163, &(0x7f0000000540)=""/246, &(0x7f0000000640)=""/4096}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0x7, &(0x7f0000000200)={0x8, 0x9, 0x9, 0x2}, 0x10) close(r1) socket$packet(0x11, 0x3, 0x300) fremovexattr(r0, &(0x7f0000000240)=@known='trusted.overlay.metacopy\x00') ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000200)=ANY=[]) write$vnet(r0, &(0x7f00000004c0)={0x1, {&(0x7f00000003c0)=""/247, 0xb870ca92, &(0x7f0000000280)=""/118, 0x3, 0x2}}, 0x39f) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000f1dff8)={0x0, r1}) 11:46:41 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002ff7)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000001000)=""/246) 11:46:41 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) io_setup(0x8, &(0x7f0000000140)=0x0) r2 = socket$inet6(0xa, 0x80006, 0x0) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000140), 0x5ee}]) accept4$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000040)=0x14, 0x800) 11:46:41 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000100), 0x12) socket$netlink(0x10, 0x3, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) ioctl$ASHMEM_GET_PIN_STATUS(r0, 0x7709, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r4, r5, 0x0, 0x10000000000443) read(r4, &(0x7f00000003c0)=""/72, 0x100000104) sendmsg$xdp(r4, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 11:46:41 executing program 3: unshare(0x20000000000fffd) r0 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x42724bbd, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(r0, 0xc004ae02, &(0x7f00000000c0)={0x3, [0x0, 0x0, 0x0]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='map\x00\x00~6\xf5\b\xd2g\xab\fz\xfe\x9f?\x00U\x1de\x9d\xa3p:\xc5{\x8e\xda\xc9\xfc\x8c]\x01\x83B\vg\x8f\xa5\x04\x00'}, 0x10) 11:46:41 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)="36706141e97c1ccc", 0xfffffffffffffe78) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x4) sendmmsg(r1, &(0x7f0000007b40)=[{{&(0x7f0000000180)=@l2, 0x80}}, {{&(0x7f0000007500)=@hci, 0x80, &(0x7f0000007680), 0x0, &(0x7f0000000000)}, 0x6}], 0x2, 0x0) 11:46:41 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x237fff, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000001000)=""/246) ioctl$EVIOCGREP(r0, 0xc008744c, &(0x7f0000003000)=""/174) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000000)=0x0) ioctl$TIOCSSOFTCAR(r0, 0x541a, &(0x7f0000000040)) ptrace$peekuser(0x3, r1, 0x0) 11:46:41 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x8000000004) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x8, 0x2180) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000040)={0x7ff, 0x6, 0xe1cd, 0x8000, 0x0}, &(0x7f0000000080)=0x10) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000280)={r2, 0x5b68, 0x7fff, 0x2, 0x5, 0x9, 0x200, 0x1, {r2, @in6={{0xa, 0x4e24, 0xa240, @mcast1, 0x73}}, 0x1, 0x2, 0x53a, 0x8001, 0x6}}, &(0x7f0000000340)=0xb0) ioctl$int_out(r1, 0x5462, &(0x7f0000000100)) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f00000001c0)={r2, @in6={{0xa, 0x4e23, 0x157, @empty, 0x2}}}, &(0x7f00000000c0)=0x84) sendmmsg$inet_sctp(r1, &(0x7f00000007c0)=[{&(0x7f00000003c0)=@in6={0xa, 0x4e20, 0x15, @ipv4={[], [], @rand_addr=0x3}, 0x7fffffff}, 0x1c, &(0x7f0000000500)=[{&(0x7f0000000400)="9387109d8a856edaacf01b8b4b6ad420e5cc22", 0x13}, {&(0x7f0000000440)="af8e635a799e434a7ca7e9c15220a2cb6e43fc43bdc12c18999f43d7d8037390e91a7cc65caad9f9748cf194c0c0dd562dc057e24d4873753555e5323318b971f50d50612a8c7cf5cc2505e27b509c4b30b28ac4f9859dcc4f23ef9656fca170681bdc4e3adb9c38ca4339ee3c", 0x6d}, {&(0x7f00000004c0)="29581cd2a579e0a81cf7bb2cad7073004d2a8a2596a0e1d0433a21aeebbafa669abf0b39e441e25669205649e9243686aa6a2d07eae43bcd", 0x38}], 0x3, &(0x7f0000000540)=[@sndinfo={0x20, 0x84, 0x2, {0xf9, 0x200, 0x3ff, 0x200, r5}}, @prinfo={0x18, 0x84, 0x5, {0x10, 0x3}}], 0x38, 0x1}, {&(0x7f0000000580)=@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10, &(0x7f00000006c0)=[{&(0x7f00000005c0)="d59fe7f41510b10fb26b186a4cb5a6d59dfaa387d19c10d8acd12c476e117d1541135348b649400e65931f7f9ceb8699855398673daef20526271a824a1d5dc70baac178d25c04d49ab2a9a17bf3a6d34246dbbccff85326d88b7839b04459a66521a49f061b5c11f923c8afbe2fc1144705ce1ea3e17bac0c136eb08d4c52", 0x7f}, {&(0x7f0000000640)="7d0e65050bcba79a4db1e7d9a64b759fdeade0bf64cf68c95f4fc543e24198a85061f32216fbb365b47819927d2b0d215d514a391f3be3352da88244ee1a4c1645de6d696b47faa45a1a4c5baf9f8bd6644c6f53b84b", 0x56}], 0x2, &(0x7f0000000700)=[@sndinfo={0x20, 0x84, 0x2, {0x9, 0x1, 0x2, 0x3, r2}}, @init={0x18, 0x84, 0x0, {0xa5a7, 0x2, 0x1, 0x7f}}, @sndrcv={0x30, 0x84, 0x1, {0x8, 0x5d, 0x4, 0x4, 0x710, 0x80, 0x0, 0x100, r3}}, @sndinfo={0x20, 0x84, 0x2, {0x40, 0x200, 0x3, 0x5, r4}}, @init={0x18, 0x84, 0x0, {0x1, 0x3, 0x4, 0x7}}], 0xa0, 0x8000}], 0x2, 0x4890) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000140)="58000000e3570acbefa2f709040d8c560a067fffffff81004e220000000006000b4824ca945f64009400a8000000000000002000000000000000000000fff5dd0000000c0001000a0a0c00410400000000fcff0000000000", 0x58}], 0x1) 11:46:41 executing program 3: unshare(0x20400) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x101000, 0x0) setsockopt$TIPC_MCAST_BROADCAST(r0, 0x10f, 0x85) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='map\x00\x00~6\xf5\b\xd2g\xab\fz\xfe\x9f?\x00U\x1de\x9d\xa3p:\xc5{\x8e\xda\xc9\xfc\x8c]\x01\x83B\vg\x8f\xa5\x04\x00'}, 0x10) 11:46:41 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_G_PARM(r0, 0xc0cc5615, &(0x7f0000000280)={0xc, @raw_data="3491942d944ee98590fb6fc5866e9e8daf570273d88d95bba990009489188e1e2d991bb88292b55ec8ae14ad5285d138116b7027433a1e457378ffdfc2e6b1f27b5819c6445623580499eb542e45dcfaf02bec4fa5d4a712e7ac91a267b945799f8dc50c46dc3ce928813378551fe6aaa5b9fac33e5d60e2958e8d3b53e0ceeea205cada60cec31be1592be6e3f393b7ff017c4be8416ba8117cf162cbfc558a66c1230265c815ad54da67154fd7c05a49e339db46b12add70b46ea0b49b2c8f32026126d3336f4d"}) r1 = fcntl$getown(r0, 0x9) r2 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x0, 0x2) ioctl$PPPIOCGCHAN(r2, 0x80047437, &(0x7f0000000180)) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$KDGETMODE(r3, 0x4b3b, &(0x7f0000000100)) ptrace$setregs(0xf, r1, 0x3ff, &(0x7f0000000000)="4cdf0751e1b9aacc8804efd18ad3d55d40ce8f38754ae3b83e1a4c4ea396f578c7be7b66d9b0904ad8c57f6b6c13bbe50ac9707d33f3ebf53b6b5ab751a17e53dbeaa8bf06c8afe83bee88473419155256ae93f34a0cc8bd214296363fba6fdd6821fe4bf24a697a7a41cdb0d0f3c155159644404354be869e3589") 11:46:41 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002ff7)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000001000)=""/246) ioctl$EVIOCGREP(r0, 0xc008744c, &(0x7f0000003000)=""/174) 11:46:41 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_BEARER_GET(r0, &(0x7f00000002c0)={0x0, 0x24187e6f2d13525b, &(0x7f0000000280)={&(0x7f00000005c0)=ANY=[]}}, 0x3) read(r0, &(0x7f0000000100)=""/99, 0x63) r1 = socket$inet6(0xa, 0x5, 0x5) getsockopt$IP_VS_SO_GET_VERSION(r1, 0x0, 0x480, &(0x7f00000001c0), &(0x7f0000000200)=0x40) r2 = dup2(r1, r1) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r2, &(0x7f0000000540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2020800e}, 0xc, &(0x7f0000000500)={&(0x7f0000000300)={0x1d8, r3, 0x100, 0x70bd27, 0x25dfdbfb, {}, [@TIPC_NLA_LINK={0x58, 0x4, [@TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5d}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1800000000000000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fffffff}]}, @TIPC_NLA_LINK_PROP={0x4}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_LINK={0x6c, 0x4, [@TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x58}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_BEARER={0xc0, 0x1, [@TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xbdc}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fffffff}]}, @TIPC_NLA_BEARER_PROP={0x44, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6c}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x81}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xe1}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100000001}]}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x400}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x7, @local, 0xb9d}}, {0x14, 0x2, @in={0x2, 0x4e20, @rand_addr=0x1}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x7ff}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x200}]}, @TIPC_NLA_NET={0x1c, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x30}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x2000000000}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x5}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}]}, @TIPC_NLA_NODE={0x18, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_NODE_UP={0x4}]}]}, 0x1d8}, 0x1, 0x0, 0x0, 0x4000}, 0x20000000) getsockopt$inet6_int(r2, 0x29, 0x33, &(0x7f0000000000), &(0x7f0000000040)=0x4) write$FUSE_IOCTL(r2, &(0x7f0000000580)={0x20, 0xfffffffffffffffe, 0x7, {0x3, 0x4, 0x4, 0x1}}, 0x20) 11:46:41 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x2000, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000000c0)='sysfs\x00', 0x18008, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) flistxattr(r0, &(0x7f0000000140)=""/231, 0xfed3) 11:46:41 executing program 3: r0 = accept$inet6(0xffffffffffffffff, &(0x7f0000000240)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000280)=0x1c) getsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f00000002c0), &(0x7f0000000300)=0x10) unshare(0x20400) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm_plock\x00', 0x2, 0x0) ioctl$PIO_FONTX(r1, 0x4b6c, &(0x7f0000000380)="dc776c59af3f0f340eff7297b7c6166733dfb385e70a3889f36f024f7f7c90a728877efa618c1cebe518de89fd68c3ab2302d122443a25715945b7b1628a426eba59df2bce68b877c80301d8cfe92e7220c3983b473969eadae9c866060c72fe3a") r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x8000, 0x0) ioctl$VIDIOC_S_MODULATOR(r1, 0x40445637, &(0x7f00000004c0)={0x5, "ca6abcaa539b59b6dd3ef7ad4130c2de20f34cbcffa11764a33ae14f2b7b8d59", 0x204, 0x0, 0x45, 0x6, 0x1}) setsockopt(r2, 0xb48, 0xfffffffffffffff7, &(0x7f0000000140)="e7c9b5b937b4626cfb77ec4111bcc6c324aa08470f8e33040eda09a7722c8d24a1b66ea0c08c9327e11067d81ee9688d0097f1f557460d05fe0313bb6be8ffda12cccba4e91bce7256a6c1f05a78572a68fa8cfaaaaefbfe238e55e431c9945d226c8095d4530b61275b59632c6f0a79b62009668bfbce834f52a932abe375ab2100ae47871bbf803589d0cf063a811c306a948ecc0b51c07918509649fee6f77fae694cdcc59d8ff45562ae27024cd2caaab7058907831d71ff23b356e0fe1e1a6ec7066c46d94ee35986149ba750", 0xcf) ioctl$sock_inet_SIOCGIFPFLAGS(r2, 0x8935, &(0x7f0000000480)={'veth0\x00', 0x4}) ioctl$DRM_IOCTL_SET_UNIQUE(r2, 0x40106410, &(0x7f0000000100)={0x36f, &(0x7f00000000c0)="8d04f7828625095b26652b5c65bd7753c756422e5d1a36f746b99f2fcf7f4a179575b36fbafbc066efc3c6726b06eaa261ce3691"}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='map\x00\x00~6\xf5\b\xd2g\xab\fz\xfe\x9f?\x00U\x1de\x9d\xa3p:\xc5{\x8e\xda\xc9\xfc\x8c]\x01\x83B\vg\x8f\xa5\x04\x00'}, 0x10) fstat(r2, &(0x7f0000000400)) 11:46:42 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x6, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = memfd_create(&(0x7f00000000c0)=',%\x00', 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000027ff3)='/dev/snd/seq\x00', 0x0, 0x20005) r3 = dup2(r2, r1) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000000)={0x0, 0x7, 0x10}, &(0x7f0000000040)=0xc) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000080)={r4, 0x3}, &(0x7f0000000100)=0xc) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000037000)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^H\x00\x00\x00\x00\x00\x00\x00\x7fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,Q\xf0\x1b\x7f\v\x01O\x9f\x91\xee\xb7\xc3|r@\xf4v\xc8\xd7S\xd0\x00\xaa\x05\x00\x00\x00t\xdb\xcf\xa6\xdcM'}) write$sndseq(r1, &(0x7f000000a000)=[{0x5, 0x3, 0x0, 0x0, @time={0x0, 0x989680}, {}, {}, @ext={0x0, 0x0}}], 0x2000a030) 11:46:42 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000100), 0x12) socket$netlink(0x10, 0x3, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) ioctl$ASHMEM_GET_PIN_STATUS(r0, 0x7709, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r4, r5, 0x0, 0x10000000000443) read(r4, &(0x7f00000003c0)=""/72, 0x100000104) sendmsg$xdp(r4, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 11:46:42 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002f40)='/dev/ppp\x00', 0x404000, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000140)=ANY=[@ANYRES32=0x0, @ANYBLOB="58000000e0b4e6536d7829179f96ff42db5163a88046538de7e7ce986b257b28f82b9bd1142c0d1493bf7c380d12d937a17e6c7a60399e336d7ae81ea4e92c42df72e0b635052ca62a018c1d64417a85b5160b4c20239f6138ed6a819dc98873796c436cab27be04533e787d101abe95557a2545d3f571235375c2a4ba6a1357e8707786de18a1bb4fe87305a848ae1dd9ba360c3edf03cd413c3774cf5fa55b728c231e23dd5c6d6ed884784a196f278af1af8fc2c1d23524ffc8e705de6c1b301f27b35bb2c4589af9a1da708dd13fdf2ff25aaab75964fe000000000000000000000000"], &(0x7f0000000080)=0x60) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f00000000c0)={r1, 0x2, "74bf"}, &(0x7f0000000100)=0xa) connect$vsock_stream(r0, &(0x7f0000000300)={0x28, 0x0, 0x0, @hyper}, 0x10) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000001000)=""/246) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000000380)={0x5, &(0x7f0000000340)=[{}, {}, {}, {0x0}, {}]}) r4 = syz_open_dev$amidi(&(0x7f0000002fc0)='/dev/amidi#\x00', 0x7fff, 0x4000) ioctl$DRM_IOCTL_DMA(r0, 0xc0406429, &(0x7f00000004c0)={r3, 0x5, &(0x7f00000003c0)=[0x81, 0x5, 0x0, 0xe6, 0xfff], &(0x7f0000000400)=[0x9, 0x800000000000, 0x64d0], 0x20, 0x3, 0x6, &(0x7f0000000440)=[0x3, 0xfffffffffffffbff, 0xfff], &(0x7f0000000480)=[0x94, 0x6aa, 0x7fff]}) ioctl$sock_inet_SIOCSIFBRDADDR(r4, 0x891a, &(0x7f0000002f80)={'bpq0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xf}}}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x6, 0x7, 0x4a, 0x2, 0x0, 0x3, 0x80010, 0x5, 0x2, 0x2, 0x4, 0x8, 0x5, 0x1, 0x40, 0x8000, 0x106, 0x4, 0x1, 0x40, 0x4, 0x6, 0x1000200000, 0x4, 0x14, 0x2, 0xfa2, 0x3, 0x4, 0x9, 0x1, 0x0, 0x7, 0x0, 0xbbf7, 0x4, 0x0, 0x2, 0x0, @perf_bp={&(0x7f0000000000), 0xe}, 0x80, 0x7fff, 0x3, 0x0, 0x0, 0xf5bf, 0x9}, r5, 0xf, r0, 0x0) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)=ANY=[@ANYRES32=r2, @ANYBLOB="0200ff00046c8d5b"], 0xc) sendmmsg$inet_sctp(r0, &(0x7f0000002e00)=[{&(0x7f0000000500)=@in6={0xa, 0x4e22, 0x7e00, @empty, 0xff}, 0x1c, &(0x7f0000000680)=[{&(0x7f0000000540)="9186ea95289da2713ad5597afee505e45f1357b86558132e77f3ae4406d607a87b11cffcf037e122b77357b928a747130aaddfbfb5227cf316b05765c80ebdd8b85917d25816400af2817b05acccfdde091842dd8aa8345bf469bd7d8acaa87da08fed4f66e086ea3b999e001c7cbd1b334ad2a6", 0x74}, {&(0x7f00000005c0)="ae24565985a5068676788c80baec283deee6db570af3d30d18ad660c49becf723bbc4d863ad143a9e4420093e9c1f4687e177aa1d3fc94c11aaeb6455d6fb0b43a67f7ab153b13e55d1492f8a351909f589be403e47ead5693d3141b400d5221fe95243dad78b62f0e37dc2f8405cb4f4078ae1c4188", 0x76}, {&(0x7f0000000640)="224d8c9c7cd43696ffbc1df1a4ce72f52b752129ece9703e1f064d2154663881eb23e3518790a1e6235a6e54f3b14e77e3f61b796226a5ef6fa3ff", 0x3b}], 0x3, &(0x7f00000006c0)=[@sndinfo={0x20, 0x84, 0x2, {0x4, 0x4, 0x5, 0x81, r2}}, @dstaddrv4={0x18, 0x84, 0x7, @dev={0xac, 0x14, 0x14, 0xd}}, @prinfo={0x18, 0x84, 0x5, {0x30, 0x69}}, @dstaddrv6={0x20, 0x84, 0x8, @ipv4={[], [], @empty}}], 0x70, 0x44000}, {&(0x7f0000000740)=@in6={0xa, 0x4e20, 0x100, @remote, 0x8365}, 0x1c, &(0x7f0000000900)=[{&(0x7f0000000780)="470d9663947694edfc1ebb2fb477d343be0ca593ed2a66f76c98894a10868c658146ad6096a381e914907538bdbc164730f5e7d73f618911705b2d9c858caf1e0c248e0d303e1cf5598275a2297a3bc8c44f06bdaac59d12936f1ea131fa11f50b237723c2f0a1c9255f3e18a5", 0x6d}, {&(0x7f0000000800)="3a4ebbb3f725d8f3d40b296cebb9b5ee148b054e4982b20cae4c201da3ec90be7a2e174b33f0afc113b004afd66357db31929558aaae806dd8773c36420b89a59c1815f2f8e543463db9f2650db01a529a425c554395ffcc9cf7d7b6c75f0a2a598f3a525c358b556c5cd43cbf58dc5496d082ab9197d698f0ad0becbf940a91e2efd30a5f9caf56cd82ec19cc2e1fdb37800ef35377616c256d3b7d44473e1a615ebdeec95c8452c6b478d3020d8e144eb18e20989af664d575b0cb279b2ec1c175af6bde206d2a67b4206387239c9d316b8e", 0xd3}, {&(0x7f0000001100)="de462ca3a6ff43770825cc307ae793d545a26cd20ef65c16a278b6ab2a5dc79d99aa2b41d52beaefca8430c771fd5d94344aae685fd20167bb2b5152c95c87f4b99a0e82c16ec95a696a287b83b1648495976ac3de19c0f57c2f1716121b30b29d0554e7c41ff0e3b678dac6b7d2062365b07c0f546bbb47d6d9e515c7313480f140815f077e02898450e89aff7946e86471c1c76df8dfb3497b6879968873b19bc3d65880b78d47e87d3aba2af0ff84482410d4a4276521bbb0815193d3deeb8857af10529ad70ff98e952f44d5e87423dbe72a5418d37d908f68a54c85a2145450a017dfa712b43224c0a0c727102ba6445d6a7cdf7ea54ea6a01d9045432d467504b1845f4b81386538cd05de40fb6c42d4ca28371ae1e54f3363940f5d27c341c12801c36d305a61855c3e18872e950542b48ce6b177554bcade2807a1de7d48db24a01c8e18aeec21392909be100529f53b1f47fa7978758eb689b4f0817aef19df650893fcbd417f1dd3bde0cdc431747388f61a01d9c19c51ea7ac2a8ed8b0fba28f9337e1a1128a1c9be560c74c54baaccf237b77799dceee848fcf8f413bee2e511e46f72c3aa80c4ca792272af73db07571be4231a10d012d59f80f2219b4c0be633efc758c896448bb82131c610a2765f4bf16194d0f284886be740bfd3bfe01b77dea8ea1fa3f7a9ba2d69c0ad75549fffee09c8f5424b58bee7c496f169563b74893731967327f0e2f28413f7f0ca518d6b5d70e646c05955a16792b010476d7e59fc46adf0515d6ce2798af639fb04d0fc45a812147cd7b27e936a7bf380b481df3817c17a4907280f08e5fcfc8728402ab5df58afc000649d5731cd9c3a62be039f45a5089e1d8a3523e7c128d6c21f367474ecaa7b9b5b7a77f0724a9e73e6e48509890d4f470ef7f39bf36f8c2a60eea96c63f2fe50b310a782480d19964ca122a0155f9f4dcd928f5ed69dfba607619f89dabd9bf57c1628c79638fbf83bd15cfde1c7a218f905316e30f0b8c62e09c9ad6d8fc7780caa62b325172178e9d0424a2ed06ccb70d059028740b7c0cec0591163b62c6a5b55f13f182d2ce1e6e86c448220334bdd070bd56a9690bc5d3039b8822a4606db6a493424498ba16087f9f29f2b1ca8cd797c4fbc04281aeb0fe864ebfa76f471c0331aa1d5e00eb902200548d93b8d0359c2f0d5f7d3ff59d086d93452c08d356e840d96805bd2a97990edac5d8d00fcd1df2cfcf6d35544a452d2a83918fc454e76e40fc3eb44f37997fad02bc303caf07fbaa5fe314fea3b3050e8b214f0268c3fcebf938b1b420edacaa58cfbbc61b83a9dbd6754140fc516b0579f1490ce4881a93e3ba58fa2c5a21ea6ad7a7cc241489c3a1f2e15f91493f84ecb4165c1e790412858e9eb44481af24e364e1d858170ae5ef2095930606a1e38171968c365e317e46d529c2f408404922880a58dcd05641a208548c609027c1494f5d2cccf28a721757cc4ab2488024ec7b6ff280c315ad69aa9d793c21bcae423b388900e39500e9d1fa0f894f90708e2a43022da80e08ff574e0fdc2ca15479432fa74c8efb4592b33478891011d4d5c42a280b9827bfe61d2e83d06e976336db6e3a264638f3c436452ae40ea00c3fa9784dfbed86c1e0bc7bc403822a90e4d0275815d5bfaad26b3b22f2353f2ca31b93dff2f713ccb47bbcc46f7ee327a668c6059b8ea0839f7ca1317af0abcb9f6bc9ec5f22f42d114fdc4c516398fc92149d5f63a31bbe7d99214fa7f1e1c069d13505cb48383b0b58349d9eeb47de44c87012e2c03b8bb778855fa52017f7ed864e7fa53c4b9b4e01359fecfc95ec12d1dfcbcb5959b9d1618c0192207e344b6adefd7fd3d5997d93caacd75d1f6921640c3aa8bbf5771f71392a8d50c4a9a51ee2458e910c191c65eee6152a65cbd344dff86131a990ebcd75bc869064d367adf0f01809d5a4aeae79078c249844794631d0dcaeea6c58a03327037f988a24f15845d1eb32094655e506197a5d6fb39ef084412d97942fe1980bf603d6b8349da05ce444d30f280250c82b6fc87448abfeeab833c08bc261a6545d6e59b900866893239e4e6fe0d4d0fb76a82b2f6d1f201ec3cd63f05bd58f03e5d100aba8c2513c675f4d6ba18297d502bcf06ce1b8e39dc9b8343163cd1c558b4b95a0ae009e9ba68cac120108c971a1003591e9268332f7bfd02f55a70b51ea0ed700c3ba9e03d0452cfbbcb2b11d4ac1b55af861b6ed7683e66b281c481f3e867202de034c5441a391e497a5044f312f34461b4b9b2893c01f52ee3638d2fe55638853ed9dacd8b7835b993049d64cbe61ae22c4dabde2a27bed0c7ae93b501c4984bfe938b2a3e24c4416f6196f48b01deac55d8a592966fc2beb30557e45b9eaeb9a06a11e2c5f2686fb7df16428a7685ffb5434fcebef9a75b25c8ae9d84d349e4862d3fa82dff3b698f0f586b2e4d190847ec08ed96c8212a635ffb50a26b45ac8d56d1c0c4a9f44acd7a992860061e58bc02a670216fa2fc6dcb58a0a31d993888588d684dd74e8ad20817bd47e634c1974163a2a57003b9eb24a34725ccbd4fdb302e255fbecf17f31f35cb582fb79255119f1a6fbf39a94de02691f2c922f3c2d678225aebef1c35ca9e70a8664c6db4e262f248d2f595d1d04a97f591711dc59bb4064ef5b5d5413c615cf8441865a23a95906227154bd2541ec06bae2ad18f1b25a81c83bf970c727c0887f756ae8cc13d16ea9595bc5402096b00d59b2f9a7a308fa35700881ca266aa8bb75ce207a0f025fd5f01254712a78049d7adffdec545cf6b18439143b54170e7081bdd47a43a0996d4c4c56dc1808f65b7ef691ecb4927a0b75c8689b3c193f579667f9c959ae3993eebf3634e39fa66cb896833c2d1ebbe516123227a4e0f9c2b6224f7760311a5569475a4374eeda2e2773d2720739c878b6f1006fadc0dc9d7c38f41dc1d6afb9ec48d70e45d93dc63ea43b769d7150f467a52d2cb305260f9983d82fcb213a59d022bedfa23522a02702c769d9dcbbd09f3062169eb5b9a4eb00486f9cb2f0350eb1045f65b014a6850540f83789ae232e2e177e428cbdcc15db1ecfef28de78335405c8e656570a72437e25205585008df100c98f61c5e45374fe94d046c909885e3ebaad14c01c43d9abce26d7c9e32199529e476726663b9d94d89a46ff72ae80b40d66b42357f541a71d3ce792e5a15342603b60c9043634541c45ee0976375108be0981c32a33307e9ad7860d602aea2d27a91c470ebca3fac82908fe465ad87ecd118d2e3e60fe851371e3110e0c02385fda37d3abbebbe29300d0a65a8b6d270024a7f780f8450e5139de114f0e99107090dbe99fbbba6455ed9f985b243e71d2b6cd46ffa3120960f6500ebf428d43304b76a395ec3076dd93f423cc0c2de2ac5b01028589d8b35b41e2aeed268de307bc2b33101fba665af9de75a1cdb30c19d751b94feb5208764214d78d69f6a0bfafe0dcbbc14d91a44444d2b459eb0e0572febadd063fdeb9d535262466dc7204d07ca91192ae0d55272d0a4b47debe948a5e221913449f47232c0f3b6c2f57dbcdff2398b2ee0dbaeeab80fc3166a36306eb7e22b73febf7153013897ec92b3f28b23d48e863aa7dad376bfd827f5b57afada9c1deba904f151fca828f7f03d2d42ffdbffc3578d8b41b405d5a52de5058c08342a24098a7358aec1c22e3f86319540f8df8e20e67ff6372000e44cdf410373892364ef691649984ae7d665616b3a09ffd11e299799210a567f69cd0c82f25a4db09beb27e176c6ceabd1c9d907d37ae8ebe7df67521f1ac9b25fd8c28e0e9f171b45b2103dc4ad2dd46faefbf2efd5152c3c371c3a78c7eb7b028c652e4d29103ce98b77b71001571e4bbf19ccb2ca3a5dd5e9f6b6cc56a34d56b3bd7c4e5233e26d39634eec55038695f4cf121381a47f422148e7001a4328f71e84e322509a5dc31032e1073ac1eed423032d4ccdfc197b5c4bc4dee39abe7bd83c843f8ce71129421d145671a8d86d51da2ced603e55f73832a8614826913438c7a86f777f2f19342a5b056f0f1b0acc309b111c4c986f66cde853ef1137d3ba201e4ec8e42be678ce5fe0cd3acea3b7c67006745e54631071f9a62efdf76ec236793e1eef0fba6f60b5cb31eb17a3efcaafff2c16386fc51c35ebdb6f847e41cc24864c896c3bccf20534340ab24467e2cf4ca89ad3c28a10ea36495f70bc8cd968c65fcf464dd247813a63bc134f36911d998787d4445765b7f94cc219fd7685cadcda22d7e80a9e14e0bb290b2c872e803080532e89d3e800354671dfb75792442da8805aa0ca866a3578f1e393021983f1ed0caf37dd55772e32805f9eb57b3318fa9e601666f99f16402908859c25444ed0a511f1ff948fe5fb2525c3569a7f0e0ff2739febab656954ffe887b1f5a69ba903ad0ff4e314141533268540fd9f52f348bf972fd720ea8b87fdc986adab4222576a668d52a1d59fa562c35831c14ba2924afd6801c2f54f57f5e8abf07879191db26647fba16ad007914488f457b833573b42fa3975e3ad9e9ec3047261647e2b188c224ce93c5434effe24a9e543d6cbfec22ba15a82813035d61df81471c531ee70e46c688c91e325e15bb88377e63823c06b38db7ec7f793e3d67d5844c4c50ab7505dbe2fa96d89e4ee153d1f479c98e09910acae631be18db349811a43d5bc91bc04ff3120f3f36ff83167ac012af63aae9465798550cb1fb8812dfd5358734a0c1cc6f5b98e80bb4218749682b2134b554d81e4e881bb1a9268ad00b38f3495e7d3ab80ac7df6060b9517f73507c6be42d6ea4fd5030749896d4a6c4f0dc41ce2f3b504844902d5060bed382a3480ac83a2a9137d7812b39e841f2189f789833010620b1be08b2daf5460f0f94837e791a301117aec115d7524067404ccc6a10fe28d64f5e57159e423c12a48aa12905b812cb67623d7a6c594af59a12a2f0f3325488980799ff80d97373260d4eb5dd19a379a77a88715ac0bb7b08d1fa7e9dca124b7ed4c76d4affa04a4ce3101d7a95591f23a5bb2f0c6be61e5ba1a5f23f18347f60ed4d76d661b0fe1e989228fd93e3e63ed3443290115cbee34d66e4da0658eb13b9f4d42a4825e08202b407de921fd811fc5ba07eac348f4eab03be6335683c856c73912acd79655810d2ffe1b510824719010f9208e860403e53ea413b9041ccf34a2bcc4bc86440aaf232b15820af62d8dcf9efb4b5abddd3c2680411387a439a33b694d1d932e14fc97752e967ab60a04673d2256ef09f3a6582ccaa5b71644a072525b1476fabcc463f67930cd18ebf2aff7069066e381b211a0e3fc57cc5cd8e72fd886e051ecec279710f61b97e075614ae986115050133b3358720508a209ed100a03c3ea07c961a1225185d2558b0f7b47115e83d0e6be23239292e626295ad699ab0138b1b8dc8bc54b05c82743aaf5667b8cd512d7fa06fb42cbd04613159fe1848db2265796d9867be356a9cf8224c0fcc723ce2ae291daa750a6efa8a9a91c27e28f918290d4f6e004e6e33854ec5c2ef1d92b3e9feb021b83291865ff092a873b882efa1fec3979338a6d9b535b3df2bad99c7df92f48dc78c385ae4812b66fe1dc70f0877bcdc2f87026f4beced2fb1e46bd48927f48da162734010b73d2394d2411ba659b02b5f58c1a4ceafbc0a580c60781e146ea2f345262eec8b603f3c89017025f95428d0fd4446e8c85b3f7a86949756f58a8730137776b", 0x1000}], 0x3, &(0x7f0000000940)=[@authinfo={0x18, 0x84, 0x6, {0x8001}}, @authinfo={0x18, 0x84, 0x6, {0xfffffffffffffffb}}, @authinfo={0x18, 0x84, 0x6, {0xfffffffffffffff7}}, @sndrcv={0x30, 0x84, 0x1, {0x3, 0xffffffffffffff01, 0x8206, 0x1, 0x4, 0x2b0, 0x100000000, 0x5, r2}}, @sndinfo={0x20, 0x84, 0x2, {0x6, 0x4, 0x80000001, 0x5c, r2}}, @dstaddrv4={0x18, 0x84, 0x7, @rand_addr=0x8}], 0xb0, 0x800}, {&(0x7f0000000a00)=@in={0x2, 0x4e24, @multicast1}, 0x10, &(0x7f0000000f00)=[{&(0x7f0000000a40)="bba5bb076b0fdb634dcd782a417e715d5b8e011ff5756f5e9c48bf52c82b6f2abaddf7de9cfbda04ddfbe250455d97893fb533d5fe64cb8cacd7bbd1508b4f375f076aa668519f53ed47aed151fe88b744fa2b02593e51094f5f795507d1c4c1bc08afb746e98b752bacf6c8f42562df328cc3015db1a5cd3e82a0a8ca31487880d8daa24726bc66e0ea9dee222a0c3bdfa9c5668d536ab1f2b4c5728e70c8206606c276ab0b348c1ac4e3a152c8a26d66beeb8405ecbc593f825b", 0xbb}, {&(0x7f00000030c0)="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", 0x1000}, {&(0x7f0000000b00)="d484c6f380b85b0f0414a35e05238bca58c0029a64fa4e12d5bb8c369e3ad78cf177845438fbdbc3ecca24859bd5f3de609f3d8cee61969b949f5026f5b0f703bb481b1d1deb236277b6504a722eba3a02b0b582f27e62f21ff3582cf2c742c11cc4c6c144f17ac2520616efe618c00031077ccaa73e34a9edfd32b7679cf40b2762ef7d2b8aeb8648a97b05caf542e189054246d0e940ac92d60874", 0x9c}, {&(0x7f0000000bc0)="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", 0xfc}, {&(0x7f0000000cc0)="fe19cb78eb8911b4e301f8cdfb6999998f0a1fd5ca0d7ead5761a8d0f28f160eda1e1081", 0x24}, {&(0x7f0000000d00)="7049bb1e1ec081e3dadccd2638b50048d3700020f1bf316659f884b89c30952b8b1603b08985317b12ac7e4cfe04cd34f11ef2e28a08ef9ad045f95c80d9c3e8a4ccd55b1c0dbdafa5c98ff9a8c0c452ec241416", 0x54}, {&(0x7f0000000d80)="8d3f1727bbab19464dabdff7034b33fbce84fe3005f96376abbdb49af155c019f3afda5c900f73b83fba3bd35dc4c32b625cf5949bce19dc2c2751599dd53e82439145074eacc5a5806a6117616883b6d9f2af728497f703364314ab6f57045bf9e89a30eadf6e7f2967d33a7e69c2080cc804ce974d318fe23e121ad63f594cc669823efe9f76c98f090f1abba38a22e8185f01ca81fadd0774a602f551f9ed31db5baccee5960efff86fa967bfbfd8a7d70f0b258c4b34a5881937b851d6281ed7e6042f15b5e18a3459b8aa", 0xcd}, {&(0x7f0000000e80)}, {&(0x7f0000000ec0)="818afae3017e6c37a8dab8fd0ede78617712c603e6d236511cb21869fd3785f6bd88d298135800bf2e7825f390dd7ce27339a8743670ba0ca09b", 0x3a}], 0x9, 0x0, 0x0, 0x4000000}, {&(0x7f0000000fc0)=@in6={0xa, 0x4e21, 0x6, @remote, 0x1}, 0x1c, &(0x7f0000002740)=[{&(0x7f0000002100)="037ecf74ae9acdd6898c43470ed105466fd4cc58aa89198a033f08fb8e61509f657694531986a3dc1af0f776e632f2f82a88b5ddfacf8946f82b71c1199aeebda81c94f37153b3b0b0229120b82a1bbdfbc2620220b61bddff469f5bd2be4d3f8cbbd3f8f5f93368102467861aa356d43f6c59f10702dbf35e69bcefdfdd2771d1b2100afc704eb5c61513231f4dacb5e6d3f594ff14cf1fb1c60df3ab2bbf086b0f6747a8a18d6a5ddbb99b8d2d39acf85a5654ae25c205f97584f4b5616e3075d52297a76d82804cddd481", 0xcc}, {&(0x7f0000002200)="faeda5a87f0b12a4063f1439ec83a2bcde4c38a6d66bb94a08acefa9bc0ae0bb2c915a93171f3591770ad4a7c407ae4b75ccfbf7778e50089081ea36b7d6752a9f560b6e6a45f3942956624f2cebdaa661627c917cfe73191233c3035be7b37567af5d44219331ae5f8733374521c529f5435d848461f8008f3f5ba11d7ece34df13693587a34baf43bf23dbd1dbf4fd7881beeec45f16", 0x97}, {&(0x7f00000022c0)="1923cc822417ea15cb3d16893b008114d5cae7f17cbab83cc32233e4b7745f8b556cf333f48897c8d60d09f297a1389435943d8af2872b1ea9db025d04e2676ce256f032be459547c45b2db12adf8b0ad4a449a49c48f450837d3f6d0d278c87f4538b695c6463816fc3547302195166e3ecd37a04d3feb9ac7e4f571b1ec9938b49df749dd975302261c4ae51be791d62d034f1639965c888e4bac059b61c72edd526313e57252dc90ad5", 0xab}, {&(0x7f0000002380)="1b5684d108ee2792dcb8bf09a6f03bb11cfcee76a82caa081e86560d6ff8e0e752bba7fa7416f35311c86023802e529f527120afd08de607a0bb3ed9290ea47ae6f8c340f8543b9b385de2dde322702239cf026be9a3e03b6d4c4d17984d78a04ff5b414b12dd3c37c61a91e579d2c171b720b4cb01ae374e540f2a01c026efd6c8bfd17868d21b131b35dc97e5da548515b26554d67a6af82ed80abfcb878e1e2ad0c3e28ae7ffed2501bbc5126e492efaf725bbfecfa718760a9748541480185f544e3336991ce", 0xc8}, {&(0x7f0000002480)="7ac0c4c1b8e06779060b2026b9b9d2af417e63263acf90a17ff50a33a54484976a09653bbc1c55d7fd5d612a1091c01fdd92e0835faf92f6e28b879f6fcdfb5061b243727014f82b06653285227f82603f14b89442f03136dafa4ae88955572d2c792842e9944164640455d120e56c5c7842b5c0caa92718e5b67fd85bd49cb2b5687a1735fbd12e7b176e7fdbf143cb4d", 0x91}, {&(0x7f0000002540)="99789c1f2e56c44a429eeadeca160c678bd412f90ffb65a33a73daa5cbb1884c8c9f4ea9516d7543d9b743c577011503fd3dc82c1a9654c200c59ae8e56cca0ce8077537f83142651e3141dc450a13042e8cfbd0d8c14cc56a139d8d32468c2766a6c5795a4c3ba7b2ae4b83dc593cb6a88ddb62371727f128970c239b6c5866fa4c15fcb790fea852d863aeb19f82458da6b2e691b1b350c9ed09e0c41c3445c7c7f1f920a1faa91f60153d5e4a9f0710e6a3e6814b", 0xb6}, {&(0x7f0000002600)="f03c", 0x2}, {&(0x7f0000002640)="b45dc4d6f7e4fe806a0583db2c00af9730d65ed57b7a154f97245eb978b9f2dacae7bc06f711995568ee36e96e5016399c6cdc3c97fd3f16f5d6fe899ea687a55842328c80a237693f005b94b14c713d5e88d3966712c75b01cd68c9f4f84dc2f7f3b9467c0d6d26efb9b403d4fd25f904279ffdc0fe79de547de494f61dee85a690e9f60009256fd2effb5ea877cc07ddec46b80ae0219b127dd36b7f59749383b45424400f8206941042cbbdbce5d073a442d8b2112a7430af8cf3a0eb9fdfc73a23348af2e8c538d922dbf4d5a2f812a0b756", 0xd4}], 0x8, &(0x7f00000027c0)=[@dstaddrv6={0x20, 0x84, 0x8, @mcast1}, @dstaddrv4={0x18, 0x84, 0x7, @remote}], 0x38, 0x8000}, {&(0x7f0000002800)=@in6={0xa, 0x4e24, 0x0, @local, 0x7fff}, 0x1c, &(0x7f0000002d40)=[{&(0x7f0000002840)="9c6b31800a8ac3a093a18d062b", 0xd}, {&(0x7f0000002880)="dcb6211882b68069966d3d2c50fef01fa723bf558a6e7e13bd6aa5ee77fa6f20833d69e250e2c35815870311ddf46ffa807880f6084ce3f6bcfc1c6f327988c7b564a3fad9ff58cb18c8572bb7860869ee6180def5f1612ad2a17904cc420d12448a23c0f720717604e088fbabe011c3f7109e215f4c40dbbaced1c616a5b5f9b6af518047ac85689cdb8bbb247b2093efade13e2af59ba3be7765e2d73936e6e5541bbe49496f80fa0e88671d500be7a9cf841c70886d6d1cff449181037fa0b80a67d0b818ecb4e2c477ec60a5893d88399fbcc4d9426c05fba82c8d6b9c8c8555df6c1c9e19bd6e46f1", 0xeb}, {&(0x7f0000002980)="b15b059bc5bfa73b0cbf12676dfaf09399f4b44e197c03e7e300573c2e6868629f41dc054e2d3c1e23d8cf90ba5328088eeec7f9fb22033c0d01594b1157d408ac23704d2a72c315fef79edc4ef40bfe9669a49fd99534669682fecde3bf55b4c571b3b855e0b97dd40d28dc9f4f0fb607726e723dacdea58891003077f47fe292a536a2449b79e9fb3c5d", 0x8b}, {&(0x7f0000002a40)="0c443679b12ef90d717585dd48970a68c355bcaacfb538f026cf51ddaacf670c5d5ce45f944b42928b9c33fa2b910dccf59f9437b44e1d0fb6970b6774b35404748b76fba05ed2581996827195bbfd058ffbe1d31e9c9e5deda69d9244ccba77f586155b2c8398473490e120584cb3b20caf07af0a59c05ec590319d71c26a", 0x7f}, {&(0x7f0000002ac0)="91466c4766827c8c0b7f64553f1f0c1b08caa44042ba68a2c6aa3a7b70b95b5127d81bffe04203de17357986e72dbf7327c59cf2395531aea624658087c448e348ddd592663338f500ffbed3538740c40b33d5d61fe41ff7072a248bd30e476e9fa128d5d1d8973ae66a7a6508f04d00d5ae952ec8c81b5cb846fca61eeeefee0216e2a085957e3d4211c360d3c5", 0x8e}, {&(0x7f0000002b80)="b7f232240159546c42da64063de14c1c720f73b012ef7e9a6aa601fa1e9366c6d3c114293784edc6069ba496da0f02b2d8c2d70e1430280e1047fcaf00e585", 0x3f}, {&(0x7f0000002bc0)="3f7f31a45a723c40668213", 0xb}, {&(0x7f0000002c00)="9882701ce509720f3a6dd087dff3161904090dc2c23dd033a097be2e8beb4395ec0326170aa735102cabfa2988823e753a15f063d60be9fa277ea8e6c1238bbbc0d40b11fad25457a96fb167d15fe48eaf12babca41c464a1d3121b374985cffac1b7b5f56f34a6c146b56a3924ff93f4d789b520e6e44b412672bcd441bdab9bf81ee5222cb03f85e6652f43c71e6b07ca676020df6bb12b6fb34b931f8dbef9da89150cc04285d11910dfef3f69c1272630d1248aa7d35e0ee1255dec40ae5e356cbc85968efd76b10bd245bf2a6bdcf2a6554698fc38bc24745500ad59ad83545fec107dc0c7fc736129915bda1a7e97b0773", 0xf4}, {&(0x7f0000002d00)="646bd12f7bbb441cfe019c054cf0a72a38bad34bcf456967efc44dbb6043b45b50b909d5dde53cd776ae4f4b", 0x2c}], 0x9, 0x0, 0x0, 0x4000}], 0x5, 0x40010) ioctl$EVIOCGREP(r0, 0xc008744c, &(0x7f0000003000)=""/174) 11:46:42 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x2000, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000000c0)='sysfs\x00', 0x18008, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) flistxattr(r0, &(0x7f0000000140)=""/231, 0xfed3) 11:46:42 executing program 5: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x8, 0x200000) write$UHID_INPUT(r0, &(0x7f0000000100)={0x8, "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", 0x1000}, 0x1006) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$ASHMEM_GET_PIN_STATUS(r0, 0x7709, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000040), &(0x7f0000000080)=0x4) prlimit64(0x0, 0x7, &(0x7f00000000c0), 0x0) socket$pptp(0x18, 0x1, 0x2) 11:46:42 executing program 3: unshare(0x4000000000021000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='map\x00\x00~6\xf5\b\xd2g\xab\fz\xfe\x9f?\x00U\x1de\x9d\xa3p:\xc5{\x8e\xda\xc9\xfc\x8c]\x01\x83B\vg\x8f\xa5\x04\x00'}, 0x10) 11:46:42 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002ff7)='/dev/ppp\x00', 0x0, 0x0) getsockopt$sock_int(r0, 0x1, 0x5, &(0x7f00000000c0), &(0x7f0000000100)=0x4) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000001000)=""/246) ioctl$KVM_DIRTY_TLB(r0, 0x4010aeaa, &(0x7f0000000000)={0x0, 0x10000}) ioctl$EVIOCGREP(r0, 0xc008744c, &(0x7f0000003000)=""/174) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') 11:46:42 executing program 5: r0 = memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x1) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f00000001c0)={0xf48b, 0x7fffffff, 0x0, 'queue0\x00'}) close(r2) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xffffff76) poll(&(0x7f0000000380)=[{r2}], 0x1, 0x7) 11:46:42 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=ANY=[@ANYBLOB="240000000301ffff000000150000000000080008000000000000000000000000", @ANYRES32=0x0], 0x24}}, 0x0) 11:46:42 executing program 2: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/3ys/net/s/snat_re\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000040), 0x4) getsockopt$netlink(r0, 0x10e, 0x4000000000009, &(0x7f00000000c0)=""/4, &(0x7f0000000000)=0x36b) socket$bt_bnep(0x1f, 0x3, 0x4) 11:46:42 executing program 3: unshare(0x20400) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='map\x00\x00~6\xf5\b\xd2g\xab\fz\xfe\x9f?\x00U\x1de\x9d\xa3p:\xc5{\x8e\xda\xc9\xfc\x8c]\x01\x83B\vg\x8f\xa5\x04\x00'}, 0x10) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x111102, 0x0) setsockopt$netlink_NETLINK_RX_RING(r0, 0x10e, 0x6, &(0x7f00000000c0)={0x2, 0x7, 0x7, 0x7}, 0x10) [ 463.830170] netlink: 16 bytes leftover after parsing attributes in process `syz-executor1'. 11:46:43 executing program 1: r0 = syz_open_dev$cec(&(0x7f0000000480)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) socket(0xa, 0x3, 0x200000000008) syz_genetlink_get_family_id$ipvs(0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) unshare(0x44000600) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), 0x0) setsockopt(r2, 0x5, 0x6, &(0x7f0000000240)="0ad3e82f675cddf1306ee6b7820d8871fa9c7beba9ffddbaca75d268deb0a213e74fd68547953480f753169ee98ec75bb68498acd51dd72d1cfd85e36158b87f0b0497d9b5f4e29cbbddb1d2117686ae70868a1da7ba9e1f932945bcdde7f1a411f2e34d9f6b406d578ef0c007def968d8559d43b727038a02cb986d6e916bf207ca5d8b3adc36414432b07e22b05b3aad2b45fd8c1b284462afdb1d4bfed4504dc84d928c49925d44e27eb1ab2ac6cf6fa97d714dba6e8b25d829f6a435feda", 0xc0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={r1, &(0x7f0000000300)="58f3ee72c4777c296f3db6f62cd635b644aedc22771916267a2b0bc7c6b86accfc20fe357a25cbd94189303bb1e7156553a06298e567b2b95f03400b11edc7d0fe4bdc5471416327a00a1872b5d1a1533cd01b6387fbaf8fa65a7f4554e07f48cf5f05"}, 0x10) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) write$evdev(r0, &(0x7f00000004c0)=[{{}, 0x15, 0x100000001, 0xffff}, {{r3, r4/1000+30000}, 0x15, 0x2, 0xffffffffffff7fff}, {{}, 0x5, 0x5, 0x100000000}, {{r5, r6/1000+10000}, 0x17, 0x69, 0xfffffffffffffff8}, {{0x0, 0x7530}, 0x13, 0x101, 0x1ff}, {{0x77359400}, 0x0, 0x3, 0x6}, {{}, 0x4, 0x81, 0x9}, {{r7, r8/1000+30000}, 0x1f, 0x2, 0x9}, {{r9, r10/1000+10000}, 0x17, 0x0, 0x7ff}], 0xd8) syz_genetlink_get_family_id$ipvs(0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) 11:46:43 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002ff7)='/dev/ppp\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000001180), &(0x7f0000001200)=0x68) r1 = semget$private(0x0, 0x4, 0x248) semtimedop(r1, &(0x7f0000001100)=[{0x1, 0x61f7318e, 0x1800}, {0x3, 0x7fffffff, 0x1800}, {0x2, 0xd5, 0x1000}, {0x4, 0x9, 0x800}, {0x0, 0x2a, 0x1800}, {0x3, 0xff, 0x1000}], 0x6, &(0x7f0000001140)) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000001000)=""/246) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$EVIOCGREP(r0, 0xc008744c, &(0x7f0000003000)=""/174) ioctl$EVIOCGID(r0, 0x80084502, &(0x7f0000000000)=""/4096) [ 464.341436] IPVS: ftp: loaded support on port[0] = 21 11:46:43 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000100), 0x12) socket$netlink(0x10, 0x3, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) ioctl$ASHMEM_GET_PIN_STATUS(r0, 0x7709, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r4, r5, 0x0, 0x10000000000443) read(r4, &(0x7f00000003c0)=""/72, 0x100000104) sendmsg$xdp(r4, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 11:46:43 executing program 2: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000d86000/0x2000)=nil, 0x2000, 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f00005a1000/0x200000)=nil, 0x200000, 0x1ffffff, 0x8031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x8032, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_PIT2(r0, 0x4070aea0, &(0x7f0000000000)={[{0x3, 0x2, 0x7fffffff, 0x0, 0xffffffff, 0x8, 0x6533, 0x4, 0x24b1, 0xfffffffffffffffa, 0x5, 0xfff, 0x1}, {0x0, 0xfffffffffffffffa, 0x6, 0x8, 0xfff, 0xfffffffffffffffc, 0x7, 0x8, 0x1, 0x222d366b, 0x2, 0x4, 0x8156}, {0x2, 0x48d, 0x2, 0x9, 0xa77, 0x600, 0x461, 0x8, 0x52c2db2b, 0x20, 0x0, 0x6, 0x4}], 0x3}) [ 464.977235] IPVS: ftp: loaded support on port[0] = 21 11:46:55 executing program 5: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x0, 0x0) setsockopt$inet6_dccp_int(r0, 0x21, 0x7, &(0x7f0000000040)=0x8, 0x1fb) r1 = socket$vsock_dgram(0x28, 0x2, 0x0) recvfrom(r1, &(0x7f0000000180)=""/232, 0xe8, 0x0, &(0x7f0000000280)=@rc, 0x80) [ 476.883952] clocksource: timekeeping watchdog on CPU0: Marking clocksource 'tsc' as unstable because the skew is too large: [ 476.895345] clocksource: 'acpi_pm' wd_now: 4136fb wd_last: 8196f2 mask: ffffff [ 476.904741] clocksource: 'tsc' cs_now: 1044add506f cs_last: fd64d1e62e mask: ffffffffffffffff [ 476.915433] tsc: Marking TSC unstable due to clocksource watchdog [ 476.923838] TSC found unstable after boot, most likely due to broken BIOS. Use 'tsc=unstable'. 11:46:56 executing program 3: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm-monitor\x00', 0x22280, 0x0) ioctl$SG_SET_KEEP_ORPHAN(r0, 0x2287, &(0x7f0000000240)=0x100) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x1, 0x0) ioctl$PIO_UNIMAP(r1, 0x4b67, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x4, 0xfffffffffffffff7}]}) r2 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/attr/exec\x00', 0x2, 0x0) unshare(0x20400) bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000300)=0xffffffff) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000280), &(0x7f00000002c0)=0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='map\x00\x00~6\xf5\b\xd2g\xab\fz\xfe\x9f?\x00U\x1de\x9d\xa3p:\xc5{\x8e\xda\xc9\xfc\x8c]\x01\x83B\vg\x8f\xa5\x04\x00'}, 0x10) [ 476.932699] sched_clock: Marking unstable (476982317894, -58496127)<-(477043225480, -119403477) [ 476.933821] clocksource: Switched to clocksource acpi_pm 11:46:56 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002ff7)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000001000)=""/246) ioctl$EVIOCGREP(r0, 0xc008744c, &(0x7f0000003000)=""/174) ioctl$NBD_DO_IT(r0, 0xab03) 11:46:56 executing program 2: socket$can_raw(0x1d, 0x3, 0x1) unshare(0x28020400) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0x4a) r1 = dup3(r0, r0, 0x80000) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000000)={0x0, 0x7fff, 0x0, 0x1ff, 0x7}, &(0x7f00000000c0)=0x18) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r1, 0x84, 0x79, &(0x7f0000000100)={r2, 0x6, 0x6}, 0x8) setsockopt$inet6_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000040), 0x4) 11:46:56 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x802, 0x0) write$uinput_user_dev(r0, &(0x7f0000000740)={'syz1\x00', {}, 0x11}, 0x45c) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x0) ftruncate(r0, 0x4) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x14) ioctl$UI_DEV_CREATE(r0, 0x5501) 11:46:56 executing program 3: unshare(0x42000003) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhci\x00', 0x242400, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000000c0)='map\x00\x00~6\xf5\b\xd2g\xab\fz\xfe\x9f?\x00U\x1de\x9d\xa3p:\xc5{\x8e\xda\xc9\xfc\x8c]\x01\x83B\vg\x8f\xa5\x04\x00', r0}, 0x10) [ 477.322072] input: syz1 as /devices/virtual/input/input32 11:46:56 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002ff7)='/dev/ppp\x00', 0x0, 0x0) ioctl$KVM_GET_REGS(r0, 0x8090ae81, &(0x7f0000000000)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000001c0)="be7b0f1c3a1ee441a86a341d48d18538", 0x10) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000001000)=""/246) ioctl$EVIOCGREP(r0, 0xc008744c, &(0x7f0000003000)=""/174) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000240)={0xffffffffffffffff}, 0x113, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000002c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000200), 0x1, r1, 0x1c, 0x1, @in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0xb}}}}, 0xa0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000380)={0x0, 0x2}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000400)={r2, 0xb9, "fa1c672abcfb1a6f951c7f7dd042357b574f5604648d675d134d100c3b0c0ec90b2437f13684806031bbecad799cde3d3ccec7d44593d233935b1c9514fc4a45ff2264034aa208c11710989de7c5abf8c0aa77ea9daabc0dcec16ab42a49e347f4ea1fc9956943ccaf8cc6cfa3ecbc9b407e02c83066eb8934f77c3193d69f73044fadb53de47622b6142485be6fc42672c4f540ecd30f60ebf7b8b0480d9e00df74d87b7b872961d2b4da940781b07b9be0afd398e0141eff"}, &(0x7f0000000500)=0xc1) fgetxattr(r0, &(0x7f00000000c0)=@known='security.apparmor\x00', &(0x7f0000000100)=""/184, 0xb8) [ 477.420779] input: syz1 as /devices/virtual/input/input33 11:46:56 executing program 3: unshare(0x20400) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='map\x00\x00~6\xf5\b\xd2g\xab\fz\xfe\x9f?\x00U\x1de\x9d\xa3p:\xc5{\x8e\xda\xc9\xfc\x8c]\x01\x83B\vg\x8f\xa5\x04\x00'}, 0xffffffffffffff1e) 11:46:57 executing program 1: r0 = syz_open_dev$cec(&(0x7f0000000480)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) socket(0xa, 0x3, 0x200000000008) syz_genetlink_get_family_id$ipvs(0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) unshare(0x44000600) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), 0x0) setsockopt(r2, 0x5, 0x6, &(0x7f0000000240)="0ad3e82f675cddf1306ee6b7820d8871fa9c7beba9ffddbaca75d268deb0a213e74fd68547953480f753169ee98ec75bb68498acd51dd72d1cfd85e36158b87f0b0497d9b5f4e29cbbddb1d2117686ae70868a1da7ba9e1f932945bcdde7f1a411f2e34d9f6b406d578ef0c007def968d8559d43b727038a02cb986d6e916bf207ca5d8b3adc36414432b07e22b05b3aad2b45fd8c1b284462afdb1d4bfed4504dc84d928c49925d44e27eb1ab2ac6cf6fa97d714dba6e8b25d829f6a435feda", 0xc0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={r1, &(0x7f0000000300)="58f3ee72c4777c296f3db6f62cd635b644aedc22771916267a2b0bc7c6b86accfc20fe357a25cbd94189303bb1e7156553a06298e567b2b95f03400b11edc7d0fe4bdc5471416327a00a1872b5d1a1533cd01b6387fbaf8fa65a7f4554e07f48cf5f05"}, 0x10) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) write$evdev(r0, &(0x7f00000004c0)=[{{}, 0x15, 0x100000001, 0xffff}, {{r3, r4/1000+30000}, 0x15, 0x2, 0xffffffffffff7fff}, {{}, 0x5, 0x5, 0x100000000}, {{r5, r6/1000+10000}, 0x17, 0x69, 0xfffffffffffffff8}, {{0x0, 0x7530}, 0x13, 0x101, 0x1ff}, {{0x77359400}, 0x0, 0x3, 0x6}, {{}, 0x4, 0x81, 0x9}, {{r7, r8/1000+30000}, 0x1f, 0x2, 0x9}, {{r9, r10/1000+10000}, 0x17, 0x0, 0x7ff}], 0xd8) syz_genetlink_get_family_id$ipvs(0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) 11:46:57 executing program 5: mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000fff000/0x1000)=nil) setrlimit(0x2, &(0x7f0000000040)={0x2, 0x2000000}) mprotect(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x2) iopl(0x3ff) 11:46:57 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002ff7)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000001000)=""/246) ioctl$EVIOCGREP(r0, 0xc008744c, &(0x7f0000003000)=""/174) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x48080, 0x0) 11:46:57 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000080)='trusted.overlay.opaque\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x0) unshare(0x32000000) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000000)='map\x00\x00~6\xf5\b\xd2g\xab\fz\xfe\x9f?\x00U\x1de\x9d\xa3p:\xc5{\x8e\xda\xc9\xfc\x8c]\x01\x83B\vg\x8f\xa5\x04\x00'}, 0x10) 11:46:57 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000100), 0x12) socket$netlink(0x10, 0x3, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) ioctl$ASHMEM_GET_PIN_STATUS(r0, 0x7709, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r4, r5, 0x0, 0x10000000000443) read(r4, &(0x7f00000003c0)=""/72, 0x100000104) sendmsg$xdp(r4, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 11:46:57 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x141400, 0x0) ioctl$TCGETS(r2, 0x5401, &(0x7f0000000100)) clone(0x240002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$EVIOCREVOKE(r1, 0x40044591, &(0x7f0000000080)=0x5) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000180)=0x1) ioctl$SIOCSIFMTU(r1, 0x8922, &(0x7f0000000040)={'bond0\x00'}) 11:46:58 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x1, 0x0) accept4$inet(r1, &(0x7f0000000080)={0x2, 0x0, @empty}, &(0x7f00000000c0)=0x10, 0x80000) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) acct(0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) setsockopt$sock_timeval(r1, 0x1, 0x15, &(0x7f0000000100)={0x0, 0x7530}, 0x10) ioctl$KVM_SET_CPUID(r3, 0x4008ae8a, &(0x7f0000000300)=ANY=[@ANYBLOB="05000000070000008c000040050000a9ff01000000000000000000400000000001"]) ioctl$KVM_SET_MSRS(r3, 0xc008ae88, &(0x7f0000000240)=ANY=[@ANYBLOB="010000800000810e818b418d00df8af4ff4a00000000000000e5ff12a92c743ee9080000884cb2240b45d1"]) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timerfd_settime(r1, 0x1, &(0x7f0000000280)={{0x77359400}, {r4, r5+10000000}}, &(0x7f00000002c0)) ioctl$KVM_GET_REGS(r1, 0x8090ae81, &(0x7f0000000180)) 11:46:58 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002ff7)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000001000)=""/246) ioctl$EVIOCGREP(r0, 0xc008744c, &(0x7f0000003000)=""/174) ioctl$VIDIOC_ENUMINPUT(r0, 0xc050561a, &(0x7f0000000000)={0x100000000, "3aafd612468b7714aef4419942690c9c59264e1b85d9d3e7345575538538fd5b", 0x3, 0x20, 0x7, 0x1000000, 0x2000000, 0xa}) [ 478.935910] IPVS: ftp: loaded support on port[0] = 21 [ 478.937946] bond0: mtu less than device minimum 11:46:58 executing program 3: unshare(0x20400) r0 = dup(0xffffffffffffffff) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='{\x00'}, 0x10) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000100)={r1, 0x0, 0x2, 0xffff, 0x5}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='map\x00\x00~6\xf5\b\xd2g\xab\fz\xfe\x9f?\x00U\x1de\x9d\xa3p:\xc5{\x8e\xda\xc9\xfc\x8c]\x01\x83B\vg\x8f\xa5\x04\x00'}, 0x10) 11:46:58 executing program 2: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000040), 0xffffffffffffff97, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[]}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x40, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r2, 0x28, &(0x7f0000000140)}, 0x10) sendmsg$netlink(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f00000003c0), 0x2a8, &(0x7f00000005c0)=[@rights={0x18, 0x1, 0x1, [r0]}], 0x18}, 0x0) recvmsg(r1, &(0x7f0000000440)={&(0x7f00000000c0)=@pppol2tpv3in6, 0x80, &(0x7f00000002c0), 0x191, &(0x7f0000000980)=""/142, 0x8e}, 0x0) 11:46:58 executing program 1: r0 = syz_open_dev$cec(&(0x7f0000000480)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) socket(0xa, 0x3, 0x200000000008) syz_genetlink_get_family_id$ipvs(0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) unshare(0x44000600) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), 0x0) setsockopt(r2, 0x5, 0x6, &(0x7f0000000240)="0ad3e82f675cddf1306ee6b7820d8871fa9c7beba9ffddbaca75d268deb0a213e74fd68547953480f753169ee98ec75bb68498acd51dd72d1cfd85e36158b87f0b0497d9b5f4e29cbbddb1d2117686ae70868a1da7ba9e1f932945bcdde7f1a411f2e34d9f6b406d578ef0c007def968d8559d43b727038a02cb986d6e916bf207ca5d8b3adc36414432b07e22b05b3aad2b45fd8c1b284462afdb1d4bfed4504dc84d928c49925d44e27eb1ab2ac6cf6fa97d714dba6e8b25d829f6a435feda", 0xc0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={r1, &(0x7f0000000300)="58f3ee72c4777c296f3db6f62cd635b644aedc22771916267a2b0bc7c6b86accfc20fe357a25cbd94189303bb1e7156553a06298e567b2b95f03400b11edc7d0fe4bdc5471416327a00a1872b5d1a1533cd01b6387fbaf8fa65a7f4554e07f48cf5f05"}, 0x10) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) write$evdev(r0, &(0x7f00000004c0)=[{{}, 0x15, 0x100000001, 0xffff}, {{r3, r4/1000+30000}, 0x15, 0x2, 0xffffffffffff7fff}, {{}, 0x5, 0x5, 0x100000000}, {{r5, r6/1000+10000}, 0x17, 0x69, 0xfffffffffffffff8}, {{0x0, 0x7530}, 0x13, 0x101, 0x1ff}, {{0x77359400}, 0x0, 0x3, 0x6}, {{}, 0x4, 0x81, 0x9}, {{r7, r8/1000+30000}, 0x1f, 0x2, 0x9}, {{r9, r10/1000+10000}, 0x17, 0x0, 0x7ff}], 0xd8) syz_genetlink_get_family_id$ipvs(0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) [ 479.285764] kvm: SMP vm created on host with unstable TSC; guest TSC will not be reliable 11:46:58 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002ff7)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000001000)=""/246) ioctl$EVIOCGREP(r0, 0xc008744c, &(0x7f0000003000)=""/174) memfd_create(&(0x7f0000000000)='\x00', 0x2) 11:46:58 executing program 3: unshare(0x20400) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x40100, 0x0) getsockname$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000100)=0x1c) ioctl$PPPOEIOCSFWD(r0, 0x4008b100, &(0x7f0000000180)={0x18, 0x0, {0x3, @local, 'ip_vti0\x00'}}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='map\x00\x00~6\xf5\b\xd2g\xab\fz\xfe\x9f?\x00U\x1de\x9d\xa3p:\xc5{\x8e\xda\xc9\xfc\x8c]\x01\x83B\vg\x8f\xa5\x04\x00'}, 0x10) [ 479.444997] IPVS: ftp: loaded support on port[0] = 21 11:46:58 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x1, 0x0) accept4$inet(r1, &(0x7f0000000080)={0x2, 0x0, @empty}, &(0x7f00000000c0)=0x10, 0x80000) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) acct(0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) setsockopt$sock_timeval(r1, 0x1, 0x15, &(0x7f0000000100)={0x0, 0x7530}, 0x10) ioctl$KVM_SET_CPUID(r3, 0x4008ae8a, &(0x7f0000000300)=ANY=[@ANYBLOB="05000000070000008c000040050000a9ff01000000000000000000400000000001"]) ioctl$KVM_SET_MSRS(r3, 0xc008ae88, &(0x7f0000000240)=ANY=[@ANYBLOB="010000800000810e818b418d00df8af4ff4a00000000000000e5ff12a92c743ee9080000884cb2240b45d1"]) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timerfd_settime(r1, 0x1, &(0x7f0000000280)={{0x77359400}, {r4, r5+10000000}}, &(0x7f00000002c0)) ioctl$KVM_GET_REGS(r1, 0x8090ae81, &(0x7f0000000180)) 11:46:58 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000100), 0x12) socket$netlink(0x10, 0x3, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) ioctl$ASHMEM_GET_PIN_STATUS(r0, 0x7709, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r4, r5, 0x0, 0x10000000000443) read(r4, &(0x7f00000003c0)=""/72, 0x100000104) 11:46:58 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x1, 0x0) accept4$inet(r1, &(0x7f0000000080)={0x2, 0x0, @empty}, &(0x7f00000000c0)=0x10, 0x80000) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) acct(0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) setsockopt$sock_timeval(r1, 0x1, 0x15, &(0x7f0000000100)={0x0, 0x7530}, 0x10) ioctl$KVM_SET_CPUID(r3, 0x4008ae8a, &(0x7f0000000300)=ANY=[@ANYBLOB="05000000070000008c000040050000a9ff01000000000000000000400000000001"]) ioctl$KVM_SET_MSRS(r3, 0xc008ae88, &(0x7f0000000240)=ANY=[@ANYBLOB="010000800000810e818b418d00df8af4ff4a00000000000000e5ff12a92c743ee9080000884cb2240b45d1"]) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timerfd_settime(r1, 0x1, &(0x7f0000000280)={{0x77359400}, {r4, r5+10000000}}, &(0x7f00000002c0)) ioctl$KVM_GET_REGS(r1, 0x8090ae81, &(0x7f0000000180)) 11:46:58 executing program 3: unshare(0x20400) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='map\x00\x00~6\xf5\b\xd2g\xab\fz\xfe\x9f?\x00U\x1de\x9d\xa3p:\xc5{\x8e\xda\xc9\xfc\x8c]\x01\x83B\vg\x8f\xa5\x04\x00'}, 0x10) pipe(&(0x7f0000000080)={0xffffffffffffffff}) ioctl$SCSI_IOCTL_STOP_UNIT(r0, 0x6) 11:46:58 executing program 4: ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000001000)=""/246) r0 = fcntl$getown(0xffffffffffffffff, 0x9) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)={0x1, r0}) ioctl$EVIOCGREP(0xffffffffffffffff, 0xc008744c, &(0x7f0000003000)=""/174) 11:46:59 executing program 1: r0 = syz_open_dev$cec(&(0x7f0000000480)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) socket(0xa, 0x3, 0x200000000008) syz_genetlink_get_family_id$ipvs(0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) unshare(0x44000600) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), 0x0) setsockopt(r2, 0x5, 0x6, &(0x7f0000000240)="0ad3e82f675cddf1306ee6b7820d8871fa9c7beba9ffddbaca75d268deb0a213e74fd68547953480f753169ee98ec75bb68498acd51dd72d1cfd85e36158b87f0b0497d9b5f4e29cbbddb1d2117686ae70868a1da7ba9e1f932945bcdde7f1a411f2e34d9f6b406d578ef0c007def968d8559d43b727038a02cb986d6e916bf207ca5d8b3adc36414432b07e22b05b3aad2b45fd8c1b284462afdb1d4bfed4504dc84d928c49925d44e27eb1ab2ac6cf6fa97d714dba6e8b25d829f6a435feda", 0xc0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={r1, &(0x7f0000000300)="58f3ee72c4777c296f3db6f62cd635b644aedc22771916267a2b0bc7c6b86accfc20fe357a25cbd94189303bb1e7156553a06298e567b2b95f03400b11edc7d0fe4bdc5471416327a00a1872b5d1a1533cd01b6387fbaf8fa65a7f4554e07f48cf5f05"}, 0x10) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) write$evdev(r0, &(0x7f00000004c0)=[{{}, 0x15, 0x100000001, 0xffff}, {{r3, r4/1000+30000}, 0x15, 0x2, 0xffffffffffff7fff}, {{}, 0x5, 0x5, 0x100000000}, {{r5, r6/1000+10000}, 0x17, 0x69, 0xfffffffffffffff8}, {{0x0, 0x7530}, 0x13, 0x101, 0x1ff}, {{0x77359400}, 0x0, 0x3, 0x6}, {{}, 0x4, 0x81, 0x9}, {{r7, r8/1000+30000}, 0x1f, 0x2, 0x9}, {{r9, r10/1000+10000}, 0x17, 0x0, 0x7ff}], 0xd8) syz_genetlink_get_family_id$ipvs(0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) 11:46:59 executing program 2: ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f00000000c0)=0x0) syz_open_procfs(r0, &(0x7f0000000100)='attr\x00') r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000000), 0xc, 0x0}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000700)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, 0x0, 0x0, &(0x7f0000000e00)=""/241, 0xf1}, 0x0) sendto(r1, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000b00)=[{&(0x7f0000000a40)=""/178, 0xb2}], 0x167, &(0x7f0000000a00)=[{&(0x7f0000000280)=""/37, 0x25}, {&(0x7f00000009c0)=""/47, 0x2f}], 0x10000000000000f3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000140)=@hci, 0x80, 0x0, 0x0, &(0x7f00000024c0)=""/129, 0x81}, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000300)='team\x00') process_vm_writev(0x0, &(0x7f0000000b80)=[{&(0x7f00000007c0)=""/186, 0xba}, {&(0x7f00000001c0)=""/19, 0x13}, {&(0x7f0000000900)=""/124, 0x7c}, {&(0x7f0000000d00)=""/226, 0xe2}], 0x4, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0xfffffffffffffeb0}, {&(0x7f0000000c80)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0x3c}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x8, &(0x7f0000000600)=""/191, 0xbf}}], 0x1, 0x0, &(0x7f0000003700)={0x77359400}) r2 = syz_open_dev$dspn(&(0x7f00000002c0)='/dev/dsp#\x00', 0x5, 0x50100) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r2, 0xc08c5335, &(0x7f0000000bc0)={0x4, 0xff, 0x8, 'queue0\x00', 0x7}) 11:46:59 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x1, 0x0) accept4$inet(r1, &(0x7f0000000080)={0x2, 0x0, @empty}, &(0x7f00000000c0)=0x10, 0x80000) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) acct(0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) setsockopt$sock_timeval(r1, 0x1, 0x15, &(0x7f0000000100)={0x0, 0x7530}, 0x10) ioctl$KVM_SET_CPUID(r3, 0x4008ae8a, &(0x7f0000000300)=ANY=[@ANYBLOB="05000000070000008c000040050000a9ff01000000000000000000400000000001"]) ioctl$KVM_SET_MSRS(r3, 0xc008ae88, &(0x7f0000000240)=ANY=[@ANYBLOB="010000800000810e818b418d00df8af4ff4a00000000000000e5ff12a92c743ee9080000884cb2240b45d1"]) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timerfd_settime(r1, 0x1, &(0x7f0000000280)={{0x77359400}, {r4, r5+10000000}}, &(0x7f00000002c0)) ioctl$KVM_GET_REGS(r1, 0x8090ae81, &(0x7f0000000180)) [ 480.191997] IPVS: ftp: loaded support on port[0] = 21 11:46:59 executing program 3: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0xc, 0x80800) ioctl$KVM_SET_NR_MMU_PAGES(r1, 0x80089203, 0x0) unshare(0x20400) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='map\x00\x00~6\xf5\b\xd2g\xab\fz\xfe\x9f?\x00U\x1de\x9d\xa3p:\xc5{\x8e\xda\xc9\xfc\x8c]\x01\x83B\vg\x8f\xa5\x04\x00'}, 0x10) 11:46:59 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002ff7)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000400)=""/246) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='\xad\x85\'\x8f', 0xa27b0254) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000005c0)='TIPCv2\x00') sendmsg$TIPC_NL_NET_GET(r0, &(0x7f00000003c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000380)={&(0x7f0000000600)=ANY=[@ANYBLOB="34020000", @ANYRES16=r1, @ANYBLOB="100827bd7000fbdbdf250e0000006000070008000200050000000c0004000400000000000000080002000800000008000100070000000800010092d10000080002000500000008000200030000000c00040001000000000000000c000400018000000000000008000200f7ffffff880005001c00020008000400050000000800010008000000080002000000000008000100696200002c00020008000400befd0541080004000200000008000300010100000800030006000000080001001c000000340002000800020001010000080002000300000008000100150000000800040005000000080002000600000008000200040000004800070008000100010001000c00030000000000000000000c0003000600000000000000080002000010000008000100080000000c0003002d0f00000000000008000200050000003c000900080002004000000008000200f7ffffff0800020007000000080002000000008008000100ffff0000080001000300000008000100400000003c0007000c000400f9ffffffffffffff08000200080000000800020000000000080001000000000008000200080000000c000300d9060000000000001800040014000700080001001700000008000400c40600004c000200080002004000000008000200040000000400040008000100000000800400040008000100ffffffff080001009f0100000800020001000000080002000000000008000200ff7f00001400090008000100fbffffff08000200681e6309df826b6c91c3e54a1e75519d3c774ba18d83cb648fa8adf86ec3d09eaeb75c9d501fa5fd65dee05d19e81c9056c7a86f457137d7e58a595cb70a9243e43c7e0e31c140c9f9e68da28cf8d43531ed24ef6d8150950757d4c523d200e3afe4f5aea8f9a2029629c1e5be1e72656c9a31a69b6959d778b0cb8d1aee5b018413be44904390436e30fb381d0714a26b15a549"], 0x234}, 0x1, 0x0, 0x0, 0x240400c0}, 0x4041) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$EVIOCGREP(r0, 0xc008744c, &(0x7f0000003000)=""/174) 11:46:59 executing program 2: r0 = socket(0x0, 0x0, 0x0) r1 = getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)=0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x8000, 0x0) kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f00000000c0)={r3, r0, 0x401}) fgetxattr(r0, &(0x7f0000000140)=@known='system.posix_acl_default\x00', &(0x7f0000000180)=""/80, 0x50) sendmsg$alg(0xffffffffffffffff, 0x0, 0x4010) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) mmap(&(0x7f0000e73000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mbind(&(0x7f00007ff000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0) ioctl$NBD_DO_IT(r3, 0xab03) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r3, 0x80045400, &(0x7f0000000380)) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r6 = userfaultfd(0x0) ioctl$UFFDIO_API(r6, 0xc018aa3f, &(0x7f0000000500)) ioctl$UFFDIO_REGISTER(r6, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) fcntl$setstatus(r4, 0x4, 0x2000) ioctl$int_in(r4, 0x5452, &(0x7f0000affff8)=0x7fffffff) syz_open_dev$sndtimer(&(0x7f0000000100)='/dev/snd/timer\x00', 0x0, 0x400) r7 = dup2(r4, r6) ioctl$PPPOEIOCDFWD(0xffffffffffffffff, 0xb101, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, 0x0) ioctl$NBD_SET_FLAGS(0xffffffffffffffff, 0xab0a, 0x1000) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r7, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x74, &(0x7f0000000200)=[@in={0x2, 0x4e22, @local}, @in6={0xa, 0x4e20, 0x9, @empty, 0x8}, @in6={0xa, 0x4e21, 0x1, @loopback, 0x9}, @in={0x2, 0x4e22, @rand_addr=0x100000001}, @in6={0xa, 0x4e21, 0xe15, @empty, 0x1000}]}, &(0x7f00000002c0)=0x10) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r5, 0x84, 0x18, &(0x7f0000000300)={r8, 0x8}, &(0x7f0000000340)=0x8) 11:46:59 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x1, 0x0) accept4$inet(r1, &(0x7f0000000080)={0x2, 0x0, @empty}, &(0x7f00000000c0)=0x10, 0x80000) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) acct(0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) setsockopt$sock_timeval(r1, 0x1, 0x15, &(0x7f0000000100)={0x0, 0x7530}, 0x10) ioctl$KVM_SET_CPUID(r3, 0x4008ae8a, &(0x7f0000000300)=ANY=[@ANYBLOB="05000000070000008c000040050000a9ff01000000000000000000400000000001"]) ioctl$KVM_SET_MSRS(r3, 0xc008ae88, &(0x7f0000000240)=ANY=[@ANYBLOB="010000800000810e818b418d00df8af4ff4a00000000000000e5ff12a92c743ee9080000884cb2240b45d1"]) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timerfd_settime(r1, 0x1, &(0x7f0000000280)={{0x77359400}, {r4, r5+10000000}}, &(0x7f00000002c0)) 11:46:59 executing program 3: r0 = msgget(0x0, 0x1) msgsnd(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="0300000000000000f3cd21cf5a380bda4876ce5606813f8aa32a90df4eaadd77f3dbe09065f65af1141a8fc376fa0204827bbd5dd2b5894319b66d9fb2dfe373234261e81b9a03c5c67b9db73990015598fb381ada966815229a119670e8edad1705a1c077d3faaec6667aba23982fc973ab194a589af2d1835a7898fd4f10701ac5bf5523b4bbcb8d8b27b7008834daa263339402b8b67bc0c9e9c8e71a4148354dd29dca70d2b509b850ec5f0f1fdd8c0477acb7c3622b2af766294fb1934581a335da207396f12e28cddc3f87aa1105e43efd3ddd49133741822e"], 0xdf, 0x800) unshare(0x20000020400) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x43, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000000c0)={{{@in6=@mcast2, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f00000001c0)=0xe8) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000200)={@mcast2, @empty, @empty, 0x8, 0x101, 0x8, 0x400, 0xffff, 0x80000, r2}) sendmmsg(0xffffffffffffffff, &(0x7f000000be80)=[{{0x0, 0x0, &(0x7f0000007c80)=[{&(0x7f0000006c80)="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", 0xe81}], 0x1}}], 0x1, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept$alg(r3, 0x0, 0x0) sendmmsg(r4, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x80, &(0x7f00000000c0)}}, {{&(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x0, &(0x7f0000007b00), 0x179}}], 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) accept4$alg(r1, 0x0, 0x0, 0x800) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000000)='map\x00\x00~6\xf5\b\xd2g\xab\fz\xfe\x9f?\x00U\x1de\x9d\xa3p:\xc5{\x8e\xda\xc9\xfc\x8c]\x01\x83B\vg\x8f\xa5\x04\x00'}, 0x337) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000400)='team\x00') sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000000700)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000006c0)={&(0x7f0000000440)={0x24c, r5, 0x400, 0x70bd25, 0x25dfdbfb, {}, [{{0x8, 0x1, r2}, {0x224, 0x2, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x8000}}, {0x8, 0x6, r2}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r2}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x100}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r2}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r2}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x3f}}, {0x8, 0x6, r2}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r2}}}]}}, {{0x8, 0x1, r2}, {0x4}}]}, 0x24c}}, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x23) 11:46:59 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000100), 0x12) socket$netlink(0x10, 0x3, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) ioctl$ASHMEM_GET_PIN_STATUS(r0, 0x7709, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') read(r4, &(0x7f00000003c0)=""/72, 0x100000104) 11:46:59 executing program 1: r0 = syz_open_dev$cec(&(0x7f0000000480)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) socket(0xa, 0x3, 0x200000000008) syz_genetlink_get_family_id$ipvs(0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) unshare(0x44000600) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), 0x0) setsockopt(r2, 0x5, 0x6, &(0x7f0000000240)="0ad3e82f675cddf1306ee6b7820d8871fa9c7beba9ffddbaca75d268deb0a213e74fd68547953480f753169ee98ec75bb68498acd51dd72d1cfd85e36158b87f0b0497d9b5f4e29cbbddb1d2117686ae70868a1da7ba9e1f932945bcdde7f1a411f2e34d9f6b406d578ef0c007def968d8559d43b727038a02cb986d6e916bf207ca5d8b3adc36414432b07e22b05b3aad2b45fd8c1b284462afdb1d4bfed4504dc84d928c49925d44e27eb1ab2ac6cf6fa97d714dba6e8b25d829f6a435feda", 0xc0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={r1, &(0x7f0000000300)="58f3ee72c4777c296f3db6f62cd635b644aedc22771916267a2b0bc7c6b86accfc20fe357a25cbd94189303bb1e7156553a06298e567b2b95f03400b11edc7d0fe4bdc5471416327a00a1872b5d1a1533cd01b6387fbaf8fa65a7f4554e07f48cf5f05"}, 0x10) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) write$evdev(r0, &(0x7f00000004c0)=[{{}, 0x15, 0x100000001, 0xffff}, {{r3, r4/1000+30000}, 0x15, 0x2, 0xffffffffffff7fff}, {{}, 0x5, 0x5, 0x100000000}, {{r5, r6/1000+10000}, 0x17, 0x69, 0xfffffffffffffff8}, {{0x0, 0x7530}, 0x13, 0x101, 0x1ff}, {{0x77359400}, 0x0, 0x3, 0x6}, {{}, 0x4, 0x81, 0x9}, {{r7, r8/1000+30000}, 0x1f, 0x2, 0x9}, {{r9, r10/1000+10000}, 0x17, 0x0, 0x7ff}], 0xd8) syz_genetlink_get_family_id$ipvs(0x0) 11:46:59 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fremovexattr(r0, &(0x7f0000000000)=@random={'user.', ']\x00'}) r1 = dup2(r0, r0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r1, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x111}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)={0xc4, r2, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@TIPC_NLA_LINK={0x10, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}]}]}, @TIPC_NLA_MEDIA={0x40, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3cec}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x93a}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}]}]}, @TIPC_NLA_LINK={0x60, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xbe5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x93}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x40}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9cd}]}]}]}, 0xc4}, 0x1, 0x0, 0x0, 0x1}, 0x4048000) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002ff7)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r3, 0xc004743e, &(0x7f0000001000)=""/246) ioctl$EVIOCGREP(r3, 0xc008744c, &(0x7f0000003000)=""/174) 11:47:00 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000100), 0x12) socket$netlink(0x10, 0x3, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) ioctl$ASHMEM_GET_PIN_STATUS(r0, 0x7709, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r4, r5, 0x0, 0x10000000000443) read(r4, &(0x7f00000003c0)=""/72, 0x100000104) 11:47:00 executing program 3: unshare(0x1fffffe) r0 = dup(0xffffffffffffffff) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000000)=0x6) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='map\x00\x00~6\xf5\b\xd2g\xab\fz\xfe\x9f?\x00U\x1de\x9d\xa3p:\xc5{\x8e\xda\xc9\xfc\x8c]\x01\x83B\vg\x8f\xa5\x04\x00', r0}, 0x10) [ 481.093684] IPVS: ftp: loaded support on port[0] = 21 11:47:00 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x1, 0x0) accept4$inet(r1, &(0x7f0000000080)={0x2, 0x0, @empty}, &(0x7f00000000c0)=0x10, 0x80000) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) acct(0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) setsockopt$sock_timeval(r1, 0x1, 0x15, &(0x7f0000000100)={0x0, 0x7530}, 0x10) ioctl$KVM_SET_CPUID(r3, 0x4008ae8a, &(0x7f0000000300)=ANY=[@ANYBLOB="05000000070000008c000040050000a9ff01000000000000000000400000000001"]) ioctl$KVM_SET_MSRS(r3, 0xc008ae88, &(0x7f0000000240)=ANY=[@ANYBLOB="010000800000810e818b418d00df8af4ff4a00000000000000e5ff12a92c743ee9080000884cb2240b45d1"]) clock_gettime(0x0, &(0x7f0000000000)) 11:47:00 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000100), 0x12) socket$netlink(0x10, 0x3, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) ioctl$ASHMEM_GET_PIN_STATUS(r0, 0x7709, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') read(r4, &(0x7f00000003c0)=""/72, 0x100000104) 11:47:00 executing program 4: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0x0, 0x0) ioctl$SIOCGETNODEID(r0, 0x89e1, &(0x7f00000001c0)) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) unshare(0x8000000) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000001000)=""/246) ioctl$EVIOCGREP(r1, 0xc008744c, &(0x7f0000003000)=""/174) fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000000)='trusted.overlay.upper\x00', &(0x7f0000000080)={0x0, 0xfb, 0xff, 0x2, 0x2, "d8737dce88f013e61e73fc9b1e348a4f", "e0748de6ba7984fe3e44203d29d4e891e2455570202f1153742e9792c938efb598041ff351bcfd8d4f5e6ab86a154f32ef4e4a1c9fbcfa66b4d295d7189ceaa010ec7660a09096708e67ceb194846c99f9d61e485bfa5f5599473220fdcb8d27eca46856df58b04afe2d843b64cfbdf5af4afb89903d4dfd3a703d610cbf881ce4a252e09cb3e20111a9a10b06753e7e2ba70a91c6736e16af30a848a9c81a19bde9bc06fac5a49c94240a35d932e1f5438ab278f6ee9a5ce97be0154f799001bf4af5b9c45307280f95109b100f6d06eba1242604e05f94571211d303f3f0eb93256b608ff5901642e1"}, 0xff, 0x1) 11:47:00 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f00000001c0), 0x4) lsetxattr$security_smack_transmute(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000300)='TRUE', 0x4, 0x1) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = accept(r1, &(0x7f0000000000)=@ethernet={0x0, @remote}, &(0x7f0000000200)=0x3a2d74f00bad3cf9) getsockopt$inet6_udp_int(r3, 0x11, 0x67, &(0x7f0000000100), &(0x7f0000000140)=0x4) r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r4, 0xc008ae88, &(0x7f0000000280)={0x7b, 0x0, [0x1b, 0x3]}) 11:47:00 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000100), 0x12) socket$netlink(0x10, 0x3, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) ioctl$ASHMEM_GET_PIN_STATUS(r0, 0x7709, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') read(r4, &(0x7f00000003c0)=""/72, 0x100000104) 11:47:00 executing program 3: unshare(0x20400) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='map\x00\x00~6\xf5\b\xd2g\xab\fz\xfe\x9f?\x00U\x1de\x9d\xa3p:\xc5{\x8e\xda\xc9\xfc\x8c]\x01\x83B\vg\x8f\xa5\x04\x00'}, 0x10) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$unix(r1, &(0x7f0000000100), &(0x7f0000000180)=0x6e) ioctl$PPPIOCGFLAGS(r0, 0x8004745a, &(0x7f00000000c0)) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000300)={&(0x7f0000000240)={0x98, r2, 0x400, 0x70bd2b, 0x25dfdbfd, {}, [@TIPC_NLA_LINK={0x54, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xd0e}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x981}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}]}]}, @TIPC_NLA_LINK={0x24, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x10}, 0x8000) 11:47:00 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x1, 0x0) accept4$inet(r1, &(0x7f0000000080)={0x2, 0x0, @empty}, &(0x7f00000000c0)=0x10, 0x80000) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) acct(0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) setsockopt$sock_timeval(r1, 0x1, 0x15, &(0x7f0000000100)={0x0, 0x7530}, 0x10) ioctl$KVM_SET_CPUID(r3, 0x4008ae8a, &(0x7f0000000300)=ANY=[@ANYBLOB="05000000070000008c000040050000a9ff01000000000000000000400000000001"]) ioctl$KVM_SET_MSRS(r3, 0xc008ae88, &(0x7f0000000240)=ANY=[@ANYBLOB="010000800000810e818b418d00df8af4ff4a00000000000000e5ff12a92c743ee9080000884cb2240b45d1"]) 11:47:00 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002ff7)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000001000)=""/246) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x400000, 0x0) ioctl$EVIOCGREP(r0, 0xc008744c, &(0x7f0000003000)=""/174) 11:47:00 executing program 1: r0 = syz_open_dev$cec(&(0x7f0000000480)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) socket(0xa, 0x3, 0x200000000008) syz_genetlink_get_family_id$ipvs(0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) unshare(0x44000600) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), 0x0) setsockopt(r2, 0x5, 0x6, &(0x7f0000000240)="0ad3e82f675cddf1306ee6b7820d8871fa9c7beba9ffddbaca75d268deb0a213e74fd68547953480f753169ee98ec75bb68498acd51dd72d1cfd85e36158b87f0b0497d9b5f4e29cbbddb1d2117686ae70868a1da7ba9e1f932945bcdde7f1a411f2e34d9f6b406d578ef0c007def968d8559d43b727038a02cb986d6e916bf207ca5d8b3adc36414432b07e22b05b3aad2b45fd8c1b284462afdb1d4bfed4504dc84d928c49925d44e27eb1ab2ac6cf6fa97d714dba6e8b25d829f6a435feda", 0xc0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={r1, &(0x7f0000000300)="58f3ee72c4777c296f3db6f62cd635b644aedc22771916267a2b0bc7c6b86accfc20fe357a25cbd94189303bb1e7156553a06298e567b2b95f03400b11edc7d0fe4bdc5471416327a00a1872b5d1a1533cd01b6387fbaf8fa65a7f4554e07f48cf5f05"}, 0x10) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) write$evdev(r0, &(0x7f00000004c0)=[{{}, 0x15, 0x100000001, 0xffff}, {{r3, r4/1000+30000}, 0x15, 0x2, 0xffffffffffff7fff}, {{}, 0x5, 0x5, 0x100000000}, {{r5, r6/1000+10000}, 0x17, 0x69, 0xfffffffffffffff8}, {{0x0, 0x7530}, 0x13, 0x101, 0x1ff}, {{0x77359400}, 0x0, 0x3, 0x6}, {{}, 0x4, 0x81, 0x9}, {{r7, r8/1000+30000}, 0x1f, 0x2, 0x9}, {{r9, r10/1000+10000}, 0x17, 0x0, 0x7ff}], 0xd8) 11:47:01 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000100), 0x12) socket$netlink(0x10, 0x3, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) ioctl$ASHMEM_GET_PIN_STATUS(r0, 0x7709, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) sendfile(r4, 0xffffffffffffffff, 0x0, 0x10000000000443) read(r4, &(0x7f00000003c0)=""/72, 0x100000104) 11:47:01 executing program 3: r0 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x0, 0x200) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000001c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8001000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="000929bd7000fdcbdf2501000000000000000b000000080c001473797a3010010000"], 0x28}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) inotify_add_watch(r0, &(0x7f00000000c0)='./file0\x00', 0x4000008) ioctl$KDSETMODE(r0, 0x4b3a, 0x9db) unshare(0x10000000) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000240)={0xdf, @dev={0xac, 0x14, 0x14, 0x9}, 0x4e23, 0x4, 'nq\x00', 0x2, 0x60a, 0x1e}, 0x2c) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='map\x00\x00~6\xf5\b\xd2g\xab\fz\xfe\x9f?\x00U\x1de\x9d\xa3p:\xc5{\x8e\xda\xc9\xfc\x8c]\x01\x83B\vg\x8f\xa5\x04\x00'}, 0x10) 11:47:01 executing program 2: r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") r1 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x200000, 0x0) r3 = getgid() ioctl$TUNSETGROUP(r2, 0x400454ce, r3) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000100)=ANY=[@ANYBLOB="b8000000190001000000000000000000ff0100000034254f987da2e3090000000000000000000001e000000100000000000000000000000008000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x31, &(0x7f0000000040)={@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4ffffff]}}, 0x20) [ 482.192323] IPVS: ftp: loaded support on port[0] = 21 11:47:01 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x121000, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000001000)=""/246) ioctl$EVIOCGREP(r0, 0xc008744c, &(0x7f0000003000)=""/174) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000000)={0x0, 0x7}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000080)={r1, 0x7}, 0x8) 11:47:01 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x1, 0x0) accept4$inet(r1, &(0x7f0000000080)={0x2, 0x0, @empty}, &(0x7f00000000c0)=0x10, 0x80000) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) acct(0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) setsockopt$sock_timeval(r1, 0x1, 0x15, &(0x7f0000000100)={0x0, 0x7530}, 0x10) ioctl$KVM_SET_MSRS(r3, 0xc008ae88, &(0x7f0000000240)=ANY=[@ANYBLOB="010000800000810e818b418d00df8af4ff4a00000000000000e5ff12a92c743ee9080000884cb2240b45d1"]) 11:47:01 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000100), 0x12) socket$netlink(0x10, 0x3, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) ioctl$ASHMEM_GET_PIN_STATUS(r0, 0x7709, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) sendfile(r4, 0xffffffffffffffff, 0x0, 0x10000000000443) read(r4, &(0x7f00000003c0)=""/72, 0x100000104) 11:47:01 executing program 3: r0 = syz_open_dev$mice(&(0x7f00000002c0)='/dev/input/mice\x00', 0x0, 0x80000101000) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x800) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000200)={@empty, 0x66, r1}) futex(&(0x7f0000000080)=0x1, 0x3, 0x2, &(0x7f0000000100), &(0x7f0000000140), 0x0) unshare(0xffffffffffffffff) bind$bt_rfcomm(r0, &(0x7f00000000c0)={0x1f, {0x7fffffff, 0x1, 0x1000, 0x4, 0x8, 0x1}, 0x7}, 0xa) recvmmsg(r0, &(0x7f0000001280)=[{{&(0x7f0000000240)=@xdp, 0x80, &(0x7f0000000480)=[{&(0x7f00000002c0)}, {&(0x7f0000000300)=""/63, 0x3f}, {&(0x7f0000000340)=""/137, 0x89}, {&(0x7f0000000400)=""/109, 0x6d}], 0x4}, 0xfffffffffffffff8}, {{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000004c0)=""/63, 0x3f}], 0x1}, 0x1f}, {{&(0x7f0000000540)=@rc, 0x80, &(0x7f00000006c0)=[{&(0x7f00000005c0)=""/246, 0xf6}], 0x1, &(0x7f0000000700)=""/216, 0xd8}, 0x201}, {{0x0, 0x0, &(0x7f0000000c00)=[{&(0x7f0000000800)=""/119, 0x77}, {&(0x7f0000000880)=""/29, 0x1d}, {&(0x7f00000008c0)=""/63, 0x3f}, {&(0x7f0000000900)=""/185, 0xb9}, {&(0x7f00000009c0)=""/100, 0x64}, {&(0x7f0000000a40)=""/84, 0x54}, {&(0x7f0000000ac0)=""/156, 0x9c}, {&(0x7f0000000b80)=""/118, 0x76}], 0x8, &(0x7f0000000c80)=""/160, 0xa0}, 0xffffffffffffffff}, {{&(0x7f0000000d40)=@generic, 0x80, &(0x7f00000011c0)=[{&(0x7f0000000dc0)=""/242, 0xf2}, {&(0x7f0000000ec0)=""/103, 0x67}, {&(0x7f0000000f40)=""/228, 0xe4}, {&(0x7f0000001040)=""/174, 0xae}, {&(0x7f0000001100)=""/146, 0x92}], 0x5, &(0x7f0000001240)=""/24, 0x18}, 0x2}], 0x5, 0x62, &(0x7f00000013c0)={0x0, 0x989680}) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0xffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='map\x00\x00~6\xf5\b\xd2g\xab\fz\xfe\x9f?\x00U\x1de\x9d\xa3p:\xc5{\x8e\xda\xc9\xfc\x8c]\x01\x83B\vg\x8f\xa5\x04\x00'}, 0x10) 11:47:01 executing program 2: r0 = socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000738000/0x1000)=nil, 0x1000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x101000, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000080)='lp\x00', 0x3) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000000)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000004fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket(0xa, 0x1, 0x0) getsockopt$inet6_int(r3, 0x29, 0x3b, 0x0, &(0x7f0000013000)) mmap(&(0x7f0000000000/0xfe3000)=nil, 0xfe3000, 0x3, 0x32, 0xffffffffffffffff, 0x0) close(r2) 11:47:01 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x1, 0x0) accept4$inet(r1, &(0x7f0000000080)={0x2, 0x0, @empty}, &(0x7f00000000c0)=0x10, 0x80000) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) acct(0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r3, 0xc008ae88, &(0x7f0000000240)=ANY=[@ANYBLOB="010000800000810e818b418d00df8af4ff4a00000000000000e5ff12a92c743ee9080000884cb2240b45d1"]) 11:47:01 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000100), 0x12) socket$netlink(0x10, 0x3, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) ioctl$ASHMEM_GET_PIN_STATUS(r0, 0x7709, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) sendfile(r4, 0xffffffffffffffff, 0x0, 0x10000000000443) read(r4, &(0x7f00000003c0)=""/72, 0x100000104) 11:47:01 executing program 4: r0 = syz_open_dev$midi(&(0x7f0000000180)='/dev/midi#\x00', 0xffffffffffff4f20, 0x20000) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000040)={{{@in=@multicast2, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0xe8) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002ff7)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000001000)=""/246) ioctl$EVIOCGREP(r1, 0xc008744c, &(0x7f0000003000)=""/174) 11:47:01 executing program 1: syz_open_dev$cec(&(0x7f0000000480)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) socket(0xa, 0x3, 0x200000000008) syz_genetlink_get_family_id$ipvs(0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) unshare(0x44000600) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), 0x0) setsockopt(r1, 0x5, 0x6, &(0x7f0000000240)="0ad3e82f675cddf1306ee6b7820d8871fa9c7beba9ffddbaca75d268deb0a213e74fd68547953480f753169ee98ec75bb68498acd51dd72d1cfd85e36158b87f0b0497d9b5f4e29cbbddb1d2117686ae70868a1da7ba9e1f932945bcdde7f1a411f2e34d9f6b406d578ef0c007def968d8559d43b727038a02cb986d6e916bf207ca5d8b3adc36414432b07e22b05b3aad2b45fd8c1b284462afdb1d4bfed4504dc84d928c49925d44e27eb1ab2ac6cf6fa97d714dba6e8b25d829f6a435feda", 0xc0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={r0, &(0x7f0000000300)="58f3ee72c4777c296f3db6f62cd635b644aedc22771916267a2b0bc7c6b86accfc20fe357a25cbd94189303bb1e7156553a06298e567b2b95f03400b11edc7d0fe4bdc5471416327a00a1872b5d1a1533cd01b6387fbaf8fa65a7f4554e07f48cf5f05"}, 0x10) clock_gettime(0x0, &(0x7f0000000000)) clock_gettime(0x0, &(0x7f0000000080)) clock_gettime(0x0, &(0x7f0000000100)) clock_gettime(0x0, &(0x7f0000000180)) 11:47:02 executing program 2: unshare(0x2000400) r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x877, 0x10000) getsockopt$inet_mreq(r0, 0x0, 0x24, &(0x7f0000000180)={@empty, @remote}, &(0x7f00000001c0)=0x8) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f0000000380)={'\x00', 0x1}) fcntl$getown(r0, 0x9) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = dup(r1) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f00000002c0)={0x0, @broadcast, @multicast1}, &(0x7f0000000300)=0xc) ioctl$KVM_IRQ_LINE(r0, 0x4008ae61, &(0x7f0000000340)={0x9, 0x400}) getsockopt$inet_tcp_buf(r2, 0x6, 0x1f, &(0x7f0000000040)=""/194, &(0x7f0000000140)=0xc2) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000200)={0x4, {{0x2, 0x4e20, @local}}}, 0x88) 11:47:02 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000100), 0x12) socket$netlink(0x10, 0x3, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) ioctl$ASHMEM_GET_PIN_STATUS(r0, 0x7709, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r4, r5, 0x0, 0x10000000000443) read(r4, &(0x7f00000003c0)=""/72, 0x100000104) 11:47:02 executing program 3: unshare(0xff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='map\x00\x00~6\xf5\b\xd2g\xab\fz\xfe\x9f?\x00U\x1de\x9d\xa3p:\xc5{\x8e\xda\xc9\xfc\x8c]\x01\x83B\vg\x8f\xa5\x04\x00'}, 0x10) [ 483.126155] IPVS: ftp: loaded support on port[0] = 21 11:47:02 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x1, 0x0) accept4$inet(r1, &(0x7f0000000080)={0x2, 0x0, @empty}, &(0x7f00000000c0)=0x10, 0x80000) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) acct(0x0) ioctl$KVM_SET_MSRS(0xffffffffffffffff, 0xc008ae88, &(0x7f0000000240)=ANY=[@ANYBLOB="010000800000810e818b418d00df8af4ff4a00000000000000e5ff12a92c743ee9080000884cb2240b45d1"]) 11:47:02 executing program 2: mknod$loop(&(0x7f0000000740)='./file0\x00', 0xc000, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x200, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f00000001c0)={'filter\x00', 0x7, 0x4, 0x458, 0x258, 0x118, 0x118, 0x370, 0x370, 0x370, 0x4, &(0x7f0000000180), {[{{@arp={@empty, @multicast2, 0xffffffff, 0xffffffff, @mac, {[0x0, 0xff, 0xff, 0x0, 0xff, 0xff]}, @empty, {[0x0, 0x0, 0x0, 0x0, 0xff, 0xff]}, 0x7, 0x80, 0x100000001, 0x4, 0x9, 0x7, 'tunl0\x00', 'ip6gretap0\x00', {0xff}, {}, 0x0, 0x6}, 0xf0, 0x118}, @unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@arp={@remote, @broadcast, 0xffffffff, 0xffffffff, @mac=@broadcast, {[0xff, 0x0, 0xff, 0xff]}, @mac=@remote, {[0x0, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0xed, 0xece, 0x541, 0x7, 0x5, 0xe71e, 'syzkaller0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x0, 0x1}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@random="7755f1135ef8", @broadcast, @rand_addr=0x7fffffff, 0xf, 0xffffffff}}}, {{@arp={@local, @rand_addr=0x2, 0xffffffff, 0xffffffff, @mac=@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, {[0xff, 0xff, 0x0, 0x0, 0xff, 0xff]}, @mac=@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, {[0x0, 0xff, 0xff, 0xff, 0xff]}, 0x401, 0x7, 0x7, 0x2239, 0x401, 0x1000, 'syzkaller0\x00', 'rose0\x00', {}, {0xff}, 0x0, 0x8}, 0xf0, 0x118}, @unspec=@NFQUEUE0={0x28, 'NFQUEUE\x00', 0x0, {0x10000}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x4a8) lsetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000140)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x0, 0x0) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000040)) removexattr(&(0x7f0000000700)='./file0\x00', &(0x7f0000000000)=@random={'security.', 'security%\x00'}) 11:47:02 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x800000000000, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000001000)=""/246) ioctl$EVIOCGREP(r0, 0xc008744c, &(0x7f0000003000)=""/174) 11:47:02 executing program 3: unshare(0x20400) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x440000, 0x0) write$P9_RREADDIR(r0, &(0x7f00000000c0)={0x87, 0x29, 0x1, {0x5, [{{0x80, 0x2, 0x2}, 0x6387b9ec, 0x4, 0x7, './file0'}, {{0x82, 0x4, 0x6}, 0x7, 0x0, 0x7, './file0'}, {{0x8, 0x4, 0x1}, 0xf, 0x4, 0x7, './file0'}, {{0x10}, 0x0, 0x401, 0x7, './file0'}]}}, 0x87) write$binfmt_elf32(r0, &(0x7f0000000180)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x1, 0x3, 0x0, 0x200000000000000, 0x2, 0x6, 0x401, 0x3a7, 0x38, 0x2b3, 0x4475425c, 0x5, 0x20, 0x2, 0xffffe00000000000, 0x3, 0x58ad}, [{0x70000000, 0x401, 0x6, 0xfffffffffffffffb, 0x1e880, 0x7, 0x1, 0x5}, {0x7474e551, 0x20, 0x9, 0x0, 0x9, 0x10000, 0x4, 0x1}], "aa208c904236e84f812086cdfa6830c9ee906e9a3711e2e8a5ec2ab2553d239975fd1eab280ee086949418cc34f6e7a5c03fb4cd87730e372c8d33710979190d03bf1701e122afc51db6e7aa22a57f87fc81245a039f24955a1dcfbcbe9fa41bb202aee548c8203fe5ae9a5149"}, 0xe5) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='map\x00\x00~6\xf5\b\xd2g\xab\fz\xfe\x9f?\x00U\x1de\x9d\xa3p:\xc5{\x8e\xda\xc9\xfc\x8c]\x01\x83B\vg\x8f\xa5\x04\x00'}, 0x10) 11:47:02 executing program 1: syz_open_dev$cec(&(0x7f0000000480)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) socket(0xa, 0x3, 0x200000000008) syz_genetlink_get_family_id$ipvs(0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) unshare(0x44000600) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), 0x0) setsockopt(r1, 0x5, 0x6, &(0x7f0000000240)="0ad3e82f675cddf1306ee6b7820d8871fa9c7beba9ffddbaca75d268deb0a213e74fd68547953480f753169ee98ec75bb68498acd51dd72d1cfd85e36158b87f0b0497d9b5f4e29cbbddb1d2117686ae70868a1da7ba9e1f932945bcdde7f1a411f2e34d9f6b406d578ef0c007def968d8559d43b727038a02cb986d6e916bf207ca5d8b3adc36414432b07e22b05b3aad2b45fd8c1b284462afdb1d4bfed4504dc84d928c49925d44e27eb1ab2ac6cf6fa97d714dba6e8b25d829f6a435feda", 0xc0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={r0, &(0x7f0000000300)="58f3ee72c4777c296f3db6f62cd635b644aedc22771916267a2b0bc7c6b86accfc20fe357a25cbd94189303bb1e7156553a06298e567b2b95f03400b11edc7d0fe4bdc5471416327a00a1872b5d1a1533cd01b6387fbaf8fa65a7f4554e07f48cf5f05"}, 0x10) clock_gettime(0x0, &(0x7f0000000000)) clock_gettime(0x0, &(0x7f0000000080)) clock_gettime(0x0, &(0x7f0000000100)) 11:47:02 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000100), 0x12) socket$netlink(0x10, 0x3, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) ioctl$ASHMEM_GET_PIN_STATUS(r0, 0x7709, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r4, r5, 0x0, 0x10000000000443) read(r4, &(0x7f00000003c0)=""/72, 0x100000104) 11:47:02 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x1, 0x0) accept4$inet(r1, &(0x7f0000000080)={0x2, 0x0, @empty}, &(0x7f00000000c0)=0x10, 0x80000) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) acct(0x0) ioctl$KVM_SET_MSRS(0xffffffffffffffff, 0xc008ae88, &(0x7f0000000240)=ANY=[@ANYBLOB="010000800000810e818b418d00df8af4ff4a00000000000000e5ff12a92c743ee9080000884cb2240b45d1"]) 11:47:02 executing program 2: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 483.782734] IPVS: ftp: loaded support on port[0] = 21 11:47:02 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r1 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000100), 0x12) socket$netlink(0x10, 0x3, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) ioctl$ASHMEM_GET_PIN_STATUS(r0, 0x7709, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r4, r5, 0x0, 0x10000000000443) read(r4, &(0x7f00000003c0)=""/72, 0x100000104) 11:47:02 executing program 3: unshare(0x800) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='map\x00\x00~6\xf5\b\xd2g\xab\fz\xfe\x9f?\x00U\x1de\x9d\xa3p:\xc5{\x8e\xda\xc9\xfc\x8c]\x01\x83B\vg\x8f\xa5\x04\x00'}, 0x10) 11:47:03 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002ff7)='/dev/ppp\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000080)={0x0, 0x4, 0x1, 0x2, 0x3, 0xffff, 0x7, 0x53, 0x0}, &(0x7f00000000c0)=0x20) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000100)={0xfff, 0xffffffffffff0000, 0x1, 0xe, 0x6, 0xffffffffffffffff, 0x7f, 0x0, r1}, &(0x7f0000000140)=0x20) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000001000)=""/246) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x4058534c, &(0x7f0000000000)={0x200, 0x6, 0x401, 0x100000001, 0xfffffffffffffff8, 0x8}) r3 = getpgrp(0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@loopback, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@dev}}, &(0x7f0000000340)=0xe8) getgroups(0x2, &(0x7f0000000380)=[0x0, 0x0]) setsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000003c0)={r3, r4, r5}, 0xc) ioctl$EVIOCGREP(r0, 0xc008744c, &(0x7f0000003000)=""/174) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000180)={r2, 0x7fff}, &(0x7f00000001c0)=0x8) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_GET(r0, &(0x7f0000000600)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000480)={0x11c, r6, 0x300, 0x70bd2c, 0x25dfdbfc, {}, [@TIPC_NLA_NET={0x50, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x9}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x100000001}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x4}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x61d}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x6}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x2}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x100}]}, @TIPC_NLA_NET={0x30, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x19}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x200}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x3}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xfa75}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x80000001}]}, @TIPC_NLA_BEARER={0x50, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0x7, @mcast2, 0x800}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0x1000, @loopback, 0x2}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x6}]}, @TIPC_NLA_SOCK={0x38, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xb3}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x2}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x59}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x3}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x101}]}]}, 0x11c}, 0x1, 0x0, 0x0, 0x800}, 0x4004) ioctl$EVIOCGREP(r0, 0x80084503, &(0x7f0000000200)=""/38) 11:47:03 executing program 2: creat(0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) r0 = memfd_create(&(0x7f0000001fc1)='#vmnet1nodevem1\x00', 0x0) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000000040), 0x7f) sendfile(r0, r0, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) mount(&(0x7f0000000200)=ANY=[@ANYBLOB="41e28a6be90a193b5f42bb9e54b4780fedf0b211f5fd8d98b8d694928b5d7c445158cd3040fc4a82ce6099ce85b42e80ce8ea67b8b47b4548879d452177a3c291abc6a3c884e27d7eb1908c59f5ce7d58ebc7d8c87807791792baabf437ae1f267e556b6eb1c6d5e2230cbcf157a326deea4ce254489d8b73e5eed4ba53712690f41e2c3e8d15111dffa87ee1bcbaceb7ae52e44d0b33c2770b6421a1e881866cfa1cfd7dd95b981bdef7309069eb7b75dafbe82ccd9b47ac4054100102af63843a8133b8247844188eb681388a30a7bbc74d826a163cca94242c968617c77360a2745ca424596aab5eda8f650ac69a72b8676ec0b77af46b4158e0cf7df7e585b47e846973d0b7dba8cef87cef12ebeda1e4619f8987846e5bba74ae08f38eabbfa05f684dc354f749301e7d148c2f177c1965c93f53407624b9272823f7d02fc"], &(0x7f0000000140)='./file1\x00', 0x0, 0x1000, 0x0) setfsgid(0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$evdev(0x0, 0x0, 0x0) 11:47:03 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x1, 0x0) accept4$inet(r1, &(0x7f0000000080)={0x2, 0x0, @empty}, &(0x7f00000000c0)=0x10, 0x80000) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) acct(0x0) ioctl$KVM_SET_MSRS(0xffffffffffffffff, 0xc008ae88, &(0x7f0000000240)=ANY=[@ANYBLOB="010000800000810e818b418d00df8af4ff4a00000000000000e5ff12a92c743ee9080000884cb2240b45d1"]) 11:47:03 executing program 0: syz_open_procfs(0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) socket$netlink(0x10, 0x3, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r3, r4, 0x0, 0x10000000000443) read(r3, &(0x7f00000003c0)=""/72, 0x100000104) 11:47:03 executing program 1: syz_open_dev$cec(&(0x7f0000000480)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) socket(0xa, 0x3, 0x200000000008) syz_genetlink_get_family_id$ipvs(0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) unshare(0x44000600) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), 0x0) setsockopt(r1, 0x5, 0x6, &(0x7f0000000240)="0ad3e82f675cddf1306ee6b7820d8871fa9c7beba9ffddbaca75d268deb0a213e74fd68547953480f753169ee98ec75bb68498acd51dd72d1cfd85e36158b87f0b0497d9b5f4e29cbbddb1d2117686ae70868a1da7ba9e1f932945bcdde7f1a411f2e34d9f6b406d578ef0c007def968d8559d43b727038a02cb986d6e916bf207ca5d8b3adc36414432b07e22b05b3aad2b45fd8c1b284462afdb1d4bfed4504dc84d928c49925d44e27eb1ab2ac6cf6fa97d714dba6e8b25d829f6a435feda", 0xc0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={r0, &(0x7f0000000300)="58f3ee72c4777c296f3db6f62cd635b644aedc22771916267a2b0bc7c6b86accfc20fe357a25cbd94189303bb1e7156553a06298e567b2b95f03400b11edc7d0fe4bdc5471416327a00a1872b5d1a1533cd01b6387fbaf8fa65a7f4554e07f48cf5f05"}, 0x10) clock_gettime(0x0, &(0x7f0000000000)) clock_gettime(0x0, &(0x7f0000000080)) 11:47:03 executing program 3: unshare(0x2000100) r0 = socket$inet6_dccp(0xa, 0x6, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x6f5e0000000, 0x200) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r2) sendto$inet6(r1, &(0x7f00000000c0)="e3e739198d7c09e7e84da6c848c72c73f96b9488aaa557383b37ff0167d2c4fe5c2c93c4af25f179e0695ef1446f11", 0x2f, 0x40000, &(0x7f0000000100)={0xa, 0x4e23, 0x8, @empty, 0x20}, 0x1c) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='map\x00\x00~6\xf5\b\xd2g\xab\fz\xfe\x9f?\x00U\x1de\x9d\xa3p:\xc5{\x8e\xda\xc9\xfc\x8c]\x01\x83B\vg\x8f\xa5\x04\x00'}, 0x10) 11:47:03 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002ff7)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000001000)=""/246) prctl$PR_CAPBSET_READ(0x17, 0x5) creat(&(0x7f0000000000)='./file0\x00', 0xc1) ioctl$EVIOCGREP(r0, 0xc008744c, &(0x7f0000000180)=""/174) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/attr/current\x00', 0x2, 0x0) 11:47:03 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000000180)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000000)={0x10, 0x0, &(0x7f0000005fd4)=[@acquire, @acquire={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000001c0)={0x44, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="00634040020000000000000002000000000000000000000001000000000000000000000018000000000000003800000000000000", @ANYPTR=&(0x7f0000000340)=ANY=[@ANYBLOB="852a6466006c0800", @ANYRES32=r0, @ANYBLOB="000000000100000000000000"], @ANYPTR=&(0x7f0000000380)=ANY=[@ANYBLOB="3800000000000000180000000000000000000000000000002800000000000000200000000000000018000000000000005800000000000000"]], 0xfffffeb6, 0x0, 0x0}) [ 484.455585] IPVS: ftp: loaded support on port[0] = 21 11:47:03 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x1, 0x0) accept4$inet(r1, &(0x7f0000000080)={0x2, 0x0, @empty}, &(0x7f00000000c0)=0x10, 0x80000) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r3, 0xc008ae88, &(0x7f0000000240)=ANY=[@ANYBLOB="010000800000810e818b418d00df8af4ff4a00000000000000e5ff12a92c743ee9080000884cb2240b45d1"]) 11:47:03 executing program 3: unshare(0x20400) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000400)={{{@in=@broadcast, @in=@broadcast}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f0000000500)=0xe8) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000080)={0x0, 0x1}, &(0x7f00000000c0)=0x8) r2 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x55a, 0x200) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r2, 0x6, 0x23, &(0x7f00000006c0)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}, &(0x7f0000000700)=0x10) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000100)={r1, 0x2caf, 0x4, 0xec}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000580)='TIPCv2\x00') sendmsg$TIPC_NL_SOCK_GET(r2, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x48000}, 0xc, &(0x7f0000000380)={&(0x7f0000000740)=ANY=[@ANYBLOB="74010000", @ANYRES16=r3, @ANYBLOB="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"], 0x174}, 0x1, 0x0, 0x0, 0x10}, 0x50) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f0000000680)={&(0x7f00000001c0)=[0x0, 0x0, 0x0], &(0x7f00000005c0)=[0x0, 0x0, 0x0], &(0x7f0000000600)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0], 0x3, 0x3, 0x4, 0x4}) ioctl$VIDIOC_G_JPEGCOMP(r2, 0x808c563d, &(0x7f0000000200)) r4 = fanotify_init(0x8, 0x80000) ioctl$EXT4_IOC_SETFLAGS(r4, 0x40086602, &(0x7f0000000540)=0x400010) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='map\x00\x00~6\xf5\b\xd2g\xab\fz\xfe\x9f?\x00U\x1de\x9d\xa3p:\xc5{\x8e\xda\xc9\xfc\x8c]\x01\x83B\vg\x8f\xa5\x04\x00'}, 0x10) [ 484.667342] binder: 15720:15722 got transaction to invalid handle [ 484.673837] binder: 15720:15722 transaction failed 29201/-22, size 24-56 line 2834 [ 484.681846] binder: 15720:15722 ioctl c0306201 200001c0 returned -14 [ 484.773107] binder: BINDER_SET_CONTEXT_MGR already set [ 484.778475] binder: 15720:15722 ioctl 40046207 0 returned -16 11:47:03 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002ff7)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000001000)=""/246) socket$nl_route(0x10, 0x3, 0x0) ioctl$EVIOCGREP(r0, 0xc008744c, &(0x7f0000003000)=""/174) 11:47:03 executing program 1: syz_open_dev$cec(&(0x7f0000000480)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) socket(0xa, 0x3, 0x200000000008) syz_genetlink_get_family_id$ipvs(0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) unshare(0x44000600) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), 0x0) setsockopt(r1, 0x5, 0x6, &(0x7f0000000240)="0ad3e82f675cddf1306ee6b7820d8871fa9c7beba9ffddbaca75d268deb0a213e74fd68547953480f753169ee98ec75bb68498acd51dd72d1cfd85e36158b87f0b0497d9b5f4e29cbbddb1d2117686ae70868a1da7ba9e1f932945bcdde7f1a411f2e34d9f6b406d578ef0c007def968d8559d43b727038a02cb986d6e916bf207ca5d8b3adc36414432b07e22b05b3aad2b45fd8c1b284462afdb1d4bfed4504dc84d928c49925d44e27eb1ab2ac6cf6fa97d714dba6e8b25d829f6a435feda", 0xc0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={r0, &(0x7f0000000300)="58f3ee72c4777c296f3db6f62cd635b644aedc22771916267a2b0bc7c6b86accfc20fe357a25cbd94189303bb1e7156553a06298e567b2b95f03400b11edc7d0fe4bdc5471416327a00a1872b5d1a1533cd01b6387fbaf8fa65a7f4554e07f48cf5f05"}, 0x10) clock_gettime(0x0, &(0x7f0000000000)) [ 484.892168] binder: undelivered TRANSACTION_ERROR: 29201 [ 484.892189] binder: 15720:15726 got transaction to invalid handle [ 484.892236] binder: 15720:15726 transaction failed 29201/-22, size 24-56 line 2834 [ 484.912144] binder: 15720:15726 ioctl c0306201 200001c0 returned -14 11:47:04 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x1, 0x0) accept4$inet(r0, &(0x7f0000000080)={0x2, 0x0, @empty}, &(0x7f00000000c0)=0x10, 0x80000) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r1, 0xc008ae88, &(0x7f0000000240)=ANY=[@ANYBLOB="010000800000810e818b418d00df8af4ff4a00000000000000e5ff12a92c743ee9080000884cb2240b45d1"]) [ 485.061125] binder: undelivered TRANSACTION_ERROR: 29201 11:47:04 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) unshare(0x10000000) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0xa4) prctl$PR_SET_SECUREBITS(0x1c, 0x36) [ 485.175033] IPVS: ftp: loaded support on port[0] = 21 11:47:04 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000080)={{{@in=@broadcast, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000000180)=0xe8) sendmsg(r0, &(0x7f0000000540)={&(0x7f00000001c0)=@ll={0x11, 0x4, r1, 0x1, 0x4374d02e}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000240)="987e3f7b33b739c476de1995d670bb8311393b45ad624324faac2f2c2ee1bf367d18dddbe7a29c06c0d939e5b1309de7bee45fcc8c8a8c7f287c7bf27b5c559a6e41f334aaee67f50ed42ebf34905923141ba08f43d9681dcf2ceae9226f47cc9ba766c06d499f2a0c00b350d493faf71a595df26e4822f67f7d6047f5cb418010eb99a118b4f9f4aac1199e293df867f3b61e1a6ea329b54be311310bd82180e2bab656ecf1d57301a74b99cf1c7a82350ece65a4befe3deb94c385f20d4e8766e3b895d8a098abad103b11d0e408c7b38414754d7f60e93069791348e52090", 0xe0}], 0x1, &(0x7f0000000380)=[{0xf0, 0x101, 0x3, "be19769e782b7d991d4807fdb3a9a6113006301058ed571e38c6038056795701ca300aa3359fb29d3ea187bb6c30aff9e7991b3c24d6103fe31cba2aa7b81bc32703b075fdf9a37f023e85e021b47ec7f1d386ab2a1946399bd695f3b6c4201785c2817da6ca9dccda79cab210116081c1c23719662376f353aa1d63a9c6510161d5562cf4295e2b34893bc80c512212a78ac45dea6f93a5cc7359dc2ea365328d076cdb7f5fbddf3dd5c2a966acf2b2c931ce592d16ad8c51c3b48e94390adb72be5beeb9972c8d0dc3f1b007ba94678e79df692f38236293209837e743"}, {0x58, 0x111, 0x6, "171aea27de56ac10853ecf61490c359136f99d4ca1b2b95605bebd88976cc2c6f433d369afccb05f243baf1e431bbc242ff41e2cb758837afbf884c735ea65e321eb4bba27746a"}, {0x70, 0x10f, 0x5, "f037bbb92be64e343c32e34af6aaf35fe1ff3942f0e7d4a034749f684ea9f4c107393e3ba02e184484cd23f49c668695d210259f5a6b3ff71e41c0f8da81d7905158e447e7811b05d2fc735f1486ba174d574d8fd8a71038dfed"}], 0x1b8}, 0x40000) unshare(0x20400) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='map\x00\x00~6\xf5\b\xd2g\xab\fz\xfe\x9f?\x00U\x1de\x9d\xa3p:\xc5{\x8e\xda\xc9\xfc\x8c]\x01\x83B\vg\x8f\xa5\x04\x00'}, 0x10) 11:47:04 executing program 0: syz_open_procfs(0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) socket$netlink(0x10, 0x3, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(0xffffffffffffffff, r3, 0x0, 0x10000000000443) read(0xffffffffffffffff, &(0x7f00000003c0)=""/72, 0x100000104) 11:47:04 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002ff7)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000001000)=""/246) ioctl$int_out(r0, 0x0, &(0x7f0000000000)) ioctl$EVIOCGREP(r0, 0xc008744c, &(0x7f0000003000)=""/174) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000000c0)={{{@in6=@ipv4={[], [], @dev}, @in6=@ipv4={[], [], @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f00000001c0)=0xe8) sendmsg$nl_generic(r0, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x86}, 0xc, &(0x7f0000000200)={&(0x7f00000030c0)=ANY=[@ANYBLOB="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", @ANYRES32=r1, @ANYBLOB="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"], 0x122c}, 0x1, 0x0, 0x0, 0x20048810}, 0x4040800) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f0000000040)={'bond0\x00', 0x3}) 11:47:04 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x1, 0x0) accept4$inet(r0, &(0x7f0000000080)={0x2, 0x0, @empty}, &(0x7f00000000c0)=0x10, 0x80000) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r1, 0xc008ae88, &(0x7f0000000240)=ANY=[@ANYBLOB="010000800000810e818b418d00df8af4ff4a00000000000000e5ff12a92c743ee9080000884cb2240b45d1"]) 11:47:04 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) unshare(0x10000000) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0xa4) prctl$PR_SET_SECUREBITS(0x1c, 0x36) 11:47:04 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x1, 0x0) accept4$inet(r0, &(0x7f0000000080)={0x2, 0x0, @empty}, &(0x7f00000000c0)=0x10, 0x80000) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r1, 0xc008ae88, &(0x7f0000000240)=ANY=[@ANYBLOB="010000800000810e818b418d00df8af4ff4a00000000000000e5ff12a92c743ee9080000884cb2240b45d1"]) 11:47:04 executing program 0: syz_open_procfs(0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) socket$netlink(0x10, 0x3, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(0xffffffffffffffff, r3, 0x0, 0x10000000000443) read(0xffffffffffffffff, &(0x7f00000003c0)=""/72, 0x100000104) 11:47:04 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000001000)=""/246) ioctl$EVIOCGREP(r0, 0xc008744c, &(0x7f0000003000)=""/174) 11:47:04 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) unshare(0x10000000) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0xa4) prctl$PR_SET_SECUREBITS(0x1c, 0x36) 11:47:04 executing program 1: syz_open_dev$cec(&(0x7f0000000480)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) socket(0xa, 0x3, 0x200000000008) syz_genetlink_get_family_id$ipvs(0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) unshare(0x44000600) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), 0x0) setsockopt(r1, 0x5, 0x6, &(0x7f0000000240)="0ad3e82f675cddf1306ee6b7820d8871fa9c7beba9ffddbaca75d268deb0a213e74fd68547953480f753169ee98ec75bb68498acd51dd72d1cfd85e36158b87f0b0497d9b5f4e29cbbddb1d2117686ae70868a1da7ba9e1f932945bcdde7f1a411f2e34d9f6b406d578ef0c007def968d8559d43b727038a02cb986d6e916bf207ca5d8b3adc36414432b07e22b05b3aad2b45fd8c1b284462afdb1d4bfed4504dc84d928c49925d44e27eb1ab2ac6cf6fa97d714dba6e8b25d829f6a435feda", 0xc0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={r0, &(0x7f0000000300)="58f3ee72c4777c296f3db6f62cd635b644aedc22771916267a2b0bc7c6b86accfc20fe357a25cbd94189303bb1e7156553a06298e567b2b95f03400b11edc7d0fe4bdc5471416327a00a1872b5d1a1533cd01b6387fbaf8fa65a7f4554e07f48cf5f05"}, 0x10) 11:47:04 executing program 3: unshare(0x20400) r0 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x3, 0x2) ioctl$KVM_IRQ_LINE(r0, 0x4008ae61, &(0x7f00000000c0)={0x33d2, 0x4}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='map\x00\x00~6\xf5\b\xd2g\xab\fz\xfe\x9f?\x00U\x1de\x9d\xa3p:\xc5{\x8e\xda\xc9\xfc\x8c]\x01\x83B\vg\x8f\xa5\x04\x00'}, 0x10) 11:47:04 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x1, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000240)=ANY=[@ANYBLOB="010000800000810e818b418d00df8af4ff4a00000000000000e5ff12a92c743ee9080000884cb2240b45d1"]) 11:47:05 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000240)=ANY=[@ANYBLOB="010000800000810e818b418d00df8af4ff4a00000000000000e5ff12a92c743ee9080000884cb2240b45d1"]) 11:47:05 executing program 0: syz_open_procfs(0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) socket$netlink(0x10, 0x3, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(0xffffffffffffffff, r3, 0x0, 0x10000000000443) read(0xffffffffffffffff, &(0x7f00000003c0)=""/72, 0x100000104) 11:47:05 executing program 3: r0 = memfd_create(&(0x7f0000000080)='map\x00\x00~6\xf5\b\xd2g\xab\fz\xfe\x9f?\x00U\x1de\x9d\xa3p:\xc5{\x8e\xda\xc9\xfc\x8c]\x01\x83B\vg\x8f\xa5\x04\x00', 0x4) getpeername$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local}, &(0x7f0000000100)=0x1c) unshare(0x20400) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='map\x00\x00~6\xf5\b\xd2g\xab\fz\xfe\x9f?\x00U\x1de\x9d\xa3p:\xc5{\x8e\xda\xc9\xfc\x8c]\x01\x83B\vg\x8f\xa5\x04\x00'}, 0x10) [ 486.148836] IPVS: ftp: loaded support on port[0] = 21 11:47:05 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) unshare(0x10000000) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0xa4) prctl$PR_SET_SECUREBITS(0x1c, 0x36) 11:47:05 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002ff7)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000001000)=""/246) ioctl$EVIOCGREP(r0, 0xc008744c, &(0x7f0000003000)=""/174) ioctl$DRM_IOCTL_RM_MAP(r0, 0x4028641b, &(0x7f0000000000)={&(0x7f0000ffc000/0x1000)=nil, 0x7fffffff, 0x3, 0x20, &(0x7f0000ffa000/0x3000)=nil, 0xab17}) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, &(0x7f0000000040)={0x0, 0x0, 0x6}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r0, 0xc00c642d, &(0x7f0000000080)={r1, 0x80000, r0}) 11:47:05 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) unshare(0x10000000) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0xa4) 11:47:05 executing program 0: syz_open_procfs(0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) socket$netlink(0x10, 0x3, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r3, r4, 0x0, 0x10000000000443) read(r3, &(0x7f00000003c0)=""/72, 0x100000104) 11:47:05 executing program 5: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r1, 0xc008ae88, &(0x7f0000000240)=ANY=[@ANYBLOB="010000800000810e818b418d00df8af4ff4a00000000000000e5ff12a92c743ee9080000884cb2240b45d1"]) 11:47:05 executing program 3: unshare(0x40100) r0 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0xff, 0x4000) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000140)={0x21, 0x3, 0x0, {0x5}}, 0x21) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='map\x00\x00~6\xf5\b\xd2g\xab\fz\xfe\x9f?\x00U\x1de\x9d\xa3p:\xc5{\x8e\xda\xc9\xfc\x8c]\x01\x83B\vg\x8f\xa5\x04\x00'}, 0x10) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0xfffffffffffeffff, 0x200201) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f00000000c0)) 11:47:05 executing program 1: syz_open_dev$cec(&(0x7f0000000480)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) socket(0xa, 0x3, 0x200000000008) syz_genetlink_get_family_id$ipvs(0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) unshare(0x44000600) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), 0x0) setsockopt(r0, 0x5, 0x6, &(0x7f0000000240)="0ad3e82f675cddf1306ee6b7820d8871fa9c7beba9ffddbaca75d268deb0a213e74fd68547953480f753169ee98ec75bb68498acd51dd72d1cfd85e36158b87f0b0497d9b5f4e29cbbddb1d2117686ae70868a1da7ba9e1f932945bcdde7f1a411f2e34d9f6b406d578ef0c007def968d8559d43b727038a02cb986d6e916bf207ca5d8b3adc36414432b07e22b05b3aad2b45fd8c1b284462afdb1d4bfed4504dc84d928c49925d44e27eb1ab2ac6cf6fa97d714dba6e8b25d829f6a435feda", 0xc0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) 11:47:05 executing program 0: syz_open_procfs(0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) socket$netlink(0x10, 0x3, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r3, r4, 0x0, 0x10000000000443) read(r3, &(0x7f00000003c0)=""/72, 0x100000104) 11:47:05 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0xa4) 11:47:05 executing program 5: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r1, 0xc008ae88, &(0x7f0000000240)=ANY=[@ANYBLOB="010000800000810e818b418d00df8af4ff4a00000000000000e5ff12a92c743ee9080000884cb2240b45d1"]) 11:47:05 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002ff7)='/dev/ppp\x00', 0x0, 0x0) ioctl$KDSKBMETA(r0, 0x4b63, &(0x7f0000000000)=0xffffffffffffffc1) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000001000)=""/246) ioctl$EVIOCGREP(r0, 0xc008744c, &(0x7f0000000180)=""/174) [ 486.904071] IPVS: ftp: loaded support on port[0] = 21 11:47:06 executing program 3: unshare(0x20400) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x800, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='map\x00\x00~6\xf5\b\xd2g\xab\fz\xfe\x9f?\x00U\x1de\x9d\xa3p:\xc5{\x8e\xda\xc9\xfc\x8c]\x01\x83B\vg\x8f\xa5\x04\x00'}, 0x10) 11:47:06 executing program 2: ioctl$KVM_CHECK_EXTENSION(0xffffffffffffffff, 0xae03, 0xa4) 11:47:06 executing program 0: syz_open_procfs(0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) socket$netlink(0x10, 0x3, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r3, r4, 0x0, 0x10000000000443) read(r3, &(0x7f00000003c0)=""/72, 0x100000104) 11:47:06 executing program 5: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r1, 0xc008ae88, &(0x7f0000000240)=ANY=[@ANYBLOB="010000800000810e818b418d00df8af4ff4a00000000000000e5ff12a92c743ee9080000884cb2240b45d1"]) 11:47:06 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0xa4) 11:47:06 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002ff7)='/dev/ppp\x00', 0x0, 0x0) timerfd_create(0x7, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000001000)=""/246) openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x14000, 0x0) ioctl$EVIOCGREP(r0, 0xc008744c, &(0x7f0000003000)=""/174) ioctl$KDGKBMODE(r0, 0x4b44, &(0x7f0000000000)) 11:47:06 executing program 1: syz_open_dev$cec(&(0x7f0000000480)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) socket(0xa, 0x3, 0x200000000008) syz_genetlink_get_family_id$ipvs(0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) unshare(0x44000600) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), 0x0) setsockopt(r0, 0x5, 0x6, &(0x7f0000000240)="0ad3e82f675cddf1306ee6b7820d8871fa9c7beba9ffddbaca75d268deb0a213e74fd68547953480f753169ee98ec75bb68498acd51dd72d1cfd85e36158b87f0b0497d9b5f4e29cbbddb1d2117686ae70868a1da7ba9e1f932945bcdde7f1a411f2e34d9f6b406d578ef0c007def968d8559d43b727038a02cb986d6e916bf207ca5d8b3adc36414432b07e22b05b3aad2b45fd8c1b284462afdb1d4bfed4504dc84d928c49925d44e27eb1ab2ac6cf6fa97d714dba6e8b25d829f6a435feda", 0xc0) 11:47:06 executing program 0: syz_open_procfs(0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) socket$netlink(0x10, 0x3, 0x0) bind$alg(0xffffffffffffffff, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r2, r3, 0x0, 0x10000000000443) read(r2, &(0x7f00000003c0)=""/72, 0x100000104) 11:47:06 executing program 3: unshare(0x20400) pipe(&(0x7f0000000100)) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x2000, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000200)='map\x00\x00~6\xf5\b\xd2g\xab\fz\xfe\x9c\x97\x03\rb+\x14\xdc\x9f?\x00U\x1de\x9d\xbbp:\xc5{\x8e\xda\xc9\xfc\x97]\x01\x83B\vg\x8f\xa5\x04\x00\x90\xc9\x82_g\x80\xcb\xc3\x05|\xcd\x98\x1c\xf69', r0}, 0x268) 11:47:06 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(0xffffffffffffffff, 0xae03, 0xa4) 11:47:06 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000240)=ANY=[@ANYBLOB="010000800000810e818b418d00df8af4ff4a00000000000000e5ff12a92c743ee9080000884cb2240b45d1"]) [ 487.696654] IPVS: ftp: loaded support on port[0] = 21 11:47:06 executing program 0: syz_open_procfs(0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) socket$netlink(0x10, 0x3, 0x0) bind$alg(0xffffffffffffffff, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r2, r3, 0x0, 0x10000000000443) read(r2, &(0x7f00000003c0)=""/72, 0x100000104) 11:47:06 executing program 3: unshare(0x20400) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', 0x0, 0x10}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='map\x00\x00~6\xf5\b\xd2g\xab\fz\xfe\x9f?\x00U\x1de\x9d\xa3p:\xc5{\x8e\xda\xc9\xfc\x8c]\x01\x83B\vg\x8f\xa5\x04\x00'}, 0x10) 11:47:06 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002ff7)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000000)=""/246) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f0000000100)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1c}}, @in={0x2, 0x4e22, @broadcast}], 0x20) ioctl$EVIOCGREP(r0, 0xc008744c, &(0x7f0000003000)=""/174) 11:47:07 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0x0) 11:47:07 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000240)=ANY=[@ANYBLOB="010000800000810e818b418d00df8af4ff4a00000000000000e5ff12a92c743ee9080000884cb2240b45d1"]) 11:47:07 executing program 0: syz_open_procfs(0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) socket$netlink(0x10, 0x3, 0x0) bind$alg(0xffffffffffffffff, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r2, r3, 0x0, 0x10000000000443) read(r2, &(0x7f00000003c0)=""/72, 0x100000104) 11:47:07 executing program 3: pselect6(0x40, &(0x7f0000000080)={0x0, 0x7, 0x0, 0x0, 0x100000000000000}, &(0x7f00000000c0)={0x0, 0x4}, &(0x7f0000000100), &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000200)={&(0x7f0000000240), 0x86}) sched_setattr(0x0, &(0x7f0000000180)={0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000001fee)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x2000c2604110, &(0x7f0000000080)) unshare(0x20400) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='map\x00\x00~6\xf5\b\xd2g\xab\fz\xfe\x9f?\x00U\x1de\x9d\xa3p:\xc5{\x8e\xda\xc9\xfc\x8c]\x01\x83B\vg\x8f\xa5\x04\x00'}, 0x10) 11:47:07 executing program 1: syz_open_dev$cec(&(0x7f0000000480)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) socket(0xa, 0x3, 0x200000000008) syz_genetlink_get_family_id$ipvs(0x0) pipe(&(0x7f00000003c0)) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) unshare(0x44000600) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), 0x0) 11:47:07 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002ff7)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000001000)=""/246) r1 = msgget(0x2, 0x104) msgsnd(r1, &(0x7f00000000c0)={0x0, "8b6470fc6b14fd6ebac307bc017cbd"}, 0x17, 0x0) ioctl$EVIOCGREP(r0, 0xc008744c, &(0x7f0000000000)=""/174) 11:47:07 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000240)=ANY=[@ANYBLOB="010000800000810e818b418d00df8af4ff4a00000000000000e5ff12a92c743ee9080000884cb2240b45d1"]) 11:47:07 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0x0) 11:47:07 executing program 0: syz_open_procfs(0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r3, r4, 0x0, 0x10000000000443) read(r3, &(0x7f00000003c0)=""/72, 0x100000104) [ 488.612576] IPVS: ftp: loaded support on port[0] = 21 11:47:07 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r1, 0xc008ae88, &(0x7f0000000240)=ANY=[@ANYBLOB="010000800000810e818b418d00df8af4ff4a00000000000000e5ff12a92c743ee9080000884cb2240b45d1"]) 11:47:07 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0x0) 11:47:07 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") mq_unlink(&(0x7f0000000000)='\x00') r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x41004, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000001000)=""/246) ioctl$EVIOCGREP(r1, 0xc008744c, &(0x7f0000000140)=""/174) 11:47:08 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r1, 0xc008ae88, &(0x7f0000000240)=ANY=[@ANYBLOB="010000800000810e818b418d00df8af4ff4a00000000000000e5ff12a92c743ee9080000884cb2240b45d1"]) 11:47:08 executing program 2: syz_open_dev$cec(&(0x7f0000000480)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) socket(0xa, 0x3, 0x200000000008) syz_genetlink_get_family_id$ipvs(0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) unshare(0x44000600) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), 0x0) setsockopt(r0, 0x5, 0x6, &(0x7f0000000240)="0ad3e82f675cddf1306ee6b7820d8871fa9c7beba9ffddbaca75d268deb0a213e74fd68547953480f753169ee98ec75bb68498acd51dd72d1cfd85e36158b87f0b0497d9b5f4e29cbbddb1d2117686ae70868a1da7ba9e1f932945bcdde7f1a411f2e34d9f6b406d578ef0c007def968d8559d43b727038a02cb986d6e916bf207ca5d8b3adc36414432b07e22b05b3aad2b45fd8c1b284462afdb1d4bfed4504dc84d928c49925d44e27eb1ab2ac6cf6fa97d714dba6e8b25d829f6a435feda", 0xc0) 11:47:08 executing program 1: syz_open_dev$cec(&(0x7f0000000480)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) socket(0xa, 0x3, 0x200000000008) syz_genetlink_get_family_id$ipvs(0x0) pipe(&(0x7f00000003c0)) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) unshare(0x44000600) [ 489.336510] IPVS: ftp: loaded support on port[0] = 21 11:47:08 executing program 3: unshare(0x20400) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000000c0)='map\x00\x00~6\xf5\b\xd2g\xab\fz\xfe\x9f?\x00U\x1de\x9d\xa3p:\xc5{\x8e\xda\xc9\xfc\x8c]\x01\x83B\vg\x8f\xa5\x04\x00'}, 0xfffffffffffffeb7) 11:47:08 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002ff7)='/dev/ppp\x00', 0x200040, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000001000)=""/246) ioctl$sock_proto_private(r0, 0x89eb, &(0x7f0000000000)="aab23d7a8737501dcf9ddd4756463ea6d47332fd7d618d64adc342870bd9cfe588b8d6aa7b34235f690650c1a6a1b0728906fd308e0db2f676fefc81db0b984ba6cbd2") ioctl$EVIOCGREP(r0, 0xc008744c, &(0x7f0000003000)=""/174) 11:47:08 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r1, 0xc008ae88, &(0x7f0000000240)=ANY=[@ANYBLOB="010000800000810e818b418d00df8af4ff4a00000000000000e5ff12a92c743ee9080000884cb2240b45d1"]) 11:47:08 executing program 0: syz_open_procfs(0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r3, r4, 0x0, 0x10000000000443) read(r3, &(0x7f00000003c0)=""/72, 0x100000104) [ 489.583484] IPVS: ftp: loaded support on port[0] = 21 11:47:08 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x201, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000001000)=""/246) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f00000000c0)) ioctl$EVIOCGREP(r0, 0xc008744c, &(0x7f0000003000)=""/174) 11:47:08 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r1, 0xc008ae88, &(0x7f0000000240)=ANY=[@ANYBLOB="010000800000810e818b418d00df8af4ff4a00000000000000e5ff12a92c743ee9080000884cb2240b45d1"]) 11:47:08 executing program 3: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x200002, 0x0) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f00000000c0)=0x1, 0x4) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000300)={0xfffffffffffffffa, 0x81, 0x2, 0x5}, 0x8) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000100)=0x0) ptrace$getregs(0x11, r1, 0xffff, &(0x7f0000000140)=""/178) unshare(0x20400) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r0, &(0x7f00000004c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x101400}, 0xc, &(0x7f0000000480)={&(0x7f00000003c0)={0xbc, r2, 0x10, 0x70bd25, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_SERVICE={0x34, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x2}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x9, 0x10}}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@local}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x600000000}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}, @IPVS_CMD_ATTR_DEST={0x4c, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x6}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x3}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e22}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e21}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x5}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e20}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x2}, @IPVS_DEST_ATTR_WEIGHT={0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}]}, 0xbc}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000200)='@vboxnet1wlan1cpuset\x00', r0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='map\x00\x00~6\xf5\b\xd2g\xab\fz\xfe\x9f?\x00U\x1de\x9d\xa3p:\xc5{\x8e\xda\xc9\xfc\x8c]\x01\x83B\vg\x8f\xa5\x04\x00'}, 0x10) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f0000000280)={'IDLETIMER\x00'}, &(0x7f00000002c0)=0x1e) 11:47:09 executing program 2: syz_open_procfs(0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r3, r4, 0x0, 0x10000000000443) read(r3, &(0x7f00000003c0)=""/72, 0x100000104) 11:47:09 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r1, 0xc008ae88, &(0x7f0000000240)=ANY=[@ANYBLOB="010000800000810e818b418d00df8af4ff4a00000000000000e5ff12a92c743ee9080000884cb2240b45d1"]) 11:47:09 executing program 1: syz_open_dev$cec(&(0x7f0000000480)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) socket(0xa, 0x3, 0x200000000008) syz_genetlink_get_family_id$ipvs(0x0) pipe(&(0x7f00000003c0)) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) 11:47:09 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x210802, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000000)) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000001000)=""/246) ioctl$EVIOCGREP(r0, 0xc008744c, &(0x7f00000000c0)=""/174) ioctl$VIDIOC_S_EDID(r0, 0xc0285629, &(0x7f0000000180)={0x0, 0x7, 0x1, [], &(0x7f0000000040)=0x59}) 11:47:09 executing program 3: unshare(0x10000800) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='map\x00\x00~6\xf5\b\xd2g\xab\fz\xfe\x9f?\x00U\x1de\x9d\xa3p:\xc5{\x8e\xda\xc9\xfc\x8c]\x01\x83B\vg\x8f\xa5\x04\x00'}, 0x10) 11:47:09 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x101803, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000001000)=""/246) ioctl$EVIOCGREP(r0, 0xc008744c, &(0x7f0000000040)=""/174) 11:47:09 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r1, 0xc008ae88, &(0x7f0000000240)=ANY=[@ANYBLOB="010000800000810e818b418d00df8af4ff4a00000000000000e5ff12a92c743ee9080000884cb2240b45d1"]) 11:47:09 executing program 1: syz_open_dev$cec(&(0x7f0000000480)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) socket(0xa, 0x3, 0x200000000008) syz_genetlink_get_family_id$ipvs(0x0) pipe(&(0x7f00000003c0)) 11:47:09 executing program 0: syz_open_procfs(0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r2, r3, 0x0, 0x10000000000443) read(r2, &(0x7f00000003c0)=""/72, 0x100000104) 11:47:09 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002ff7)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000001000)=""/246) ioctl$EVIOCGREP(r0, 0xc008744c, &(0x7f0000003000)=""/174) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000040)='team\x00') ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'ip_vti0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000480)={{{@in=@multicast2, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@loopback}}, &(0x7f0000000580)=0xe8) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f00000006c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000680)={&(0x7f00000005c0)={0x98, r1, 0x22, 0x70bd2a, 0x25dfdbfb, {}, [{{0x8, 0x1, r2}, {0x7c, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r3}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r4}}}]}}]}, 0x98}, 0x1, 0x0, 0x0, 0x4000800}, 0x4000004) 11:47:09 executing program 3: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/mixer\x00', 0x8000, 0x0) ioctl$VT_WAITACTIVE(r0, 0x5607) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x2000000008004, 0x0) ioctl$EVIOCGBITSND(r1, 0x80404532, &(0x7f00000000c0)=""/173) unshare(0x20400) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='map\x00\x00~6\xf5\b\xd2g\xab\fz\xfe\x9f?\x00U\x1de\x9d\xa3p:\xc5{\x8e\xda\xc9\xfc\x8c]\x01\x83B\vg\x8f\xa5\x04\x00'}, 0x10) open$dir(&(0x7f0000000180)='./file0\x00', 0x309000, 0x90) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000001c0), 0x4) 11:47:10 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(0xffffffffffffffff, 0xc008ae88, &(0x7f0000000240)=ANY=[@ANYBLOB="010000800000810e818b418d00df8af4ff4a00000000000000e5ff12a92c743ee9080000884cb2240b45d1"]) 11:47:10 executing program 2: r0 = socket$inet6(0xa, 0x803, 0x4) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, 0x0, 0x0) 11:47:10 executing program 1: syz_open_dev$cec(&(0x7f0000000480)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) socket(0xa, 0x3, 0x200000000008) syz_genetlink_get_family_id$ipvs(0x0) 11:47:10 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(0xffffffffffffffff, 0xc008ae88, &(0x7f0000000240)=ANY=[@ANYBLOB="010000800000810e818b418d00df8af4ff4a00000000000000e5ff12a92c743ee9080000884cb2240b45d1"]) 11:47:10 executing program 4: r0 = getpid() r1 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x101000, 0x0) readahead(r1, 0x9, 0x88) ptrace$getregs(0xc, r0, 0x3, &(0x7f0000000040)=""/97) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002ff7)='/dev/ppp\x00', 0x0, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xff, 0x214480) ioctl$EVIOCGABS20(r2, 0x80184560, &(0x7f0000000100)=""/153) ioctl$EVIOCGPROP(r2, 0xc004743e, &(0x7f0000001000)=""/246) ioctl$EVIOCGSW(r2, 0x8040451b, &(0x7f0000000240)=""/191) ioctl$EVIOCGREP(r2, 0xc008744c, &(0x7f0000003000)=""/174) 11:47:10 executing program 3: unshare(0x20400) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='map\x00\x00~6\xf5\b\xd2g\xab\fz\xfe\x9f?\x00U\x1de\x9d\xa3p:\xc5{\x8e\xda\xc9\xfc\x8c]\x01\x83B\vg\x8f\xa5\x04\x00'}, 0x10) 11:47:10 executing program 2: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={&(0x7f0000000000)=@in6, 0x80, 0x0}, 0x200008c4) sendmsg$kcm(r0, &(0x7f0000005140)={0x0, 0x0, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) 11:47:10 executing program 1: syz_open_dev$cec(&(0x7f0000000480)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) socket(0xa, 0x3, 0x200000000008) 11:47:10 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(0xffffffffffffffff, 0xc008ae88, &(0x7f0000000240)=ANY=[@ANYBLOB="010000800000810e818b418d00df8af4ff4a00000000000000e5ff12a92c743ee9080000884cb2240b45d1"]) 11:47:11 executing program 0: syz_open_procfs(0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r2, r3, 0x0, 0x10000000000443) read(r2, &(0x7f00000003c0)=""/72, 0x100000104) 11:47:11 executing program 1: syz_open_dev$cec(&(0x7f0000000480)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) 11:47:11 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000340), 0x4) 11:47:11 executing program 3: unshare(0x10000) prctl$PR_SET_FPEXC(0xc, 0x20002) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='map\x00\x00~6\xf5\b\xd2g\xab\fz\xfe\x9f?\x00U\x1de\x9d\xa3p:\xc5{\x8e\xda\xc9\xfc\x8c]\x01\x83B\vg\x8f\xa5\x04\x00'}, 0x10) 11:47:11 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000001000)=""/246) ioctl$EVIOCGREP(r0, 0xc008744c, &(0x7f0000000000)=""/174) ioctl$sock_SIOCDELDLCI(r0, 0x8981, &(0x7f0000000100)={'gre0\x00', 0x2}) syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x0, 0x10080) ioctl$KDGETMODE(r0, 0x4b3b, &(0x7f00000000c0)) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) 11:47:11 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, 0x0) 11:47:11 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) 11:47:11 executing program 2: r0 = socket(0x200000000000011, 0x3, 0x0) getsockopt$sock_buf(r0, 0x1, 0x1a, 0x0, &(0x7f0000000340)) 11:47:11 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, 0x0) 11:47:11 executing program 3: unshare(0x20400) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x100, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='map\x00\x00~6\xf5\b\xd2g\xab\fz\xfe\x9f?\x00U\x1de\x9d\xa3p:\xc5{\x8e\xda\xc9\xfc\x8c]\x01\x83B\vg\x8f\xa5\x04\x00', r0}, 0x10) 11:47:11 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f0000000000)=""/139) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000001000)=""/246) ioctl$EVIOCGREP(r0, 0xc008744c, &(0x7f0000000340)=""/174) 11:47:11 executing program 1: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 11:47:12 executing program 0: syz_open_procfs(0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r2, r3, 0x0, 0x10000000000443) read(r2, &(0x7f00000003c0)=""/72, 0x100000104) 11:47:12 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, 0x0) 11:47:12 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fb, &(0x7f0000000500)={0x2, 0x4e23, @multicast2}, 0x10) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)={0x14}, 0x14}}, 0x20000005) r0 = memfd_create(&(0x7f0000000580)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\b\x00\x00\x00\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe9\xaa\x9b\xc3\x14\xd2\xd1y\x1f\x9e\x856\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce(\xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(\xb8\xd9\xa3\xc4p\xf4\\>A\x11U\x99\x8d\xa3\x86\xb7\x1d\x87z\xd3\xc4\xdf\x13/\x97Yy\x8b{\x1df\x8d/\x90\xd3<\xf8\x18\xa4\x88\xcf\x048\xb4\xbe\xfa\xa5\xb7\xd6\xa5&);\x1br\xd2a\xf2\x8b\xa7\x15\xbe\x95\xeb\x1bB\xacoyP\xbb\x1c\xb9S-\xe0oK\xac\x00;S\x8a\x01\xd2\xca<\x04\xaf\x04\x9a\x9d\x84\xa5\x94J>F\xc5V\xc6\xfa\x8e\v\xe1\x82\x03`\xf8\xca\xf4\x89\r^Z44\x91\xeb\xf4$\xf3\x1d\xd5\xbd\xb6ZZ\xd8\xfdS\r\x98\x06/\x9a%m\xcf\xab u\xa6Fw\xde\xb4?\r\xbdK\xfb\xf2\x13\xb3\xfa\x00\xaaP\xc9t\x7f\'\xba\x12', 0x0) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000540)=0x102, 0x72) bind$inet(r1, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000040), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) setxattr$trusted_overlay_origin(&(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x1) sendmsg$nl_generic(r0, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14, 0x12, 0x100, 0x0, 0x25dfdbfb, {0x9}}, 0x14}}, 0x4008080) exit(0x7fffffffbffffffd) mlockall(0x3) 11:47:12 executing program 3: r0 = perf_event_open$cgroup(&(0x7f00000000c0)={0x1, 0x70, 0x93b2, 0x8, 0x20, 0x7ff, 0x0, 0x7, 0x84000, 0x3, 0x2, 0x1, 0x889, 0xaae, 0x3, 0xd4a, 0x9, 0x0, 0x8001, 0x0, 0x0, 0x3, 0x200, 0x204, 0x80, 0x4, 0xde, 0x9, 0x0, 0x6e52, 0x8, 0x1, 0x3, 0x6, 0xfffffffffffff801, 0x5, 0x7ff, 0x8, 0x0, 0x2, 0x6, @perf_bp={&(0x7f0000000080), 0x5}, 0x4001, 0x8, 0x5, 0x5, 0x0, 0xf8, 0x5}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x0) fdatasync(r0) unshare(0x20400) r1 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x2, 0x0, @dev}, &(0x7f0000000180)=0x10, 0x80800) recvfrom$inet(r1, &(0x7f00000001c0)=""/29, 0x1d, 0x10000, &(0x7f0000000200)={0x2, 0x4e22, @loopback}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000000)='map\x00\x00~6\xf5\b\xd2g\xab\fz\xfe\x9f?\x00U\x1de\x9d\xa3p:\xc5{\x8e\xda\xc9\xfc\x8c]\x01\x83B\vg\x8f\xa5\x04\x00'}, 0xfffffedc) 11:47:12 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = dup(r1) write(r2, &(0x7f00000000c0)="1b0000004a001f0fff07f4f9002304000a04f51108000100020100", 0x1b) 11:47:12 executing program 4: syz_open_dev$dspn(&(0x7f0000000140)='/dev/dsp#\x00', 0x0, 0x40) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002ff7)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000001000)=""/246) ioctl$EVIOCGREP(r0, 0xc008744c, &(0x7f0000003000)=""/174) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000000)=r0) setsockopt$inet6_dccp_buf(r0, 0x21, 0x0, &(0x7f0000000040)="d7674681eea5f577b47c96d8cc564255151d93ef9cbf0cf9418402b68ce6c860cc9a1d11acaeef3794f25af1d03a62397bbde42101860f49438c7c83ba617a0141b248a5dffdfc2002aa51cdfd9afac9d354643b3903572c983ad5e49c48ea0adb29a42bb8cf4c4124009ed9d4bc69e018488a45c4a300ba0be95a0a420700dfb0569cde0103918d9e585bc5c0f7801612d000f68bbd606e958f269d44b7f81918c4d2229ef16903b2b375955409b311cb1f7cc84a5720636ed12565f21af347434e6257114832f3ab54e50a7c8b2d4c0697f5838e9e958a239b559017c441c4715bfd436268e350b904a1c5bcbd6c1455ccdeef", 0xf4) 11:47:12 executing program 3: unshare(0x48000004) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='/dev/autofs\x00'}, 0x7) mlock(&(0x7f0000ffa000/0x4000)=nil, 0x4000) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x40, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000c40)=@nat={'nat\x00', 0x19, 0x5, 0xb08, [0x20000100, 0x0, 0x0, 0x20000628, 0x20000658], 0x0, &(0x7f00000000c0), &(0x7f0000001980)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff02000000000000000800000088e5627071300000000000000000000000006272696467655f736c6176655f310000766574683100000000000000000000006970365f767469300000000000000000fb507f6ded34ffff00ffff00ffffffffffff0000000000ff0000e8020000e802000020030000627066000000000000000000000000000000000000000000000000000000000010020000000000000b00000000080704030000000100090404000000000103007a0f0000010004e00700000000080009800000000000010101000000e302400000000000f9ff01040100000009007609c70000000100068f06000000ffff00020200000008000000010001000900c14ec988ffff010064ff000000800900000780000000020007009c000000080000068db200000500020400000000ffff20050600000000000200ff7f0000040053db0000000006005600e500000006001f060008000000009b06040000000200a74606000000010032a60000000003000509890700000400090600000100020000c604000000020008ff01000000000000aa0800000029000560ff030000050009057f0000000300040401000000020007ff0000000001000400ff000000ff7f0700000200000200010101000080f8ff0605030000003f00e608030000000000010809000000060008062dc81d130200020120000000070004b6582f00000000ff0101000000001000000300000005005b017f000000010009020800000001800503ffffff7f0900bd08ff020000800106072f0200000000070606000000090080e10010000007000000ff0700000900010209000000cce40100001000000180010001000100700e200100002000ffff04067f000000a7ae0153090000000400000301000000030007000800000004000807bc0c0000020000500400000000000000fcffffffffffffff636f6e6e6279746573000000000000000000000000000000000000000000000018000000000000000004000000000000020000000000000002010000000000006172707265706c790000000000000000000000000000000000000000000000001000000000000000c7e7c39a830e0000fdffffff000000001b0000002000000088847665746830000000000000000000000076657468315f746f5f7465616d0000007465716c30000000000000000000000074756e6c3000000000000000000000000180c2000003ffff00ffffffaaaaaaaaaaaaffff00ffff0000000801000090010000d80100006c696d69740000000000000000000000000000000000000000000000000000002000000000000000e40000000200000009000000000000000100008001000000e60000000000000069707673000000000000000000000000000000000000000000000000000000002800000000000000ac1414bb000000000000000000000000000000000000000000000000000000004e223a004e220a226172707265706c790000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaabb0000ffffffff0000000049444c4554494d4552000000000000000000000000000000000000000000000028000000000000000401000073797a3000000000000000000000000000000000000000000000000003000000000000005241544545535400000000000000000000000000000000000000000000000000200000000000000073797a3100000000000000000000000001b10000000000000b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000fcffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000002000000ffffffff020000000300000000000000e8ef6272696467653000000000000000000079616d300000000000000000000000006263736630000000000000000000000069703667726530000000000000000000341ac0285f40ff00ff00ff00aaaaaaaaaaaaff00ff000000000070000000d80000002801000000000000000000000000000000000000000000000000000000000000000000000800000000000000ffffffff000000006172707265706c7900000000000000000000000000000000000000000000000010000000000000003629d330f5400000ffffffff0000000049444c4554494d4552000000000000000000000000000000000000000000000028000000000000000000000073797a310000000000000000000000000000000000000000000000000400000000000000030000004100000000006272696467655f736c6176655f30000064756d6d79300000000000000000000065727370616e3000000000000000000065716c000000000000000000000000000180c2000000ff00ff00ffff077cb3519fe0ffffff0000000000a8f922859e89b4c458daf6b7020000a8020000d8020000627066000000000000000000000000000000000000000000000000000000000010020000000000000a000000020020e703000000564406000900000005009f040800000008000008090000000000a70101000000433407870500000086a32048940f000020000463070000005000019dfcffffff0000000701000000fdff00fbff03000001000701ffffffff0300010509000000000008010500000020000001ff070000030009000c00000008000706680000000180ffaf010000000900ff3f06000000018002d508000000ff0f01d208000000ff007a080104000004000504000400000700060908000000060000050000000027e3fd7dff07000004001d03f7ffffff0900c0000200000008000401010000000800010480000000030000000500000013000178ffffffff0700070005000000080000029a010000040007021f000000ff7f0600ff03000000000900ff0100004f2640086c0f0000008007ff0100000076fe0203ff0f00000800808f0000000009000901000000000200020709000000ff0301b504000000280400f2040000000700ff0506000000060002cafaffffff030003d859000000010006206ce8000001000000810000000400440403000000c73700053f00000067f4000603000000c1ff6357020000000600010220000000000006400400000003000704b141ffff9faf00000100000003007a08ff0f00000200000905000000040001045e00000008000403fbffffff2803010920000000800002063f000000000000000600000000000000434c4153534946590000000000000000000000000000000000000000000000000800000000000000700000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000fcffffff01000000110000000000000089ff677265746170300000000000000000006c6f000000000000000000000000000076657468305f746f5f626f6e640000007465616d300000000000000000000000aaaaaaaaaabb00ffff00ffff000000000000ff0000ff00000000a00000001801000050010000766c616e00000000000000000000000000000000000000000000000000000000080000000000000000000100986404024e464c4f470000000000000000000000000000000000000000000000000000005000000000000000ffffff7f001007000100000070277a6a2e635ed2ea50cb301351854d04d291a88f05ef6ce3db1753037e408dcf87d13df974157aa961919953a883985dd525ac91b4d47317248d754d174312000000006172707265706c790000000000000000000000000000000000000000000000001000000000000000ffffffffffff0000ffffffff00000000f8a60868747d109ae9e18c901d8aebeeeea646ae44863a681c9aa2099befd9737909b8f5db646d8fb5374b45c9c1edfab57427a567020b940e8fa98d997c0b15f5442501af641928d7853b8065dad6a1e114f093fed4770b88a9196e3c9555d8f96b56f93262f04acd2eb7c9f0375d81b6153d189422f6ea8b176a3fc6cb64418c322a4013a930d96cbf3696aae78d78df9b96a2fed45fcbea7381302fd24261235b6e226b1335f004c1a9fa2c3c6920d857abb307a01bd66c2f69ebb6424f23823df891a939374a63b93abc693efaaa8a29e970e76fe601a25b6856f758450fcd48c9379372cd818e4037f64f63f791eb16510f5b98e9bcd72a11a131b632835c70e4492dd6c08a018f5dca299704ea68e4fded53446f0e0acb8db3a0b0"]}, 0xca9) 11:47:12 executing program 1: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) capget(&(0x7f0000000080), 0x0) 11:47:12 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002ff7)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000001000)=""/246) ioctl$EVIOCGPROP(r0, 0x80404509, &(0x7f0000000000)=""/254) ioctl$EVIOCGREP(r0, 0xc008744c, &(0x7f0000000140)=""/174) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000100)) 11:47:12 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000240)=ANY=[]) 11:47:12 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x80\x00\x00\x00\'\xd9\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x80\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xe7\xa2\xa4R\x00\x00\x00\x00\x00\x00\x80\x00'}) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) readv(r0, &(0x7f0000000080)=[{&(0x7f0000000300)=""/148, 0x94}], 0x1) 11:47:12 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000240)=ANY=[]) [ 493.793763] input: syz1 as /devices/virtual/input/input34 11:47:13 executing program 0: syz_open_procfs(0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000100), 0x12) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) read(r1, &(0x7f00000003c0)=""/72, 0x100000104) 11:47:13 executing program 3: unshare(0x20400) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x8000, 0x0) ioctl$FIONREAD(r0, 0x541b, &(0x7f00000000c0)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='map\x00\x00~6\xf5\b\xd2g\xab\fz\xfe\x9f?\x00U\x1de\x9d\xa3p:\xc5{\x8e\xda\xc9\xfc\x8c]\x01\x83B\vg\x8f\xa5\x04\x00'}, 0x10) 11:47:13 executing program 4: r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x7fff, 0x400800) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x10000, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000001000)=""/246) ioctl$EVIOCGREP(r1, 0xc008744c, &(0x7f0000003000)=""/174) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f0000000040)=@generic={0x2, 0x1f, 0x4}) keyctl$set_reqkey_keyring(0xe, 0x1) 11:47:13 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000240)=ANY=[]) 11:47:13 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="0a0775b0d5e383e5b3b60ced5c54dbb7295df0df8217ad6200000000000000e6", 0x20) close(r0) 11:47:13 executing program 4: r0 = open(&(0x7f0000000040)='./file0\x00', 0x100, 0x28) write$P9_ROPEN(r0, &(0x7f0000000080)={0x18, 0x71, 0x1, {{0x2, 0x3, 0x4}, 0x1}}, 0x18) ioctl$EVIOCGREP(r0, 0x80084503, &(0x7f0000000140)=""/108) setxattr$trusted_overlay_upper(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.upper\x00', &(0x7f0000000240)={0x0, 0xfb, 0x75, 0x2, 0x2, "e110be5eab50843c3c1fe1a6d7f79062", "a0e3a26c5665861210b574aa78d5e8a11356ba328658729043cd76377b507fc58547ee2c3b74aea10fcc9ba80b3f3c7ab2c1dec5d073bee21236d0dbbddccb6b35b95976e958bbf1f8a95234e696e57a997206b27542a736ec08fb4ab0e18b4d"}, 0x75, 0x2) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002ff7)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000001000)=""/246) setxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.upper\x00', &(0x7f0000001100)={0x0, 0xfb, 0x1015, 0x5, 0x1, "412d3935b200f61710b32505705c6523", "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"}, 0x1015, 0x2) ioctl$EVIOCGREP(r1, 0xc008744c, &(0x7f0000003000)=""/174) ioctl$EVIOCGABS0(r1, 0x80184540, &(0x7f0000000000)=""/33) 11:47:13 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000240)=ANY=[@ANYBLOB]) 11:47:13 executing program 3: unshare(0x20400) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffff9c, 0xc058565d, &(0x7f0000000000)={0x10001, 0xd, 0x4, 0x2002004, {0x0, 0x2710}, {0x3, 0xf, 0xbbe, 0x5, 0x7f, 0x1000, "a34fa436"}, 0x7f, 0x3, @fd=0xffffffffffffffff, 0x4}) sync_file_range(r0, 0x10000, 0x7, 0x0) [ 494.529648] input: syz1 as /devices/virtual/input/input35 11:47:13 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_inet_SIOCGIFDSTADDR(r0, 0x8917, &(0x7f0000000000)={'veth0\x00', {0x2, 0x0, @multicast1}}) 11:47:13 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002ff7)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000001000)=""/246) ioctl$EVIOCGREP(r0, 0xc008744c, &(0x7f0000003000)=""/174) fsetxattr$security_ima(r0, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000040)=@v1={0x2, "d34767c42b99fe86dbed"}, 0xb, 0x2) 11:47:14 executing program 3: r0 = semget(0x3, 0x0, 0x58) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x185000, 0x0) ioctl$KVM_SET_SREGS(r1, 0x4138ae84, &(0x7f0000000100)={{0x5002, 0xd000, 0xf, 0xfff, 0x20, 0x0, 0xffffffff, 0x1, 0x6, 0x10000, 0x6b4f, 0x6}, {0xf000, 0x5000, 0xc, 0x7, 0x21, 0x101, 0x4, 0x5, 0x5, 0x7ff, 0x6, 0xfffffffffffffa4f}, {0xf000, 0x2000, 0x10, 0x0, 0xbb0, 0x2, 0x1, 0x3, 0x4, 0x5, 0x5, 0x83b}, {0x1f001, 0x1, 0xc, 0x8, 0x6c9, 0xd49, 0x2, 0x2, 0x97, 0xbe8, 0x3, 0x8}, {0x10002, 0x0, 0x8, 0x2, 0x1, 0x80, 0xf6, 0x8, 0x1, 0x2, 0xff, 0x4fac}, {0x1000, 0x0, 0x8, 0x3, 0x0, 0xffffffffffff8001, 0x5, 0x100, 0x100000001, 0x4, 0xa99, 0x708b4027}, {0x100000, 0x10000, 0xa, 0x7, 0x1, 0xa3d6, 0x5, 0x80000000, 0x2, 0x1, 0x100, 0x101}, {0x4, 0x0, 0x10, 0x9, 0x0, 0xfffffffffffffffb, 0x5, 0x7f, 0x4, 0x100, 0x7, 0x3}, {0xd004, 0xf000}, {}, 0x40006, 0x0, 0x10f002, 0x20, 0x4, 0x2c00, 0x0, [0x7fffffff, 0x3f, 0x100000000, 0x8]}) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000040)=[0x7, 0x7fff, 0xae2, 0x4000000, 0x371, 0xffffffffffff60df, 0x3, 0x0]) unshare(0x20900) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='map\x00\x00~6\xf5\b\xd2g\xab\fz\xfe\x9f?\x00U\x1de\x9d\xa3p:\xc5{\x8e\xda\xc9\xfc\x8c]\x01\x83B\vg\x8f\xa5\x04\x00'}, 0x0) 11:47:14 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000240)=ANY=[@ANYBLOB]) 11:47:14 executing program 0: syz_open_procfs(0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000100), 0x12) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) read(r1, &(0x7f00000003c0)=""/72, 0x100000104) 11:47:14 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capget(&(0x7f0000000080)={0x20080522}, 0x0) 11:47:14 executing program 3: unshare(0x20400) r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x7, 0x400) setsockopt$inet_dccp_int(r0, 0x21, 0x12, &(0x7f0000000080)=0xff, 0x180) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000200)) getsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, &(0x7f0000000040), &(0x7f00000001c0)=0x4) ioctl$EVIOCGKEYCODE_V2(r0, 0x80284504, &(0x7f00000000c0)=""/207) 11:47:14 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002ff7)='/dev/ppp\x00', 0x84800, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000040)=0xfffffffffffffffb) ioctl$EVIOCGPROP(r0, 0x80404509, &(0x7f0000000080)=""/135) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000280)=""/246) ioctl$EVIOCGREP(r0, 0xc008744c, &(0x7f0000003000)=""/174) syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0xb8b, 0x101000) 11:47:14 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000002c0)={{}, 'syz1\x00'}) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 11:47:14 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000240)=ANY=[@ANYBLOB]) [ 495.533981] input: syz1 as /devices/virtual/input/input36 [ 495.606079] input: syz1 as /devices/virtual/input/input37 11:47:14 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002ff7)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000001000)=""/246) ioctl$EVIOCGREP(r0, 0xc008744c, &(0x7f0000003000)=""/174) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000000)) setsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000040)={0x5, 0x0, 0x5, 0x1, 0x1, 0x4, 0x5, 0x3f, 0x4d8, 0x5, 0x20}, 0xb) dup(r0) 11:47:14 executing program 3: unshare(0x20400) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='map\x00\x00~6\xf5\b\xd2g\xab\fz\xfe\x9f?\x00U\x1de\x9d\xa3p:\xc5{\x8e\xda\xc9\xfc\x8c]\x01\x83B\vg\x8f\xa5\x04\x00'}, 0x10) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x400, 0x0) unlinkat(r0, &(0x7f00000000c0)='./file0\x00', 0x0) 11:47:14 executing program 1: timer_create(0x2, 0x0, &(0x7f0000000500)) timer_settime(0x0, 0x0, 0x0, &(0x7f0000000580)) 11:47:14 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000240)=ANY=[@ANYBLOB="010000800000810e818b418d00df8af4ff4a00000000"]) 11:47:15 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fremovexattr(r0, &(0x7f0000000000)=@known='trusted.overlay.origin\x00') 11:47:15 executing program 2: fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) accept$unix(0xffffffffffffffff, 0x0, 0x0) timer_create(0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, 0x0, 0x1b6) 11:47:15 executing program 0: syz_open_procfs(0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000100), 0x12) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) read(r1, &(0x7f00000003c0)=""/72, 0x100000104) 11:47:15 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capget(&(0x7f0000000080)={0x19980330}, 0x0) 11:47:15 executing program 3: recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000100)=""/246, 0xf6}, {&(0x7f0000000200)=""/185, 0xb9}], 0x2, &(0x7f0000000300)=""/98, 0x62}, 0x40000101) r1 = syz_open_dev$usb(&(0x7f00000004c0)='/dev/bus/usb/00#/00#\x00', 0x3, 0x2040) ioctl$RTC_UIE_OFF(r1, 0x7004) ioctl$FS_IOC_MEASURE_VERITY(r0, 0xc0046686, &(0x7f00000003c0)={0x3, 0x45, "b1c5a607f322071f5e884d558aed2154b6c255ca6f5c9a5ae20623cfb3d2e12e5adcdd6250ba6dd97d741b94936d0b746847a648c8e2052892ded06c6dbb359eb013a388d9"}) unshare(0x20400) r2 = semget$private(0x0, 0x2, 0x40) getsockopt$inet_mreq(r0, 0x0, 0x20, &(0x7f0000000440)={@local, @multicast2}, &(0x7f0000000480)=0x8) semctl$IPC_RMID(r2, 0x0, 0x0) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000500)={0x0, 0x7, 0xffff, 0x32a, 0x3, 0x4, 0x80000001, 0x100000001, {0x0, @in={{0x2, 0x4e22, @broadcast}}, 0x1, 0x9, 0x7ff, 0x56cd, 0x4}}, &(0x7f00000005c0)=0xb0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000600)={r3, 0x1, 0x0, 0xfffffffffffffffe, 0x7}, &(0x7f0000000640)=0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='map\x00\x00~6\xf5\b\xd2g\xab\fz\xfe\x9f?\x00U\x1de\x9d\xa3p:\xc5{\x8e\xda\xc9\xfc\x8c]\x01\x83B\vg\x8f\xa5\x04\x00'}, 0x10) 11:47:15 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x60080, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000040)={0x1, 0x4, 0x7, 0x83, 0x94}) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002ff7)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000001000)=""/246) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$EVIOCGREP(r1, 0xc008744c, &(0x7f0000003000)=""/174) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000080)) 11:47:15 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000240)=ANY=[@ANYBLOB="01"]) 11:47:15 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x80\x00\x00\x00\'\xd9\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x80\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xe7\xa2\xa4R\x00\x00\x00\x00\x00\x00\x80\x00'}) ioctl$UI_SET_SWBIT(r0, 0x4004556d, 0xa) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240)='/dev/hwrng\x00', 0x10000, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'veth1_to_bond\x00', 0x800}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) r3 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$get_persistent(0x16, r2, r3) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) ioctl$KDSETLED(r1, 0x4b32, 0xc68b) r4 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f0000000000)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='\xf2\x1d0\xc3\xf4\xb9\x02\xf5\xd9\xec)4(\xd0r\x9f\b\x15\xbcR\x83glb\xeb\xa8\x01<\x1d\xdcv\xe71B1)\x93V\xaa!\xc2\x95g\xb6\xa5\xbe\xc9\x9e\xac\xf1\xfb\xba\xe4\x17Ej\xdcmo\x88\xd5\x1d\xfe`\x05\xec`^\xf3\x01R\x19\x1e\xfbn/e=\xc2\x95\xcfV,_\xa0\xaf+N\xf7?X\xda\x858\xf1\xd3I\xd1w\xe8\x84\xf7/v\xda\x84\xac`\xa7)\x8e3\xa3\x8a\xfd\f \x03\xc8\xb8Q\xc5\xb55\x0f\xda]fN\x8f\x11\xa1\x16\xd3\xd8-c\x97\xc3~\xbd\xa99_i\xc5S_Jy\xfa\xb1k\r\x8a\x1e\xd9G)\x80J\xbf\x9a4\xd4\x8asPi\x1d', 0x200002, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(r4, 0x8935, &(0x7f0000000180)={'syz_tun\x00', 0x1}) ioctl$sock_inet_SIOCDARP(r4, 0x8953, &(0x7f00000002c0)={{0x2, 0x4e20, @empty}, {0x307, @link_local}, 0x8, {0x2, 0x4e22, @multicast2}, 'irlan0\x00'}) [ 496.554932] input: syz1 as /devices/virtual/input/input38 [ 496.600097] input: syz1 as /devices/virtual/input/input39 11:47:15 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000240)=ANY=[@ANYBLOB="01"]) 11:47:15 executing program 1: dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, 0x0, 0x0) getegid() fchown(0xffffffffffffffff, 0x0, 0x0) faccessat(0xffffffffffffffff, 0x0, 0x4, 0x100) 11:47:15 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGREP(r0, 0x80084503, &(0x7f0000000000)=""/5) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000001000)=""/246) ioctl$EVIOCGREP(r0, 0xc008744c, &(0x7f0000003000)=""/174) 11:47:15 executing program 3: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x4000, 0x0) ioctl$VIDIOC_S_MODULATOR(r0, 0x40445637, &(0x7f00000000c0)={0xffffffffffffffff, "49a3806451c0aff86721d7a0b4b6fa997885033585ba9e4374c83dea3c13a277", 0x1818, 0x1, 0xfff, 0x14, 0x4003}) unshare(0x20400) ioctl$TUNSETLINK(r0, 0x400454cd, 0x325) openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000140)=[@in={0x2, 0x4e23, @remote}], 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='map\x00\x00~6\xf5\b\xd2g\xab\fz\xfe\x9f?\x00U\x1de\x9d\xa3p:\xc5{\x8e\xda\xc9\xfc\x8c]\x01\x83B\vg\x8f\xa5\x04\x00'}, 0x10) 11:47:16 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x80\x00\x00\x00\'\xd9\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x80\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xe7\xa2\xa4R\x00\x00\x00\x00\x00\x00\x80\x00'}) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) ioctl$UI_SET_PROPBIT(r0, 0x4004556e, 0x0) [ 497.109355] input: syz1 as /devices/virtual/input/input40 11:47:16 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000240)=ANY=[@ANYBLOB="01"]) 11:47:16 executing program 0: syz_open_procfs(0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0x12) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r2, r3, 0x0, 0x10000000000443) read(r2, &(0x7f00000003c0)=""/72, 0x100000104) 11:47:16 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x32600) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x3ff800) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) ioctl(0xffffffffffffffff, 0x0, 0x0) 11:47:16 executing program 4: r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000180)=""/33, 0x21) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002ff7)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000001000)=""/246) ioctl$EVIOCGREP(r1, 0xc008744c, &(0x7f0000003000)=""/174) 11:47:16 executing program 3: unshare(0x20400) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='map\x00\x00~6\xf5\b\xd2g\xab\fz\xfe\x9f?\x00U\x1de\x9d\xa3p:\xc5{\x8e\xda\xc9\xfc\x8c]\x01\x83B\vg\x8f\xa5\x04\x00'}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='pids.current\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vga_arbiter\x00', 0x80000, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000000300)='/dev/vbi#\x00', 0x2, 0x2) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, &(0x7f0000000080)={'nat\x00'}, &(0x7f0000000340)=0x78) 11:47:16 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) fdatasync(0xffffffffffffffff) setsockopt$inet_mreqsrc(r2, 0x0, 0x0, &(0x7f0000000040)={@loopback, @broadcast, @multicast1}, 0xc) 11:47:16 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000240)=ANY=[@ANYBLOB="010000800000810e818b418d"]) 11:47:16 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0xa, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x20000015001}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) write$tun(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="010000000000000000006031409200183a00fe80000000000000000000000000ff0200000000000000000000000000010000907800000000fe800000000000000000000000000000"], 0x1) 11:47:16 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000240)=ANY=[@ANYBLOB="0100"]) 11:47:16 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000002c0)={{}, 'syz1\x00'}) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 11:47:16 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x40000083fe, 0x0) r1 = socket$can_raw(0x1d, 0x3, 0x1) fcntl$getown(r1, 0x9) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000001000)=""/246) ioctl$EVIOCGREP(r0, 0xc008744c, &(0x7f0000003000)=""/174) r2 = getpgrp(0xffffffffffffffff) syz_open_procfs(r2, &(0x7f0000000000)='net/icmp6\x00') 11:47:17 executing program 3: r0 = syz_open_dev$admmidi(&(0x7f0000000100)='/dev/admmidi#\x00', 0x0, 0x0) write$P9_RREMOVE(r0, &(0x7f0000000140)={0x7, 0x7b, 0x2}, 0x7) unshare(0x12000000) sysfs$2(0x2, 0x0, &(0x7f00000000c0)=""/55) r1 = semget(0x3, 0x1, 0x201) semctl$GETZCNT(r1, 0x1, 0xf, &(0x7f0000000080)=""/3) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='map\x00\x00~6\xf5\b\xd2g\xab\fz\xfe\x9f?\x00U\x1de\x9d\xa3p:\xc5{\x8e\xda\xc9\xfc\x8c]\x01\x83B\vg\x8f\xa5\x04\x00'}, 0x10) [ 497.943375] input: syz1 as /devices/virtual/input/input42 [ 498.050046] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 498.056830] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 498.087385] input: syz1 as /devices/virtual/input/input43 11:47:17 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000240)=ANY=[@ANYBLOB="0100"]) [ 498.421720] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 11:47:17 executing program 1: r0 = socket(0x10, 0x3, 0x0) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) sendto(r0, &(0x7f0000000140)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) 11:47:17 executing program 0: syz_open_procfs(0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0x12) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r2, r3, 0x0, 0x10000000000443) read(r2, &(0x7f00000003c0)=""/72, 0x100000104) 11:47:17 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000240)=ANY=[@ANYBLOB="0100"]) 11:47:17 executing program 3: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x4a0000, 0x0) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000500)={"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"}) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x80000, 0x0) sendmsg$tipc(r1, &(0x7f00000004c0)={&(0x7f0000000180)=@id={0x1e, 0x3, 0x3, {0x4e20}}, 0x10, &(0x7f0000000440)=[{&(0x7f00000001c0)="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", 0xfd}, {&(0x7f00000002c0)="74b0dfa9b9b12631f4fca7730e2a8885406a33cc3ca2bbb976c46af264821d37c6b308102c2062db3a241b4703c86ac1356e788376c723639a440360f62ff656c9fac378f7272f1cc16fb15bfb58b1f2a603ae", 0x53}, {&(0x7f0000000340)="b9623b7f5db1fd0b0aa17264129f69", 0xf}, {&(0x7f0000000380)="770e39db01f03a6b752101e6f656197d47a5331400e3689b8d16046634195c6ea352e925237d5b49324a3f3ffd022c10361fdcd1456ff0f8d27e31", 0x3b}, {&(0x7f00000003c0)="17943333f498c80d65ef5a7446975c95fb555db8e6fc386ae6b0f633a08f36b23ae1c662aee629897823819ecebf5626a90aa6", 0x33}, {&(0x7f0000000400)="53d33a3c5b086d836eb4423a8e157f986b980e8e3991bf3cc912d7c98c4c09cc8c0705d59c3c76f6b4d0f9796caa78f347b255d88a", 0x35}], 0x6, 0x0, 0x0, 0x8800}, 0x810) unshare(0x20400) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000080)={0x0}) ioctl$DRM_IOCTL_NEW_CTX(r1, 0x40086425, &(0x7f00000000c0)={r2, 0x3}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='map\x00\x00~6\xf5\b\xd2g\xab\fz\xfe\x9f?\x00U\x1de\x9d\xa3p:\xc5{\x8e\xda\xc9\xfc\x8c]\x01\x83B\vg\x8f\xa5\x04\x00'}, 0x10) 11:47:17 executing program 3: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x400, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r0, &(0x7f00000003c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10200010}, 0xc, &(0x7f0000000380)={&(0x7f0000000140)={0x23c, r1, 0x20, 0x70bd25, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x14, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}]}, @TIPC_NLA_BEARER={0x20, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x4}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x4}, @TIPC_NLA_BEARER_NAME={0xc, 0x1, @l2={'ib', 0x3a, 'bpq0\x00'}}]}, @TIPC_NLA_NODE={0x10, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}]}, @TIPC_NLA_MON={0x44, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0xfffffffffffffffc}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7fff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xfffffffffffffffc}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x101}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x20}]}, @TIPC_NLA_NODE={0x18, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8}]}, @TIPC_NLA_MEDIA={0xec, 0x5, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}]}, @TIPC_NLA_MEDIA_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xdb}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7f}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xf19}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfff}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10001}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xc00000000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}]}]}, @TIPC_NLA_LINK={0x54, 0x4, [@TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3ff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x32}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x81}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x243}]}]}, @TIPC_NLA_LINK={0x48, 0x4, [@TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3ff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffff7fffffff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x200}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}]}]}]}, 0x23c}, 0x1, 0x0, 0x0, 0x10}, 0x8010) unshare(0x20400) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='map\x00\x00~6\xf5\b\xd2g\xab\fz\xfe\x9f?\x00U\x1de\x9d\xa3p:\xc5{\x8e\xda\xc9\xfc\x8c]\x01\x83B\vg\x8f\xa5\x04\x00'}, 0x10) 11:47:17 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000240)=ANY=[@ANYBLOB="01000080000081"]) 11:47:18 executing program 2: r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000400)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000000ac0)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, r0) keyctl$setperm(0x5, r1, 0x2000000) 11:47:18 executing program 3: unshare(0x20400) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_user\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000000c0)={0x0, 0x7, 0x1f}, 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='map\x00\x00~6\xf5\b\xd2g\xab\fz\xfe\x9f?\x00U\x1de\x9d\xa3p:\xc5{\x8e\xda\xc9\xfc\x8c]\x01\x83B\vg\x8f\xa5\x04\x00'}, 0x10) 11:47:18 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000240)=ANY=[@ANYBLOB="0100"]) 11:47:18 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00009e1000)='./file0\x00', 0x8040, 0x0) fcntl$setlease(r0, 0x400, 0x3) 11:47:18 executing program 0: syz_open_procfs(0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0x12) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r2, r3, 0x0, 0x10000000000443) read(r2, &(0x7f00000003c0)=""/72, 0x100000104) 11:47:18 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002ff7)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000100)=""/246) ioctl$EVIOCGREP(r0, 0xc008744c, &(0x7f0000003000)=""/174) 11:47:19 executing program 1: syz_emit_ethernet(0x2a, &(0x7f0000000000)={@link_local, @link_local, [], {@arp={0x806, @ether_ipv4={0xffffff1f, 0x800, 0x6, 0x4, 0x0, @local, @loopback, @link_local, @remote}}}}, 0x0) 11:47:19 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000240)=ANY=[@ANYBLOB="0100"]) 11:47:19 executing program 3: r0 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x3, 0x80000) write$P9_RLERRORu(r0, &(0x7f0000000140)={0x37, 0x7, 0x1, {{0x2a, 'map\x00\x00~6\xf5\b\xd2g\xab\fz\xfe\x9f?\x00U\x1de\x9d\xa3p:\xc5{\x8e\xda\xc9\xfc\x8c]\x01\x83B\vg\x8f\xa5\x04\x00'}, 0x7}}, 0x37) unshare(0x20400) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='map\x00\x00~6\xf5\b\xd2g\xab\fz\xfe\x9f?\x00U\x1de\x9d\xa3p:\xc5{\x8e\xda\xc9\xfc\x8c]\x01\x83B\vg\x8f\xa5\x04\x00'}, 0x10) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x101200, 0x0) ioctl$SCSI_IOCTL_DOORUNLOCK(r1, 0x5381) ioctl$SG_SET_COMMAND_Q(r1, 0x2271, &(0x7f00000000c0)=0x1) writev(r1, &(0x7f0000000380)=[{&(0x7f0000000200)="45949ccc6117b5c801ec84b73d28346d235c9a6a590ebd69376210b800d471a98e873baa545ed6bbbd403efbc7f33ac45e0c9a6157fe50e9436397b01bd82b3a2611df28533ec077630b6d74ad758dcba185136e3400458e536086eded83e37389e25c173bbda0db4e15342374f35150179f18d9c8d9772f833489ef5a601fda7ecdda88265e552465e1b3391b4684eb67507329b00cf1e4572d13dc", 0x9c}, {&(0x7f00000002c0)="bb2fab33e46068e6c641d9870dbb3f15b1d9e2447e501e32c97ff5cb4b6854d551acbf4242d6d523cbb54517a999adda25cae16c9f15c9125f64427887184ec8e097818029a734e09920540bb521be2aa2aa8f0d8b1173c10c8329ca9932f456818b72ab1de22acac2c9b21d061b11cf6dfd203e1e3cb888c1d690500390b6297789e1a22c105e72020e591c5ccd168c9bd8332147775e551289f922e1f2ae6170f84a2a", 0xa4}], 0x2) 11:47:19 executing program 2: r0 = creat(&(0x7f0000000000)='./file0\x00', 0xc) unlinkat(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_void(r0, 0x1, 0x0, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) lsetxattr$security_evm(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, 0x0, 0x0) write$P9_RUNLINKAT(r0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, 0x0, 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, 0x0) setxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) readv(r0, &(0x7f00000012c0), 0x0) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) 11:47:19 executing program 4: r0 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0xff, 0x8000) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x144, r1, 0x81f, 0x70bd2c, 0x25dfdbfe, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x4004001) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002ff7)='/dev/ppp\x00', 0x0, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) ioctl$EVIOCGPROP(r2, 0xc004743e, &(0x7f0000001000)=""/246) ioctl$EVIOCGREP(r2, 0xc008744c, &(0x7f0000003000)=""/174) 11:47:19 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, 0x0, 0x6c8) 11:47:19 executing program 2: timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000240)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = gettid() r2 = socket$inet(0x2, 0x1, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0xfffffffffffffffc, 0x8972, 0xffffffffffffffff, 0x0) connect$inet(r2, &(0x7f00000e5000)={0x2, 0x0, @loopback}, 0x10) connect$inet(r2, &(0x7f00009322c4)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) connect$inet(r2, &(0x7f0000000080)={0x2, 0x0, @loopback}, 0x10) dup2(r0, r2) tkill(r1, 0x1000000000016) 11:47:19 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000240)=ANY=[@ANYBLOB="0100"]) 11:47:19 executing program 3: unshare(0x20400) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='map\x00\x00~6\xf5\b\xd2g\xab\fz\xfe\x9f?\x00U\x1de\x9d\xa3p:\xc5{\x8e\xda\xc9\xfc\x8c]\x01\x83B\vg\x8f\xa5\x04\x00'}, 0x10) getsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000080), &(0x7f00000000c0)=0x8) 11:47:19 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') lseek(r0, 0x0, 0x2000000000000004) 11:47:20 executing program 0: syz_open_procfs(0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r3, r4, 0x0, 0x10000000000443) read(r3, &(0x7f00000003c0)=""/72, 0x100000104) 11:47:20 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x10008, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000001000)=""/246) ioctl$EVIOCGREP(r0, 0xc008744c, &(0x7f0000003000)=""/174) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='trusted.overlay.nlink\x00', &(0x7f0000000080)='/dev/ppp\x00', 0x9, 0x2) 11:47:20 executing program 1: socket(0x10, 0x3, 0x0) semop(0x0, &(0x7f0000000040)=[{0x0, 0xfffffffffffff0bd}], 0x1) semtimedop(0x0, &(0x7f0000000040), 0x1b9, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x0) 11:47:20 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x800000000009, 0x1, &(0x7f0000000240)=@raw=[@jmp={0x5, 0x0, 0x4}], &(0x7f0000000000)='GPL\x00', 0x1, 0x99, &(0x7f0000000380)=""/153}, 0x48) 11:47:20 executing program 3: socketpair(0x3, 0x807, 0x2, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000100)={0x0, @aes256}) unshare(0x20400) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x8000, 0x0) ioctl$UI_DEV_CREATE(r1, 0x5501) setsockopt$inet_sctp_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000140)=0x3ff, 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='map\x00\x00~6\xf5\b\xd2g\xab\fz\xfe\x9f?\x00U\x1de\x9d\xa3p:\xc5{\x8e\xda\xc9\xfc\x8c]\x01\x83B\vg\x8f\xa5\x04\x00'}, 0x2) 11:47:20 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000240)=ANY=[@ANYBLOB="0100008000"]) 11:47:20 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x0, 0x0, 0x0) 11:47:20 executing program 1: socket(0x10, 0x3, 0x0) semop(0x0, &(0x7f0000000040)=[{0x0, 0xfffffffffffff0bd}], 0x1) semtimedop(0x0, &(0x7f0000000040), 0x1b9, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x0) 11:47:20 executing program 4: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x202200, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000740)=0x14) getresuid(&(0x7f0000000780)=0x0, &(0x7f00000007c0), &(0x7f0000000800)) setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000840)={{{@in6=@local, @in6=@mcast1, 0x4e21, 0x401, 0x4e20, 0x6, 0x0, 0x80, 0xa0, 0x32, r1, r2}, {0xfffffffffffffffe, 0x6, 0x0, 0x1f, 0x2d88, 0x8000, 0x4, 0x4}, {0x20000000, 0x1, 0x6, 0x3}, 0x4, 0x6e6bb0, 0x0, 0x0, 0x3, 0x1}, {{@in6=@mcast1, 0x4d3, 0x3c}, 0x2, @in6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x16}}, 0x3506, 0x3, 0x3, 0x4, 0x7f, 0x4, 0xd81c}}, 0xe8) r3 = dup(r0) ioctl$BLKIOMIN(r3, 0x1278, &(0x7f0000000040)) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002ff7)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r4, 0xc004743e, &(0x7f0000001000)=""/246) ioctl$EVIOCGREP(r4, 0xc008744c, &(0x7f0000003000)=""/174) 11:47:20 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000240)=ANY=[@ANYBLOB="0100008000"]) 11:47:20 executing program 3: unshare(0x10000300) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='map\x00\x00~6\xf5\b\xd2g\xab\fz\xfe\x9f?\x00U\x1de\x9d\xa3p:\xc5{\x8e\xda\xc9\xfc\x8c]\x01\x83B\vg\x8f\xa5\x04\x00'}, 0x10) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x40, 0x2) getsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000140)={0x0, 0xe2}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000001c0)={r3, @in6={{0xa, 0x4e20, 0x0, @ipv4={[], [], @broadcast}, 0x10000}}, 0xd, 0x1f, 0x3f0, 0x80, 0xa0}, 0x98) ioctl$RTC_PIE_OFF(r0, 0x7006) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000080)={{0x2, 0x4e20, @loopback}, {0x7, @dev={[], 0xe}}, 0x48, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x16}}, 'syz_tun\x00'}) sigaltstack(&(0x7f0000ffd000/0x1000)=nil, 0x0) 11:47:20 executing program 2: socket(0x10, 0x3, 0x0) semop(0x0, &(0x7f0000000040)=[{0x0, 0xfffffffffffff0bd}], 0x1) semtimedop(0x0, &(0x7f0000000040), 0x1b9, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x0) 11:47:21 executing program 0: syz_open_procfs(0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r3, r4, 0x0, 0x10000000000443) read(r3, &(0x7f00000003c0)=""/72, 0x100000104) 11:47:21 executing program 1: socket(0x10, 0x3, 0x0) semop(0x0, &(0x7f0000000040)=[{0x0, 0xfffffffffffff0bd}], 0x1) semtimedop(0x0, &(0x7f0000000040), 0x1b9, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x0) 11:47:21 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x975198654314ff88, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, &(0x7f0000000040)) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002ff7)='/dev/ppp\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_G_DV_TIMINGS(r1, 0xc0845658, &(0x7f0000000080)={0x0, @reserved}) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000001000)=""/246) ioctl$EVIOCGREP(r1, 0xc008744c, &(0x7f0000003000)=""/174) ioctl$SG_GET_REQUEST_TABLE(r1, 0x2286, &(0x7f0000000140)) 11:47:21 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000240)=ANY=[@ANYBLOB="010000"]) 11:47:21 executing program 3: unshare(0x20400) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='map\x00\x00~6\xf5\b\xd2g\xab\fz\xfe\x9f?\x00U\x1de\x9d\xa3p:\xc5{\x8e\xda\xc9\xfc\x8c]\x01\x83B\vg\x8f\xa5\x04\x00'}, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000800}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x24, r1, 0x510, 0x70bd29, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}]}, 0x24}, 0x1, 0x0, 0x0, 0x8004}, 0x4081) r2 = syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x20240) ioctl$BLKBSZGET(r2, 0x80081270, &(0x7f0000000240)) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x4e22, 0x3, @ipv4={[], [], @rand_addr=0x24fbbc1d}, 0x1f}, @in={0x2, 0x4e23, @loopback}, @in={0x2, 0x4e20, @empty}], 0x3c) ioctl$EVIOCGPHYS(r2, 0x80404507, &(0x7f0000000280)=""/137) 11:47:21 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, 0x0) dup3(r0, r1, 0x0) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, 0x0) sendto$unix(r1, &(0x7f0000000000)="f8", 0x1, 0x0, 0x0, 0x0) 11:47:21 executing program 1: socket(0x10, 0x3, 0x0) semop(0x0, &(0x7f0000000040)=[{0x0, 0xfffffffffffff0bd}], 0x1) semtimedop(0x0, &(0x7f0000000040), 0x1b9, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x0) 11:47:21 executing program 2: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) vmsplice(r0, &(0x7f0000001300)=[{&(0x7f0000000100)='\x00', 0x1}], 0x1, 0x4) 11:47:21 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000240)=ANY=[@ANYBLOB="010000"]) 11:47:21 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002ff7)='/dev/ppp\x00', 0x1, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000001000)=""/246) ioctl$EVIOCGREP(r0, 0xc008744c, &(0x7f0000003000)=""/174) 11:47:21 executing program 3: unshare(0x20400) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uhid\x00', 0x2, 0x0) fremovexattr(r0, &(0x7f00000000c0)=@random={'user.', 'map\x00\x00~6\xf5\b\xd2g\xab\fz\xfe\x9f?\x00U\x1de\x9d\xa3p:\xc5{\x8e\xda\xc9\xfc\x8c]\x01\x83B\vg\x8f\xa5\x04\x00'}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='map\x00\x00~6\xf5\b\xd2g\xab\fz\xfe\x9f?\x00U\x1de\x9d\xa3p:\xc5{\x8e\xda\xc9\xfc\x8c]\x01\x83B\vg\x8f\xa5\x04\x00'}, 0x10) 11:47:21 executing program 1: socket(0x10, 0x3, 0x0) semop(0x0, &(0x7f0000000040)=[{0x0, 0xfffffffffffff0bd}], 0x1) semctl$IPC_RMID(0x0, 0x0, 0x0) 11:47:21 executing program 0: syz_open_procfs(0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r3, r4, 0x0, 0x10000000000443) read(r3, &(0x7f00000003c0)=""/72, 0x100000104) 11:47:21 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') lseek(r0, 0x0, 0x2000000000000003) 11:47:21 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000240)=ANY=[@ANYBLOB="010000"]) 11:47:21 executing program 1: socket(0x10, 0x3, 0x0) semctl$IPC_RMID(0x0, 0x0, 0x0) 11:47:21 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002ff7)='/dev/ppp\x00', 0x101000, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000001000)=""/246) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0x1, &(0x7f00000000c0)={&(0x7f0000000080)={0x271, r1, 0x0, 0x70bd26, 0x25dfdbfe, {}, ["", "", "", ""]}, 0x4d2}, 0x1, 0x0, 0x0, 0x10}, 0x40000) ioctl$EVIOCGREP(r0, 0xc008744c, &(0x7f0000003000)=""/174) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000140)='trusted.overlay.upper\x00', &(0x7f0000000180)={0x0, 0xfb, 0xb9, 0x0, 0x40, "7d2e63c08b1d91f112f097913c1ffa95", "4f0075c645aa0c36b3cd5559e4532fbf941d0c561c4cf2a9add88c78c693d46d9c6520b38871529c59283fff6cc8a425a71bc485922134003e096238a8a7c782b71aa0a4cb05567a4b2163d3e3e05564a90c110ca68febbad5d56a8609bbcaa37984d28d5e98ddc6239fc3331180ea0404082cfaa1562e15b0de400d42ff90333bdec7809b930841716d3430bba6adee2ca92fcc900ec55e7a1ffe19a930518949b22630"}, 0xb9, 0x3) getsockname$tipc(r0, &(0x7f0000000240)=@id, &(0x7f0000000280)=0x10) 11:47:21 executing program 3: unshare(0x20400) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='map\x00\x00~6\xf5\b\xd2g\xab\fz\xfe\x9f?\x00U\x1de\x9d\xa3p:\xc5{\x8e\xda\xc9\xfc\x8c]\x01\x83B\vg\x8f\xa5\x04\x00'}, 0x10) r0 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x200, 0x10800) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffff9c, 0x84, 0x1, &(0x7f00000000c0)={0x0, 0x10001, 0xfff, 0x200, 0x1, 0x10001}, &(0x7f0000000100)=0x14) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000140)={r1, 0x8001, 0x3, 0xd3}, &(0x7f0000000180)=0x10) 11:47:22 executing program 1: semctl$IPC_RMID(0x0, 0x0, 0x0) 11:47:22 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000001c0)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000005c0), 0x1000) readlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000500)=""/180, 0xb4) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000000000000000000000000000b08956d069e000000002066ce654d316e6f646576656d3100f9ff00000000000000000000000000000000000001000000000000002c00000000000008000000000000000000000000000000001c00000000000051a717000418b9b3cc002b737973740400000065746367726f757024"], 0x90) llistxattr(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) 11:47:22 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000240)=ANY=[@ANYBLOB="01000080"]) 11:47:22 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 11:47:22 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002ff7)='/dev/ppp\x00', 0x0, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000040)={{0x2, 0x4e22, @remote}, {0x307, @local}, 0x48, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xa}}, 'veth0_to_bond\x00'}) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000001000)=""/246) ioctl$EVIOCGREP(r0, 0xc008744c, &(0x7f0000003000)=""/174) ioctl$SIOCSIFMTU(r0, 0x8922, &(0x7f0000000000)={'vcan0\x00', 0x2}) 11:47:22 executing program 3: unshare(0x20400) r0 = accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080)={0xa, 0x0, 0x0, @local}, &(0x7f00000000c0)=0x1c, 0x80000) recvmmsg(r0, &(0x7f0000004940)=[{{&(0x7f0000000100)=@l2, 0x80, &(0x7f0000000200)=[{&(0x7f0000000180)=""/37, 0x25}, {&(0x7f00000001c0)=""/31, 0x1f}], 0x2}, 0x62}, {{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000240)=""/81, 0x51}, {&(0x7f00000002c0)=""/28, 0x1c}, {&(0x7f0000000300)=""/79, 0x4f}, {&(0x7f0000000380)=""/177, 0xb1}, {&(0x7f0000000440)=""/45, 0x2d}, {&(0x7f0000000480)=""/95, 0x5f}, {&(0x7f0000000500)=""/39, 0x27}, {&(0x7f0000000540)=""/199, 0xc7}, {&(0x7f0000000640)=""/243, 0xf3}, {&(0x7f0000000740)=""/136, 0x88}], 0xa, &(0x7f00000008c0)=""/198, 0xc6}, 0x1000}, {{0x0, 0x0, &(0x7f0000002ec0)=[{&(0x7f00000009c0)=""/4096, 0x1000}, {&(0x7f00000019c0)=""/44, 0x2c}, {&(0x7f0000001a00)=""/209, 0xd1}, {&(0x7f0000001b00)=""/250, 0xfa}, {&(0x7f0000001c00)=""/59, 0x3b}, {&(0x7f0000001c40)=""/126, 0x7e}, {&(0x7f0000001cc0)=""/4096, 0x1000}, {&(0x7f0000002cc0)=""/230, 0xe6}, {&(0x7f0000002dc0)=""/66, 0x42}, {&(0x7f0000002e40)=""/79, 0x4f}], 0xa}, 0x6}, {{&(0x7f0000002f80), 0x80, &(0x7f0000003180)=[{&(0x7f0000003000)=""/9, 0x9}, {&(0x7f0000003040)=""/75, 0x4b}, {&(0x7f00000030c0)=""/162, 0xa2}], 0x3, &(0x7f00000031c0)=""/101, 0x65}, 0x3}, {{&(0x7f0000003240)=@nl=@unspec, 0x80, &(0x7f00000033c0)=[{&(0x7f00000032c0)=""/142, 0x8e}, {&(0x7f0000003380)=""/62, 0x3e}], 0x2, &(0x7f0000003400)=""/4096, 0x1000}, 0x1000}, {{&(0x7f0000004400)=@xdp, 0x80, &(0x7f0000004600)=[{&(0x7f0000004480)=""/107, 0x6b}, {&(0x7f0000004500)=""/82, 0x52}, {&(0x7f0000004580)=""/112, 0x70}], 0x3, &(0x7f0000004640)=""/112, 0x70}, 0x10001}, {{&(0x7f00000046c0)=@in={0x2, 0x0, @multicast2}, 0x80, &(0x7f0000004900)=[{&(0x7f0000004740)=""/177, 0xb1}, {&(0x7f0000004800)=""/248, 0xf8}], 0x2}, 0x7}], 0x7, 0x10000, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='map\x00\x00~6\xf5\b\xd2g\xab\fz\xfe\x9f?\x00U\x1de\x9d\xa3p:\xc5{\x8e\xda\xc9\xfc\x8c]\x01\x83B\vg\x8f\xa5\x04\x00'}, 0x10) r1 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000004b00)='/dev/video37\x00', 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000004c40)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$PPPOEIOCDFWD(r2, 0xb101, 0x0) ioctl$VIDIOC_S_PARM(r1, 0xc0cc5616, &(0x7f0000004b40)={0xf, @capture={0x1000, 0x1, {0x1, 0x800000000}, 0x3ff, 0x401}}) [ 503.385963] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 11:47:22 executing program 0: syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r3, r4, 0x0, 0x10000000000443) read(r3, &(0x7f00000003c0)=""/72, 0x100000104) 11:47:22 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000240)=ANY=[@ANYBLOB="010000"]) 11:47:22 executing program 3: unshare(0x20000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='map\x00\x00~6\xf5\b\xd2g\xab\fz\xfe\x9f?\x00U\x1de\x9d\xa3p:\xc5{\x8e\xda\xc9\xfc\x8c]\x01\x83B\vg\x8f\xa5\x04\x00'}, 0x10) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x111000, 0x0) ioctl$PPPIOCGFLAGS(r0, 0x8004745a, &(0x7f00000000c0)) 11:47:22 executing program 1: r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) vmsplice(r0, &(0x7f00000002c0)=[{0x0}], 0x1, 0x0) 11:47:22 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002ff7)='/dev/ppp\x00', 0x0, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000000)=0x0) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000080)={0x4, 0x63ed, 0x8, 0x1000}, 0x63efaeece5942189) sched_rr_get_interval(r1, &(0x7f0000000040)) timer_create(0x3, &(0x7f00000001c0)={0x0, 0x39, 0x5, @thr={&(0x7f00000000c0)="855078cb434c412014c0a5e3e1360f4b66076ecaeece7ecab5afcbc33348f189df6e5f9695488e014afdd0dfd49642248e725682e4b0c83b506f5c574b6bec98d28bfcaa57d122aebc2d9082fb412392492965931f94d21e9aca507e3b1472745c2abd1734e357a4b4933043681470751141bbce80f444873e7e3c6f50314f17214f3f774320ae4c6f974e59bf865066c713d4c11bf7b005507a20899153521c6d08a5ca22cc5c22", &(0x7f0000000180)="3d5956d40da79da443c425b180246ef8d298ef859cfe30d3b4b3b2ba1e0353038a3269490b36f355cce59d2cc714418d7c18deb97f71a87b2a8a8df19fd2"}}, &(0x7f0000000200)=0x0) timer_gettime(r2, &(0x7f0000000240)) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000001000)=""/246) ioctl$EVIOCGREP(r0, 0xc008744c, &(0x7f0000003000)=""/174) 11:47:23 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x3ff800) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) 11:47:23 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000240)=ANY=[@ANYBLOB="010000"]) 11:47:23 executing program 2: syz_emit_ethernet(0x1, &(0x7f0000000380)=ANY=[@ANYBLOB="0180c2000003aaaaaaaaaaaa0200000186dd000000000000000000000000010180c2000000fe8000000000000000000000000000bb"], 0x0) 11:47:23 executing program 3: unshare(0x20400) r0 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x5, 0x82) dup(r0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000000c0)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) accept$packet(r0, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000001c0)=0x14) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000140)={0x7, 0x8, 0xfa00, {r1, 0x8}}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='map\x00\x00~6\xf5\b\xd2g\xab\fz\xfe\x9f?\x00U\x1de\x9d\xa3p:\xc5{\x8e\xda\xc9\xfc\x8c]\x01\x83B\vg\x8f\xa5\x04\x00'}, 0x10) 11:47:23 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000240)=ANY=[@ANYBLOB="010000"]) 11:47:23 executing program 4: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$update(0x2, r0, &(0x7f00000000c0)="179b6b078052a1fec4aaeb0e31b0a1941c1fa92fdbc1ca46e306a2fbc88c1de7b0d104c97949a8f7ecfd880362d33254d1d1a2e3ca726ba2f9a609719b60ab598628f9dc80dc9cd5bb00e4844bc931b94ecd9ad020168a147bc60708f39b6a59f27d6a", 0x63) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0xffffffeffffffbff, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000001000)=""/246) ioctl$EVIOCGREP(r1, 0xc008744c, &(0x7f0000003000)=""/174) getpeername$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0}, &(0x7f0000000180)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000200)={'vcan0\x00', r2}) sendmsg$rds(r1, &(0x7f0000000980)={&(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000280)=""/191, 0xbf}, {&(0x7f0000000340)=""/77, 0x4d}, {&(0x7f0000001100)=""/4096, 0x1000}, {&(0x7f00000003c0)=""/16, 0x10}, {&(0x7f0000000400)=""/58, 0x3a}, {&(0x7f0000000440)=""/68, 0x44}], 0x6, &(0x7f00000007c0)=ANY=[@ANYBLOB="580000000000000014010000080000000100000000000100", @ANYPTR=&(0x7f0000000540)=ANY=[@ANYBLOB="0500000000000000"], @ANYPTR=&(0x7f0000000580)=ANY=[@ANYBLOB="ff7f000000000000"], @ANYBLOB="0400000000000000c904000000000000b30c000000000000f1c769290000000028000000000000000100000000000000580000000000000014010000070000000900000004000000", @ANYPTR=&(0x7f00000005c0)=ANY=[@ANYBLOB="0600000000000000"], @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="0000008000000000"], @ANYBLOB="0100000000000000080000000000000001006d000000000000000000001401000009000000010000000100000000000000000000000000000000", @ANYPTR=&(0x7f0000000640)=ANY=[@ANYBLOB="8b0a000000000000"], @ANYPTR=&(0x7f0000000680)=ANY=[@ANYBLOB='!\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="010000000000000002000000000000000900000000000000209d0000000000000400000000000000018000000000000058000000000000001401000006000000ff07000000010000", @ANYPTR=&(0x7f00000006c0)=ANY=[@ANYBLOB='?\x00\x00\x00\x00\x00\x00\x00'], @ANYPTR=&(0x7f0000000700)=ANY=[@ANYBLOB="0080000000000000"], @ANYBLOB="0700000000000000040000000000000055040000000000000180000000000000fefe64c0d2b39dabcd0600000000000030000000000000001401000003000000", @ANYPTR=&(0x7f0000000740)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB='5\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000780)=ANY=[@ANYBLOB='\x00'], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x190, 0x4000001}, 0x4000000) ioctl$VIDIOC_REQBUFS(r1, 0xc0145608, &(0x7f00000001c0)={0x45d00000, 0x9, 0x1}) 11:47:23 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) signalfd(0xffffffffffffffff, 0x0, 0x0) 11:47:23 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x14, 0x16, 0x113, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) 11:47:23 executing program 0: syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r3, r4, 0x0, 0x10000000000443) read(r3, &(0x7f00000003c0)=""/72, 0x100000104) 11:47:23 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000000)={'bridge_slave_1\x00', @random="01003a1e2410"}) 11:47:23 executing program 5: process_vm_writev(0x0, 0x0, 0x0, &(0x7f0000000780)=[{&(0x7f00000028c0)=""/224, 0xe0}], 0x1, 0x0) r0 = socket(0x10, 0x803, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000f80)=[{{&(0x7f0000000940)=@xdp, 0x80, 0x0}}], 0x1, 0x0, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000b00)=[{&(0x7f00000007c0)=""/161, 0xa1}, {&(0x7f0000000a40)=""/178, 0xb2}], 0x2, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000140)=@hci, 0x80, 0x0, 0x0, &(0x7f00000024c0)=""/129, 0x81}, 0x0) recvmsg(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x5f}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0x3c}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x16}], 0x8}}], 0x1, 0x0, 0x0) 11:47:23 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002ff7)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000001000)=""/246) ioctl$EVIOCGREP(r0, 0xc008744c, &(0x7f00000001c0)=""/174) write$P9_RREMOVE(r0, &(0x7f0000000000)={0x7, 0x7b, 0x1}, 0x7) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000280)=@sack_info={0x0, 0x80000000, 0x8}, &(0x7f0000000040)=0xffffffffffffff9c) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000080), &(0x7f00000000c0)=0xc) fcntl$setstatus(r0, 0x4, 0x800) alarm(0x800000004) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000140)={0x1, 0x401, 0x2}) remap_file_pages(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, 0x5, 0x20) openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x4000, 0x0) 11:47:23 executing program 3: r0 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x4, 0x4000) setsockopt$bt_rfcomm_RFCOMM_LM(r0, 0x12, 0x3, &(0x7f0000000100)=0x22, 0x4) accept4$inet6(r0, 0x0, &(0x7f00000000c0), 0x80000) ioctl$TUNGETVNETHDRSZ(r0, 0x800454d7, &(0x7f0000000200)) unshare(0x20400) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='map\x00\x00~6\xf5\b\xd2g\xab\fz\xfe\x9f?\x00U\x1de\x9d\xa3p:\xc5{\x8e\xda\xc9\xfc\x8c]\x01\x83B\vg\x8f\xa5\x04\x00'}, 0x10) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000000140)=""/71, &(0x7f00000001c0)=0x47) 11:47:23 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = inotify_init1(0x0) fcntl$setown(r2, 0x8, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000002c0)) ioctl$RTC_EPOCH_READ(0xffffffffffffffff, 0x8008700d, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 11:47:24 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) time(0x0) close(r0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) getsockname$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x81, &(0x7f0000000240)={'broute\x00', 0x0, 0x0, 0x0, [], 0x0, 0x0}, 0x78) getpeername$unix(r0, 0x0, 0x0) setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) 11:47:24 executing program 3: unshare(0x20400) r0 = getpgrp(0xffffffffffffffff) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x3, &(0x7f00000000c0)=""/242) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='map\x00\x00~6\xf5\b\xd2g\xab\fz\xfe\x9f?\x00U\x1de\x9d\xa3p:\xc5{\x8e\xda\xc9\xfc\x8c]\x01\x83B\vg\x8f\xa5\x04\x00'}, 0x277) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r0, 0x10, &(0x7f0000000040)={0x9}) 11:47:24 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002ff7)='/dev/ppp\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000000)=0x20, 0x4) ioctl$EVIOCGREP(r0, 0xc008744c, &(0x7f0000003000)=""/174) 11:47:24 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) 11:47:24 executing program 1: syz_emit_ethernet(0x1, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], 0x0) 11:47:24 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002ff7)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000001000)=""/246) clone(0x2000, &(0x7f0000000000)="b28cb6f13183e36c75f9ef0e56599c29e81fc91b6661c637772e76c70f3c33f7f8e4201af1daa3ef2ca7d22f24d8adfce0424e2e7dfb11db6f7113d0d27b6a1e169b0c8b92cf6fc8e12778a43f7220c900f6406f53226d93b0aff2330534b3ead59ccefaaec6a02af30fddb079d4347fd53d7613973c11dadd453b9d26c222641547a776de0168e0e68ae12830dbf2e8ef4503dac91122", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f00000001c0)="fee66d8baa527ee58a709107a1fc63d4d75e75b6fe0b620ef3bbca4cc1dc96ffd9072b2822d9c45adb23b3e96cbee47e25b9eeb145bfa34777c73f5fd484197b041a3da4cd356fc743fc2e89dfe611e3605ce06d6e71277d77256106125c633c9fec3d7f61c6393167915995") openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGREP(r0, 0xc008744c, &(0x7f0000003000)=""/174) ioctl$EVIOCGPHYS(r0, 0x80404507, &(0x7f0000000140)=""/114) 11:47:24 executing program 0: syz_open_procfs(0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r3, r4, 0x0, 0x10000000000443) read(r3, &(0x7f00000003c0)=""/72, 0x100000104) 11:47:24 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x408000, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f00000000c0)={@dev, @multicast2, 0x0}, &(0x7f0000000100)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000140)={'team0\x00', r1}) unshare(0x20400) connect$rds(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast2}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='map\x00\x00~6\xf5\b\xd2g\xab\fz\xfe\x9f?\x00U\x1de\x9d\xa3p:\xc5{\x8e\xda\xc9\xfc\x8c]\x01\x83B\vg\x8f\xa5\x04\x00'}, 0x10) 11:47:24 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f0000000000)="f8", 0x1, 0x0, 0x0, 0x0) 11:47:24 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) time(0x0) close(r0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) getsockname$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x81, &(0x7f0000000240)={'broute\x00', 0x0, 0x0, 0x0, [], 0x0, 0x0}, 0x78) getpeername$unix(r0, 0x0, 0x0) setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) 11:47:24 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/snmp\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) unshare(0x20000) link(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='./file0\x00') r1 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r1, 0x29, 0x41, 0x0, 0x0) r2 = dup(r1) setsockopt$inet6_tcp_int(r1, 0x6, 0x12, &(0x7f00000001c0)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f00000007c0)=0x2c0, 0x4) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, 0x0, 0x0) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000700)) ftruncate(r3, 0x2007fff) sendfile(r2, r3, &(0x7f0000d83ff8), 0x8000ffeffffe) 11:47:24 executing program 4: r0 = dup(0xffffffffffffff9c) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000040), 0x4) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000001000)=""/246) ioctl$EVIOCGREP(r1, 0xc008744c, &(0x7f0000003000)=""/174) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) 11:47:24 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) time(0x0) close(r0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) getsockname$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x81, &(0x7f0000000240)={'broute\x00', 0x0, 0x0, 0x0, [], 0x0, 0x0}, 0x78) getpeername$unix(r0, 0x0, 0x0) setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) 11:47:24 executing program 5: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) unlinkat(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x0) 11:47:24 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002ff7)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000001000)=""/246) ioctl$EVIOCGREP(r0, 0xc008744c, &(0x7f0000003000)=""/174) setsockopt$inet6_group_source_req(r0, 0x29, 0x0, &(0x7f0000000000)={0x81, {{0xa, 0x4e22, 0x3, @loopback, 0xdf}}, {{0xa, 0x4e24, 0x4b6e97d, @local, 0x7}}}, 0x108) 11:47:25 executing program 3: unshare(0x20400) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x1, 0x0) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8, 0x8, 0x6, 0x60be, 0x400, 0x7}, 0x1c) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='map\x00\x00~6\xf5\b\xd2g\xab\fz\xfe\x9f?\x00U\x1de\x9d\xa3p:\xc5{\x8e\xda\xc9\xfc\x8c]\x01\x83B\vg\x8f\xa5\x04\x00'}, 0x10) 11:47:25 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) time(0x0) close(r0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) getsockname$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x81, &(0x7f0000000240)={'broute\x00', 0x0, 0x0, 0x0, [], 0x0, 0x0}, 0x78) getpeername$unix(r0, 0x0, 0x0) setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) 11:47:25 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fremovexattr(r0, &(0x7f0000000000)=@known='trusted.overlay.origin\x00') 11:47:25 executing program 0: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r3, r4, 0x0, 0x10000000000443) read(r3, &(0x7f00000003c0)=""/72, 0x100000104) 11:47:25 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x4040, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000001000)=""/246) ioctl$EVIOCGREP(r0, 0xc008744c, &(0x7f0000003000)=""/174) 11:47:25 executing program 3: r0 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x4, 0x200000) ioctl$KVM_X86_SET_MCE(r0, 0x4040ae9e, &(0x7f00000000c0)={0x300000000000000, 0xd000, 0x800, 0x2, 0x10}) unshare(0x20400) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='map\x00\x00~6\xf5\b\xd2g\xab\fz\xfe\x9f?\x00U\x1de\x9d\xa3p:\xc5{\x8e\xda\xc9\xfc\x8c]\x01\x83B\vg\x8f\xa5\x04\x00'}, 0x10) 11:47:25 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) time(0x0) close(r0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) getsockname$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x81, &(0x7f0000000240)={'broute\x00', 0x0, 0x0, 0x0, [], 0x0, 0x0}, 0x78) getpeername$unix(r0, 0x0, 0x0) 11:47:25 executing program 5: r0 = socket(0x200000000000011, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xf, 0x0, 0x69) 11:47:25 executing program 1: 11:47:25 executing program 1: 11:47:25 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002ff7)='/dev/ppp\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='bbr\x00', 0x4) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000100)={0x20, 0x5, 0x5, 0x749}, 0x8) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000001240)=0xff, 0xfffffffffffffee2) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000000)=""/246) ioctl$EVIOCGREP(r0, 0xc008744c, &(0x7f0000001180)=""/174) mq_timedsend(r0, &(0x7f0000003000)="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", 0x1044, 0x5, &(0x7f0000001100)={0x0, 0x989680}) 11:47:25 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) time(0x0) close(r0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) getsockname$inet(0xffffffffffffffff, 0x0, 0x0) getpeername$unix(r0, 0x0, 0x0) 11:47:25 executing program 3: unshare(0x20400) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='map\x00\x00~6\xf5\b\xd2g\xab\fz\xfe\x9f?\x00U\x1de\x9d\xa3p:\xc5{\x8e\xda\xc9\xfc\x8c]\x01\x83B\vg\x8f\xa5\x04\x00'}, 0x10) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x101040, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x200, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x400448c8, &(0x7f0000000240)={r1, r2, 0x9, 0x921, &(0x7f00000001c0)="02d11f09757f54e8c244df0421cbcae0f23dcf113ccaabaae7e77fa84cd6b1afd36678818904cab52919b6bc32753e851fecf10fab947bcf9ccab4fc36a7e5cd80968f412d7cc9cb778ad28d929aeda8c95d0d8cf5ac04b20c933e743136ad8c48ec27c6a089e9d775ddee8f27f00e34", 0x631, 0x0, 0x4ff, 0x7, 0x0, 0xb6b, 0x4, "cd23479949b05aa3f28897b9b8a3f31a9a76fd32e33766c5e71434a42029ad7ac887a7b68a9a5031039c0775ff5f4bfab1ec0c2f2cdbdd163d3b19b8b92953a84becb89233ea0d36"}) 11:47:25 executing program 5: 11:47:26 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) time(0x0) close(r0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) getpeername$unix(r0, 0x0, 0x0) 11:47:26 executing program 5: 11:47:26 executing program 3: unshare(0x20400) getgid() r0 = syz_open_dev$admmidi(&(0x7f0000000100)='/dev/admmidi#\x00', 0x3, 0x42c2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f00000000c0)='#\x1b\x00', r0}, 0xf) exit_group(0x8001) 11:47:26 executing program 1: 11:47:26 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002ff7)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000100)=""/246) ioctl$EVIOCGREP(r0, 0xc008744c, &(0x7f0000003000)=""/174) ioctl$EVIOCGID(r0, 0x80084502, &(0x7f0000000040)=""/36) ioctl$KVM_S390_UCAS_UNMAP(r0, 0x4018ae51, &(0x7f0000000000)={0x7fffffff, 0x6, 0x9}) 11:47:26 executing program 0: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r3, r4, 0x0, 0x10000000000443) read(r3, &(0x7f00000003c0)=""/72, 0x100000104) 11:47:26 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) time(0x0) close(r0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) getpeername$unix(r0, 0x0, 0x0) 11:47:26 executing program 5: 11:47:26 executing program 1: 11:47:26 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) time(0x0) close(r0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) getpeername$unix(r0, 0x0, 0x0) 11:47:26 executing program 3: unshare(0x20400) 11:47:26 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x3, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000000c0)=""/246) ioctl$EVIOCGREP(r0, 0xc008744c, &(0x7f00000002c0)=""/174) futimesat(r0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)={{0x77359400}}) 11:47:26 executing program 5: 11:47:27 executing program 0: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r3, r4, 0x0, 0x10000000000443) read(r3, &(0x7f00000003c0)=""/72, 0x100000104) 11:47:27 executing program 1: 11:47:27 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) time(0x0) close(r0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) getpeername$unix(r0, 0x0, 0x0) 11:47:27 executing program 5: 11:47:27 executing program 3: unshare(0x20400) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000001fe8)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000340)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r1, 0x8040450a, &(0x7f0000013000)) r2 = dup2(r1, r1) r3 = getpgid(0x0) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e20, @remote}}}, 0x84) sched_setaffinity(r3, 0xfffffece, &(0x7f0000000080)=0x101) ioctl$EVIOCSABS20(r2, 0x401845e0, 0x0) ioctl$VHOST_SET_FEATURES(r2, 0x4008af00, 0x0) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, &(0x7f0000000300)={0x3c, @dev={0xac, 0x14, 0x14, 0x16}, 0x4e22, 0x0, 'nq\x00', 0x20, 0x0, 0x4e}, 0x2c) close(r0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='map\x00\x00~6\xf5\b\xd2g\xab\fz\xfe\x9f?\x00U\x1de\x9d\xa3p:\xc5{\x8e\xda\xc9\xfc\x8c]\x01\x83B\vg\x8f\xa5\x04\x00'}, 0x10) r4 = syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x0, 0x2) setsockopt$inet_udp_int(r4, 0x11, 0xa, &(0x7f00000000c0)=0x81, 0x4) madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xf) 11:47:27 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002ff7)='/dev/ppp\x00', 0x0, 0x0) getsockopt$TIPC_IMPORTANCE(r0, 0x10f, 0x7f, &(0x7f0000000100), &(0x7f0000000140)=0x4) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000000)=""/246) ioctl$EVIOCGREP(r0, 0xc008744c, &(0x7f0000003000)=""/174) 11:47:27 executing program 5: 11:47:27 executing program 1: 11:47:27 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) time(0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) getpeername$unix(r0, 0x0, 0x0) 11:47:27 executing program 4: r0 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0xff6, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x2d, &(0x7f0000000180)=""/32, &(0x7f00000000c0)=0xffffffffffffffb7) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002ff7)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000001000)=""/246) ioctl$sock_inet_SIOCGIFPFLAGS(r1, 0x8935, &(0x7f0000000000)={'bridge0\x00', 0x25ac}) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000080)) prctl$PR_GET_TIMERSLACK(0x1e) 11:47:27 executing program 5: 11:47:27 executing program 1: 11:47:28 executing program 0: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r3, r4, 0x0, 0x10000000000443) read(r3, &(0x7f00000003c0)=""/72, 0x100000104) 11:47:28 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) time(0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) getpeername$unix(r0, 0x0, 0x0) 11:47:28 executing program 5: 11:47:28 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002ff7)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000001000)=""/246) ioctl$TIOCSSOFTCAR(r0, 0x541a, &(0x7f00000002c0)=0x7f) ioctl$EVIOCGREP(r0, 0xc008744c, &(0x7f0000003000)=""/174) getresuid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f0000000100)) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, &(0x7f00000001c0)={0x0, @motion_det}) fcntl$getownex(r0, 0x10, &(0x7f0000000300)={0x0, 0x0}) ptrace$peekuser(0x3, r2, 0x100) fstat(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x80000, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c72766f746d6f64653d3030303030303030303030302c752a02725f69643d", @ANYRESDEC=r1, @ANYBLOB=',group_id=', @ANYRESDEC=r3, @ANYBLOB=',max_read=0x0000000000001000,blksize=0x0000000000001000,;max_read=0x000000000000003f,subj_role=md5sum^},dont_hash,measure,hash,\x00']) 11:47:28 executing program 3: unshare(0x20400) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x7fdfb01b, 0x101002) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000240)=0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) ioctl$VIDIOC_SUBDEV_ENUM_DV_TIMINGS(r2, 0xc0945662, &(0x7f0000000400)={0x2, 0x0, [], {0x0, @bt={0x3ff, 0x3f, 0x1, 0x1, 0x2, 0x5, 0x2, 0x0, 0x0, 0x13ba0000000, 0x60c9, 0xfffffffffffffffb, 0x0, 0x7, 0x10, 0x20}}}) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x9, 0x7, 0x2, 0x4, 0x0, 0x1ff, 0x80, 0x4, 0x2, 0x5, 0x100000001, 0x64b, 0x200004, 0xfffffffffffffff8, 0x400, 0x20, 0x100000, 0x40, 0x0, 0x1ff, 0xa8, 0x7, 0x1ff, 0x47dd4567, 0x10b, 0x7ff, 0xffffffffffffb34e, 0xef6, 0x7, 0x7, 0xff, 0x200, 0x1, 0x1b6d, 0x3da, 0x8, 0x0, 0x2, 0x1, @perf_config_ext={0x81e, 0x422}, 0x50, 0x7, 0x6a, 0x0, 0x3, 0x7, 0x7b98}, r1, 0x7, r2, 0x3) ioctl$KVM_GET_CPUID2(r2, 0xc008ae91, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x9, 0x4, 0x1ff, 0xfff, 0x0, 0x8001, 0xa802, 0x8, 0x8, 0xffffffffffffd2f6, 0x17, 0x1, 0x5, 0x8, 0x7, 0xfffffffffffffff9, 0x2, 0x1, 0x7, 0x3, 0x3, 0x7, 0x0, 0x80, 0x4, 0x5, 0x0, 0x10001, 0x1, 0xffffffffffffffda, 0x20, 0x7, 0x5, 0x7ff, 0x2, 0x2, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000200), 0x5}, 0x1010, 0x625, 0x80000000, 0xa, 0x1, 0x200, 0x1000}, r1, 0x3, r0, 0xa) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='map\x00\x00~6\xf5\b\xd2g\xab\fz\xfe\x9f?\x00U\x1de\x9d\xa3p:\xc5{\x8e\xda\xc9\xfc\x8c]\x01\x83B\vg\x8f\xa5\x04\x00'}, 0x10) openat$cgroup_ro(r0, &(0x7f0000000100)='cgroup.events\x00', 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x440400, 0x0) 11:47:28 executing program 1: 11:47:28 executing program 5: 11:47:28 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) time(0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) getpeername$unix(r0, 0x0, 0x0) 11:47:28 executing program 1: 11:47:28 executing program 5: 11:47:28 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) time(0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) getpeername$unix(r0, 0x0, 0x0) 11:47:28 executing program 1: 11:47:29 executing program 3: unshare(0xfffffffff7fffffb) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='map\x00\x00~6\xf5\b\xd2g\xab\fz\xfe\x9f?\x00U\x1de\x9d\xa3p:\xc5{\x8e\xda\xc9\xfc\x8c]\x01\x83B\vg\x8f\xa5\x04\x00'}, 0x10) 11:47:29 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002ff7)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000001000)=""/246) ioctl$EVIOCGREP(r0, 0xc008744c, &(0x7f0000003000)=""/174) fstat(r0, &(0x7f0000000000)) 11:47:29 executing program 0: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r3, r4, 0x0, 0x10000000000443) read(r3, &(0x7f00000003c0)=""/72, 0x100000104) 11:47:29 executing program 5: 11:47:29 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) getpeername$unix(r0, 0x0, 0x0) 11:47:29 executing program 1: 11:47:29 executing program 1: 11:47:29 executing program 5: 11:47:29 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) getpeername$unix(r0, 0x0, 0x0) 11:47:29 executing program 3: unshare(0x203fe) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='map\x00\x00~6\xf5\b\xd2g\xab\fz\xfe\x9f?\x00U\x1de\x9d\xa3p:\xc5{\x8e\xda\xc9\xfc\x8c]\x01\x83B\vg\x8f\xa5\x04\x00'}, 0x10) r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x2, 0x4100) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r0, 0x40a85321, &(0x7f00000000c0)={{0x7ff, 0x406}, 'port1\x00', 0x22, 0x1, 0x4, 0x0, 0x74, 0x9, 0x7, 0x0, 0x1, 0x28c41c0}) 11:47:29 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002ff7)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000000)=""/246) ioctl$EVIOCGREP(r0, 0xc008744c, &(0x7f0000000180)=""/174) exit(0x80) pipe(&(0x7f0000000100)) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685) 11:47:29 executing program 1: 11:47:29 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) readv(r0, &(0x7f00000007c0)=[{&(0x7f0000000600)=""/139, 0x8b}, {&(0x7f00000006c0)=""/254, 0xfe}], 0x2) ioctl$EXT4_IOC_RESIZE_FS(r0, 0x40086610, &(0x7f0000000040)=0xe94) r1 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0xffffffffffffb8a2, 0x22000) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r1, 0xc4c85513, &(0x7f00000000c0)={{0x0, 0x0, 0x8c, 0x9, '\x00', 0x5}, 0x1, [0x2, 0x6, 0x5, 0x5, 0x401, 0x6d61, 0x40800000000, 0x1, 0x9, 0xfffffffffffffffc, 0x4, 0x7ff, 0x30, 0x80, 0x0, 0xffffffffffff0cbc, 0x0, 0x3, 0x0, 0x81, 0x100000000, 0xfffffffffffffffb, 0x4, 0x101, 0x3, 0x2, 0x3f, 0xfc64, 0x8, 0xff07, 0x3, 0x3, 0x10001, 0x5, 0x1, 0x1, 0x1ff, 0x0, 0x2, 0xffffffff, 0x74f7, 0x2, 0x8, 0x7, 0x2, 0x6, 0xff, 0x1, 0x400, 0xbb, 0x8, 0x7, 0x4, 0x100000000, 0x1, 0x9, 0x8, 0x4, 0x3f, 0x8, 0x1, 0x3, 0x8, 0x8001, 0x100, 0x7, 0x9f, 0x1, 0xe7f, 0x1, 0x8000, 0x9, 0x0, 0x80000000, 0x40, 0xffffffff, 0x8000, 0x7, 0x2, 0x9, 0x3f, 0xc888, 0x0, 0x3, 0xfffffffffffffff9, 0x40, 0xb, 0x101, 0x1, 0x10001, 0x800, 0x8, 0x9, 0x2, 0x3, 0x8, 0x0, 0x6, 0x2, 0x5, 0x400, 0x2d3, 0x101, 0x0, 0x8, 0xad3, 0x6, 0x3, 0x8, 0x9, 0xe5, 0x1, 0x0, 0x2, 0xf3, 0x4, 0x7fff, 0x0, 0x1ff, 0x7fffffff, 0x6, 0x7, 0x7, 0xfff, 0x40, 0x320, 0x40000000000, 0x5], {0x77359400}}) unshare(0xff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000000)='map\x00\x00~6\xf5\b\xd2g\xab\fz\xfe\x9f\x05\x00U\x1de\x9d\xa3p:\xc5{\x8e\xda\xc9\xfc\x8c]\x01\x83B\vg\x8f\xa5\x04\x00', r1}, 0x10) socket$l2tp(0x18, 0x1, 0x1) 11:47:29 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) getpeername$unix(r0, 0x0, 0x0) 11:47:30 executing program 0: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r3, r4, 0x0, 0x10000000000443) read(r3, &(0x7f00000003c0)=""/72, 0x100000104) 11:47:30 executing program 5: 11:47:30 executing program 1: 11:47:30 executing program 2: close(0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) getpeername$unix(0xffffffffffffffff, 0x0, 0x0) 11:47:30 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x800, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000180)={0x2, 0x2, 0x8, 0x10001, "4e5de194297a7616bc323b07e91f6a0a33ab2c377705136b1a7ff42f306a00c8"}) r1 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0xfffffffffffffd00, 0x1002) linkat(r0, &(0x7f00000000c0)='./file0\x00', r1, &(0x7f0000000140)='./file0\x00', 0x1400) unshare(0x120000000020403) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='map\x00\x00~6\xf5\b\xd2g\xab\fz\xfe\x9f?\x00U\x1de\x9d\xa3p:\xc5{\x8e\xda\xc9\xfc\x8c]\x01\x83B\vg\x8f\xa5\x04\x00'}, 0x10) 11:47:30 executing program 5: 11:47:30 executing program 2: close(0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) getpeername$unix(0xffffffffffffffff, 0x0, 0x0) 11:47:30 executing program 1: 11:47:30 executing program 4: io_setup(0x2, &(0x7f0000000100)=0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x40, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x101000, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000280)='/dev/input/mouse#\x00', 0x8, 0x60000) r4 = syz_open_dev$mouse(&(0x7f0000000380)='/dev/input/mouse#\x00', 0xc9, 0x80000) r5 = timerfd_create(0x7, 0x800) r6 = syz_open_dev$usb(&(0x7f0000000480)='/dev/bus/usb/00#/00#\x00', 0x8000, 0x0) r7 = signalfd(0xffffffffffffffff, &(0x7f0000000500)={0x7}, 0x8) r8 = accept$unix(0xffffffffffffff9c, &(0x7f0000000680), &(0x7f0000000700)=0x6e) r9 = openat$full(0xffffffffffffff9c, &(0x7f0000000740)='/dev/full\x00', 0x2000, 0x0) r10 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/vhost-vsock\x00', 0x2, 0x0) r11 = eventfd2(0x8001, 0x801) io_submit(r0, 0x6, &(0x7f0000000900)=[&(0x7f0000000240)={0x0, 0x0, 0x0, 0xf, 0x2, r1, &(0x7f0000000180)="ef6a2f23902a570aca6b3be6556d06186f3c01e7b401b5749a977cf93687b04f9fff3dcfdebd8404c4fa7a418cfc835119fe33cb0008a43132db90be765f8630226484159379c934b533c5a7f373af275e7886294276141d5fb64ed4fcfa3d922f3bbc", 0x63, 0x1, 0x0, 0x3, r2}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x5, r3, &(0x7f00000002c0)="6db70b36d5e7f4d237f296eb2e300019879f6983294995c12d1a1a8c141b36fbbd7e5eb3e11a2eebef3182a3a9a545e523ba45f86d72fc2cc9d0a9b70a36e7e770b8af7983c3414626bb663483bdc9eeec8d208a59de3a1f90e2a0f1881d2828c3b9f607a13e9a02eb461ac1dd11d37309fe50b5c373f6d5a8e73b48fcc3ccc6ac12b3d9df11cc52376a3d2ebd2926406d47c6b0dec6182622612c20eb62e0b5a80766b0ef44424857249547cf3c1c2f7c04f4", 0xb3, 0x800, 0x0, 0x2, r4}, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x5, 0xffffffff, r5, &(0x7f0000000400)="ba794686fb29f49a0f6b03d834d1a83adbb9f5f07d4e1396f0a6a86b3785bc50cfaeff18bece8e087dd0e81dbad3700185888cb41f41504c0b33d03e61704e429b09f649e51918f05af36d1b6846c96ddde605e45894f6c9959ab7493149088dac9a3c3fc006", 0x66, 0x3, 0x0, 0x1, r6}, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x5, 0x7fffffff, r7, &(0x7f0000000540)="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", 0xfe, 0x7f, 0x0, 0x2, 0xffffffffffffff9c}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x9, 0x8, r8, &(0x7f0000001100)="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", 0x1000, 0x3ff, 0x0, 0x0, r9}, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x6, 0x7f, r10, &(0x7f0000000800)="7daeca6bc8cb45a75354b577501e585d381633c70838b8b6a95c03a741646a859af58f45b4632ad440b2a5bdb04ea283d577e752528baefe5201d241f7d539739206cf96347ba4e0ec8b347b80c90bbf79fc8457c489efc51905bd30ca21f9af644517627728ab998015dd063fd50e347c9c02885381bc04a8262249475fcb7ce61ed5fd175af32d9601c4d3802925", 0x8f, 0x8, 0x0, 0x0, r11}]) r12 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002ff7)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r12, 0xc004743e, &(0x7f0000001000)=""/246) ioctl$EVIOCGREP(r12, 0xc008744c, &(0x7f0000003000)=""/174) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r12, 0x84, 0x6d, &(0x7f0000000000)={0x0, 0x36, "4f2a57ff73f6a650896389d0e1b06996fed2cfebee2d495359cd4e1052562725a89b17decda9456d0e75a678e63c39d7e331870100b1"}, &(0x7f0000000040)=0x3e) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r12, 0x84, 0x71, &(0x7f00000000c0)={r13, 0x6}, 0x8) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r12, 0x84, 0x76, &(0x7f0000000080)={r13, 0x3}, 0x8) 11:47:30 executing program 3: unshare(0x20400) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='map\x00\x00~6\xf5\b\xd2g\xab\fz\xfe\x9f?\x00U\x1de\x9d\xa3p:\xc5{\x8e\xda\xc9\xfc\x8c]\x01\x83B\vg\x8f\xa5\x04\x00'}, 0x10) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffd94, 0xfa00, {0x2, &(0x7f00000000c0)={0xffffffffffffffff}, 0x13f, 0x1009}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000140)={0x9, 0x108, 0xfa00, {r2, 0x2b, "e19af0", "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"}}, 0x110) 11:47:30 executing program 5: 11:47:30 executing program 1: 11:47:31 executing program 0: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r3, r4, 0x0, 0x10000000000443) read(r3, &(0x7f00000003c0)=""/72, 0x100000104) 11:47:31 executing program 2: close(0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) getpeername$unix(0xffffffffffffffff, 0x0, 0x0) 11:47:31 executing program 5: 11:47:31 executing program 1: 11:47:31 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x0, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000000c0), &(0x7f0000000100)=0x14) unshare(0x20400) r1 = geteuid() r2 = getpid() ioctl$DRM_IOCTL_GET_CLIENT(r0, 0xc0286405, &(0x7f0000000140)={0xffffffffffffffff, 0x80000000, r2, 0x0, r1, 0x0, 0x80000000, 0xfb}) ioctl$TUNSETOWNER(r0, 0x400454cc, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='map\x00\x00~6\xf5\b\xd2g\xab\fz\xfe\x9f?\x00U\x1de\x9d\xa3p:\xc5{\x8e\xda\xc9\xfc\x8c]\x01\x83B\vg\x8f\xa5\x04\x00'}, 0x10) 11:47:31 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ppp\x00', 0x2004, 0x0) read(r0, &(0x7f00000000c0)=""/126, 0x7e) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x9, 0x10001) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000180)=""/246) ioctl$EVIOCGREP(r0, 0xc008744c, &(0x7f0000003000)=""/174) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000000)={{&(0x7f0000ffe000/0x2000)=nil, 0x2000}, 0x1}) ioctl$EVIOCSABS3F(r0, 0x401845ff, &(0x7f0000000040)={0x3, 0x7, 0x2, 0x1601, 0x6, 0x1}) 11:47:31 executing program 1: 11:47:31 executing program 5: 11:47:31 executing program 2: r0 = syz_open_procfs(0x0, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) getpeername$unix(r0, 0x0, 0x0) 11:47:31 executing program 3: unshare(0x20400) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='map\x00\x00~6\xf5\b\xd2g\xab\fz\xfe\x9f?\x00U\x1de\x9d\xa3p:\xc5{\x8e\xda\xc9\xfc\x8c]\x01\x83B\vg\x8f\xa5\x04\x00'}, 0x10) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/schedule_icmp\x00', 0x2, 0x0) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) 11:47:31 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002ff7)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000001000)=""/246) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000000)={{0x800, 0x8001}, 'port0\x00', 0x20, 0x100010, 0x2, 0x843, 0x4, 0xfff, 0x0, 0x0, 0x1, 0x4}) ioctl$EVIOCGREP(r0, 0xc008744c, &(0x7f0000003000)=""/174) 11:47:31 executing program 1: 11:47:32 executing program 0: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r3, r4, 0x0, 0x10000000000443) read(r3, &(0x7f00000003c0)=""/72, 0x100000104) 11:47:32 executing program 2: r0 = syz_open_procfs(0x0, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) getpeername$unix(r0, 0x0, 0x0) 11:47:32 executing program 5: 11:47:32 executing program 1: 11:47:32 executing program 3: bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000080)=0xaf4, 0x4) unshare(0x20400) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='map\x00\x00~6\xf5\b\xd2g\xab\fz\xfe\x9f?\x00U\x1de\x9d\xa3p:\xc5{\x8e\xda\xc9\xfc\x8c]\x01\x83B\vg\x8f\xa5\x04\x00'}, 0x10) 11:47:32 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002ff7)='/dev/ppp\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000000)) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000001000)=""/246) ioctl$EVIOCGREP(r0, 0xc008744c, &(0x7f0000003000)=""/174) 11:47:32 executing program 1: 11:47:32 executing program 5: 11:47:32 executing program 2: r0 = syz_open_procfs(0x0, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) getpeername$unix(r0, 0x0, 0x0) 11:47:32 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x20000000000000, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000140)=""/246) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000040)={0x0, 0x38, "bca7c29f6d6bb6babea91c44c83871ed16f4fc2bbba0ffa9be595dc99051747799a0a26f70b2a1ca8e8729d5a1ebee826b9252329e081ff8"}, &(0x7f0000000080)=0x40) ioctl$DRM_IOCTL_AGP_ENABLE(r0, 0x40086432, &(0x7f0000000100)=0x100000001) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000000c0)=@assoc_value={r1, 0x8000}, 0x8) ioctl$EVIOCGREP(r0, 0xc008744c, &(0x7f0000003000)=""/174) 11:47:32 executing program 1: 11:47:32 executing program 3: unshare(0x20404) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='map\x00\x00~6\xf5\b\xd2g\xab\fz\xfe\x9f?\x00U\x1de\x9d\xa3p:\xc5{\x8e\xda\xc9\xfc\x8c]\x01\x83B\vg\x8f\xa5\x04\x00'}, 0x10) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x3ae4dbabace9925f, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000140)={{0xff, 0x1}, 0x0, 0xfff, 0x0, {0x4, 0x401}, 0xe53, 0x2}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f00000000c0)={{0xfffffffffffffffd}, {0xfffffffffffffff9, 0x100}, 0x5, 0x2, 0x2}) 11:47:32 executing program 0: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r3, r4, 0x0, 0x10000000000443) read(r3, &(0x7f00000003c0)=""/72, 0x100000104) 11:47:32 executing program 5: 11:47:32 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') close(0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) getpeername$unix(r0, 0x0, 0x0) 11:47:32 executing program 1: clone(0x0, 0x0, 0x0, 0x0, 0x0) timer_create(0x0, 0x0, 0x0) open$dir(0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000840)='clear_refs\x00\xb0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96\x04\x00\x00\x00\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfgx\xa1\x96\xad\x93\xaa=-z\x06r\b\'yY\xe3\x1e\xf2a\xfa\x1c\xcb\x16YNp%\xd8J\xe4\a\xabJA9\xdc\x9a\x16\xb9\'\x00\x00\x00\x00\x00\x00\x00\x00\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000440)='syscall\x00') sendfile(r0, r1, 0x0, 0x1) 11:47:32 executing program 3: unshare(0x20400) r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x2001, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='map\x00\x00~6\xf5\b\xd2g\xab\fz\xfe\x9f? U\x1d\r\xee\x06U:\xc5{B\vg\x8f\xa5\x04\x00\x00\x00\x00\x00\x00\x00\x00\x00', r0}, 0x10) 11:47:32 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002ff7)='/dev/ppp\x00', 0x0, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000000)) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000001000)=""/246) ioctl$EVIOCGREP(r0, 0xc008744c, &(0x7f00000001c0)=""/174) 11:47:33 executing program 5: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='uid_map\x00') 11:47:33 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') close(0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) getpeername$unix(r0, 0x0, 0x0) 11:47:33 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x20000, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000001000)=""/246) ioctl$EVIOCGREP(r0, 0xc008744c, &(0x7f0000003000)=""/174) 11:47:33 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000002300), &(0x7f0000000140)=0x552) 11:47:33 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000680)='/dev/snapshot\x00', 0x4000, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000700)='TIPCv2\x00') openat$audio(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/audio\x00', 0x200000, 0x0) sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f0000000940)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000900)={&(0x7f0000000740)=ANY=[@ANYBLOB="2bcd140b", @ANYRES16=r1, @ANYBLOB="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"], 0x1bc}, 0x1, 0x0, 0x0, 0x8000}, 0x4000000) socketpair(0x10, 0x5, 0x9, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bind$rds(r2, &(0x7f00000000c0)={0x2, 0x4e21, @loopback}, 0x10) sendmsg$rds(r2, &(0x7f0000000640)={&(0x7f0000000100)={0x2, 0x5, @empty}, 0x10, &(0x7f0000000140), 0x0, &(0x7f00000005c0)=[@rdma_args={0x48, 0x114, 0x1, {{0x101, 0x1}, {&(0x7f0000000180)=""/183, 0xb7}, &(0x7f0000000540)=[{&(0x7f0000000240)=""/131, 0x83}, {&(0x7f0000000300)=""/70, 0x46}, {&(0x7f0000000380)=""/59, 0x3b}, {&(0x7f00000003c0)=""/10, 0xa}, {&(0x7f0000000400)=""/166, 0xa6}, {&(0x7f00000004c0)=""/95, 0x5f}], 0x6, 0x4, 0x3}}], 0x48, 0x20000000}, 0x800) unshare(0x20400) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000980)) write$FUSE_OPEN(r2, &(0x7f0000000140)={0x20, 0x0, 0x6, {0x0, 0x2}}, 0x20) setsockopt$inet6_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000a00), 0x117ea4e44d135555) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='map\x00\x00~6\xf5\b\xd2g\xab\fz\xfe\x9f?\x00U\x1de\x9d\xa3p:\xc5{\x8e\xda\xc9\xfc\x8c]\x01\x83B\vg\x8f\xa5\x04\x00'}, 0x10) 11:47:33 executing program 5: signalfd(0xffffffffffffffff, &(0x7f00000002c0), 0x8) 11:47:33 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002ff7)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000001000)=""/246) ioctl$EVIOCGREP(r0, 0xc008744c, &(0x7f00000000c0)=""/174) 11:47:33 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') close(0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) getpeername$unix(r0, 0x0, 0x0) 11:47:33 executing program 0: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r3, r4, 0x0, 0x10000000000443) read(r3, &(0x7f00000003c0)=""/72, 0x100000104) 11:47:33 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 11:47:33 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x1f, 0x200000) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000002c0)={r0, &(0x7f0000000180)="4f20cd38d8b503fc9c91bf0a3b93f3b04aeb80b7d23a5fd361aca4e25ef0c7403b8eb286bfcd31eab9d4b16273061735d7329861a4", &(0x7f00000001c0)=""/219}, 0x18) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4000000000000024, 0x32, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0305602, &(0x7f00000005c0)={0x0, 0x40, 0x3002}) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000013e95), 0x4) unshare(0x20400) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000400)={0x0, 0x8000, 0xafae, 0xfffffffffffffffd, 0x1, 0x4, 0x401, 0xa6c, {0x0, @in={{0x2, 0x4e20, @multicast2}}, 0x80000001, 0x5, 0x100000000, 0x3, 0x2}}, &(0x7f00000004c0)=0xb0) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000500)={r2, 0x3, 0x1f, 0x3}, &(0x7f0000000540)=0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='map\x00\x00~6\xf5\b\xd2g\xab\fz\xfe\x9f?\x00U\x1de\x9d\xa3p:\xc5{\x8e\xda\xc9\xfc\x8c]\x01\x83B\vg\x8f\xa5\x04\x00'}, 0x10) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000600)={r3, @in6={{0xa, 0x4e20, 0x6, @empty, 0xffff}}}, &(0x7f00000006c0)=0x84) r4 = socket$kcm(0x29, 0x5, 0x0) getpeername$packet(r0, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000080)=0x5caa92a6c010a1be) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') ioctl$SNDRV_TIMER_IOCTL_PVERSION(r0, 0x80045400, &(0x7f0000000580)) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', r5}) openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000300)='/dev/video36\x00', 0x2, 0x0) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f00000003c0)={0x3, 0x31, &(0x7f0000000380)="b760f6c737f4ab3acff7e0b2d9759b63aaeb2d0eda363b6becc88fbcc198f80b7c9abf8e47d25ce99c377566d66b8707bc"}) 11:47:33 executing program 5: mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000002000/0x4000)=nil) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) munlockall() r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x4000) io_setup(0x4, &(0x7f0000000040)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x377140be6b5ef4c7}]) 11:47:34 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') close(r0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) getpeername$unix(r0, 0x0, 0x0) 11:47:34 executing program 5: syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000080)={0x4, 0x0, &(0x7f0000000480)=[@enter_looper], 0x1, 0x0, &(0x7f00000004c0)='8'}) 11:47:34 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002ff7)='/dev/ppp\x00', 0x0, 0x0) syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x2) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000240)=""/246) ioctl$VIDIOC_QUERYSTD(r0, 0x8008563f, &(0x7f0000000040)) ioctl$EVIOCGREP(r0, 0xc008744c, &(0x7f0000003000)=""/174) 11:47:34 executing program 3: pipe2(&(0x7f0000000080), 0x800) r0 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x2, 0x2) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x40000, 0x0) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r1, 0x400454ce, r2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='map\x00\x00~6\xf5\b\xd2g\xab\fz\xfe\x9f?\x00U\x1de\x9d\xa3p:\xc5{\x8e\xda\xc9\xfc\x8c]\x01\x83B\vg\x8f\xa5\x04\x00', r0}, 0x10) [ 515.172901] binder: 17043:17045 ioctl c018620b 0 returned -14 [ 515.268934] binder: 17051 RLIMIT_NICE not set 11:47:34 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') close(r0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) getpeername$unix(r0, 0x0, 0x0) [ 515.302063] binder: 17043:17051 ioctl c018620b 0 returned -14 11:47:34 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x80\x00\x00\x00\'\xd9\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x80\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xe7\xa2\xa4R\x00\x00\x00\x00\x00\x00\x80\x00'}) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$binfmt_aout(r0, &(0x7f0000000240)={{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2aa}}, 0x20) 11:47:34 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000001000)=""/246) ioctl$EVIOCGREP(r0, 0xc008744c, &(0x7f0000000240)=""/174) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)=ANY=[@ANYBLOB="02ff7ef4", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000040)=0x10) connect$tipc(r0, &(0x7f0000000080)=@name={0x1e, 0x2, 0x3, {{0x41}, 0x4}}, 0x10) [ 515.560540] input: syz1 as /devices/virtual/input/input44 [ 515.615750] input: syz1 as /devices/virtual/input/input45 11:47:34 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') close(r0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) getpeername$unix(r0, 0x0, 0x0) 11:47:34 executing program 0: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r3, r4, 0x0, 0x10000000000443) read(r3, &(0x7f00000003c0)=""/72, 0x100000104) 11:47:34 executing program 3: unshare(0x20400) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='map\x00\x00~6\xf5\b\xd2g\xab\fz\xfe\x9f?\x00U\x1de\x9d\xa3p:\xc5{\x8e\xda\xc9\xfc\x8c]\x01\x83B\vg\x8f\xa5\x04\x00'}, 0x10) r0 = accept(0xffffffffffffffff, &(0x7f0000000080)=@ipx, &(0x7f0000000100)=0x80) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000140)={0x8, [0x8, 0x0, 0x9, 0x5, 0x1, 0x7ff, 0x18, 0xb963]}, 0x14) 11:47:34 executing program 1: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000000)={0x36, 0x0, &(0x7f0000000040)=ANY=[@ANYRESDEC, @ANYPTR, @ANYPTR64, @ANYRESHEX=0x0], 0x0, 0x0, 0x0}) 11:47:34 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002ff7)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000001000)=""/246) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000040)={0x0, 0x100000001, 0x6, [], &(0x7f0000000000)=0x80000000}) ioctl$EVIOCGREP(r0, 0xc008744c, &(0x7f0000003000)=""/174) 11:47:34 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0, 0x0}, &(0x7f0000000380)=0xc) keyctl$chown(0x4, 0x0, r1, r2) [ 515.960929] binder: 17075:17081 unknown command 875837489 [ 515.966796] binder: 17075:17081 ioctl c0306201 20000000 returned -22 11:47:35 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/raw6\x00') readv(r0, &(0x7f0000000840)=[{&(0x7f0000000400)=""/70, 0x46}, {&(0x7f00000004c0)=""/142, 0x8e}], 0x2) 11:47:35 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') close(r0) socketpair$unix(0x1, 0x5, 0x0, 0x0) getpeername$unix(r0, 0x0, 0x0) 11:47:35 executing program 1: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000100)={0x8, 0x0, &(0x7f0000000040)=[@increfs={0x40046304, 0x3}], 0x0, 0x0, 0x0}) 11:47:35 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002ff7)='/dev/ppp\x00', 0x0, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x60002, 0x0) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x800, 0x0) ioctl$EVIOCGPROP(r2, 0xc004743e, &(0x7f0000000140)=""/246) getsockopt$inet_tcp_buf(r1, 0x6, 0x1a, &(0x7f0000000080)=""/35, &(0x7f00000000c0)=0x23) ioctl$EVIOCGREP(r0, 0xc008744c, &(0x7f0000003000)=""/174) 11:47:35 executing program 3: unshare(0x20400) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='map\x00\x00~6\xf5\b\xd2g\xab\fz\xfe\x9f?\x00U\x1de\x9d\xa3p:\xc5{\x8e\xda\xc9\xfc\x8c]\x01\x83B\vg\x8f\xa5\x04\x00'}, 0x99) [ 516.272159] binder: 17096:17098 IncRefs 0 refcount change on invalid ref 3 ret -22 11:47:35 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000002c0)={0x8, 0x0, &(0x7f0000000100)=[@register_looper, @enter_looper], 0x0, 0x0, 0x0}) 11:47:35 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') close(r0) socketpair$unix(0x1, 0x5, 0x0, 0x0) getpeername$unix(r0, 0x0, 0x0) [ 516.482026] QAT: Invalid ioctl [ 516.494714] binder: 17105:17108 ERROR: BC_REGISTER_LOOPER called without request [ 516.502538] binder: 17105:17108 ERROR: BC_ENTER_LOOPER called after BC_REGISTER_LOOPER [ 516.523398] QAT: Invalid ioctl 11:47:35 executing program 0: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r3, r4, 0x0, 0x10000000000443) read(r3, &(0x7f00000003c0)=""/72, 0x100000104) 11:47:35 executing program 1: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000280)={0x4, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="11634840"], 0x0, 0x0, 0x0}) 11:47:35 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002ff7)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000001000)=""/246) ioctl$EVIOCGREP(r0, 0xc008744c, &(0x7f0000003000)=""/174) fcntl$setlease(r0, 0x400, 0x3) 11:47:35 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000002c0)={0x8, 0x0, &(0x7f0000000100)=[@register_looper, @enter_looper], 0x0, 0x0, 0x0}) 11:47:35 executing program 3: r0 = getpgid(0x0) getpriority(0x0, r0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x400000, 0x0) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f00000000c0)={&(0x7f0000ffc000/0x3000)=nil, 0x3000}) unshare(0x20400) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='map\x00\x00~6\xf5\b\xd2g\xab\fz\xfe\x9f?\x00U\x1de\x9d\xa3p:\xc5{\x8e\xda\xc9\xfc\x8c]\x01\x83B\vg\x8f\xa5\x04\x00'}, 0xfffffffffffffe8a) 11:47:35 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') close(r0) socketpair$unix(0x1, 0x5, 0x0, 0x0) getpeername$unix(r0, 0x0, 0x0) [ 516.866721] binder: 17121:17122 ERROR: BC_REGISTER_LOOPER called without request [ 516.874498] binder: 17121:17122 ERROR: BC_ENTER_LOOPER called after BC_REGISTER_LOOPER [ 516.885895] binder_alloc: 17125: binder_alloc_buf, no vma [ 516.891506] binder: 17125:17128 transaction failed 29189/-3, size 0-0 line 2973 11:47:36 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) getpeername$unix(0xffffffffffffffff, 0x0, 0x0) [ 516.915708] binder: BINDER_SET_CONTEXT_MGR already set [ 516.921218] binder: 17125:17130 ioctl 40046207 0 returned -16 [ 516.955547] binder: undelivered TRANSACTION_ERROR: 29189 11:47:36 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$sock_int(r0, 0x1, 0x2e, 0x0, &(0x7f0000000040)) 11:47:36 executing program 3: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000280)='/dev/rfkill\x00', 0x20, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000000c0)) unshare(0x300) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='map\x00\x00~6\xf5\b\xd2g\xab\fz\xfe\x9f?\x00U\x1de\x9d\xa3p:\xc5{\x8e\xda\xc9\xfc\x8c]\x01\x83B\vg\x8f\xa5\x04\x00'}, 0x10) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000100)=@assoc_id=0x0, &(0x7f0000000140)=0x4) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000200)=0xb3f) write$binfmt_elf32(r1, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x9, 0x101, 0x1, 0x7, 0x9, 0x0, 0x0, 0x9e6, 0x309, 0x38, 0xa2, 0x7, 0x4, 0x20, 0x1, 0xffffffff7fffffff, 0x470, 0x7afd}, [{0x6, 0x2, 0x6, 0x1, 0x5, 0x4, 0x0, 0x2}, {0x5, 0x100000001, 0x1000, 0xdbb0, 0xdfa3, 0x5, 0x1ff, 0x65f}], "d57d0fca1300e8523fee278c8d4467dbcafe689895a0d11d3db7f58a7840843de1b70db4138bdba053e7b23c695509cd9914d75e3b6a861624bb4de0d2a8b6107900fa3eb74cc0695386bbd586bfde543524db9e154b44bf1be077d561aa101650f785f7b2654026e672d191955d94f5ca605df69ab312805d8a3aefc0fa2ac35010c5d811134f4e310a7e810d3ecb300fa2bdf6a5d445dab576e69d82ba404981a3906fd1b0e09d7acde3e089e59dd81e18323fe5", [[], [], [], [], [], [], []]}, 0x82d) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000180)={r2, 0x6}, 0x8) 11:47:36 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002ff7)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000001000)=""/246) r1 = openat$vimc0(0xffffffffffffff9c, &(0x7f0000000200)='/dev/video0\x00', 0x2, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x50, r2, 0x110, 0x70bd29, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DEST={0x3c, 0x2, [@IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e24}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@multicast1}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@dev={0xfe, 0x80, [], 0x1f}}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e24}]}]}, 0x50}, 0x1, 0x0, 0x0, 0x4004}, 0x20000000) ioctl$EVIOCGREP(r0, 0xc008744c, &(0x7f0000003000)=""/174) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000001c0)={0x0, 0x3, 0x7, 0x3}) 11:47:36 executing program 1: openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) mincore(&(0x7f0000000000/0x400000)=nil, 0x400000, &(0x7f0000000140)=""/177) 11:47:36 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) getpeername$unix(0xffffffffffffffff, 0x0, 0x0) 11:47:36 executing program 1: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, 0x0) 11:47:36 executing program 0: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r3, r4, 0x0, 0x10000000000443) read(r3, &(0x7f00000003c0)=""/72, 0x100000104) 11:47:36 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000840)='clear_refs\x00\xb0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96\x04\x00\x00\x00\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfgx\xa1\x96\xad\x93\xaa=-z\x06r\b\'yY\xe3\x1e\xf2a\xfa\x1c\xcb\x16YNp%\xd8J\xe4\a\xabJA9\xdc\x9a\x16\xb9\'\x00\x00\x00\x00\x00\x00\x00\x00\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000440)='syscall\x00') sendfile(r0, r1, 0x0, 0x1) 11:47:36 executing program 3: unshare(0x20400) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x42, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f00000000c0)={0x0}) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f0000000100)={r1}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='map\x00\x00~6\xf5\b\xd2g\xab\fz\xfe\x9f?\x00U\x1de\x9d\xa3p:\xc5{\x8e\xda\xc9\xfc\x8c]\x01\x83B\vg\x8f\xa5\x04\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='/dev/vsock\x00', r0}, 0x10) 11:47:36 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) getpeername$unix(0xffffffffffffffff, 0x0, 0x0) 11:47:36 executing program 4: r0 = socket$vsock_dgram(0x28, 0x2, 0x0) getsockopt(r0, 0x400, 0x7, &(0x7f0000000000)=""/145, &(0x7f00000000c0)=0x91) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002ff7)='/dev/ppp\x00', 0x0, 0x0) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0xe) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000001000)=""/246) ioctl$EVIOCGREP(r1, 0xc008744c, &(0x7f0000003000)=""/174) [ 517.829183] Unknown ioctl -1072143861 [ 517.837042] binder: 17164:17168 ioctl c0306201 0 returned -14 11:47:37 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='\x00\x00\x009\xd5^\xd3') fstat(r0, &(0x7f0000000040)) getegid() 11:47:37 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f00000002c0)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000080)={@multicast2, @loopback, 0x1, 0x1, [@multicast1]}, 0x14) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f00000000c0)={@multicast2, @loopback, 0x0, 0x2, [@dev, @empty]}, 0x18) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r1, 0x0, 0x27, &(0x7f00003fdff5)={@multicast2, @loopback}, 0xc) 11:47:37 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xfffffffffffffffc, 0x31, 0xffffffffffffffff, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000080)) 11:47:37 executing program 3: unshare(0x20400) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='map\x00\x00~6\xf5\b\xd2g\xab\fz\xfe\x9f?\x00U\x1de\x9d\xa3p:\xc5{\x8e\xda\xc9\xfc\x8c]\x01\x83B\vg\x8f\xa5\x04\x00'}, 0x10) r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x3, 0x2) ioctl$KVM_GET_CLOCK(r0, 0x8030ae7c, &(0x7f00000000c0)) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000100)=0x783a) 11:47:37 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000002ff7)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000001000)=""/246) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000000)=0x0) sched_getparam(r1, &(0x7f0000000040)) ioctl$EVIOCGREP(r0, 0xc008744c, &(0x7f0000003000)=""/174) 11:47:37 executing program 2: pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) io_setup(0x8001, &(0x7f0000000180)=0x0) io_destroy(r0) 11:47:37 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioperm(0x0, 0x2, 0x0) 11:47:37 executing program 0: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0x12) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r2, r3, 0x0, 0x10000000000443) read(r2, &(0x7f00000003c0)=""/72, 0x100000104) 11:47:37 executing program 4: r0 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000003000/0x3000)=nil, 0x3000, 0xffffffffffeffffa, 0x20012, r0, 0x0) mprotect(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x0) 11:47:37 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x2, 0xc, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, [@sadb_x_nat_t_port={0x1, 0x16}, @sadb_x_nat_t_port={0x1, 0x16, 0x4e23}]}, 0x20}}, 0x0) 11:47:37 executing program 3: unshare(0x20400) r0 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0xffffffffffffff70, 0xc93a4e80cca8b98b) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f00000000c0)={{0x7f, 0x5}, {0x1, 0x800}, 0x800, 0x1, 0xe}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='map\x00\x00~6\xf5\b\xd2g\xab\fz\xfe\x9f?\x00U\x1de\x9d\xa3p:\xc5{\x8e\xda\xc9\xfc\x8c]\x01\x83B\vg\x8f\xa5\x04\x00'}, 0x10) 11:47:37 executing program 5: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/raw\x00') preadv(r0, &(0x7f0000000300), 0x28f, 0x10400003) 11:47:37 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(r2, 0x0, 0x2d, &(0x7f00000001c0)={0x5, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x12}}}}, 0x88) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000140)=0x401) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f00000000c0)={'lo\x00', 0x101}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') r5 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(r4, 0x1, 0x25, &(0x7f0000000180)=0x2, 0x4) sendto$inet6(r5, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) sysfs$3(0x3) [ 518.806272] binder: binder_mmap: 17212 20003000-20006000 bad vm_flags failed -1 [ 518.821901] TCP: request_sock_TCP: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 518.842154] binder: binder_mmap: 17212 20003000-20006000 bad vm_flags failed -1 11:47:38 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, 0x0) 11:47:38 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) truncate(&(0x7f00000000c0)='./bus\x00', 0xfffff) write$UHID_CREATE(r1, &(0x7f00000003c0)={0x0, 'syz1\x00', 'syz1\x00', 'syz1\x00', 0x0}, 0x11c) r2 = open(&(0x7f0000000000)='./bus\x00', 0x26880, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x402c5828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x40}) sendfile(r1, r2, 0x0, 0x8000fffffffe) creat(&(0x7f0000000180)='./bus\x00', 0x0) 11:47:38 executing program 3: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0xfcda) setsockopt$inet_int(r0, 0x0, 0x6, &(0x7f0000000080)=0x8000000939, 0x4) setsockopt$inet_int(r0, 0x0, 0x4, &(0x7f0000000100), 0x4) setsockopt$inet_opts(r0, 0x0, 0xd, &(0x7f00000002c0)="ed", 0x1) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x6e) readv(r0, &(0x7f0000000500)=[{&(0x7f0000000440)=""/175, 0xaf}], 0x1) unshare(0x20400) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='map\x00\x00~6\xf5\b\xd2g\xab\fz\xfe\x9f?\x00U\x1de\x9d\xa3p:\xc5{\x8e\xda\xc9\xfc\x8c]\x01\x83B\vg\x8f\xa5\x04\x00'}, 0x10) 11:47:38 executing program 2: syslog(0x3, &(0x7f00000000c0)=""/147, 0x37a8ec531be3c41f) open(&(0x7f0000000e00)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, &(0x7f00000002c0)) 11:47:38 executing program 5: r0 = socket(0x200000000000011, 0x802, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, 0x0, 0x0) 11:47:38 executing program 4: r0 = socket(0x200000000000011, 0x802, 0x4001000dd86) r1 = accept4$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000002c0)=0x14, 0x80800) bind$packet(r0, &(0x7f0000000000)={0x11, 0x15, r2, 0x1, 0x3df5, 0x6, @broadcast}, 0x14) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'sit0\x00', r2}) bind$packet(r0, &(0x7f00000000c0)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) getsockopt(r1, 0x23, 0x10001, &(0x7f0000000400)=""/4096, &(0x7f0000000340)=0x1000) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000040), &(0x7f0000000100)=0x68) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup//yz0\x00', 0x1ff) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000001c0)={0xfb9, 0x2, 0x7, 0x101, 0x0}, &(0x7f0000000200)=0x10) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000240)=@sack_info={r4, 0x1}, 0xc) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000140)="fb", 0x1}], 0x1) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) 11:47:38 executing program 0: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0x12) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r2, r3, 0x0, 0x10000000000443) read(r2, &(0x7f00000003c0)=""/72, 0x100000104) 11:47:38 executing program 5: r0 = socket$inet(0x2, 0x3, 0x19) setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x81, &(0x7f0000000100)={'filt\nr\x00', 0x0, 0x0, 0x0, [], 0x1, 0x0, 0x0, [{}]}, 0x88) 11:47:38 executing program 3: unshare(0x20400) r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x2, 0x470281) ioctl$SG_SET_DEBUG(r0, 0x227e, &(0x7f00000000c0)=0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='map\x00\x00~6\xf5\b\xd2g\xab\fz\xfe\x9f?\x00U\x1de\x9d\xa3p:\xc5{\x8e\xda\xc9\xfc\x8c]\x01\x83B\vg\x8f\xa5\x04\x00'}, 0x10) 11:47:38 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000300)={r0, 0x0, 0xe, 0x0, &(0x7f0000000100)="4d8d8fe636f6cac49c53c4e73fff", 0x0}, 0x28) 11:47:38 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'rmd256-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x135, &(0x7f0000001180), 0x11, &(0x7f00000011c0)=""/157, 0xffffffffffffff47}, 0x3700}], 0x1500, 0x0, &(0x7f00000001c0)={0x77359400}) [ 519.901779] device lo entered promiscuous mode [ 520.230667] device lo left promiscuous mode [ 520.594642] device lo entered promiscuous mode 11:47:39 executing program 1: 11:47:39 executing program 2: r0 = socket$inet(0x2, 0x3, 0x19) setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x81, &(0x7f0000000100)={'filter\xff\xff\xff\xff\xa0\x01\x80\x00', 0x0, 0x0, 0x0, [], 0x1, 0x0, 0x0, [{}]}, 0x88) 11:47:39 executing program 3: unshare(0x20400) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='map\x00\x00~6\xf5\b\xd2g\xab\fz\xfe\x9f?\x00U\x1de\x9d\xa3p:\xc5{\x8e\xda\xc9\xfc\x8c]\x01\x83B\vg\x8f\xa5\x04\x00'}, 0x10) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x8000, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f00000000c0)={0x0, 0x6, 0x7, [0x2, 0xffffffffffff9302, 0x20, 0x400, 0x1ff, 0x20, 0xfffffffffffffff9]}, &(0x7f0000000100)=0x16) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f0000000180)) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000000140)=r1, 0x4) 11:47:39 executing program 5: 11:47:39 executing program 5: 11:47:39 executing program 2: 11:47:39 executing program 1: 11:47:39 executing program 0: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0x12) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r2, r3, 0x0, 0x10000000000443) read(r2, &(0x7f00000003c0)=""/72, 0x100000104) 11:47:40 executing program 3: unshare(0x20400) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x800, 0x0) ioctl$RTC_PIE_ON(r0, 0x7005) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='map\x00\x00~6\xf5\b\xd2g\xab\fz\xfe\x9f?\x00U\x1de\x9d\xa3p:\xc5{\x8e\xda\xc9\xfc\x8c]\x01\x83B\vg\x8f\xa5\x04\x00'}, 0x10) 11:47:40 executing program 5: 11:47:40 executing program 2: 11:47:40 executing program 4: 11:47:40 executing program 1: 11:47:40 executing program 5: 11:47:40 executing program 3: unshare(0x20400) r0 = open(&(0x7f0000000000)='./file0\x00', 0x800, 0x8) setsockopt$inet_int(r0, 0x0, 0x12, &(0x7f0000000040)=0x84, 0x4) r1 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x832, 0x1) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000000c0)={0x0, @multicast2, @broadcast}, &(0x7f0000000100)=0xc) 11:47:40 executing program 2: 11:47:40 executing program 1: 11:47:40 executing program 4: 11:47:40 executing program 5: 11:47:40 executing program 3: unshare(0x20400) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x401, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r0, 0x111, 0x1, 0x80000001, 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='map\x00\x00~6\xf5\b\xd2g\xab\fz\xfe\x9f?\x00U\x1de\x9d\xa3p:\xc5{\x8e\xda\xc9\xfc\x8c]\x01\x83B\vg\x8f\xa5\x04\x00'}, 0x10) r1 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x3, 0x20000) setsockopt$inet6_dccp_buf(r1, 0x21, 0x8e, &(0x7f00000000c0)="78a176528de03a713896e73563ede64dac89ca7b11aeb25d9331f2ff4f265d63605932c6d984857cfd09293d859b8b388061", 0x32) 11:47:40 executing program 2: 11:47:40 executing program 0: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, 0x0, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r3, r4, 0x0, 0x10000000000443) read(r3, &(0x7f00000003c0)=""/72, 0x100000104) 11:47:40 executing program 1: 11:47:40 executing program 4: 11:47:40 executing program 5: 11:47:41 executing program 1: 11:47:41 executing program 2: 11:47:41 executing program 4: 11:47:41 executing program 5: 11:47:41 executing program 1: 11:47:41 executing program 3: unshare(0x20400) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x400000, 0x0) ioctl$IOC_PR_PREEMPT(r0, 0x401870cb, &(0x7f00000001c0)={0x8001, 0x401, 0x1000, 0x1804}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='map\x00\x00~6\xf5\b\xd2g\xab\fz\xfe\x9f?\x00U\x1de\x9d\xa3p:\xc5{\x8e\xda\xc9\xfc\x8c]\x01\x83B\vg\x8f\xa5\x04\x00'}, 0x10) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f00000000c0)={0x0, 0x6}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f0000000140)=r2, 0x4) 11:47:41 executing program 4: 11:47:41 executing program 0: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, 0x0, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r3, r4, 0x0, 0x10000000000443) read(r3, &(0x7f00000003c0)=""/72, 0x100000104) 11:47:41 executing program 5: 11:47:41 executing program 2: 11:47:41 executing program 1: 11:47:41 executing program 4: 11:47:41 executing program 3: 11:47:42 executing program 3: 11:47:42 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x800, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x80\x00\x00\x00\'\xd9\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x80\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xe7\xa2\xa4R\x00\x00\x00\x00\x00\x00\x80\x00'}) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) readv(r0, &(0x7f0000000080)=[{&(0x7f0000000300)=""/148, 0x94}], 0x1) 11:47:42 executing program 2: 11:47:42 executing program 4: 11:47:42 executing program 1: [ 523.251066] input: syz1 as /devices/virtual/input/input47 11:47:42 executing program 1: [ 523.301240] input: syz1 as /devices/virtual/input/input48 11:47:42 executing program 0: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, 0x0, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r3, r4, 0x0, 0x10000000000443) read(r3, &(0x7f00000003c0)=""/72, 0x100000104) 11:47:42 executing program 2: 11:47:42 executing program 4: 11:47:42 executing program 3: 11:47:42 executing program 1: 11:47:42 executing program 5: 11:47:43 executing program 3: 11:47:43 executing program 4: 11:47:43 executing program 2: 11:47:43 executing program 1: 11:47:43 executing program 5: 11:47:43 executing program 3: 11:47:43 executing program 5: 11:47:43 executing program 4: 11:47:43 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, 0x0) 11:47:43 executing program 0: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000100), 0x12) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r2, r3, 0x0, 0x10000000000443) read(r2, &(0x7f00000003c0)=""/72, 0x100000104) 11:47:43 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) read(r0, 0x0, 0x0) 11:47:43 executing program 3: syz_emit_ethernet(0x32, &(0x7f0000000240)={@link_local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @dev}, @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "1f6760", 0x0, "8540fc"}}}}}}, 0x0) 11:47:43 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000140)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f00000004c0)=[{{&(0x7f00000000c0)=@in6={0xa, 0x0, 0x2, @mcast2}, 0x80, 0x0, 0x0, &(0x7f0000000540)=[{0x10}], 0x10}}], 0x1, 0x0) 11:47:44 executing program 1: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rfkill\x00', 0x203, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x0) 11:47:44 executing program 4: syz_open_procfs(0x0, &(0x7f0000000400)='projid_map\x00\xf1\x91\xf4)\x03\x7fA\x8a~\xe2\xf8\x16\xb5A\xd2\x00\x00F\xcf\xc6\xb9\xc9#\xc8\xd7S\xcdC\xe6\x8eamf\xc9\xe2l\x17a7\xa8\xcb\xaf\xea^\xab\xc5bi\xdd\x1bgz\xdc/vw[\x05:aOD\xc6\x8f |\x98MbMyo\r\xd2\xac\xfd%B\x0fv\x1d.:\xa1d\xe7\x1b\x0f\x81\x83\xdcR\x01\xca\xc3OU\xef<\x10\xe0^B\xcf') 11:47:44 executing program 2: r0 = socket$inet(0x2, 0x3, 0x3) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000100)={0x0, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @dev}}}, 0x108) 11:47:44 executing program 3: mmap(&(0x7f0000196000/0x4000)=nil, 0x4000, 0x2, 0x8032, 0xffffffffffffffff, 0x0) [ 525.084133] not chained 10000 origins [ 525.087974] CPU: 0 PID: 17428 Comm: syz-executor0 Not tainted 4.20.0-rc7+ #3 [ 525.091548] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 525.101970] Call Trace: [ 525.101970] dump_stack+0x1c9/0x220 [ 525.101970] kmsan_internal_chain_origin+0x23f/0x260 [ 525.113012] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 525.113012] ? rb_erase_cached+0xc32/0x2b60 [ 525.113012] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 525.113012] ? __msan_poison_alloca+0x1e0/0x270 [ 525.113012] ? __perf_event_task_sched_in+0x70/0xad0 [ 525.113012] ? perf_event_task_sched_in+0x25a/0x2e0 [ 525.113012] ? __perf_event_task_sched_in+0xa4e/0xad0 [ 525.113012] ? __msan_poison_alloca+0x1e0/0x270 [ 525.113012] __msan_chain_origin+0x6d/0xb0 [ 525.113012] skcipher_walk_next+0x98e/0x2d20 [ 525.164506] ? __msan_poison_alloca+0x1e0/0x270 [ 525.164506] ? rcu_all_qs+0x3b/0x360 [ 525.171681] ? _cond_resched+0x31/0xc0 [ 525.175932] ? rcu_all_qs+0x53/0x360 [ 525.175932] skcipher_walk_done+0x95a/0x1070 [ 525.175932] crypto_cbc_decrypt+0x86a/0x9c0 [ 525.175932] ? cipher_encrypt_unaligned+0x310/0x310 [ 525.175932] ? crypto_cbc_encrypt+0x810/0x810 [ 525.175932] skcipher_recvmsg+0x130e/0x1880 [ 525.175932] skcipher_recvmsg_nokey+0x129/0x160 [ 525.175932] ? skcipher_sendmsg_nokey+0x1f0/0x1f0 [ 525.175932] sock_read_iter+0x45b/0x4e0 [ 525.175932] ? kernel_sock_ip_overhead+0x340/0x340 [ 525.175932] __vfs_read+0x874/0xb00 [ 525.175932] vfs_read+0x3b3/0x6f0 [ 525.175932] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 525.175932] __se_sys_read+0x17a/0x370 [ 525.175932] __x64_sys_read+0x4a/0x70 [ 525.242478] do_syscall_64+0xcd/0x110 [ 525.242478] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 525.242478] RIP: 0033:0x457669 [ 525.242478] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 525.242478] RSP: 002b:00007f7b7348fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 11:47:44 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getresuid(&(0x7f0000001580), &(0x7f00000015c0), &(0x7f0000001600)) 11:47:44 executing program 3: pipe2(0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) recvfrom(r1, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x10100, 0x0, 0xfffffffffffffe75) [ 525.242478] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457669 [ 525.288532] RDX: 0000000100000104 RSI: 00000000200003c0 RDI: 0000000000000006 [ 525.288532] RBP: 000000000072bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 525.288532] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7b734906d4 [ 525.288532] R13: 00000000004c2b42 R14: 00000000004d6678 R15: 00000000ffffffff [ 525.311885] Uninit was stored to memory at: [ 525.311885] kmsan_internal_chain_origin+0x162/0x260 [ 525.311885] __msan_chain_origin+0x6d/0xb0 [ 525.311885] skcipher_walk_next+0x10a4/0x2d20 [ 525.311885] skcipher_walk_done+0x95a/0x1070 [ 525.311885] crypto_cbc_decrypt+0x86a/0x9c0 [ 525.311885] skcipher_recvmsg+0x130e/0x1880 [ 525.311885] skcipher_recvmsg_nokey+0x129/0x160 [ 525.311885] sock_read_iter+0x45b/0x4e0 [ 525.358406] __vfs_read+0x874/0xb00 [ 525.360710] vfs_read+0x3b3/0x6f0 [ 525.360710] __se_sys_read+0x17a/0x370 [ 525.367959] __x64_sys_read+0x4a/0x70 [ 525.372350] do_syscall_64+0xcd/0x110 [ 525.372350] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 525.381776] [ 525.381776] Uninit was stored to memory at: [ 525.381776] kmsan_internal_chain_origin+0x162/0x260 [ 525.381776] __msan_chain_origin+0x6d/0xb0 [ 525.381776] skcipher_walk_next+0x10a4/0x2d20 [ 525.381776] skcipher_walk_done+0x95a/0x1070 [ 525.381776] crypto_cbc_decrypt+0x86a/0x9c0 [ 525.381776] skcipher_recvmsg+0x130e/0x1880 [ 525.381776] skcipher_recvmsg_nokey+0x129/0x160 [ 525.381776] sock_read_iter+0x45b/0x4e0 [ 525.381776] __vfs_read+0x874/0xb00 [ 525.381776] vfs_read+0x3b3/0x6f0 [ 525.381776] __se_sys_read+0x17a/0x370 [ 525.381776] __x64_sys_read+0x4a/0x70 [ 525.381776] do_syscall_64+0xcd/0x110 [ 525.381776] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 525.381776] [ 525.381776] Uninit was stored to memory at: [ 525.451709] kmsan_internal_chain_origin+0x162/0x260 [ 525.451709] __msan_chain_origin+0x6d/0xb0 [ 525.462475] skcipher_walk_next+0x10a4/0x2d20 [ 525.462475] skcipher_walk_done+0x95a/0x1070 [ 525.462475] crypto_cbc_decrypt+0x86a/0x9c0 [ 525.462475] skcipher_recvmsg+0x130e/0x1880 [ 525.462475] skcipher_recvmsg_nokey+0x129/0x160 [ 525.462475] sock_read_iter+0x45b/0x4e0 [ 525.462475] __vfs_read+0x874/0xb00 [ 525.462475] vfs_read+0x3b3/0x6f0 [ 525.462475] __se_sys_read+0x17a/0x370 [ 525.462475] __x64_sys_read+0x4a/0x70 [ 525.462475] do_syscall_64+0xcd/0x110 [ 525.462475] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 525.462475] [ 525.462475] Uninit was stored to memory at: [ 525.462475] kmsan_internal_chain_origin+0x162/0x260 [ 525.521673] __msan_chain_origin+0x6d/0xb0 [ 525.521673] skcipher_walk_next+0x10a4/0x2d20 [ 525.521673] skcipher_walk_done+0x95a/0x1070 [ 525.521673] crypto_cbc_decrypt+0x86a/0x9c0 [ 525.540072] skcipher_recvmsg+0x130e/0x1880 [ 525.540072] skcipher_recvmsg_nokey+0x129/0x160 [ 525.540072] sock_read_iter+0x45b/0x4e0 [ 525.540072] __vfs_read+0x874/0xb00 [ 525.540072] vfs_read+0x3b3/0x6f0 [ 525.540072] __se_sys_read+0x17a/0x370 [ 525.562865] __x64_sys_read+0x4a/0x70 [ 525.562865] do_syscall_64+0xcd/0x110 [ 525.562865] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 525.562865] [ 525.562865] Uninit was stored to memory at: 11:47:44 executing program 2: gettid() r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000180)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$binfmt_script(r0, 0x0, 0x0) timer_create(0x0, 0x0, 0x0) timer_settime(0x0, 0x0, 0x0, 0x0) tkill(0x0, 0x0) [ 525.562865] kmsan_internal_chain_origin+0x162/0x260 [ 525.590203] __msan_chain_origin+0x6d/0xb0 [ 525.590203] skcipher_walk_virt+0xa4e/0xaa0 [ 525.590203] crypto_cbc_decrypt+0xd9/0x9c0 [ 525.590203] skcipher_recvmsg+0x130e/0x1880 [ 525.590203] skcipher_recvmsg_nokey+0x129/0x160 [ 525.590203] sock_read_iter+0x45b/0x4e0 [ 525.590203] __vfs_read+0x874/0xb00 [ 525.590203] vfs_read+0x3b3/0x6f0 [ 525.590203] __se_sys_read+0x17a/0x370 [ 525.590203] __x64_sys_read+0x4a/0x70 [ 525.590203] do_syscall_64+0xcd/0x110 [ 525.590203] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 525.590203] [ 525.590203] Uninit was stored to memory at: [ 525.590203] kmsan_internal_chain_origin+0x162/0x260 [ 525.590203] __msan_chain_origin+0x6d/0xb0 [ 525.590203] skcipher_walk_next+0x10a4/0x2d20 [ 525.590203] skcipher_walk_first+0x16f/0x700 [ 525.590203] skcipher_walk_virt+0x8d1/0xaa0 [ 525.590203] crypto_cbc_decrypt+0xd9/0x9c0 [ 525.590203] skcipher_recvmsg+0x130e/0x1880 [ 525.590203] skcipher_recvmsg_nokey+0x129/0x160 [ 525.590203] sock_read_iter+0x45b/0x4e0 [ 525.683362] __vfs_read+0x874/0xb00 [ 525.683362] vfs_read+0x3b3/0x6f0 [ 525.683362] __se_sys_read+0x17a/0x370 [ 525.683362] __x64_sys_read+0x4a/0x70 [ 525.683362] do_syscall_64+0xcd/0x110 [ 525.683362] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 525.683362] [ 525.683362] Uninit was stored to memory at: [ 525.683362] kmsan_internal_chain_origin+0x162/0x260 [ 525.683362] __msan_chain_origin+0x6d/0xb0 [ 525.721688] skcipher_walk_virt+0x6e6/0xaa0 [ 525.726638] crypto_cbc_decrypt+0xd9/0x9c0 [ 525.726638] skcipher_recvmsg+0x130e/0x1880 [ 525.737708] skcipher_recvmsg_nokey+0x129/0x160 [ 525.737708] sock_read_iter+0x45b/0x4e0 [ 525.737708] __vfs_read+0x874/0xb00 [ 525.737708] vfs_read+0x3b3/0x6f0 [ 525.737708] __se_sys_read+0x17a/0x370 [ 525.737708] __x64_sys_read+0x4a/0x70 [ 525.737708] do_syscall_64+0xcd/0x110 [ 525.737708] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 525.737708] [ 525.737708] Local variable description: ----walk@crypto_cbc_decrypt [ 525.737708] Variable was created at: [ 525.737708] crypto_cbc_decrypt+0x70/0x9c0 [ 525.737708] skcipher_recvmsg+0x130e/0x1880 11:47:45 executing program 0: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000100), 0x12) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r2, r3, 0x0, 0x10000000000443) read(r2, &(0x7f00000003c0)=""/72, 0x100000104) 11:47:45 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000280)='cpu.stat\x00', 0x2761, 0x0) 11:47:45 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000040)={0x6d0, 0x0, 0x0, 0xfffe}) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x44000) io_setup(0x40000100000003, &(0x7f0000000200)=0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r1, 0x0, 0x4d, &(0x7f0000000100)='ppp0lo-[posix_acl_accessuservboxnet0:&]*vmnet0{posix_acl_accessvmnet1cgroup(\x00'}, 0x30) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000240)={{{@in=@empty, @in6=@local}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000340)=0xc) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) munlock(&(0x7f0000003000/0x4000)=nil, 0x4000) r3 = open(&(0x7f0000000000)='./bus\x00', 0x20202, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r3, 0x0) ioctl$RTC_EPOCH_SET(0xffffffffffffffff, 0x4008700e, 0x8) fallocate(r3, 0x0, 0x0, 0xcd54) preadv(r3, &(0x7f0000000480)=[{&(0x7f0000000580)=""/4096, 0x1000}], 0x1, 0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x5, 0x1, 0x0, r1, &(0x7f0000000000), 0x377140be6b5ef4c7}]) 11:47:45 executing program 4: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'ip6_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 11:47:45 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000140)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f00000004c0)=[{{&(0x7f00000000c0)=@in6={0xa, 0x0, 0x2, @mcast2}, 0x80, 0x0, 0x0, &(0x7f0000000540)=[{0x10}], 0x10}}], 0x1, 0x0) 11:47:45 executing program 2: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x40000100000003, &(0x7f0000000200)=0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x20202, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) fallocate(r2, 0x0, 0x0, 0xcd54) preadv(r2, &(0x7f0000000480)=[{&(0x7f0000000580)=""/4096, 0x1000}], 0x1, 0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x5, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) 11:47:45 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capget(&(0x7f0000000080), 0x0) 11:47:45 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000140)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f00000004c0)=[{{&(0x7f00000000c0)=@in6={0xa, 0x0, 0x2, @mcast2}, 0x80, 0x0, 0x0, &(0x7f0000000540)=[{0x10}], 0x10}}], 0x1, 0x0) 11:47:45 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000840)='/dev/null\x00', 0x200, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffff9c, 0xc018620b, &(0x7f0000000880)={0x0}) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f00000008c0)={r1}) pselect6(0x40, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x6, 0x1}, 0x0, &(0x7f00000005c0)={0x200, 0x10001, 0x0, 0x0, 0xfff, 0x0, 0x101}, &(0x7f0000000640), &(0x7f00000006c0)={&(0x7f0000000680)={0x7}, 0x8}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000a80)={0x7c, 0x0, &(0x7f00000009c0)=[@reply_sg={0x40486312, {{0x3, 0x0, 0x3, 0x0, 0x10, 0x0, 0x0, 0x38, 0x10, &(0x7f0000000940)=[@fda={0x66646185, 0x6, 0x4, 0x7}, @flat={0x77622a85, 0x100, r1, 0x2}], &(0x7f0000000980)=[0x78, 0x48]}, 0x8}}, @dead_binder_done, @increfs, @acquire_done={0x40106309, r1}, @decrefs={0x40046307, 0x1}], 0x3a, 0x0, &(0x7f0000000a40)="49b6f46582dc2b7e8016e2ab6fc60c92186e5fda261aa0e1aaed0e6a175204b8153de21fe9ce43eddc4824fb09684fec3efeaff8c2173b1fda2d"}) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) keyctl$revoke(0x3, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x9, 0x8, &(0x7f00000003c0)=ANY=[@ANYBLOB="1816030000000000000000a6102e7a000000000000569681c422276f4867140fe570a1eeca335c020000001ac1d4770d18ef17267a7bd5da4ffbae3558309d5f217e3d"], 0x0, 0x9, 0xfb, &(0x7f00000000c0)=""/251}, 0x48) getresuid(&(0x7f0000000540), &(0x7f0000000600), &(0x7f0000000700)=0x0) r3 = getegid() lchown(&(0x7f0000000500)='./file0\x00', r2, r3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) memfd_create(&(0x7f0000000ac0)='syz', 0x6) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='devpts\x00', 0x0, 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0x400007f) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) rmdir(&(0x7f0000000180)='./file0\x00') getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000000740)=""/164, &(0x7f0000000900)=0xa4) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f00000004c0)=""/60) clock_adjtime(0x0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6e24a87c, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x62, 0x0, 0x0, 0x1ff, 0x8, 0x0, 0x7f}) pipe(&(0x7f0000000480)={0xffffffffffffffff}) mkdir(&(0x7f0000000800)='./file0\x00', 0x24) pipe(&(0x7f0000000440)) ioctl$RTC_AIE_OFF(r5, 0x7002) 11:47:45 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x80\x00\x00\x00\'\xd9\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x80\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xe7\xa2\xa4R\x00\x00\x00\x00\x00\x00\x80\x00'}) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f0000000000)) 11:47:45 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 526.753703] input: syz1 as /devices/virtual/input/input50 11:47:45 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000140)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f00000004c0)=[{{&(0x7f00000000c0)=@in6={0xa, 0x0, 0x2, @mcast2}, 0x80, 0x0, 0x0, &(0x7f0000000540)=[{0x10}], 0x10}}], 0x1, 0x0) [ 526.848301] input: syz1 as /devices/virtual/input/input51 11:47:46 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x0) 11:47:46 executing program 0: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000100), 0x12) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r2, r3, 0x0, 0x10000000000443) read(r2, &(0x7f00000003c0)=""/72, 0x100000104) 11:47:46 executing program 3: recvmsg(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000280)=""/4096, 0x1000}], 0x1}, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2, 0x4, 0x4, 0x1, 0x0, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={r0, &(0x7f00000001c0), 0x0, 0x1}, 0x20) 11:47:46 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r2, 0x541b, &(0x7f0000000080)) 11:47:46 executing program 1: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x1c) 11:47:46 executing program 3: pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$inet6_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000240), 0x4) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0xfffffffffffff7fe, 0x800) prctl$PR_SET_SECUREBITS(0x1c, 0xa) ioctl$LOOP_GET_STATUS64(r1, 0x4c05, &(0x7f0000000140)) socket$inet6(0xa, 0x4, 0x4) futex(&(0x7f0000000000)=0x1, 0x8b, 0x1, &(0x7f0000000040)={0x0, 0x1c9c380}, &(0x7f0000000100), 0x0) msgget(0x1, 0x80) setsockopt$netlink_NETLINK_CAP_ACK(r0, 0x10e, 0xa, &(0x7f0000000300), 0x4) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x8, 0x80010, r1, 0x0) 11:47:46 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) sendmmsg(r0, &(0x7f00000004c0)=[{{&(0x7f00000000c0)=@in6={0xa, 0x0, 0x2, @mcast2}, 0x80, 0x0, 0x0, &(0x7f0000000540)=[{0x10}], 0x10}}], 0x1, 0x0) 11:47:46 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000080)={@dev={0xfe, 0x80, [], 0x1d}}, 0x14) 11:47:46 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) sendmmsg(r0, &(0x7f00000004c0)=[{{&(0x7f00000000c0)=@in6={0xa, 0x0, 0x2, @mcast2}, 0x80, 0x0, 0x0, &(0x7f0000000540)=[{0x10}], 0x10}}], 0x1, 0x0) 11:47:46 executing program 2: mknod(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) semget(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000040)=ANY=[], &(0x7f0000000400)='./file0\x00', &(0x7f0000000440)='sysfs\x00', 0x0, 0x0) setxattr$security_evm(0x0, 0x0, 0x0, 0x0, 0x0) statfs(&(0x7f0000000140)='./file0\x00', 0x0) 11:47:46 executing program 4: r0 = getpgrp(0xffffffffffffffff) ptrace$setopts(0x4206, r0, 0x0, 0x8000000000) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x8200, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000000100)=0x80000000100040, 0xffffff61) 11:47:46 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000080)=[@window], 0x1) keyctl$set_timeout(0xf, 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) 11:47:47 executing program 3: write$P9_RLCREATE(0xffffffffffffffff, 0x0, 0xfffffffffffffeaf) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, 0x0, 0x0) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[], 0x0) 11:47:47 executing program 0: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r3, r4, 0x0, 0x10000000000443) read(r3, &(0x7f00000003c0)=""/72, 0x100000104) 11:47:47 executing program 4: write$P9_RLCREATE(0xffffffffffffffff, 0x0, 0xfffffffffffffeaf) dup(0xffffffffffffffff) ioctl$KDDISABIO(0xffffffffffffffff, 0x4b37) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) write$P9_RREADDIR(r0, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, 0x0, 0x0) 11:47:47 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) sendmmsg(r0, &(0x7f00000004c0)=[{{&(0x7f00000000c0)=@in6={0xa, 0x0, 0x2, @mcast2}, 0x80, 0x0, 0x0, &(0x7f0000000540)=[{0x10}], 0x10}}], 0x1, 0x0) 11:47:47 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000002c0)={{}, 'syz1\x00'}) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x0) 11:47:47 executing program 2: mknod(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) semget(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000040)=ANY=[], &(0x7f0000000400)='./file0\x00', &(0x7f0000000440)='sysfs\x00', 0x0, 0x0) setxattr$security_evm(0x0, 0x0, 0x0, 0x0, 0x0) statfs(&(0x7f0000000140)='./file0\x00', 0x0) 11:47:47 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x80\x00\x00\x00\'\xd9\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x80\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xe7\xa2\xa4R\x00\x00\x00\x00\x00\x00\x80\x00'}) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) ioctl$UI_GET_SYSNAME(r0, 0x8040552c, 0x0) [ 528.451881] input: syz1 as /devices/virtual/input/input52 [ 528.474009] input: syz1 as /devices/virtual/input/input53 11:47:47 executing program 2: mknod(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) semget(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000040)=ANY=[], &(0x7f0000000400)='./file0\x00', &(0x7f0000000440)='sysfs\x00', 0x0, 0x0) setxattr$security_evm(0x0, 0x0, 0x0, 0x0, 0x0) statfs(&(0x7f0000000140)='./file0\x00', 0x0) [ 528.505114] input: syz1 as /devices/virtual/input/input54 [ 528.567079] input: syz1 as /devices/virtual/input/input55 11:47:47 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @local}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @local}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000580)=0x19fc, 0x336) sync_file_range(r0, 0x5, 0x7, 0x0) mkdir(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) creat(0x0, 0x0) write$P9_RLOPEN(0xffffffffffffffff, 0x0, 0x0) inotify_init() socketpair$unix(0x1, 0x0, 0x0, 0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) truncate(0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) write$nbd(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="ef0000fd328c933f4a5325169d6f3023b2005ab423c607fe9fa016a9952f614508471c0c932b978ec2da4536660f46ae443eab551cc6e06e64c696e49ab90fe5d96fcf7d77664681cbbae1e0701dd92bd92b90e18641c50780266cbed0132f6a6c9e4681da46487f5950ca98b8218d6fce88b162d8572f6ab91e17fa2a5d1e9498d274a781"], 0x85) recvmsg(r0, &(0x7f00000001c0)={&(0x7f0000000440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000280), 0x0, &(0x7f0000000180)=""/63, 0xfffffffffffffd5b}, 0x2000) 11:47:47 executing program 5: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000140)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f00000004c0)=[{{&(0x7f00000000c0)=@in6={0xa, 0x0, 0x2, @mcast2}, 0x80, 0x0, 0x0, &(0x7f0000000540)=[{0x10}], 0x10}}], 0x1, 0x0) 11:47:47 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000002c0)=0xffffffee) 11:47:47 executing program 2: mknod(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) semget(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000040)=ANY=[], &(0x7f0000000400)='./file0\x00', &(0x7f0000000440)='sysfs\x00', 0x0, 0x0) setxattr$security_evm(0x0, 0x0, 0x0, 0x0, 0x0) statfs(&(0x7f0000000140)='./file0\x00', 0x0) 11:47:48 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000002c0)={{}, 'syz1\x00'}) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x0) [ 529.059326] input: syz1 as /devices/virtual/input/input56 11:47:48 executing program 0: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r3, r4, 0x0, 0x10000000000443) read(r3, &(0x7f00000003c0)=""/72, 0x100000104) 11:47:48 executing program 5: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000140)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f00000004c0)=[{{&(0x7f00000000c0)=@in6={0xa, 0x0, 0x2, @mcast2}, 0x80, 0x0, 0x0, &(0x7f0000000540)=[{0x10}], 0x10}}], 0x1, 0x0) 11:47:48 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000040)=0x1e, 0x4) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) 11:47:48 executing program 1: mmap(&(0x7f0000000000/0x8b000)=nil, 0x8b000, 0x1000004, 0x10000032, 0xffffffffffffffff, 0x0) futex(&(0x7f00000038c0), 0x8c, 0x1, 0x0, 0x0, 0x0) 11:47:48 executing program 2: mknod(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) semget(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000040)=ANY=[], &(0x7f0000000400)='./file0\x00', &(0x7f0000000440)='sysfs\x00', 0x0, 0x0) statfs(&(0x7f0000000140)='./file0\x00', 0x0) 11:47:48 executing program 3: creat(&(0x7f00000000c0)='./bus\x00', 0x0) lremovexattr(&(0x7f0000000000)='./bus\x00', 0x0) 11:47:48 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000140)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f00000004c0)=[{{&(0x7f00000000c0)=@in6={0xa, 0x0, 0x2, @mcast2}, 0x80, 0x0, 0x0, &(0x7f0000000540)=[{0x10}], 0x10}}], 0x1, 0x0) 11:47:48 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x2, 0x0) write$selinux_attr(r0, 0x0, 0x0) 11:47:48 executing program 2: mknod(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) semget(0xffffffffffffffff, 0x0, 0x0) statfs(&(0x7f0000000140)='./file0\x00', 0x0) 11:47:48 executing program 1: mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000002000/0x4000)=nil) socket$netlink(0x10, 0x3, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x4000) io_setup(0x4, &(0x7f0000000040)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x377140be6b5ef4c7}]) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x3ff) 11:47:48 executing program 3: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) rt_sigqueueinfo(r0, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}) ptrace$cont(0x20, r0, 0x0, 0x0) tkill(r0, 0x2f) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x6) 11:47:48 executing program 2: mknod(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) statfs(&(0x7f0000000140)='./file0\x00', 0x0) 11:47:49 executing program 4: openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) 11:47:49 executing program 0: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r3, r4, 0x0, 0x10000000000443) read(r3, &(0x7f00000003c0)=""/72, 0x100000104) 11:47:49 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000140)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f00000004c0)=[{{&(0x7f00000000c0)=@in6={0xa, 0x0, 0x2, @mcast2}, 0x80, 0x0, 0x0, &(0x7f0000000540)=[{0x10}], 0x10}}], 0x1, 0x0) 11:47:49 executing program 1: add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, 0x0, 0xffe2, 0xfffffffffffffffb) 11:47:49 executing program 2: statfs(&(0x7f0000000140)='./file0\x00', 0x0) 11:47:49 executing program 3: 11:47:49 executing program 4: prctl$PR_SET_DUMPABLE(0x4, 0x0) r0 = dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) connect$netlink(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(0x0, 0x0) geteuid() fstat(0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) stat(0x0, 0x0) lstat(0x0, &(0x7f00000005c0)) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) prlimit64(0x0, 0x8, &(0x7f0000000700), 0x0) clock_gettime(0x0, &(0x7f0000002d80)={0x0, 0x0}) recvmmsg(r0, &(0x7f0000002c40)=[{{&(0x7f0000000780)=@alg, 0x80, &(0x7f0000000c40)=[{&(0x7f0000000800)=""/84, 0x54}, {&(0x7f0000000880)=""/83, 0x53}, {&(0x7f0000000900)=""/222, 0xde}, {&(0x7f0000000a00)=""/3, 0x3}, {&(0x7f0000000a40)=""/89, 0x59}, {&(0x7f0000000ac0)=""/153, 0x99}, {&(0x7f0000000b80)=""/156, 0x9c}], 0x7, &(0x7f0000000cc0)=""/3, 0x3}, 0x2}, {{&(0x7f0000000d00)=@l2, 0x80, &(0x7f0000000f80)=[{&(0x7f0000000d80)=""/115, 0x73}, {&(0x7f0000000e00)=""/97, 0x61}, {&(0x7f0000000e80)=""/162, 0xa2}, {&(0x7f0000000f40)=""/7, 0x7}], 0x4, &(0x7f0000000fc0)=""/197, 0xc5}, 0x80000000}, {{&(0x7f00000010c0)=@ll, 0x80, &(0x7f0000001480)=[{&(0x7f0000001140)=""/123, 0x7b}, {&(0x7f00000011c0)=""/132, 0x84}, {&(0x7f0000001280)=""/84, 0x54}, {&(0x7f0000001300)=""/143, 0x8f}, {&(0x7f00000013c0)=""/156, 0x9c}], 0x5, &(0x7f0000001500)=""/4096, 0x1000}, 0x8}, {{&(0x7f0000002500)=@hci, 0x80, &(0x7f0000002680)=[{&(0x7f0000002580)=""/232, 0xe8}], 0x1, &(0x7f00000026c0)=""/208, 0xd0}, 0x3}, {{&(0x7f00000027c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x80, &(0x7f0000002b40)=[{&(0x7f0000002840)=""/128, 0x80}, {&(0x7f00000028c0)=""/138, 0x8a}, {&(0x7f0000002980)=""/232, 0xe8}, {&(0x7f0000002a80)=""/62, 0x3e}, {&(0x7f0000002ac0)=""/100, 0x64}], 0x5, &(0x7f0000002bc0)=""/72, 0x48}, 0x8}], 0x5, 0x100, &(0x7f0000002dc0)={r1, r2+10000000}) clock_settime(0x5, &(0x7f0000002e40)) sendto$unix(r0, &(0x7f0000003240)="866eb9c8c170befcdb44d3352e9b5d70e957320b8e59040026aa690c00593d362f1bf4", 0x23, 0x20000000, 0x0, 0x0) 11:47:49 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, 0x0) sendto$unix(r0, &(0x7f0000000000)="f8", 0x1, 0x20000044, 0x0, 0x0) 11:47:49 executing program 1: ppoll(0x0, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000200)='./file0\x00', 0x13ce, 0x0) fsync(0xffffffffffffffff) openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x28801, 0x0) 11:47:49 executing program 2: statfs(&(0x7f0000000140)='./file0\x00', 0x0) 11:47:49 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000140)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f00000004c0)=[{{&(0x7f00000000c0)=@in6={0xa, 0x0, 0x2, @mcast2}, 0x80, 0x0, 0x0, &(0x7f0000000540)=[{0x10}], 0x10}}], 0x1, 0x0) 11:47:49 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, 0x0) sendto$unix(r0, &(0x7f0000000000)="f8", 0x1, 0x0, 0x0, 0x0) 11:47:49 executing program 2: statfs(&(0x7f0000000140)='./file0\x00', 0x0) 11:47:50 executing program 0: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r3, r4, 0x0, 0x10000000000443) read(r3, &(0x7f00000003c0)=""/72, 0x100000104) 11:47:50 executing program 3: request_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz'}, 0x0, 0xfffffffffffffffc) 11:47:50 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, 0x0, 0x0) sendmmsg(r0, &(0x7f00000004c0)=[{{&(0x7f00000000c0)=@in6={0xa, 0x0, 0x2, @mcast2}, 0x80, 0x0, 0x0, &(0x7f0000000540)=[{0x10}], 0x10}}], 0x1, 0x0) 11:47:50 executing program 2: mknod(0x0, 0x0, 0x0) statfs(&(0x7f0000000140)='./file0\x00', 0x0) 11:47:50 executing program 4: 11:47:50 executing program 3: 11:47:50 executing program 4: 11:47:50 executing program 1: 11:47:50 executing program 2: mknod(0x0, 0x0, 0x0) statfs(&(0x7f0000000140)='./file0\x00', 0x0) 11:47:50 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, 0x0, 0x0) sendmmsg(r0, &(0x7f00000004c0)=[{{&(0x7f00000000c0)=@in6={0xa, 0x0, 0x2, @mcast2}, 0x80, 0x0, 0x0, &(0x7f0000000540)=[{0x10}], 0x10}}], 0x1, 0x0) 11:47:50 executing program 0: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r3, r4, 0x0, 0x10000000000443) read(r3, &(0x7f00000003c0)=""/72, 0x100000104) 11:47:50 executing program 3: 11:47:50 executing program 4: 11:47:50 executing program 0: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r3, r4, 0x0, 0x10000000000443) read(r3, &(0x7f00000003c0)=""/72, 0x100000104) 11:47:50 executing program 2: mknod(0x0, 0x0, 0x0) statfs(&(0x7f0000000140)='./file0\x00', 0x0) 11:47:50 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, 0x0, 0x0) sendmmsg(r0, &(0x7f00000004c0)=[{{&(0x7f00000000c0)=@in6={0xa, 0x0, 0x2, @mcast2}, 0x80, 0x0, 0x0, &(0x7f0000000540)=[{0x10}], 0x10}}], 0x1, 0x0) 11:47:50 executing program 4: 11:47:51 executing program 3: 11:47:51 executing program 1: 11:47:51 executing program 2: mknod(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) statfs(0x0, 0x0) 11:47:51 executing program 0: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r3, r4, 0x0, 0x10000000000443) read(r3, &(0x7f00000003c0)=""/72, 0x100000104) 11:47:51 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000140)=@req3={0x0, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f00000004c0)=[{{&(0x7f00000000c0)=@in6={0xa, 0x0, 0x2, @mcast2}, 0x80, 0x0, 0x0, &(0x7f0000000540)=[{0x10}], 0x10}}], 0x1, 0x0) 11:47:51 executing program 3: 11:47:51 executing program 4: 11:47:51 executing program 1: 11:47:51 executing program 2: mknod(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) statfs(0x0, 0x0) 11:47:51 executing program 0: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r3, r4, 0x0, 0x10000000000443) read(r3, &(0x7f00000003c0)=""/72, 0x100000104) 11:47:51 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000140)=@req3={0x0, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f00000004c0)=[{{&(0x7f00000000c0)=@in6={0xa, 0x0, 0x2, @mcast2}, 0x80, 0x0, 0x0, &(0x7f0000000540)=[{0x10}], 0x10}}], 0x1, 0x0) 11:47:51 executing program 3: 11:47:51 executing program 1: 11:47:51 executing program 4: 11:47:51 executing program 2: mknod(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) statfs(0x0, 0x0) 11:47:51 executing program 0: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, 0x0, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r3, r4, 0x0, 0x10000000000443) read(r3, &(0x7f00000003c0)=""/72, 0x100000104) 11:47:51 executing program 1: 11:47:51 executing program 3: 11:47:52 executing program 4: 11:47:52 executing program 1: 11:47:52 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000140)=@req3={0x0, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f00000004c0)=[{{&(0x7f00000000c0)=@in6={0xa, 0x0, 0x2, @mcast2}, 0x80, 0x0, 0x0, &(0x7f0000000540)=[{0x10}], 0x10}}], 0x1, 0x0) 11:47:52 executing program 0: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r3 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r3, r4, 0x0, 0x10000000000443) read(r3, &(0x7f00000003c0)=""/72, 0x100000104) 11:47:52 executing program 2: 11:47:52 executing program 1: 11:47:52 executing program 4: 11:47:52 executing program 0: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r3 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r3, r4, 0x0, 0x10000000000443) read(r3, &(0x7f00000003c0)=""/72, 0x100000104) 11:47:52 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000140)=@req3={0x10000, 0x0, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f00000004c0)=[{{&(0x7f00000000c0)=@in6={0xa, 0x0, 0x2, @mcast2}, 0x80, 0x0, 0x0, &(0x7f0000000540)=[{0x10}], 0x10}}], 0x1, 0x0) 11:47:52 executing program 3: 11:47:52 executing program 2: 11:47:52 executing program 1: 11:47:52 executing program 4: 11:47:52 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000140)=@req3={0x10000, 0x0, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f00000004c0)=[{{&(0x7f00000000c0)=@in6={0xa, 0x0, 0x2, @mcast2}, 0x80, 0x0, 0x0, &(0x7f0000000540)=[{0x10}], 0x10}}], 0x1, 0x0) 11:47:52 executing program 0: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r3 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r3, r4, 0x0, 0x10000000000443) read(r3, &(0x7f00000003c0)=""/72, 0x100000104) 11:47:52 executing program 3: 11:47:52 executing program 2: 11:47:52 executing program 4: 11:47:52 executing program 1: 11:47:53 executing program 0: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r3, r4, 0x0, 0x10000000000443) read(r3, &(0x7f00000003c0)=""/72, 0x100000104) 11:47:53 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000140)=@req3={0x10000, 0x0, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f00000004c0)=[{{&(0x7f00000000c0)=@in6={0xa, 0x0, 0x2, @mcast2}, 0x80, 0x0, 0x0, &(0x7f0000000540)=[{0x10}], 0x10}}], 0x1, 0x0) 11:47:53 executing program 3: 11:47:53 executing program 2: 11:47:53 executing program 0: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r3, r4, 0x0, 0x10000000000443) read(r3, &(0x7f00000003c0)=""/72, 0x100000104) 11:47:53 executing program 1: 11:47:53 executing program 4: 11:47:53 executing program 2: 11:47:53 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000140)=@req3={0x10000, 0x100000001, 0x0, 0x1}, 0x1c) sendmmsg(r0, &(0x7f00000004c0)=[{{&(0x7f00000000c0)=@in6={0xa, 0x0, 0x2, @mcast2}, 0x80, 0x0, 0x0, &(0x7f0000000540)=[{0x10}], 0x10}}], 0x1, 0x0) 11:47:53 executing program 1: 11:47:53 executing program 3: 11:47:53 executing program 2: 11:47:53 executing program 0: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r3, r4, 0x0, 0x10000000000443) read(r3, &(0x7f00000003c0)=""/72, 0x100000104) 11:47:53 executing program 4: 11:47:53 executing program 1: 11:47:53 executing program 2: 11:47:53 executing program 3: 11:47:53 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000140)=@req3={0x10000, 0x100000001, 0x0, 0x1}, 0x1c) sendmmsg(r0, &(0x7f00000004c0)=[{{&(0x7f00000000c0)=@in6={0xa, 0x0, 0x2, @mcast2}, 0x80, 0x0, 0x0, &(0x7f0000000540)=[{0x10}], 0x10}}], 0x1, 0x0) 11:47:53 executing program 4: 11:47:53 executing program 0: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r3, r4, 0x0, 0x10000000000443) read(r3, &(0x7f00000003c0)=""/72, 0x100000104) 11:47:54 executing program 2: 11:47:54 executing program 3: 11:47:54 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000140)=@req3={0x10000, 0x100000001, 0x0, 0x1}, 0x1c) sendmmsg(r0, &(0x7f00000004c0)=[{{&(0x7f00000000c0)=@in6={0xa, 0x0, 0x2, @mcast2}, 0x80, 0x0, 0x0, &(0x7f0000000540)=[{0x10}], 0x10}}], 0x1, 0x0) 11:47:54 executing program 1: 11:47:54 executing program 0: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r3, r4, 0x0, 0x10000000000443) read(r3, &(0x7f00000003c0)=""/72, 0x100000104) 11:47:54 executing program 4: 11:47:54 executing program 2: 11:47:54 executing program 0: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r3, r4, 0x0, 0x10000000000443) read(r3, &(0x7f00000003c0)=""/72, 0x100000104) 11:47:54 executing program 3: 11:47:54 executing program 1: 11:47:54 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000140)=@req3={0x10000, 0x100000001, 0x10000}, 0x1c) sendmmsg(r0, &(0x7f00000004c0)=[{{&(0x7f00000000c0)=@in6={0xa, 0x0, 0x2, @mcast2}, 0x80, 0x0, 0x0, &(0x7f0000000540)=[{0x10}], 0x10}}], 0x1, 0x0) 11:47:54 executing program 4: 11:47:54 executing program 3: 11:47:54 executing program 2: 11:47:54 executing program 0: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000100), 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r3, r4, 0x0, 0x10000000000443) read(r3, &(0x7f00000003c0)=""/72, 0x100000104) 11:47:54 executing program 1: 11:47:54 executing program 4: 11:47:54 executing program 3: 11:47:54 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000140)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f00000004c0)=[{{&(0x7f00000000c0)=@in6={0xa, 0x0, 0x2, @mcast2}, 0x80, 0x0, 0x0, &(0x7f0000000540)=[{0x10}], 0x10}}], 0x1, 0x0) 11:47:54 executing program 0: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000100), 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r3, r4, 0x0, 0x10000000000443) read(r3, &(0x7f00000003c0)=""/72, 0x100000104) 11:47:54 executing program 2: 11:47:55 executing program 1: 11:47:55 executing program 4: 11:47:55 executing program 3: 11:47:55 executing program 1: 11:47:55 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000140)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, 0x0, 0x0, 0x0) 11:47:55 executing program 2: 11:47:55 executing program 0: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000100), 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r3, r4, 0x0, 0x10000000000443) read(r3, &(0x7f00000003c0)=""/72, 0x100000104) 11:47:55 executing program 4: 11:47:55 executing program 1: 11:47:55 executing program 3: 11:47:55 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000140)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, 0x0, 0x0, 0x0) 11:47:55 executing program 2: 11:47:55 executing program 0: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000100)="c7da", 0x2) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r3, r4, 0x0, 0x10000000000443) read(r3, &(0x7f00000003c0)=""/72, 0x100000104) 11:47:55 executing program 4: 11:47:55 executing program 1: 11:47:55 executing program 3: 11:47:55 executing program 2: 11:47:55 executing program 4: 11:47:55 executing program 0: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000100)="c7da", 0x2) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r3, r4, 0x0, 0x10000000000443) read(r3, &(0x7f00000003c0)=""/72, 0x100000104) 11:47:56 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000140)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, 0x0, 0x0, 0x0) 11:47:56 executing program 3: 11:47:56 executing program 1: 11:47:56 executing program 2: 11:47:56 executing program 4: 11:47:56 executing program 0: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000100)="c7da", 0x2) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r3, r4, 0x0, 0x10000000000443) read(r3, &(0x7f00000003c0)=""/72, 0x100000104) 11:47:56 executing program 3: 11:47:56 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000140)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f00000004c0), 0x0, 0x0) 11:47:56 executing program 1: 11:47:56 executing program 4: 11:47:56 executing program 2: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x1000f4) sendfile(r1, 0xffffffffffffffff, 0x0, 0x8000fffffffe) r2 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) sendfile(r0, r2, 0x0, 0x8000fffffffe) 11:47:56 executing program 0: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000100)="c7da5f", 0x3) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r3, r4, 0x0, 0x10000000000443) read(r3, &(0x7f00000003c0)=""/72, 0x100000104) 11:47:56 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') close(r0) 11:47:56 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000140)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f00000004c0), 0x0, 0x0) 11:47:56 executing program 1: 11:47:56 executing program 4: 11:47:56 executing program 0: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000100)="c7da5f", 0x3) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r3, r4, 0x0, 0x10000000000443) read(r3, &(0x7f00000003c0)=""/72, 0x100000104) 11:47:56 executing program 1: 11:47:56 executing program 3: 11:47:56 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='oom_score_adj\x00') write$binfmt_elf32(r0, 0x0, 0x0) 11:47:56 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000140)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f00000004c0), 0x0, 0x0) 11:47:57 executing program 0: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000100)="c7da5f", 0x3) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r3, r4, 0x0, 0x10000000000443) read(r3, &(0x7f00000003c0)=""/72, 0x100000104) 11:47:57 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000180)="b1"}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000001c0)={0xcb, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0b63000081426de78af549ea6b95ee42b238ca2bcde0ba7649ebb8c2bf5e43d3ac6962fe6182415e992459df89f24ce92077acbd44db90b8b9fc8df787bd1c9e0001eb70d0bff2a073c4ed7faa4e4d24069f6e6c100ed4c820af45c189fe485fb01526517d766ea02a9f222e0906eaaa6919166c98f478c47995be69b0d3df5e61c0e4b6cb1ff312eeaa61ef42d271d54849b5155c54b2420fa5de436cd1cb68b1ff1889e237949da25c526c2963920ec3807326ae314f64b3e07d9eaa000019000000000018a94d9dc30f"], 0x0, 0x0, 0x0}) 11:47:57 executing program 1: r0 = syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f00000001c0)) 11:47:57 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSSOFTCAR(r0, 0x541a, &(0x7f0000000080)) 11:47:57 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000140)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f00000004c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[{0x10}], 0x10}}], 0x1, 0x0) [ 538.227587] binder: 17990:17994 ioctl c0306201 0 returned -14 11:47:57 executing program 4: r0 = syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f00000001c0)=0x20000000000001) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x0, 0x1}}) 11:47:57 executing program 0: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) r4 = syz_open_procfs(0x0, 0x0) sendfile(r3, r4, 0x0, 0x10000000000443) read(r3, &(0x7f00000003c0)=""/72, 0x100000104) [ 538.312947] binder: 17990:17998 ERROR: BC_REGISTER_LOOPER called without request [ 538.320528] binder: 17990:17998 unknown command -412269951 [ 538.326396] binder: 17990:17998 ioctl c0306201 200001c0 returned -22 11:47:57 executing program 1: r0 = syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)) 11:47:57 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, 0x0) 11:47:57 executing program 0: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) r4 = syz_open_procfs(0x0, 0x0) sendfile(r3, r4, 0x0, 0x10000000000443) read(r3, &(0x7f00000003c0)=""/72, 0x100000104) 11:47:57 executing program 4: r0 = syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, 0x0) 11:47:57 executing program 1: r0 = syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, 0x0) 11:47:57 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000140)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f00000004c0)=[{{&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, 0x0, 0x0, &(0x7f0000000540)=[{0x10}], 0x10}}], 0x1, 0x0) 11:47:58 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') ppoll(&(0x7f0000000000)=[{r0}], 0x1, 0x0, &(0x7f0000000080)={0x1}, 0x8) 11:47:58 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') lseek(r0, 0x0, 0x3) 11:47:58 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02030609100000000000004c9e0000000200130002090000000000000000000105000600200000000a00000000000020000500e50000070000001f000048ece3de97300fe40000000200010000000000000000020000000005000500000000000a00000000ecfffffe1700000000000000000000000001170000000000000040"], 0x80}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x400000000000002, 0x0) 11:47:58 executing program 0: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) r4 = syz_open_procfs(0x0, 0x0) sendfile(r3, r4, 0x0, 0x10000000000443) read(r3, &(0x7f00000003c0)=""/72, 0x100000104) 11:47:58 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000280), 0x4) 11:47:58 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000140)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f00000004c0)=[{{&(0x7f00000000c0)=@in6={0xa, 0x0, 0x2, @mcast2}, 0x80, 0x0}}], 0x1, 0x0) [ 539.018277] binder: 17990:17998 ioctl c0306201 0 returned -14 11:47:58 executing program 0: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(0xffffffffffffffff, r4, 0x0, 0x10000000000443) read(r3, &(0x7f00000003c0)=""/72, 0x100000104) 11:47:58 executing program 4: nanosleep(&(0x7f0000000000)={0x0, 0x989680}, 0x0) 11:47:58 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/snmp6\x00') clock_gettime(0x0, &(0x7f0000002000)) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) 11:47:58 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000140)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f00000004c0)=[{{&(0x7f00000000c0)=@in6={0xa, 0x0, 0x2, @mcast2}, 0x80, 0x0}}], 0x1, 0x0) 11:47:58 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSSOFTCAR(r0, 0x541a, 0x0) 11:47:58 executing program 4: syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x20, 0x84000) 11:47:59 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='mountstats\x00') sendfile(r0, r0, 0x0, 0x3f) 11:47:59 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='mountstats\x00') 11:47:59 executing program 0: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(0xffffffffffffffff, r4, 0x0, 0x10000000000443) read(r3, &(0x7f00000003c0)=""/72, 0x100000104) 11:47:59 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000140)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f00000004c0)=[{{&(0x7f00000000c0)=@in6={0xa, 0x0, 0x2, @mcast2}, 0x80, 0x0}}], 0x1, 0x0) 11:47:59 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSSOFTCAR(r0, 0x541a, 0x0) 11:47:59 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "634fe1be9f7d7e180c7068798b0808cd522df252a813ed1bb7a06358150c70d1222fb45ba3b97cd76dadab98ba46ebaf61b442d04c3ca44642382ee2ec597e08", "4ea77e1256a250966d3d6b541f52fc8914ee1951f4ef1ce6becae2fa1016db1b"}) 11:47:59 executing program 0: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(0xffffffffffffffff, r4, 0x0, 0x10000000000443) read(r3, &(0x7f00000003c0)=""/72, 0x100000104) 11:47:59 executing program 1: fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, 0x0) r0 = syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f00000001c0)) 11:47:59 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) lseek(r0, 0x0, 0x0) 11:47:59 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSSOFTCAR(r0, 0x541a, 0x0) 11:47:59 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) close(r1) 11:47:59 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000140)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f00000004c0)=[{{&(0x7f00000000c0)=@in6={0xa, 0x0, 0x2, @mcast2}, 0x80, 0x0, 0x0, &(0x7f0000000540)}}], 0x1, 0x0) 11:47:59 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r0, &(0x7f0000001300)=[{&(0x7f0000000080)=""/219, 0xdb}, {&(0x7f0000000200)=""/4096, 0x1000}], 0x2, 0x0) 11:47:59 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setpriority(0x2, 0x0, 0x0) 11:47:59 executing program 0: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r3, 0xffffffffffffffff, 0x0, 0x10000000000443) read(r3, &(0x7f00000003c0)=""/72, 0x100000104) 11:47:59 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/igmp\x00') prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) 11:47:59 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000040)) 11:47:59 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSSOFTCAR(r0, 0x541a, 0x0) 11:47:59 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000140)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f00000004c0)=[{{&(0x7f00000000c0)=@in6={0xa, 0x0, 0x2, @mcast2}, 0x80, 0x0, 0x0, &(0x7f0000000540)}}], 0x1, 0x0) 11:47:59 executing program 0: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r3, 0xffffffffffffffff, 0x0, 0x10000000000443) read(r3, &(0x7f00000003c0)=""/72, 0x100000104) 11:47:59 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12}, &(0x7f0000000180)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x3d, 0x0) write(r1, &(0x7f0000c34fff), 0xffffff0b) close(r1) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000015) 11:47:59 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='bdev\x00', 0x0, 0x0) 11:47:59 executing program 1: r0 = eventfd(0x100000000002008) read$eventfd(r0, &(0x7f0000000000), 0x8) 11:48:00 executing program 3: ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, 0x0) 11:48:00 executing program 0: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r3, 0xffffffffffffffff, 0x0, 0x10000000000443) read(r3, &(0x7f00000003c0)=""/72, 0x100000104) 11:48:00 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') lseek(r0, 0x0, 0x0) 11:48:00 executing program 2: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, 0x0, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000140)) write$cgroup_type(r0, &(0x7f0000000340)='threaded\x00', 0xffffffc5) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) ioctl$void(0xffffffffffffffff, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setregset(0x4209, 0x0, 0x0, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) pipe(0x0) getdents(0xffffffffffffffff, 0x0, 0x0) 11:48:00 executing program 3: ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, 0x0) 11:48:00 executing program 1: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000380), 0x1c) fallocate(r0, 0x0, 0x0, 0x1000f4) r1 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000fffffffe) 11:48:00 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000140)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) sendmmsg(r0, &(0x7f00000004c0)=[{{&(0x7f00000000c0)=@in6={0xa, 0x0, 0x2, @mcast2}, 0x80, 0x0, 0x0, &(0x7f0000000540)}}], 0x1, 0x0) 11:48:00 executing program 0: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r3, r4, 0x0, 0x0) read(r3, &(0x7f00000003c0)=""/72, 0x100000104) 11:48:00 executing program 3: ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, 0x0) 11:48:03 executing program 0: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r3, r4, 0x0, 0x0) read(r3, &(0x7f00000003c0)=""/72, 0x100000104) 11:48:03 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12}, &(0x7f0000000180)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x3d, 0x0) write(r1, &(0x7f0000c34fff), 0xffffff0b) close(r1) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000015) 11:48:03 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)="03", 0x1}], 0x1) 11:48:03 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSSOFTCAR(r0, 0x541a, 0x0) 11:48:03 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') clock_gettime(0x0, &(0x7f0000002000)) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) 11:48:03 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ion\x00', 0x0, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685) 11:48:03 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSSOFTCAR(r0, 0x541a, 0x0) 11:48:03 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x18000000000002a0, 0x34, 0x0, &(0x7f0000000280)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d1788e8ad30d84648a27f11c72be0000e01e1977d48", 0x0, 0x100}, 0x28) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000002c0), 0xffffffffffffff05) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000006c0)={'rose0\x00', 0x2000}) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000500)) bpf$MAP_CREATE(0x0, &(0x7f0000000300)={0x9, 0xcc, 0x5, 0x9, 0x5, 0x1, 0xc7}, 0x2c) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000100)) 11:48:03 executing program 0: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r3, r4, 0x0, 0x0) read(r3, &(0x7f00000003c0)=""/72, 0x100000104) 11:48:03 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x18000000000002a0, 0x34, 0x0, &(0x7f0000000280)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d1788e8ad30d84648a27f11c72be0000e01e1977d48", 0x0, 0x100}, 0x28) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000140), 0x4) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000004c0)='pids.events\x00', 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000500)=r1) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001000)=ANY=[], &(0x7f0000000100)='GPL\x00'}, 0x48) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000100)) 11:48:03 executing program 1: clone(0x403502001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket(0x80000000010, 0x100000802, 0x0) sendto(r0, &(0x7f0000000000)="120000001200e7ef007b1a41cd00000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x144}, {&(0x7f00000000c0)=""/85, 0x6f6}, {&(0x7f0000000fc0)=""/4096, 0x1064}, {&(0x7f0000000400)=""/120, 0x1078}, {&(0x7f0000000480)=""/60, 0x3c}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x10}, {&(0x7f0000000340)=""/22, 0x15}], 0x8, &(0x7f0000002400)=""/191, 0xfffffffffffffeb2}}], 0x4000000000000f6, 0x0, &(0x7f0000003700)={0x77359400}) r1 = socket(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000100)={'veth1_to_team\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="ffff000010e4ff88b423968e45c34702000060"]}) ppoll(&(0x7f0000000080), 0x28, 0x0, &(0x7f0000000140), 0x8) setsockopt$inet_int(r1, 0x0, 0x40, &(0x7f0000000080), 0x4) 11:48:03 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSSOFTCAR(r0, 0x541a, 0x0) 11:48:03 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12}, &(0x7f0000000180)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x3d, 0x0) write(r1, &(0x7f0000c34fff), 0xffffff0b) close(r1) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000015) 11:48:03 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, 0x0) 11:48:03 executing program 0: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r3, r4, 0x0, 0x10000000000443) read(0xffffffffffffffff, &(0x7f00000003c0)=""/72, 0x100000104) 11:48:03 executing program 5: setrlimit(0x7, &(0x7f0000000040)) perf_event_open(&(0x7f0000aaa000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 11:48:03 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xfffffffffffffffc, 0x31, 0xffffffffffffffff, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r1, 0x4010ae74, &(0x7f0000000040)) 11:48:03 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, 0x0) 11:48:04 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x2000007, 0x11, r1, 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x6100) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) ftruncate(r2, 0x88200) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000005f00)={'filter\x00', 0x4}, 0x68) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0x175d9345) recvmmsg(0xffffffffffffffff, &(0x7f0000009000)=[{{0x0, 0x0, &(0x7f0000004200)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x9) 11:48:04 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) bpf$OBJ_GET_PROG(0x7, &(0x7f00000002c0)={&(0x7f0000000140)='./file0\x00'}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003e40)={&(0x7f0000001500)=@xdp={0x2c, 0x2, 0x0, 0x28}, 0x80, &(0x7f00000039c0), 0x0, &(0x7f0000003a80)}, 0x40000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r1, 0x18000000000002a0, 0x34, 0x0, &(0x7f0000000280)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d1788e8ad30d84648a27f11c72be0000e01e1977d48", 0x0, 0x100}, 0x28) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000140), 0x4) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000002c0), 0xffffffffffffff05) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000006c0)={'rose0\x00', 0x2000}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfffffffffffffffa) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000004c0)='pids.events\x00', 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000500)=r2) bpf$MAP_CREATE(0x0, &(0x7f0000000300)={0x9, 0xcc, 0x5, 0x9, 0x5, 0x1, 0xc7}, 0x2c) socketpair(0x9, 0x5, 0x1fffffffe, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x1, 0x2000000001, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) recvmsg$kcm(r3, &(0x7f0000000700)={&(0x7f0000000400)=@alg, 0x80, &(0x7f0000000640)=[{&(0x7f0000000780)=""/242, 0xf2}, {&(0x7f0000000480)}, {&(0x7f0000000880)=""/208, 0xd0}, {&(0x7f0000000540)=""/26, 0x1a}, {&(0x7f0000000980)=""/219, 0xdb}, {&(0x7f0000000580)=""/68, 0x44}], 0x6, &(0x7f0000001580)=""/4096, 0x1000, 0x100000001}, 0x1) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x6, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b70200000036977e159a6c9f0a0000000703000000feffff7a0af0fff8ffefff79a4f0ff00000000b7060000ffffffff2d64050000000000650404000100000004040000f2000000b7050000230000006a0a00fe000000008500000036000000b700000000000000950000000000ce9b"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r5, 0x0, 0xe, 0x0, &(0x7f0000000380)="8e5712f9ec625ca6752406da588e", 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000100)) 11:48:04 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12}, &(0x7f0000000180)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x3d, 0x0) write(r1, &(0x7f0000c34fff), 0xffffff0b) close(r1) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000015) 11:48:04 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) bpf$OBJ_GET_PROG(0x7, &(0x7f00000002c0)={&(0x7f0000000140)='./file0\x00'}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r1, 0x18000000000002a0, 0x34, 0x0, &(0x7f0000000280)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d1788e8ad30d84648a27f11c72be0000e01e1977d48", 0x0, 0x100}, 0x28) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000140), 0x4) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000006c0)={'rose0\x00', 0x2000}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfffffffffffffffa) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000500)=r2) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001000)=ANY=[], &(0x7f0000000100)='GPL\x00'}, 0x48) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000100)) 11:48:04 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x18000000000002a0, 0x34, 0x0, &(0x7f0000000280)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d1788e8ad30d84648a27f11c72be0000e01e1977d48", 0x0, 0x100}, 0x28) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000004c0)='pids.events\x00', 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000500)) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000100)) 11:48:04 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, 0x0) 11:48:04 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) bpf$OBJ_GET_PROG(0x7, &(0x7f00000002c0)={&(0x7f0000000140)='./file0\x00'}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r1, 0x18000000000002a0, 0x34, 0x0, &(0x7f0000000280)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d1788e8ad30d84648a27f11c72be0000e01e1977d48", 0x0, 0x100}, 0x28) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000140), 0x4) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000002c0), 0xffffffffffffff05) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000006c0)={'rose0\x00', 0x2000}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfffffffffffffffa) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000004c0)='pids.events\x00', 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000500)=r2) bpf$MAP_CREATE(0x0, &(0x7f0000000300)={0x9, 0xcc, 0x5, 0x9, 0x5, 0x1, 0xc7}, 0x2c) socketpair(0x9, 0x5, 0x1fffffffe, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000100)) 11:48:04 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x18000000000002a0, 0x34, 0x0, &(0x7f0000000280)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d1788e8ad30d84648a27f11c72be0000e01e1977d48", 0x0, 0x100}, 0x28) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000004c0)='pids.events\x00', 0x0, 0x0) 11:48:04 executing program 0: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r3, r4, 0x0, 0x10000000000443) read(0xffffffffffffffff, &(0x7f00000003c0)=""/72, 0x100000104) 11:48:04 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x18000000000002a0, 0x34, 0x0, &(0x7f0000000280)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d1788e8ad30d84648a27f11c72be0000e01e1977d48", 0x0, 0x100}, 0x28) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000140), 0x4) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000006c0)={'rose0\x00', 0x2000}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000004c0)='pids.events\x00', 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000500)=r1) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001000)=ANY=[], &(0x7f0000000100)='GPL\x00'}, 0x48) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000100)) 11:48:04 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440)=[@mss], 0x80c5c9b036709a5) 11:48:04 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000e05000)=ANY=[@ANYBLOB="020f00001400000000000000000000000800120000000300000000000000000006000000000000000000000000000000000000000000000000f9ffffff000000ff02000000000000000000000000000105000500000000000a0000000000000000000000000000000000ffffac141400000000000000000005000600000000000a00030000000000fe8000000000000000000000000000ff0000000000000000"], 0xa0}}, 0x0) 11:48:04 executing program 2: r0 = socket(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000500)=ANY=[@ANYBLOB="1800000016000102000000000000000034bf0000f739c9df96a86ff2a90301951c1c3475c7171786788a8ce8f66cc794a148201dcc15cf72bec0f87dde17cc71e4a1ce149a3e4b73de36b7f6d63f3745e4acf12094e4daa83d7fa39968cce471c1c1f3e6db7b5f6f4ab2d0b0119444692c625634fe4e91569c7361aa991a2dbe13ce00000080000000008ce9506f49b7dc588ac887ba09d053bed772484888599fa45e66b376", @ANYRES32=0x0], 0x2}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000080), 0x4924924924926ab, 0x0) 11:48:05 executing program 4: gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12}, &(0x7f0000000180)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x3d, 0x0) write(r0, &(0x7f0000c34fff), 0xffffff0b) close(r0) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) 11:48:05 executing program 5: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000240)="81d0e6b56f4ccf8145ee279037fead423ca9d91a21c2ecd1eafec1017f3a0e47b95bfe2d8b6b00672046cc509b40a09ed107f269cb5bbd2020dce3127734f531c599f35cf53662f2cf1c6c6ddba3e0a147523c5ad181d7f8126e9158e276561c82a2c28692ed2ab398fe606cd14eae5f4776004148f6793f10a09847efe61051da1ccaaad0118c0497102863610cd1f90c1dbed7cafd771c8e6c0d3e0ecdd76d8087a66f8b98e4058fa43258cda3938127dc2a3c12f7257216de19855be746d9937ad2b18a00f9c5a40adf966a41cb69ce31b50aa3bb926878f15bf64da764", 0xdf}], 0x1, 0x0) 11:48:05 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) bpf$OBJ_GET_PROG(0x7, &(0x7f00000002c0)={&(0x7f0000000140)='./file0\x00'}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r1, 0x18000000000002a0, 0x34, 0x0, &(0x7f0000000280)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d1788e8ad30d84648a27f11c72be0000e01e1977d48", 0x0, 0x100}, 0x28) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000140), 0x4) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000002c0), 0xffffffffffffff05) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000006c0)={'rose0\x00', 0x2000}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfffffffffffffffa) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000004c0)='pids.events\x00', 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000500)=r2) bpf$MAP_CREATE(0x0, &(0x7f0000000300)={0x9, 0xcc, 0x5, 0x9, 0x5, 0x1, 0xc7}, 0x2c) socketpair(0x9, 0x5, 0x1fffffffe, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001000)=ANY=[], &(0x7f0000000100)='GPL\x00'}, 0x48) socketpair(0x1, 0x2000000001, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000100)) 11:48:05 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) recvmsg$kcm(r0, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000440)="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", 0xfb}], 0x1}, 0x0) 11:48:05 executing program 2: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000100)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000340)='io\x00[\xfcW\x16\x9b\xab\xeeT\xed\x16\xe3\x9ez\x8f\xe4\xb9\x00\x16\xf2f\xe3\xf6h\xd8p=\xb44\x9do|\x16*\x060&W \xc4CxI\xd1\x8aW[_\x96\xf6-7\x7fz\x13h\xc7\xbb3\x00\x00\x00\x00\x14\xef\xf5\xb6\xe5\x96\bxde\xb9\x10\xe9\xbf\x81^\xac\x9dl\xe4\xe4\x96T\xc7U\xf3\xe8=\xb3\x8d\x9dDm\x9f\xc6\xd92') 11:48:06 executing program 0: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r3, r4, 0x0, 0x10000000000443) read(r3, 0x0, 0x0) 11:48:06 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ff07008fbda33d88c000001018dd5d"], 0x15}}, 0x0) recvmmsg(r0, &(0x7f00000013c0), 0x2ca3bfc89d2264d, 0x2, &(0x7f0000000c40)={0x0, 0x989680}) [ 547.875254] tmpfs: Bad mount option m!a¹<µtù¥@J±êœ8aãvOפ™ÜüÇžÒìôÎnãÒÂ¥%‹›z‘«µ:WH¶"ËSmùûƵ$$Áù7EÌZXŒnÆŽ(ºîjõ¡+ÁñKÐ)·ê™ 11:48:07 executing program 3: socket$inet6(0xa, 0x0, 0xaa) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x3ff800) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6(0xa, 0x803, 0x20) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") 11:48:07 executing program 5: r0 = socket$inet6(0xa, 0x4000000080002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x6}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x1, &(0x7f0000000080)=0x7, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0xffffffffffffffff, 0x0, @ipv4}, 0x2c) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x50}}, {{0x0, 0x0, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40001ab, 0x0) 11:48:07 executing program 4: gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12}, &(0x7f0000000180)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x3d, 0x0) write(r0, &(0x7f0000c34fff), 0xffffff0b) 11:48:07 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x1) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) socket$packet(0x11, 0x2, 0x300) getsockopt$inet6_mreq(r0, 0x29, 0x1f, &(0x7f0000000040)={@dev}, &(0x7f0000000080)=0x14) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x4000030, 0x0) 11:48:07 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000005440)="2e000000120081aee4050cecdb4cb90425485e510befccd77f3e9cf0758ef9000600b0eba06ac400040003000000", 0x2e}], 0x1}, 0x0) 11:48:07 executing program 1: r0 = socket$inet6(0xa, 0x4000000080002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x6}, 0x1c) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x50}}, {{0x0, 0x0, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40001ab, 0x0) 11:48:07 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="0a00759705e381e5b3b60ced5c54dbb798", 0x11) 11:48:07 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f00000000c0)='cpu.stat\x00', 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000280)='cpu.stat\x00', 0x2761, 0x0) 11:48:07 executing program 0: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r3, r4, 0x0, 0x10000000000443) read(r3, 0x0, 0x0) 11:48:08 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f00000000c0)='cpu.stat\x00', 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000280)='cpu.stat\x00', 0x2761, 0x0) 11:48:08 executing program 5: socket$inet(0x2, 0x4000000000000001, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) close(0xffffffffffffffff) pipe2(0x0, 0x0) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) recvfrom(r1, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x10100, 0x0, 0xfffffffffffffe75) 11:48:08 executing program 4: gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12}, &(0x7f0000000180)) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x3d, 0x0) 11:48:08 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f00000000c0)='cpu.stat\x00', 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000280)='cpu.stat\x00', 0x2761, 0x0) 11:48:08 executing program 4: gettid() openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x3d, 0x0) 11:48:08 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f00000000c0)='cpu.stat\x00', 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000280)='cpu.stat\x00', 0x2761, 0x0) 11:48:09 executing program 3: r0 = socket$inet(0x2, 0x3, 0x19) setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x81, &(0x7f0000000100)={'filter\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0x0, 0x0, [], 0x1, 0x0, 0x0, [{}]}, 0x88) 11:48:09 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x3d, 0x0) [ 550.305201] kernel msg: ebtables bug: please report to author: Wrong nr of counters 11:48:09 executing program 1: syz_emit_ethernet(0x36, &(0x7f00000000c0)={@broadcast, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0xffffff88, 0x0, @rand_addr, @broadcast}, @icmp=@timestamp}}}}, 0x0) 11:48:09 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000280)='cpu.stat\x00', 0x2761, 0x0) 11:48:09 executing program 0: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r3, r4, 0x0, 0x10000000000443) read(r3, 0x0, 0x0) 11:48:09 executing program 5: r0 = socket(0x200000000000011, 0x802, 0x4001000dd86) r1 = accept4$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000002c0)=0x14, 0x80800) bind$packet(r0, &(0x7f0000000000)={0x11, 0x15, r2, 0x1, 0x3df5, 0x6, @broadcast}, 0x14) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'sit0\x00', r2}) bind$packet(r0, &(0x7f00000000c0)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) getsockopt(r1, 0x23, 0x10001, &(0x7f0000000400)=""/4096, &(0x7f0000000340)=0x1000) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000040), &(0x7f0000000100)=0x68) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x1ff) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000001c0)={0xfb9, 0x2, 0x7, 0x101, 0x0}, &(0x7f0000000200)=0x10) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000240)=@sack_info={r4, 0x1}, 0xc) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000140)="fb", 0x1}], 0x1) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) 11:48:09 executing program 4: openat$ptmx(0xffffffffffffff9c, 0x0, 0x3d, 0x0) 11:48:09 executing program 3: r0 = socket(0x200000000000011, 0x802, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0xc0045878, 0x0) [ 550.627782] syz-executor1 (18432) used greatest stack depth: 53560 bytes left 11:48:09 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x400000000001, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000001080)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80) write(r0, &(0x7f0000000280), 0xba6c1c86) ioctl$TCSETAF(r1, 0x541b, &(0x7f0000000000)) 11:48:09 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) 11:48:09 executing program 2: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpu.stat\x00', 0x2761, 0x0) 11:48:10 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, 0x0, 0x3f) fadvise64(r0, 0x0, 0x0, 0x4) 11:48:10 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000280)='cpu.stat\x00', 0x2761, 0x0) 11:48:10 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capget(&(0x7f0000000080), 0x0) 11:48:10 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) 11:48:10 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) time(0x0) close(r0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) getsockname$inet(r0, 0x0, 0x0) setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x81, 0x0, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000140)=[@window, @timestamp], 0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, 0x0, &(0x7f0000000380)) getxattr(0x0, 0x0, &(0x7f0000000080)=""/118, 0x76) 11:48:10 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpu.stat\x00', 0x2761, 0x0) 11:48:10 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) 11:48:10 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) time(0x0) close(r0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) getsockname$inet(r0, 0x0, 0x0) setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x81, 0x0, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000140)=[@window, @timestamp], 0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, 0x0, &(0x7f0000000380)) getxattr(0x0, 0x0, &(0x7f0000000080)=""/118, 0x76) 11:48:10 executing program 0: mount(&(0x7f0000000240)=ANY=[@ANYBLOB="f7"], 0x0, 0x0, 0x3080, 0x0) 11:48:10 executing program 1: ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f00000000c0)='trusted.overlay.upper\x00', 0x0, 0x0, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000240)={0x79}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, 0x0}, 0x20004091) r0 = epoll_create1(0x0) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, 0x0) clone(0x20000, &(0x7f0000000ec0), 0x0, &(0x7f0000000fc0), &(0x7f0000001000)="198ac1b003b9fa0d6f7fba15fcd4cd54ff1ddf4144d5266e700ad8dea7a84ecc6b1a6c33b72d8f64536233d54178c59bb3452ae2f396f046e69277d037cac8de652b49755e26e06c85ee5d0d37b144a1a6c63a5f4549224881ef269b0b75829c2f6796c8c403e807ddb66adbbc3bb647a1fe1fdafa6eb536879338e2350556003816162afe3e0eae5b58361f0b5e84c3cf25d847e4c98d7f0960ce7b500515293a76f515bedad7f21b4f7c49c75a81279611f43d0e21cc34ddd375527741300f4413c9f704979a8c4bb2fb8d1e21d687e6fe5c592d3e54bbd11658d13e01afbb081a1daa006bf33ae00d8d5eff675f1f84c167") add_key$user(&(0x7f0000001140)='user\x00', &(0x7f0000001180)={'syz', 0x2}, &(0x7f00000011c0)="475f8db81df706ef7c02e3f9f0ed62746afb3b759942327fe58b34dc6fb6e2cf9e8158e0c80df19383284d5efa1806e30334bf1b53a8df94918a", 0x3a, 0xfffffffffffffffd) dup2(r0, r0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000001940)={0x3, 0x100, 0x3ff, 0x7, 0x8, 0x5}) 11:48:10 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000002c0)=0xffffffee) 11:48:10 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) time(0x0) close(r0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) getsockname$inet(r0, 0x0, 0x0) setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x81, 0x0, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000140)=[@window, @timestamp], 0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, 0x0, &(0x7f0000000380)) getxattr(0x0, 0x0, &(0x7f0000000080)=""/118, 0x76) 11:48:10 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x2761, 0x0) 11:48:10 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getresuid(&(0x7f0000001580), &(0x7f00000015c0), &(0x7f0000001600)) 11:48:11 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000200)='\x9c\xda,\xb0\xddR1\xa8&\xe1H\xdc\x99b9\x1eJ\xe3\x05$\xb4A\x90\xbe\xf77\f\xe8\xa5\xdb(\xb3\xbf\xd3\xa1\xf1\xe0}\xc2\x96,\xf9:\xef\xa0\xd1\x902\x11\xf54\x0eG\x81\x9a\x90\xb1\xd8\x9d,+\x1d\xf7\xa0\x97\xc5\xf4\xd6i\xaf\xfb\xbd\xaf%)\xed\f\xe2e\xccA\x82\x9a 1\x84x\xf7\xf0', 0x2, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000140)) 11:48:11 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') ppoll(&(0x7f0000000000)=[{r0}], 0x1, 0x0, 0x0, 0x0) 11:48:11 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) dup2(r0, 0xffffffffffffffff) sched_setaffinity(0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendmmsg(r2, &(0x7f0000007fc0), 0x4000000000001a8, 0x200096dc) get_robust_list(0x0, &(0x7f0000000480)=0x0, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffe) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, 0x0) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) write$binfmt_misc(r0, 0x0, 0x0) 11:48:11 executing program 2: shmctl$SHM_INFO(0x0, 0xe, &(0x7f0000000180)=""/177) 11:48:11 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) time(0x0) close(r0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) getsockname$inet(r0, 0x0, 0x0) setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x81, 0x0, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000140)=[@window, @timestamp], 0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, 0x0, &(0x7f0000000380)) getxattr(0x0, 0x0, &(0x7f0000000080)=""/118, 0x76) 11:48:11 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f0000000000)) 11:48:11 executing program 2: shmctl$SHM_INFO(0x0, 0xe, &(0x7f0000000180)=""/177) 11:48:11 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x0, &(0x7f0000000040)={@loopback, @broadcast, @multicast1}, 0xc) 11:48:11 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00\x94u\xb7\xfbr\xf3\xf0\xaae\x8d\xa1\xa9%\x00\xb2B[_\xb8[\xe6\aD]Fl\xdb\x91\xf7v\"b\xf2:\x12\x86*\xc6\x1b\xb3o\xcbe\xa7\x87i\xf7\x8e\xa5m\xc6E8\xca\xb1\x9b\x1c\r\x9ak\xe5J\xa0\x110\xd2q\x98\xc5\xc3\xaa\x89\xc1\xce\xde\xf1\vp\xderD\xc6uu\x1d\xef\xf7\x17@\x17\xf1\xf1D\xb0\xd6\x8e\\\xb0\x0e[\a\x97\x9f\xadH\xd4\xc4\xde\v\x93J\xd8\xad\xf1\xf8Jr\xf3kY=\xab5\xa0#\xbf\xb9L2', 0x200002, 0x0) fcntl$dupfd(r0, 0x0, r0) 11:48:11 executing program 4: syz_open_procfs(0x0, &(0x7f00000003c0)='map_files\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x2) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 11:48:11 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) time(0x0) close(r0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) getsockname$inet(r0, 0x0, 0x0) setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x81, 0x0, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000140)=[@window, @timestamp], 0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, 0x0, &(0x7f0000000380)) 11:48:11 executing program 2: shmctl$SHM_INFO(0x0, 0xe, &(0x7f0000000180)=""/177) 11:48:11 executing program 4: socketpair$unix(0x1, 0x80000000002, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x805}) ioctl$sock_ifreq(r0, 0x400000000008923, &(0x7f0000000200)={'eql\x00\x00\x00\xa9[\x00', @ifru_names='eql\x00\x00\x00\xfd\xfd\xff\xff\x00'}) 11:48:12 executing program 5: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) munmap(&(0x7f0000fff000/0x1000)=nil, 0x1000) r3 = fcntl$dupfd(r1, 0x0, r2) setsockopt$inet_mtu(r3, 0x0, 0xa, &(0x7f0000000000)=0x3, 0x4) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, 0x0) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000140)=0x2) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) socket$unix(0x1, 0x0, 0x0) setsockopt(r2, 0x0, 0xff, 0x0, 0x0) 11:48:12 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x910, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000500)='/dev/fuse\x00', 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000100)) 11:48:12 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='pagemap\x00') lseek(r0, 0x0, 0x2000000000000003) 11:48:12 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) time(0x0) close(r0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) getsockname$inet(r0, 0x0, 0x0) setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x81, 0x0, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000140)=[@window, @timestamp], 0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) 11:48:12 executing program 2: shmctl$SHM_INFO(0x0, 0xe, &(0x7f0000000180)=""/177) 11:48:12 executing program 4: getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) r0 = getegid() getresgid(0x0, &(0x7f0000000080), &(0x7f00000000c0)=0x0) setregid(r0, r1) 11:48:12 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) time(0x0) close(r0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) getsockname$inet(r0, 0x0, 0x0) setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x81, 0x0, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000140)=[@window, @timestamp], 0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, 0x0, 0x0) 11:48:12 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x4000000000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xff7000)=nil, 0xff7000, 0x2, 0x40800000000031, 0xffffffffffffffff, 0x0) ioctl$LOOP_GET_STATUS64(r0, 0x4c05, &(0x7f00000000c0)) 11:48:12 executing program 2: shmctl$SHM_INFO(0x0, 0xe, 0x0) 11:48:12 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capget(&(0x7f0000000080)={0x19980330}, 0x0) 11:48:12 executing program 5: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000000)=""/148, 0x94}], 0x94, 0x0) r0 = memfd_create(&(0x7f0000000100)='+eth0\x00', 0x1) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f00000013c0)={0x1, {{0xa, 0x4e23, 0x0, @dev={0xfe, 0x80, [], 0x1f}, 0x8}}, 0x1, 0x2, [{{0xa, 0x4e23, 0xff, @mcast2, 0x6}}, {{0xa, 0x4e22, 0x0, @empty, 0xfffffffffffffffa}}]}, 0x190) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000340)="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", 0x0}, 0x20) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz0\x00', 0x1ff) r1 = syz_open_procfs(0x0, &(0x7f0000000300)='net/route\x00') preadv(r1, &(0x7f0000000480), 0x10000000000001e1, 0x4c000000) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x48c, &(0x7f00000000c0)={0x1, 'veth1_to_bond\x00'}, 0x18) 11:48:12 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='/\x02roup.stap\x00', 0x2761, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={0xffffffffffffffff, 0x0}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40286608, 0x20000001) 11:48:12 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgctl$IPC_STAT(0x0, 0x2, &(0x7f0000000180)=""/253) 11:48:12 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_PHYS(r0, 0x4008556c, &(0x7f0000000000)='syz1\x00') ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000002c0)={{}, 'syz1\x00'}) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 11:48:12 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) time(0x0) close(r0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) getsockname$inet(r0, 0x0, 0x0) setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x81, 0x0, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000140)=[@window, @timestamp], 0x2) [ 553.782922] input: syz1 as /devices/virtual/input/input58 11:48:12 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x6b9f, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000280)='cgroup.max.descendants\x00', 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) write$cgroup_int(r0, &(0x7f0000000080), 0x297ef) [ 553.824922] input: syz1 as /devices/virtual/input/input59 11:48:13 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) time(0x0) close(r0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) dup2(0xffffffffffffffff, 0xffffffffffffffff) getpeername$netlink(r0, 0x0, &(0x7f0000000040)) getsockname$inet(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SET_TIMERSLACK(0x1d, 0x0) 11:48:13 executing program 2: mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x2, 0x2172, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000002000/0x4000)=nil) munlockall() r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) io_setup(0x4, &(0x7f0000000040)=0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) 11:48:13 executing program 0: 11:48:13 executing program 1: 11:48:13 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) time(0x0) close(r0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) getsockname$inet(r0, 0x0, 0x0) setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x81, 0x0, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) 11:48:13 executing program 0: 11:48:13 executing program 2: 11:48:13 executing program 4: 11:48:13 executing program 5: 11:48:13 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) time(0x0) close(r0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) getsockname$inet(r0, 0x0, 0x0) setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x81, 0x0, 0x0) 11:48:13 executing program 1: 11:48:13 executing program 0: 11:48:13 executing program 2: 11:48:13 executing program 1: 11:48:13 executing program 4: 11:48:13 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) time(0x0) close(r0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) getsockname$inet(r0, 0x0, 0x0) 11:48:13 executing program 5: 11:48:13 executing program 0: 11:48:13 executing program 4: 11:48:14 executing program 2: 11:48:14 executing program 1: 11:48:14 executing program 5: 11:48:14 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) time(0x0) close(r0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) getsockname$inet(r0, 0x0, 0x0) 11:48:14 executing program 0: 11:48:14 executing program 4: 11:48:14 executing program 1: 11:48:14 executing program 5: 11:48:14 executing program 2: 11:48:14 executing program 0: 11:48:14 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) time(0x0) close(r0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) getsockname$inet(r0, 0x0, 0x0) 11:48:14 executing program 4: 11:48:14 executing program 1: 11:48:14 executing program 5: 11:48:14 executing program 2: 11:48:14 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) time(0x0) close(r0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) getsockname$inet(r0, 0x0, 0x0) 11:48:14 executing program 0: 11:48:14 executing program 4: 11:48:14 executing program 5: 11:48:14 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0xae, &(0x7f00000001c0)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "d4b36b", 0x18, 0x11, 0x0, @local, @ipv4={[], [], @loopback}, {[], @icmpv6=@mld={0x0, 0x0, 0x0, 0x0, 0x0, @mcast1}}}}}}, 0x0) 11:48:15 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x3, 0x0) r2 = dup(r1) write$FUSE_NOTIFY_STORE(r2, 0x0, 0x0) write(r2, &(0x7f00000000c0)="1b0000004a001f0fff07f4f9002304000a04f51108000100020100", 0x1b) 11:48:15 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) time(0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) getsockname$inet(r0, 0x0, 0x0) 11:48:15 executing program 4: 11:48:15 executing program 0: 11:48:15 executing program 5: 11:48:15 executing program 1: 11:48:15 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='/exe\x00\x00\x00\x00\x00\x00') fcntl$setstatus(r0, 0x4, 0x4000000000046802) io_setup(0x4404, &(0x7f0000000240)=0x0) write(0xffffffffffffffff, 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000100)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000200), 0xfffffdcc}]) 11:48:15 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) time(0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) getsockname$inet(r0, 0x0, 0x0) 11:48:15 executing program 5: r0 = socket$inet6(0xa, 0x401000000001, 0x0) close(r0) r1 = socket$netlink(0x10, 0x3, 0xa) sendmsg$nl_generic(r1, &(0x7f0000001280)={&(0x7f0000000040), 0xc, 0x0}, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x1141042, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) ftruncate(r2, 0x2007fff) socket$inet(0x2, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, 0x0, 0x0) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) timerfd_create(0x0, 0x0) write(r4, &(0x7f0000000340), 0x1000003c5) pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x8, 0x0, 0x100, 0x7, 0x0, 0x0, 0x0, 0xd, 0x0, 0x10001, 0x7, 0x0, 0x0, 0x80000000, 0x0, 0xfffffffffffffffb, 0x17, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x4, 0x9, 0x0, 0x2f670e85, 0x0, 0x7, 0x7, 0xfffffffffffffff9, 0x0, 0x0, 0x7f, 0x9, 0x10001, 0x0, 0x0, 0x4, @perf_config_ext, 0x10140, 0x0, 0x2, 0x8, 0x864, 0x3f}, 0x0, 0x8, 0xffffffffffffffff, 0x8) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) fsetxattr$security_selinux(r2, &(0x7f0000000200)='security.selinux\x00', &(0x7f00000003c0)='system_u:object_r:xconsole_device_t:s0\x00', 0x27, 0x2) ioctl$EVIOCSMASK(r2, 0x40104593, &(0x7f0000000400)={0x1, 0x7f3, &(0x7f0000002300)="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"}) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) sendfile(r0, r2, 0x0, 0x8000fffffffe) 11:48:15 executing program 0: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) madvise(&(0x7f0000003000/0x1000)=nil, 0x1000, 0x1) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x9) 11:48:15 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000240)) 11:48:15 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000000140)=ANY=[@ANYBLOB="b700000000000100bfa30000000000000703000028feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000011d400300000000006506000001ed00002704000000ffffffcd460000000000006a0a00fe00000000850000002e000000b7000000000000009500000000000000"], 0x0}, 0x48) 11:48:15 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) time(0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) getsockname$inet(r0, 0x0, 0x0) 11:48:15 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) flistxattr(r0, 0x0, 0x0) 11:48:15 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='/exe\x00\x00\x00\x00\x00\x00') fcntl$setstatus(r0, 0x4, 0x4000000000046802) io_setup(0x4404, &(0x7f0000000240)=0x0) write(0xffffffffffffffff, 0x0, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000100)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000200), 0xfffffdcc}]) 11:48:15 executing program 1: openat$fuse(0xffffffffffffff9c, &(0x7f0000002bc0)='/dev/fuse\x00', 0x2, 0x0) 11:48:15 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) time(0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) getsockname$inet(r0, 0x0, 0x0) 11:48:16 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) flistxattr(r0, 0x0, 0x0) 11:48:16 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000802, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='ip6_vti0\x00', 0x10) sendto$inet(r0, &(0x7f0000d7cfcb), 0xfffffffffffffd8b, 0x0, 0x0, 0x290) 11:48:16 executing program 1: socket$inet(0x2, 0x0, 0x1) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() clone(0x600001fc, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x8000000000000014) wait4(r0, 0x0, 0x0, 0x0) [ 557.184219] IPVS: ftp: loaded support on port[0] = 21 11:48:16 executing program 5: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000002b80)='/dev/loop-control\x00', 0x0, 0x0) 11:48:16 executing program 0: lstat(0x0, 0x0) 11:48:16 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) getsockname$inet(r0, 0x0, 0x0) 11:48:16 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) flistxattr(r0, 0x0, 0x0) 11:48:16 executing program 0: pwrite64(0xffffffffffffffff, &(0x7f0000000040)="93aa9f4fc102dd45e764438f36d6bd15d9046c17a2e90eaa761849a099a67c3367478279ab64d0b8b9bd9afcfc7a6e2c7e08e66d2fd2947254130d53cfe707f85d20dad5e0b0ff99d3fbe44b31e4d6b5e6bc318dbdff66bc9c5ec327aa537deff4c536c35eea05e47d6b372b7e57fa75ba208b263a90080b0dc6a5299c364436bff965", 0x83, 0x0) r0 = epoll_create(0x6) ioctl(r0, 0x3, &(0x7f0000000100)="a4b7c340c4290fe8c7b599b640f16c1fa137f18b67a12303e6a36a339b0e1e0db7e2bea52a67") ioctl(0xffffffffffffffff, 0x3ffc000000000, 0x0) r1 = getpgid(0xffffffffffffffff) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000180)=r1, 0x12) fcntl$setsig(0xffffffffffffffff, 0xa, 0x2a) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000580), &(0x7f00000005c0)=0xc) getgroups(0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000001c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000000540)=[{&(0x7f00000004c0)="29eb94cfd28e1469e52412b62b3a4a04fed76a1ef36db6a7cef4a49193409af16dfc2070da5203a09bd8605bb432f2a6", 0x30}], 0x1, 0x0, 0x0, 0x8000}, 0x20000000) shutdown(0xffffffffffffffff, 0x1) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/null\x00', 0x18f56643085c9284, 0x0) write(r2, &(0x7f0000000800)="20e73f6e57d894f7397fdbd7c6125e", 0xf) fadvise64(r2, 0x0, 0x6, 0x1) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001b00)={'team0\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f0000001bc0)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000001b80)={&(0x7f0000001b40)=@gettclass={0x24, 0x2a, 0x300, 0x70bd27, 0x25dfdbfd, {0x0, r3, {0x2, 0x8}, {0xe, 0x14}, {0x3}}, [""]}, 0x24}, 0x1, 0x0, 0x0, 0x810}, 0x10) ioctl(r0, 0xfffffffffffffffe, &(0x7f0000001c00)="59c4b8b9c9d67b9c5975cbeaa2f2a1b351cde149c2004d959188bbc67caf6b5cf6feec3d07c0b304c977cc7dde3482fa50f495e4d61248590bbd1be1d9548b0e825d8ceb9344c5") ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000001d00)={0x2, 0x18, 0x1}) write(0xffffffffffffffff, &(0x7f0000001d40)="822c49b130e180ff103d3cc9cfd244f551885e1e7c0f2d78f068e49ff8372d533150ae4ac67ab8b411612f847107c045aeba9f8615ea8aa3f5557f608aefca9eeeea5b05b744b218a35234e602ab21a131f5e9f23e07c6bdc1ca05226141b8509a04598ee1db43f73954d2735b2833cbd7e47b05b49fb8bc82c63af448e2d0227f85c110ccd8284ef4714a26743a42c626fb3ec12c2627309fd2ec931199dcf6ab8e69a4217b5c9d3b187c1eba9778ae1ae1d8ae3d5da961ea4b419969adc3ac562373", 0xc3) read(r2, &(0x7f0000001e40)=""/4096, 0x1000) io_setup(0x0, 0x0) 11:48:16 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = socket$nl_route(0x10, 0x3, 0x0) pread64(r0, &(0x7f0000000340)=""/39, 0x27, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) 11:48:16 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) flistxattr(r0, 0x0, 0x0) 11:48:16 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) getsockname$inet(r0, 0x0, 0x0) 11:48:17 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='smaps\x00') sendfile(r0, r0, 0x0, 0x88001) [ 557.965152] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 11:48:17 executing program 4: flistxattr(0xffffffffffffffff, 0x0, 0x0) [ 558.131467] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 11:48:17 executing program 2: r0 = socket$inet6(0xa, 0x401000000001, 0x0) close(r0) socket$netlink(0x10, 0x3, 0xa) r1 = open(&(0x7f0000000000)='./bus\x00', 0x1141042, 0x0) bind(r0, 0x0, 0x0) ftruncate(r1, 0x2007fff) ioctl$EVIOCSFF(r1, 0x40304580, &(0x7f00000001c0)={0x57, 0x0, 0x5, {0x800000000}, {0x9, 0xe315}, @period={0x0, 0x2f96, 0xe7a, 0x0, 0x8, {0x0, 0x80, 0x3f, 0x1}, 0x0, 0x0}}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r2, 0x0, 0x0, 0x200007fd, 0x0, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x8, 0x0, 0x100, 0x7, 0x0, 0x0, 0x2004, 0xd, 0x0, 0x10001, 0x7, 0x0, 0x3f, 0x80000000, 0x0, 0xfffffffffffffffb, 0x17, 0x3, 0x7, 0x0, 0x0, 0x0, 0x5b3, 0x4, 0x9, 0x0, 0x0, 0x33e, 0x7, 0x0, 0xfffffffffffffff9, 0x0, 0x5, 0x0, 0x9, 0x10001, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0xac0b}, 0x0, 0x0, 0x2, 0x8, 0x864, 0x0, 0x7}, 0x0, 0x8, r4, 0x0) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) fsetxattr$security_selinux(r1, &(0x7f0000000200)='security.selinux\x00', &(0x7f00000003c0)='system_u:object_r:xconsole_device_t:s0\x00', 0x27, 0x2) openat$cgroup_int(r1, &(0x7f0000000280)='cpuset.sched_load_balance\x00', 0x2, 0x0) unlinkat(r0, &(0x7f0000000240)='./bus\x00', 0x200) write$P9_RLOCK(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000fffffffe) 11:48:19 executing program 1: socket$inet(0x2, 0x0, 0x1) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() clone(0x600001fc, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x8000000000000014) wait4(r0, 0x0, 0x0, 0x0) 11:48:19 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) getsockname$inet(r0, 0x0, 0x0) 11:48:19 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) flistxattr(r0, 0x0, 0x0) 11:48:19 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) mount$fuse(0x0, &(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='fuse\x00', 0x0, 0x0) 11:48:19 executing program 5: madvise(&(0x7f0000003000/0x1000)=nil, 0x1000, 0x1) 11:48:19 executing program 2: clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2a) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x36}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:48:19 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_buf(r0, 0x1, 0x1a, 0x0, &(0x7f0000000140)) [ 560.232962] ptrace attach of "/root/syz-executor2"[18841] was attempted by "/root/syz-executor2"[18842] [ 560.242469] IPVS: ftp: loaded support on port[0] = 21 11:48:19 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, 0x0, 0x3f) ioctl$LOOP_CLR_FD(r0, 0x4c01) fadvise64(r0, 0x0, 0x0, 0x4) 11:48:19 executing program 0: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$RNDADDTOENTCNT(r0, 0x40045201, 0x0) 11:48:19 executing program 3: close(0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) getsockname$inet(0xffffffffffffffff, 0x0, 0x0) 11:48:19 executing program 4: openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) flistxattr(0xffffffffffffffff, 0x0, 0x0) 11:48:19 executing program 0: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$RNDADDTOENTCNT(r0, 0x40045201, &(0x7f0000000040)) 11:48:19 executing program 1: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000580)={0x58, 0x0, &(0x7f0000000340)=[@increfs_done, @transaction={0x40406300, {0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) 11:48:19 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000001440)={0xa, 0x4e22}, 0x1c) listen(r0, 0xfffd) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x11a, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 11:48:19 executing program 3: close(0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) getsockname$inet(0xffffffffffffffff, 0x0, 0x0) 11:48:19 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x400200007fd, &(0x7f0000000000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg$netlink(r0, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="0c0000000100000001000000180000000100000002000080", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], 0x24}, 0x0) 11:48:19 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f00000002c0)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000080)={@multicast2, @loopback, 0x1, 0x1, [@multicast1]}, 0x14) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f00000000c0)={@multicast2, @loopback, 0x0, 0x1, [@empty]}, 0x14) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r1, 0x0, 0x27, &(0x7f00003fdff5)={@multicast2, @loopback}, 0xc) [ 560.877555] binder: 18875:18876 BC_INCREFS_DONE u0000000000000000 no match [ 560.884883] binder: 18875:18876 got transaction to invalid handle [ 560.891196] binder: 18875:18876 transaction failed 29201/-22, size 0-0 line 2834 11:48:19 executing program 0: r0 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000003000/0x3000)=nil, 0x3000, 0xffffffffffeffffa, 0x20012, r0, 0x0) 11:48:20 executing program 3: close(0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) getsockname$inet(0xffffffffffffffff, 0x0, 0x0) [ 560.927962] binder: undelivered TRANSACTION_ERROR: 29201 11:48:20 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) timer_create(0xfffffffffffffffc, 0x0, &(0x7f0000000240)) r0 = syz_open_procfs(0x0, &(0x7f0000000840)='clear_refs\x00\xb0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96\x04\x00\x00\x00\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfgx\xa1\x96\xad\x93\xaa=-z\x06r\b\'yY\xe3\x1e\xf2a\xfa\x1c\xcb\x16YNp%\xd8J\xe4\a\xabJA9\xdc\x9a\x16\xb9\'\x00\x00\x00\x00\x00\x00\x00\x00\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000440)='syscall\x00') sendfile(r0, r1, &(0x7f0000000080), 0x1) 11:48:20 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000080)) 11:48:20 executing program 1: mkdir(&(0x7f0000001b40)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000340)='./file1\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) clone(0x210007fa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rename(&(0x7f0000000480)='./file0\x00', &(0x7f0000000440)='./file1/file0\x00') rename(&(0x7f0000000000)='./file1/file0\x00', &(0x7f0000000280)='./file1\x00') [ 561.035149] binder: binder_mmap: 18883 20003000-20006000 bad vm_flags failed -1 [ 561.063655] binder: binder_mmap: 18883 20003000-20006000 bad vm_flags failed -1 11:48:20 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bind$inet(0xffffffffffffffff, 0x0, 0x0) membarrier(0x400000000000001, 0x0) 11:48:20 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x80000000002) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000300)={0x8000000000000053, 0xfffffffffffffffb, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0}) write$binfmt_elf64(r0, &(0x7f0000000300)=ANY=[], 0xf6) clone(0x0, &(0x7f00000003c0), 0x0, 0x0, &(0x7f0000000040)) read(r0, &(0x7f0000000440)=""/42, 0x1a9) 11:48:20 executing program 3: r0 = syz_open_procfs(0x0, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) getsockname$inet(r0, 0x0, 0x0) 11:48:20 executing program 4: socketpair$unix(0x1, 0x802, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) close(r1) 11:48:20 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @local, 0x2}, 0x1c) 11:48:20 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) 11:48:20 executing program 3: r0 = syz_open_procfs(0x0, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) getsockname$inet(r0, 0x0, 0x0) 11:48:20 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @local, 0x2}, 0x1c) 11:48:20 executing program 3: r0 = syz_open_procfs(0x0, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) getsockname$inet(r0, 0x0, 0x0) 11:48:20 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000001440)={0xa, 0x4e22}, 0x1c) listen(r0, 0xfffd) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x11a, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) shutdown(r1, 0x1) recvfrom$inet6(r1, &(0x7f0000000040)=""/31, 0x1f, 0x0, 0x0, 0x0) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0)='A', 0x1, 0x0, 0x0, 0x0) 11:48:21 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) 11:48:21 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') close(0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) getsockname$inet(r0, 0x0, 0x0) 11:48:21 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000100)) ppoll(&(0x7f0000000000)=[{r0}], 0x1, 0x0, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1a) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) 11:48:21 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @local, 0x2}, 0x1c) 11:48:21 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) 11:48:21 executing program 0: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$TIPC_CMD_SHOW_PORTS(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x1c}}, 0x0) 11:48:21 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) 11:48:21 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') close(0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) getsockname$inet(r0, 0x0, 0x0) 11:48:21 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @local, 0x2}, 0x1c) 11:48:21 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) 11:48:21 executing program 0: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$TIPC_CMD_SHOW_PORTS(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x1c}}, 0x0) 11:48:21 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) 11:48:21 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') close(0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) getsockname$inet(r0, 0x0, 0x0) 11:48:21 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @local, 0x2}, 0x1c) 11:48:22 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) 11:48:22 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='lo\x00', 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x4f) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f00000004c0), 0x4) 11:48:22 executing program 0: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$TIPC_CMD_SHOW_PORTS(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x1c}}, 0x0) 11:48:22 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) 11:48:22 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @local, 0x2}, 0x1c) 11:48:22 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') close(r0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) getsockname$inet(r0, 0x0, 0x0) 11:48:22 executing program 0: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$TIPC_CMD_SHOW_PORTS(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x1c}}, 0x0) 11:48:22 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') close(r0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) getsockname$inet(r0, 0x0, 0x0) 11:48:22 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @local, 0x2}, 0x1c) 11:48:22 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) 11:48:22 executing program 1: syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x0, 0x82) 11:48:22 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) 11:48:23 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @local, 0x2}, 0x1c) 11:48:23 executing program 0: sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x1c}}, 0x0) 11:48:23 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') close(r0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) getsockname$inet(r0, 0x0, 0x0) 11:48:23 executing program 1: fchdir(0xffffffffffffffff) r0 = socket$inet6(0xa, 0x400000000001, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) close(r0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) syncfs(0xffffffffffffffff) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x5002}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2007fff) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f00000001c0), 0xfffffef3) read(r4, 0x0, 0x0) sendfile(r0, r3, &(0x7f0000d83ff8), 0x8000fffffffe) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0xffffffffffffffff) fchmod(r3, 0x120) r6 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x2) sendfile(0xffffffffffffffff, r6, 0x0, 0x0) r7 = accept4$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @empty}, &(0x7f0000000180)=0x10, 0x80800) ioctl$FS_IOC_FSGETXATTR(r7, 0x801c581f, &(0x7f0000000300)={0x0, 0x400, 0x5, 0x1ea}) 11:48:23 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) 11:48:23 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) 11:48:23 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @local, 0x2}, 0x1c) [ 564.277331] device lo left promiscuous mode 11:48:23 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$TIPC_CMD_SHOW_PORTS(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x1c}}, 0x0) [ 564.298919] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 564.305660] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 11:48:23 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') close(r0) socketpair$unix(0x1, 0x5, 0x0, 0x0) getsockname$inet(r0, 0x0, 0x0) 11:48:23 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) 11:48:23 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) 11:48:23 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @local, 0x2}, 0x1c) 11:48:23 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$TIPC_CMD_SHOW_PORTS(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x1c}}, 0x0) 11:48:23 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') close(r0) socketpair$unix(0x1, 0x5, 0x0, 0x0) getsockname$inet(r0, 0x0, 0x0) 11:48:23 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) [ 565.054012] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 11:48:24 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS64(r0, 0x4c05, &(0x7f0000000140)) 11:48:24 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @local, 0x2}, 0x1c) 11:48:24 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$TIPC_CMD_SHOW_PORTS(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x1c}}, 0x0) 11:48:24 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') close(r0) socketpair$unix(0x1, 0x5, 0x0, 0x0) getsockname$inet(r0, 0x0, 0x0) 11:48:24 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) 11:48:24 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x1) 11:48:24 executing program 0: socket$netlink(0x10, 0x3, 0xa) sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x1c}}, 0x0) 11:48:24 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) getsockname$inet(0xffffffffffffffff, 0x0, 0x0) [ 565.292549] ip6_tunnel: ip6tnl1 xmit: Local address not yet configured! [ 565.299684] ip6_tunnel: ip6tnl1 xmit: Local address not yet configured! [ 565.322043] ip6_tunnel: ip6tnl1 xmit: Local address not yet configured! 11:48:24 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x1) 11:48:24 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @local, 0x2}, 0x1c) 11:48:24 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x1) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x1) [ 565.432680] ip6_tunnel: ip6tnl1 xmit: Local address not yet configured! [ 565.532092] ip6_tunnel: ip6tnl1 xmit: Local address not yet configured! 11:48:24 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x35f, 0x200007fd, &(0x7f0000000040)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000000280)="04", 0x1, 0x1, 0x0, 0x0) recvmsg(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000001c00)=""/4096, 0x1000}], 0x1}, 0x0) 11:48:24 executing program 0: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$TIPC_CMD_SHOW_PORTS(r0, 0x0, 0x0) 11:48:24 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) getsockname$inet(0xffffffffffffffff, 0x0, 0x0) 11:48:24 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @local, 0x2}, 0x1c) 11:48:24 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x1) 11:48:24 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x1) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x1) 11:48:25 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) getsockname$inet(0xffffffffffffffff, 0x0, 0x0) 11:48:25 executing program 0: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$TIPC_CMD_SHOW_PORTS(r0, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) 11:48:25 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @local, 0x2}, 0x1c) 11:48:25 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x1) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x1) 11:48:25 executing program 4: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x1) 11:48:25 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) getresuid(0x0, &(0x7f0000000080), &(0x7f00000000c0)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000380)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102801ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0xb, 0x4, @tid=r3}, &(0x7f0000000080)) ioctl$EVIOCGKEYCODE(r1, 0x80084504, 0x0) timer_settime(0x0, 0x3, &(0x7f000004a000)={{0x0, 0x1}, {0x7, 0xe4c}}, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) getuid() fchown(0xffffffffffffffff, 0x0, 0x0) futimesat(0xffffffffffffffff, 0x0, 0x0) msgget$private(0x0, 0x40) syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x684000) 11:48:25 executing program 2: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x1) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x1) 11:48:25 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x0, {0x0, 0x0, 0x7}}) 11:48:25 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @local, 0x2}, 0x1c) 11:48:25 executing program 4: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x1) 11:48:25 executing program 0: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$TIPC_CMD_SHOW_PORTS(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 11:48:25 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x18}}, 0x0, 0x1a, 0x0, 0x1}, 0x20) 11:48:25 executing program 2: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x1) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x1) 11:48:25 executing program 4: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x1) 11:48:25 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @local, 0x2}, 0x1c) 11:48:25 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = semget$private(0x0, 0x7, 0x0) semtimedop(r1, &(0x7f00000002c0)=[{0x0, 0xff, 0x1800}], 0x1, 0x0) 11:48:25 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='oom_adj\x00') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000009c0)=[{&(0x7f0000000400)=""/89, 0x59}], 0x1, 0x0) 11:48:26 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_RELBIT(r0, 0x40045566, 0x0) 11:48:26 executing program 2: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x1) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x1) 11:48:26 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) 11:48:26 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @local, 0x2}, 0x1c) 11:48:26 executing program 3: write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000440)={0x14, 0x69, 0x2, {0x0, 0x0, 0x6}}, 0x14) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'teql0\x00', 0x402}) shutdown(r0, 0xfffffffffffffffd) timerfd_create(0x7, 0x800) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) clock_gettime(0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) syslog(0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9) request_key(0x0, 0x0, 0x0, 0x0) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x7}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000000)="1b", 0x1, 0x8000, 0x0, 0x0) close(r0) 11:48:26 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) getresuid(&(0x7f0000001580), &(0x7f0000000080), &(0x7f00000000c0)) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000400)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x0, 0x0, 0x0) connect$inet6(r1, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102801ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0xb, 0x4, @tid=r2}, &(0x7f0000000080)) ioctl$EVIOCGKEYCODE(r0, 0x80084504, 0x0) timer_settime(0x0, 0x3, &(0x7f000004a000)={{0x0, 0x1}, {0x7, 0xe4c}}, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) getuid() fchown(0xffffffffffffffff, 0x0, 0x0) epoll_create1(0x0) futimesat(0xffffffffffffffff, 0x0, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) msgget$private(0x0, 0x40) mknod$loop(&(0x7f0000000280)='./file0\x00', 0x0, 0x1) r3 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x684000) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r3, 0xc0605345, 0x0) 11:48:26 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) close(r0) 11:48:26 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) 11:48:26 executing program 0: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000180)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) 11:48:26 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) 11:48:26 executing program 5: socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @local, 0x2}, 0x1c) 11:48:26 executing program 0: 11:48:26 executing program 3: 11:48:26 executing program 1: 11:48:26 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) 11:48:26 executing program 5: socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @local, 0x2}, 0x1c) 11:48:26 executing program 0: 11:48:26 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) 11:48:27 executing program 5: socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @local, 0x2}, 0x1c) 11:48:27 executing program 3: 11:48:27 executing program 1: 11:48:27 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) 11:48:27 executing program 0: 11:48:27 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x1) 11:48:27 executing program 1: 11:48:27 executing program 3: 11:48:27 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6(0xa, 0x0, 0xff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @local, 0x2}, 0x1c) 11:48:27 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x1) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x1) 11:48:27 executing program 0: 11:48:27 executing program 3: 11:48:27 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x1) 11:48:27 executing program 1: 11:48:27 executing program 3: 11:48:27 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6(0xa, 0x0, 0xff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @local, 0x2}, 0x1c) 11:48:27 executing program 1: 11:48:27 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x1) 11:48:27 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x1) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x1) 11:48:27 executing program 0: 11:48:28 executing program 3: 11:48:28 executing program 1: 11:48:28 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) 11:48:28 executing program 0: 11:48:28 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x1) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x1) 11:48:28 executing program 3: 11:48:28 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6(0xa, 0x0, 0xff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @local, 0x2}, 0x1c) [ 569.211961] ip6_tunnel: ip6tnl1 xmit: Local address not yet configured! 11:48:28 executing program 1: 11:48:28 executing program 0: 11:48:28 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) 11:48:28 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x1) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) 11:48:28 executing program 3: 11:48:28 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6(0xa, 0x80003, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @local, 0x2}, 0x1c) 11:48:28 executing program 1: 11:48:28 executing program 0: 11:48:28 executing program 3: 11:48:28 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) 11:48:28 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x1) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) 11:48:29 executing program 1: 11:48:29 executing program 0: 11:48:29 executing program 3: 11:48:29 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6(0xa, 0x80003, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @local, 0x2}, 0x1c) 11:48:29 executing program 1: 11:48:29 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x1) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) 11:48:29 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x1) 11:48:29 executing program 3: 11:48:29 executing program 0: 11:48:29 executing program 1: 11:48:29 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) 11:48:29 executing program 1: 11:48:29 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6(0xa, 0x80003, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @local, 0x2}, 0x1c) 11:48:29 executing program 0: 11:48:29 executing program 3: 11:48:29 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) 11:48:29 executing program 1: 11:48:30 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) 11:48:30 executing program 0: 11:48:30 executing program 1: 11:48:30 executing program 3: 11:48:30 executing program 4: 11:48:30 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @local, 0x2}, 0x1c) 11:48:30 executing program 0: 11:48:30 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) 11:48:30 executing program 3: 11:48:30 executing program 1: 11:48:30 executing program 4: 11:48:30 executing program 0: 11:48:30 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x1) 11:48:30 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @local, 0x2}, 0x1c) 11:48:30 executing program 1: 11:48:30 executing program 3: 11:48:30 executing program 4: 11:48:30 executing program 0: 11:48:30 executing program 1: 11:48:31 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x1) 11:48:31 executing program 3: 11:48:31 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) r0 = socket$inet6(0xa, 0x80003, 0xff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @local, 0x2}, 0x1c) 11:48:31 executing program 4: 11:48:31 executing program 1: 11:48:31 executing program 0: 11:48:31 executing program 4: 11:48:31 executing program 0: 11:48:31 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x1) 11:48:31 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @local, 0x2}, 0x1c) 11:48:31 executing program 3: 11:48:31 executing program 1: 11:48:31 executing program 0: 11:48:31 executing program 4: 11:48:31 executing program 3: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000013c0)={0x0, 0x0, {0x0, 0x0, 0x0, 0xb, 0x0, 0x7f}}) 11:48:31 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @local, 0x2}, 0x1c) 11:48:31 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCDELDLCI(r0, 0x8981, 0xfffffffffffffffd) 11:48:31 executing program 1: io_setup(0x6204, &(0x7f0000000000)=0x0) io_destroy(r0) 11:48:31 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) 11:48:31 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) poll(&(0x7f0000000080)=[{r0}], 0x1, 0xf7) 11:48:32 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x4, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x1b0001}, [@ldst={0xffffffbd, 0x2, 0x4f04}]}, &(0x7f0000003ff6)='syzkaller\x00', 0x5, 0x481, &(0x7f00000001c0)=""/195}, 0x48) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, 0x0) syz_genetlink_get_family_id$fou(0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) 11:48:32 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @local, 0x2}, 0x1c) 11:48:32 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'ip6_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) 11:48:32 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) 11:48:32 executing program 1: 11:48:32 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6(0xa, 0x80003, 0xff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @local, 0x2}, 0x1c) 11:48:32 executing program 4: 11:48:32 executing program 1: 11:48:32 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) 11:48:32 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6(0xa, 0x80003, 0xff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @local, 0x2}, 0x1c) 11:48:32 executing program 3: 11:48:32 executing program 4: 11:48:32 executing program 1: 11:48:33 executing program 2: 11:48:33 executing program 0: 11:48:33 executing program 3: 11:48:33 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6(0xa, 0x80003, 0xff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @local, 0x2}, 0x1c) 11:48:33 executing program 4: 11:48:33 executing program 1: 11:48:33 executing program 2: 11:48:33 executing program 4: 11:48:33 executing program 2: 11:48:33 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bind$inet6(r1, 0x0, 0x0) 11:48:33 executing program 0: 11:48:33 executing program 1: 11:48:33 executing program 3: 11:48:33 executing program 2: 11:48:33 executing program 4: 11:48:33 executing program 0: 11:48:33 executing program 1: 11:48:33 executing program 3: 11:48:33 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bind$inet6(r1, 0x0, 0x0) 11:48:34 executing program 0: 11:48:34 executing program 2: 11:48:34 executing program 1: 11:48:34 executing program 4: 11:48:34 executing program 3: 11:48:34 executing program 0: 11:48:34 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bind$inet6(r1, 0x0, 0x0) 11:48:34 executing program 2: 11:48:34 executing program 3: 11:48:34 executing program 0: 11:48:34 executing program 1: 11:48:34 executing program 4: 11:48:34 executing program 2: 11:48:34 executing program 0: 11:48:34 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) 11:48:34 executing program 3: 11:48:34 executing program 1: 11:48:34 executing program 4: 11:48:34 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @local}, 0x1c) 11:48:35 executing program 1: 11:48:35 executing program 2: 11:48:35 executing program 3: 11:48:35 executing program 4: 11:48:35 executing program 0: 11:48:35 executing program 1: 11:48:35 executing program 2: 11:48:35 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @local}, 0x1c) 11:48:35 executing program 4: 11:48:35 executing program 3: 11:48:35 executing program 0: 11:48:35 executing program 1: 11:48:35 executing program 2: 11:48:35 executing program 0: 11:48:35 executing program 1: 11:48:35 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6(0xa, 0x80003, 0xff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @local}, 0x1c) 11:48:35 executing program 3: 11:48:35 executing program 4: 11:48:35 executing program 0: 11:48:35 executing program 2: 11:48:35 executing program 3: 11:48:35 executing program 5: 11:48:35 executing program 1: 11:48:36 executing program 0: [ 577.052375] ip6_tunnel: ip6tnl1 xmit: Local address not yet configured! 11:48:36 executing program 3: 11:48:36 executing program 5: 11:48:36 executing program 4: 11:48:36 executing program 2: 11:48:36 executing program 1: 11:48:36 executing program 0: 11:48:36 executing program 5: 11:48:36 executing program 4: 11:48:36 executing program 0: 11:48:36 executing program 3: 11:48:36 executing program 2: 11:48:36 executing program 1: 11:48:36 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000080)=ANY=[@ANYBLOB="020000000000000002004e21e0000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000002004e210000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e2300007fff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000210000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e20ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e20ac14142000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f1ff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1) 11:48:36 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x72, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) r2 = fcntl$dupfd(r0, 0x0, r1) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200107fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 11:48:36 executing program 5: 11:48:36 executing program 4: 11:48:36 executing program 2: 11:48:36 executing program 1: 11:48:37 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10034, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 11:48:37 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000040)=0x7c, 0x4) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000000280)="2724bad08d2c3094b9ef72d49083cb26b0fb20a17affae1092608f79d648520418de7385f814a42e97274911e0bde43a4f643ddb3b61b32357cabd07783f2b53f1d28f55df65e88914a96fb0edad7b23ea9832bfcc878ab1af6f2aa52ec95d98bb17a4421746683681c000f2008f94ec5956dd670a79de3bf024d10e8defb9712258a73a343410f673561d1f787d5daf178063f903c980d410abff75183a45156b2b79b482ed27807a8aa15eef0eeb0ea8de54fc87ffe7f6ce9881432e80aa1ff09592312b4b33f3e6", 0xc9, 0x0, 0x0, 0x0) recvmsg(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000001c00)=""/4096, 0x1000}], 0x1}, 0x100) write$binfmt_elf64(r1, &(0x7f0000001080)=ANY=[@ANYBLOB="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"], 0x150) 11:48:37 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000200)={0x1, 'veth0\x00'}, 0x18) setxattr$security_evm(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.evm\x00', &(0x7f0000000080), 0x1, 0x1) getsockopt$EBT_SO_GET_ENTRIES(r0, 0x0, 0x81, &(0x7f0000000340)={'broute\x00', 0x0, 0x4, 0x8c, [], 0x6, &(0x7f00000000c0)=[{}, {}, {}, {}, {}, {}], &(0x7f0000000140)=""/140}, &(0x7f00000003c0)=0x78) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) 11:48:37 executing program 2: mmap(&(0x7f0000000000/0xff7000)=nil, 0xff7000, 0x0, 0x40800000000031, 0xffffffffffffffff, 0x0) modify_ldt$write(0x1, &(0x7f0000000000), 0x10) 11:48:37 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x4000000000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xff7000)=nil, 0xff7000, 0x2, 0x40800000000031, r1, 0x0) ioctl$LOOP_GET_STATUS64(r0, 0x4c05, &(0x7f00000000c0)) 11:48:37 executing program 3: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000280)="2600000022004701050022008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x20000000000008, &(0x7f0000000240), 0x4) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x20000000, 0x4000000000003, 0x2, @thr={0x0, 0x0}}) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000000)=0x80000001, 0x4) [ 578.304597] IPVS: sync thread started: state = MASTER, mcast_ifn = veth0, syncid = 0, id = 0 11:48:37 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000200)) socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) r2 = gettid() write$cgroup_pid(r1, &(0x7f0000000100), 0xda4fff08) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000900)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000}, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0xe}, r1, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x5, 0x2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0xf, 0x1}, 0x14) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000000)) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) perf_event_open(0x0, r2, 0xc, 0xffffffffffffff9c, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x660c, 0xf) 11:48:37 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x1ff, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r1, 0x0, 0x0}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f00000001c0), 0x0}, 0x20) 11:48:37 executing program 2: r0 = socket$kcm(0x2, 0x40000000000005, 0x0) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000180)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000500)=[{&(0x7f0000000200)=']', 0x1}], 0x1}, 0x0) 11:48:37 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10034, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 11:48:38 executing program 0: r0 = socket$kcm(0xa, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x80, 0x0}, 0x20000005) sendmsg$kcm(r0, &(0x7f0000000700)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev, 0x8}, 0x80, 0x0}, 0x20004040) 11:48:38 executing program 5: socketpair$unix(0x1, 0x100000000005, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x5, 0x3c, 0x4000000000000800, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r1, &(0x7f0000000040), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={r1, &(0x7f0000000040), 0x0}, 0x20) 11:48:38 executing program 0: r0 = socket$inet(0x10, 0x2, 0x4) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) llistxattr(0x0, &(0x7f0000000140)=""/220, 0xdc) prctl$PR_GET_KEEPCAPS(0x7) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000002c0)=0x0) perf_event_open(0x0, r1, 0x7, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f000000d000)=[{&(0x7f0000000040)="4c0000001200ff09fffefd7a7e956fa283b724a6008000004e22000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca65481000000000000000000000000", 0x4c}], 0x1}, 0x0) 11:48:38 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capget(&(0x7f0000000080), 0x0) 11:48:38 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000040)={{0x2, 0x0, @remote}, {0x0, @remote}, 0x8, {0x2, 0x0, @loopback}, 'rose0\x00'}) 11:48:38 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x4) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@ipv4={[], [], @dev}, 0xfffffffffffffffc, 0x1}, 0x20) 11:48:38 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) sendto$inet6(r0, &(0x7f0000000040)="040300000100000000000000c52c", 0xe, 0x0, 0x0, 0x0) 11:48:38 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, 0x0) sendto$unix(r0, &(0x7f0000000080)="f834d0e04907025e792b", 0xa, 0x20000047, 0x0, 0x0) 11:48:38 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x40, 0x0) close(r0) r1 = syz_open_dev$loop(&(0x7f0000000240)='/dev/loop#\x00', 0x0, 0x105082) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x105, 0x0, &(0x7f00000002c0)) ioctl$TUNATTACHFILTER(r2, 0x401054d5, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, 0x0) r3 = memfd_create(&(0x7f0000000100), 0x0) pwritev(r3, &(0x7f0000000080)=[{&(0x7f00000000c0)="a8", 0x1}], 0x1, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r3) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) preadv(r3, &(0x7f0000000000)=[{&(0x7f0000004500)=""/4096, 0x1000}], 0x1, 0x0) sync_file_range(r1, 0x0, 0x0, 0x2) 11:48:38 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = dup(r1) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) ioctl$sock_inet_udp_SIOCINQ(r2, 0x8905, &(0x7f0000000140)) 11:48:38 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000000)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/route\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001e1, 0x4c000000) 11:48:38 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0d46d21fede7ec205583588838020c03", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$TIPC_CMD_SET_NETID(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0}}, 0x8000) write$FUSE_INTERRUPT(r1, 0x0, 0x0) 11:48:38 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) syz_genetlink_get_family_id$nbd(0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x3f) ioctl$LOOP_CLR_FD(r0, 0x4c01) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fadvise64(r0, 0x0, 0x0, 0x4) 11:48:38 executing program 2: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) rt_sigqueueinfo(r0, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}) ptrace$cont(0x20, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x6) 11:48:39 executing program 4: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) truncate(0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') lseek(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x0) 11:48:39 executing program 0: write$P9_RLCREATE(0xffffffffffffffff, 0x0, 0xfffffffffffffeaf) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r1 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, 0x0, 0x0) fdatasync(r1) 11:48:39 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) getsockopt$inet_mtu(r1, 0x0, 0xa, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$set_timeout(0xf, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000), 0x4) semget$private(0x0, 0x1, 0x0) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) 11:48:39 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f0000000600)={'icmp6\x00'}, 0x0) stat(&(0x7f0000000140)='./file0\x00', 0x0) lstat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000380)) 11:48:39 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, 0x0) sendto$unix(r0, &(0x7f0000000080)="f834d0e04907005e792b", 0xa, 0x40044, 0x0, 0x0) 11:48:39 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) time(0x0) close(r0) ioctl$TCXONC(r0, 0x540a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) getsockname$inet(0xffffffffffffffff, 0x0, 0x0) getpeername$unix(r0, &(0x7f0000000040), &(0x7f00000000c0)=0x6e) setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x81, &(0x7f00000001c0)=ANY=[@ANYBLOB="66696c746572000000000000000000000000000000000000000000000000000000070000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1) 11:48:39 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4000000004002) mmap(&(0x7f0000000000/0xff7000)=nil, 0xff7000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = dup2(r0, r0) ioctl$LOOP_SET_STATUS(r2, 0x4c02, 0x0) 11:48:39 executing program 1: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x200, 0x0) 11:48:39 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) getsockopt$inet_mtu(r1, 0x0, 0xa, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$set_timeout(0xf, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000), 0x4) semget$private(0x0, 0x1, 0x0) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) 11:48:39 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000340)={@ipv4={[], [], @remote}, 0x6}) r1 = socket(0x0, 0x0, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(r1, 0x8917, &(0x7f0000000180)={'bridoe_s\x06\xff3\x01\x00\x84\x13:', {0x2, 0x4e21, @multicast1}}) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") unshare(0x40000000) r2 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000000c0)={@loopback}, &(0x7f0000000100)=0x14) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x6) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000140)=0xffffffffffff8001, 0x4) r3 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000200)={0x0, {}, {}, {}, 0x2a4, 0x0, 0x0, 0x0, 0x4, &(0x7f00000001c0)='ip6_vti0\x00'}) r4 = socket(0x400000000010, 0x3, 0x0) write$binfmt_aout(r4, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x12) ioctl$TIOCCBRK(r2, 0x5428) fstat(0xffffffffffffffff, &(0x7f00000002c0)) getgroups(0x0, &(0x7f0000000380)) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x4e23, 0x40, @empty, 0x101}, 0x1c) write(r4, &(0x7f0000000000), 0x0) gettid() 11:48:39 executing program 0: clone(0x80000fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000006000/0x2000)=nil, 0x2000, 0x1, 0x10, r0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000180)={0x1, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="01"], 0x0, 0x0, 0x0}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) write$selinux_attr(r2, &(0x7f0000000300)='system_u:object_r:auth_cache_t:s0\x00', 0x22) [ 580.652018] IPVS: ftp: loaded support on port[0] = 21 [ 580.712329] binder: 19809:19810 unknown command 1 [ 580.717280] binder: 19809:19810 ioctl c0306201 20000180 returned -22 [ 580.834580] IPVS: ftp: loaded support on port[0] = 21 11:48:41 executing program 2: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) rt_sigqueueinfo(r0, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}) ptrace$cont(0x20, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x6) 11:48:41 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) rt_sigqueueinfo(r0, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}) ptrace$cont(0x20, r0, 0x0, 0x0) 11:48:41 executing program 1: creat(&(0x7f0000000700)='./bus\x00', 0x0) lremovexattr(&(0x7f0000000000)='./bus\x00', 0x0) 11:48:41 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) getsockopt$inet_mtu(r1, 0x0, 0xa, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$set_timeout(0xf, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000), 0x4) semget$private(0x0, 0x1, 0x0) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) 11:48:41 executing program 0: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fstat(r0, &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$system_posix_acl(r0, &(0x7f0000000640)='system.posix_acl_access\x00', &(0x7f0000000d40)={{}, {}, [], {}, [{0x8, 0x0, r1}]}, 0x2c, 0x0) 11:48:41 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000340)={@ipv4={[], [], @remote}, 0x6}) r1 = socket(0x0, 0x0, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(r1, 0x8917, &(0x7f0000000180)={'bridoe_s\x06\xff3\x01\x00\x84\x13:', {0x2, 0x4e21, @multicast1}}) ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000040)="0047fc2f07d82c99240970") unshare(0x40000000) r2 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000000c0)={@loopback}, &(0x7f0000000100)=0x14) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x6) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000140)=0xffffffffffff8001, 0x4) r3 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f0000000200)={0x0, {}, {}, {}, 0x2a4, 0x0, 0x0, 0x0, 0x4, &(0x7f00000001c0)='ip6_vti0\x00'}) r4 = socket(0x400000000010, 0x3, 0x0) write$binfmt_aout(r4, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x12) ioctl$TIOCCBRK(r2, 0x5428) fstat(0xffffffffffffffff, &(0x7f00000002c0)) getgroups(0x0, &(0x7f0000000380)) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x4e23, 0x40, @empty, 0x101}, 0x1c) write(r4, &(0x7f0000000000), 0x0) gettid() 11:48:42 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) rt_sigqueueinfo(r0, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}) ptrace$cont(0x20, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x6) [ 583.039208] IPVS: ftp: loaded support on port[0] = 21 11:48:42 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) getsockopt$inet_mtu(r1, 0x0, 0xa, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$set_timeout(0xf, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000), 0x4) semget$private(0x0, 0x1, 0x0) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) 11:48:42 executing program 1: request_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f00000000c0)='security&\x00', 0x0) 11:48:42 executing program 0: r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) link(&(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='./file1/file1\x00') rmdir(&(0x7f0000000000)='./file1\x00') 11:48:42 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) getsockopt$inet_mtu(r1, 0x0, 0xa, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$set_timeout(0xf, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000), 0x4) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) 11:48:42 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) write(r0, &(0x7f0000000140)="1f0000000104ff0d1d4354c007110000f3e90000085b8f00010423dcffdf00", 0x1f) [ 583.487412] netlink: 11 bytes leftover after parsing attributes in process `syz-executor1'. 11:48:42 executing program 2: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) rt_sigqueueinfo(r0, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}) ptrace$cont(0x20, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x6) 11:48:42 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00 \x01\x00K\xdd\xd9\xde\x91\xbe\x10\xee\x9e\xd5T\xfa\aBJ\xde\xe9\xcb\xc6\x99\xec,\xa5v\xe5\x00\x00\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\xd0\xcfsw\v\xd4$hG\xa1\x91NO\xb0\xaa\x9b\x15\xea\xa9K\xcd\x0ep\x0e\xd6;D3\x8e\x84\xadN\xc2\xf1\x1fo*\xdb\x8d\xc2\xfd\xb1\x821DoC\x14.\xbep\v\"1\xe8\xfc\xee\xd6\xb2*7<\x94\tgZ\xc8\xd0\xb503\x12?\xb3\x03}f$\x1a\xaf\xe0\xf8\x80\xe7\xa5\x1d\x1b\x03j\xde1\xd2Ci\xdf\x8c/\xce!\xdc\xb1\xcb\x96Vi\xf9\xa7SE\xac4y\xcdh\x8f}\xe3d\xc9\xc2\x03\xc8>\xd9\xe6f\xca%\xaa\xd2\xe7\xa2n=lb\xd0\xf8\xb9\x06\\\xfc\xa3\x11\xc0m\aD\xdb&Z\xa0\xe4\x86p|Q\xfd\x10\x8c\f\x94\xa6\xe6\xffB\'J\xf9M0\xfc\xe8\x83o\xf9\xd0\v\xdd\xd7\xfe\"\xf0\x93\x9f\xf3\xb8\x02\xea\x12`\xe8f?\xfb9|\xa0A\x9e_\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xa3\x8f+H02\x1eI{\xb8\b\x04\x03\xd3\x98\xdbG\xdd\xf8]uI)\x03\xdal\x1c~\xee\x85\xb1\xc5|!v B\xe6\x16\xef|g.\xdb\xe3\xfe\x88\x11-7\xceJ~\xd4-]\xefP\xcf\xfc\x8d\x86k\xd7\xa4\xe8\x8a\x1byk\x88e\x97e#&\xa6\xb2\xe1\xd4p\x0e\xa2\xa1`a\x03\x7fI\x89\x8f\x9ar\xbc9t\a)\x89m\xbba6\xa4\x86~Tn7\x1b\xbb:&\xd9\x95\xc3\xa3\xe2\r\xfd\xf4\xf1*\xde?G\x1a\xde%k\xf2\xab') flistxattr(r0, &(0x7f00000002c0)=""/68, 0xfffffffffffffee6) setsockopt$packet_rx_ring(r0, 0x107, 0x5, 0x0, 0x0) ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) 11:48:42 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$set_timeout(0xf, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) 11:48:42 executing program 1: r0 = socket$inet6(0xa, 0x100000000002, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = dup(r0) write$P9_RWRITE(r1, &(0x7f0000000000)={0xb}, 0xb) 11:48:43 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$set_timeout(0xf, 0x0, 0x0) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) 11:48:43 executing program 3: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x85a, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSSOFTCAR(r0, 0x541a, &(0x7f0000000080)) 11:48:43 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) rt_sigqueueinfo(r0, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}) ptrace$cont(0x20, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x6) 11:48:43 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000800)='/proc/thread-self/attr/current\x00', 0x2, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f00000001c0)=@req3={0x7fff, 0x3, 0xfeb3, 0x85c0000000000000, 0xffff, 0x9}, 0x1c) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000100)=""/154, &(0x7f0000000040)=0x9a) eventfd(0x0) syz_open_procfs(0x0, &(0x7f0000000200)='pagemap\x00') connect$unix(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_WAITACTIVE(r0, 0x5607) r2 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r2) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f00000001c0), 0xfffffef3) read(r3, &(0x7f0000000200)=""/250, 0x50c7e3e3) sendfile(r1, r1, 0x0, 0x27) 11:48:43 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffe) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) 11:48:43 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() pause() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3e) 11:48:43 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) 11:48:43 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) getsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) 11:48:46 executing program 2: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) rt_sigqueueinfo(r0, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}) ptrace$cont(0x20, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x6) 11:48:46 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) 11:48:46 executing program 3: sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x1) r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000180)="b1"}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000001c0)={0xcb, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0b63000081426de78af549ea6b95ee42b238ca2bcde0ba7649ebb8c2bf5e43d3ac6962fe6182415e992459df89f24ce92077acbd44db90b8b9fc8df787bd1c9e0001eb70d0bff2a073c4ed7faa4e4d24069f6e6c100ed4c820af45c189fe485fb01526517d766ea02a9f222e0906eaaa6919166c98f478c47995be69b0d3df5e61c0e4b6cb1ff312eeaa61ef42d271d54849b5155c54b2420fa5de436cd1cb68b1ff1889e237949da25c526c2963920ec3807326ae314f64b3e07d9eaa000019000000000018a94d9dc30f"], 0x0, 0x0, 0x0}) 11:48:46 executing program 0: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x1000f4) r1 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000fffffffe) getxattr(0x0, 0x0, 0x0, 0x0) 11:48:46 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) rt_sigqueueinfo(r0, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}) ptrace$cont(0x20, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x6) 11:48:46 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000800)='/proc/thread-self/attr/current\x00', 0x2, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f00000001c0)=@req3={0x7fff, 0x3, 0xfeb3, 0x85c0000000000000, 0xffff, 0x9}, 0x1c) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000100)=""/154, &(0x7f0000000040)=0x9a) eventfd(0x0) syz_open_procfs(0x0, &(0x7f0000000200)='pagemap\x00') connect$unix(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VT_WAITACTIVE(r0, 0x5607) r2 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r2) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f00000001c0), 0xfffffef3) read(r3, &(0x7f0000000200)=""/250, 0x50c7e3e3) sendfile(r1, r1, 0x0, 0x27) 11:48:46 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) [ 587.073612] binder: 19920:19925 ioctl c0306201 0 returned -14 [ 587.129781] binder: 19920:19930 ERROR: BC_REGISTER_LOOPER called without request [ 587.137522] binder: 19920:19930 unknown command -412269951 [ 587.143461] binder: 19920:19930 ioctl c0306201 200001c0 returned -22 11:48:46 executing program 0: socketpair$unix(0x1, 0x80000000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x4020940d, &(0x7f0000000140)='\x06\x00\x00\x00\xe6\xff\x9a\x00\x00pp1') 11:48:46 executing program 5: semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) 11:48:46 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0}, 0x48) bpf$OBJ_GET_PROG(0x7, &(0x7f00000002c0)={&(0x7f0000000140)='./file0\x00'}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000003e40)={&(0x7f0000001500)=@xdp={0x2c, 0x2, 0x0, 0x28}, 0x80, &(0x7f00000039c0), 0x0, &(0x7f0000003a80)}, 0x40000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r1, 0x18000000000002a0, 0x34, 0x0, &(0x7f0000000280)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d1788e8ad30d84648a27f11c72be0000e01e1977d48", 0x0, 0x100}, 0x28) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000140), 0x4) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000002c0), 0xffffffffffffff05) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000006c0)={'rose0\x00', 0x2000}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfffffffffffffffa) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000004c0)='pids.events\x00', 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000500)=r2) bpf$MAP_CREATE(0x0, &(0x7f0000000300)={0x9, 0xcc, 0x5, 0x9, 0x5, 0x1, 0xc7}, 0x2c) socketpair(0x9, 0x5, 0x1fffffffe, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001000)=ANY=[], &(0x7f0000000100)='GPL\x00'}, 0x48) socketpair(0x1, 0x2000000001, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) recvmsg$kcm(r3, &(0x7f0000000700)={&(0x7f0000000400)=@alg, 0x80, &(0x7f0000000640)=[{&(0x7f0000000780)=""/242, 0xf2}, {&(0x7f0000000480)}, {&(0x7f0000000880)=""/208, 0xd0}, {&(0x7f0000000540)=""/26, 0x1a}, {&(0x7f0000000980)=""/219, 0xdb}, {&(0x7f0000000580)=""/68, 0x44}], 0x6, &(0x7f0000001580)=""/4096, 0x1000, 0x100000001}, 0x1) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x6, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="b70200000036977e159a6c9f0a0000000703000000feffff7a0af0fff8ffefff79a4f0ff00000000b7060000ffffffff2d64050000000000650404000100000004040000f2000000b7050000230000006a0a00fe000000008500000036000000b700000000000000950000000000ce9b"], 0x0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r5, 0x0, 0xe, 0x0, &(0x7f0000000380)="8e5712f9ec625ca6752406da588e", 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000100)) 11:48:46 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/tcp\x00') r1 = socket(0x2, 0x1, 0x0) listen(r1, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x12c, 0x4) 11:48:46 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x7c, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000008c0), 0x4) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000001c00)=""/4096, 0x1000}], 0x1}, 0x100) write$binfmt_elf64(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="7f454c4600706a5ce1a2ee467d3bca22f507643a066104010000000000000c02000000000000a6d10000030038000200ffffffff468051e57464030000000300000000000000bc08000000000000f9ffffffffffffffff7f0000000000000600000000000000000800000000000005000000020000006f000000000000000000000000000000ea2b000000000000080000000000000003000000000000000800000000000000f8d1cf6bb60a3cc8252c025b5f92a84bb4d5efd7201c0b3858f135eeae2dc7f0e87b4cb7c2ebe8e1bf26d90204e8796ae2234ab4507f89e0a927c56e06ac8487242f23306477b3ced713f3ccd7a0f1572c2cfeceaf21b6b33f3293bfb67974157e7a4e10510b1d74ca0f796a92f62c8102c33ef139e0cf2ccd4388e8404194afc7dcb3c0580904a76736e493f5c3d9c8d91d510485793916f26e041f6b30857e8c9b55fe64259328116a71513c065b05319d42f98f00000000000000775f402d0000000000000000000000000000000000000000000000000000140000000000000000000000000000000002000000008f00000000000000000000000000f9ffffff000000000000000000000000000000000000000100001e00000000"], 0x1c3) write$binfmt_elf64(r0, &(0x7f0000001080)=ANY=[@ANYBLOB="7f454c4600250000050000000000000003003e00060000002c010000000000004000000000000000e1000000000000000500000087003800020002000700ea0002000070010046acea0a000000000000f7ffffffffffffff00000000ffffffff000000000000000001000000010004000100000000000000010000700400000005000000000000000000000000000000050000000000000001000000d15c0000ff0f00000000000000fcfffffffffffff423273d395b5dfe49a633eb0eb0263328129db30c89d614ca312379424593d1149401363a977a2b10bc8305002bab422771360aa38dc889b26829f721e3098b0f80c2f4ee55bcf0df04911af0a6a16e0ab5b5bb1e2227df0cb7b403be567ea3b9adef738dd4b7efbd9e56dfc0dc488a064d4ad246d477bc8fedb6c1fbcdb1469e544a6ac9afa9987b94c8d1209a41a79416931a8f43bd761418a2c47221a2a4d6bee2592cd6eab8fa3ac582965b48d68fb1dde708c9901874b0f1628c0adf0dc15872d102a327e9f073a52942892de4cc87c25e76cde841dd1e09db3f59955450018b682981af9bf3133a11fbf7915b41105bd663e6f7116777b3cb43f260d25a06d22119ca7674f7d9eeb496cccae5ea73758600072b6f0c2a040000002001cb9377fbc132be60c8b0bf6ac0a892b355685d62cb7077a1e889c359d7bfc544111c6ca232e6c6593a0b8f085567b065536d649fea6d4e202255fc1a0dedba780af208b0457ed33958cfd97c0155f59b06d997423bb3b6f3d5e01c8b74030434cacb0e508ef261aff03a72021b6011f6ff05f6070f0bcb7d75cbf1668562cd6599dcf1eac792c47370ac83b2730215d9955f6fa81f59d3209fbaf52f41f8c413432d976fe6eb3ae98661de6250e09bcf7b82d0492b349ca022abe346a443d41aa83ba7d2ed5193dda7e9c78769b1430e5a171e12e0fa1d057e1aef4b856ab0f2dabc8b207f09d78e1f83461ccac0b2558732ea70d369973971d2c6d94081f33308b1e4b27a2ce6f45838809407045aa63b07372728d2aabbb752eb506219d82564c7323f73bfc2260fd95e5e8eeca550b29adcca477de69469764858d7aa3ab8afd99e883c43dacae12ac88e7fea5a99df90755e5caf59185794ed6419a22fe36d9070ed6558b090cb871914491e2a135047b729107896b784bf87c941f7b993033898b993c83b8bcec93aed20e900921e8c8e65939b23a0f84c837a71633aad5664665e7f89839258d1477a2e8fceaa9280b9c9dc53b5ed4bd907c3948f04ac1eff961bf3040ae0faed3985bccc355506ab48000000000000c988e60aec5b577af9769cebc8d6e87a826826f8362c84fe7e4a16277f3cc34e0ac8e9102e5c83c9e6d3cc39c1b6b6b9005eaaf0d9037fa57675b8143dc67e94c1090b7376eec330f5995c4b3a119646b4a953cf0669d6e52264827bbbae2c7565529a68f46f5e1a23137059867d0192caf6b22e2d74f8fbe12a139bc90a0d12b6acc0a106ba4fc2baf87c254bb540835206fc5f63dbc82581cec68813c331af00086cae971610587c4683d5f1b0dd68b8a419f581f0387cc9d1a435e329a0595d73a4489b1ea23c331ca752bfd46de13faee26e7e2e9b11dd7151883ac8112c0ba049070bcf00881cc0a37395f1a102cddda4b0b903b0233461e70254e6a75b9c29c02fce51b630d5cd58867e5f8e5b47fdb2fb53e0b9485f1079ddb39d7b3ef5d8d37be9a08714575e454274581a8ad758ba53da32d2c893e8a40de0febf31f84016558a9db7c53dec27895d69fa1a34e4b5b856f4d0974a9dd4031e28632a245b921a576f1a19f47d7ba08e9ca94a7ae46c89b379d90e0dfdcffb790586d920ea79f94af735aa51695dfe0c9c73a44b277e877b473b43f5c3a960d7c5e22678ab3f7cf46bdf23cbbd31df613827f8e23f7b2c71be25eab7dbd56f7b426b78f8e5afe72366ffcd05c29b92ad591e35a19df8010001009b87a13109c19ea941e9b9f6ee1c47708870abfda2debce7eae0f356bc896a5a207f6bc3ed4186117e1ae9b861d3a9a94520a6df99fd700c6fc3b82467a1257c2040dd34b2fb30c032224e6b864900f93168e387edaeeedaebf8b7b40d4caaa97c85229e63770ced3382013fd11010d0ee46333666aaec98aacc511c92be9e55eee400c74ab4614552624ad88f5d63b6f87e85826ee7cf6f15418f9712c6d07f36a54f097d9bc48b3035ae569af4753e7831dc520fe4726d0c96d0cb7b45e5ca5002884d38ed8e8ead8d4a7da76f9bcfd848fd27345bec7dd4356ef7b11a0cd3113bd9c581e7e647eddd060553fd6e9194bc07ffc5ca9eb6e9ce36aa545ac0f6e242e381282522481668f05909a69db9c8f417ce2406fb727c11fa8ed3ec6f097fed51414f3286075c414753979f58a70d97539c1215ad15f4f24e9921c3fc4636f4fb616d5b871cbdc9cb27e00245bb2291f767d4c581387a63022c727026043c0180a848edd1c3fffff21c3fe0b11c65caca8941959536882277e3dc9e61da52527a24e2d79a497a80b33b24f1ca184d56ad13194867d7a0a424977b5f256a4643460a03007ccf2abb042c6a8f357e8c67298f4ee68fa10d82aeec9c63884f43927692db04bfa6651a630ff1e945d5c2ceb1552d0cd69830f257e5d2b500e4447f03edc78938d82871b7075be875dee546cd23ae617356f51fe8f1fb11417e63a436d7ca0ecd22fab3719ab5b4a4fa0ac2b6a44002fdddb61f7d6fe2beac291455b144cff1da4cb487c430a42cd6dee2b0752536175bdeb3abf2a393823dddf4567d7a6ac785662eb272ea9ea223e0d63a2d027fc3bfa6da9c1537a5c207c9f2495bd45ee28be938ad3dbdadee778875ba641ceb20f3fb23d57269a4e40e0baea56d0b4247f12ebb7cf6ee0e64b0d521c8636ca845287f752adfde005237bee0451540bcabf455b43233e287e4ce36ebbf2cf0aa8325b72b90c40cc5bdf77f66b07bf5423a80409e1e95424e2d63c09e621354d87d29d28758c290f29746e00e72e1f6ee"], 0x865) [ 587.796901] binder: 19920:19930 ioctl c0306201 0 returned -14 [ 587.821039] binder: 19920:19958 ERROR: BC_REGISTER_LOOPER called without request [ 587.828857] binder: 19920:19958 unknown command -412269951 [ 587.834692] binder: 19920:19958 ioctl c0306201 200001c0 returned -22 11:48:47 executing program 2: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) rt_sigqueueinfo(r0, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}) ptrace$cont(0x20, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x6) 11:48:47 executing program 0: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x859, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) restart_syscall() 11:48:47 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGPTPEER(r0, 0x5406, 0x7ffffd) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 11:48:47 executing program 4: 11:48:47 executing program 3: 11:48:47 executing program 4: 11:48:47 executing program 3: 11:48:47 executing program 0: 11:48:47 executing program 4: 11:48:47 executing program 1: 11:48:47 executing program 3: 11:48:47 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x7c, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000008c0), 0x4) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000001c00)=""/4096, 0x1000}], 0x1}, 0x100) write$binfmt_elf64(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1c3) write$binfmt_elf64(r0, &(0x7f0000001080)=ANY=[@ANYBLOB="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"], 0x865) 11:48:48 executing program 2: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) rt_sigqueueinfo(r0, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}) ptrace$cont(0x20, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x6) 11:48:48 executing program 0: 11:48:48 executing program 3: 11:48:48 executing program 4: 11:48:48 executing program 1: 11:48:48 executing program 3: 11:48:48 executing program 1: 11:48:48 executing program 0: 11:48:48 executing program 4: 11:48:48 executing program 3: 11:48:48 executing program 1: 11:48:48 executing program 5: 11:48:49 executing program 2: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) rt_sigqueueinfo(r0, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}) ptrace$cont(0x20, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x6) 11:48:49 executing program 4: 11:48:49 executing program 3: 11:48:49 executing program 0: 11:48:49 executing program 1: 11:48:49 executing program 5: 11:48:49 executing program 0: 11:48:49 executing program 5: 11:48:49 executing program 1: 11:48:49 executing program 3: 11:48:49 executing program 4: 11:48:49 executing program 0: 11:48:49 executing program 2: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) rt_sigqueueinfo(r0, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x6) 11:48:49 executing program 1: 11:48:49 executing program 5: 11:48:49 executing program 3: 11:48:49 executing program 0: 11:48:49 executing program 4: 11:48:50 executing program 0: 11:48:50 executing program 1: 11:48:50 executing program 4: 11:48:50 executing program 5: 11:48:50 executing program 3: 11:48:50 executing program 0: 11:48:50 executing program 2: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) rt_sigqueueinfo(r0, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x6) 11:48:50 executing program 1: 11:48:50 executing program 5: 11:48:50 executing program 4: 11:48:50 executing program 3: 11:48:50 executing program 0: 11:48:51 executing program 4: 11:48:51 executing program 5: 11:48:51 executing program 1: 11:48:51 executing program 3: chmod(&(0x7f0000000000)='./file0\x00', 0x0) 11:48:51 executing program 0: 11:48:51 executing program 1: [ 592.412678] ip6_tunnel: ip6tnl1 xmit: Local address not yet configured! 11:48:51 executing program 2: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) rt_sigqueueinfo(r0, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x6) 11:48:51 executing program 5: 11:48:51 executing program 3: 11:48:51 executing program 4: 11:48:51 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x3, 0x16, &(0x7f0000000200)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf200000000000000700000008ffffffad2301000000000095000000000000006916000000000000bf67000000000000570600000f0000006706000002000000070600000ee60000bf050000000000001f650000000000006707000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffbd43010000000000950000000000000005000000000000009500000000000000"], 0x0}, 0x48) 11:48:51 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f00000001c0)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) 11:48:51 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x20000000003, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fc, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000440)="1a8c44203bb0f1b182da383dd71795f51053261e63b0b9f1283f0800000000000000210600000000000000a5dba53c46b82862a2f804121cda7e6be8fd507bb1545de629746d878f10be8036e98a270c42d6458f97b342303464e94ccbaf05408837796bb1b807635f2f136d6f4fff945e3f3fa35492e706f3ba32b6a4d04c4999f6", 0x82, 0x0, 0x0, 0x0) readv(r0, &(0x7f0000000140)=[{&(0x7f0000000200)=""/226, 0xe2}], 0x1) sendto$inet(r0, &(0x7f00000007c0)="0690938ddc845794e84f5a123660c5e073a21961cbec526d562837b8ee4c9bc1e490af59fff88d42048556d192049c3b75163c4205106fdbd6dcdf0682342729bd5b98bed9501bc521eb72d1398766963051afaaa8b1ac12a926757b44d86248a12a447647dd8b7da4dc4ffcd6c2ad0739077a65366abc124819d884e25c5dfc3345", 0x82, 0x44081, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000780)='V', 0x1, 0x0, 0x0, 0x0) 11:48:51 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100), 0x1c) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f000014f000)={&(0x7f00003c7ff4), 0x88, &(0x7f00000bfff0)={&(0x7f00000001c0)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x32, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x88) 11:48:52 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x32, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x88) 11:48:52 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) r3 = epoll_create(0x6) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r0, &(0x7f0000000100)={0x14}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 11:48:52 executing program 1: r0 = memfd_create(&(0x7f0000000300)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x9cT\x94(>\xc0:\xec\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x80000001}]}, 0x78) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 11:48:52 executing program 4: syz_emit_ethernet(0x32, &(0x7f0000000380)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x2f, 0x0, @empty, @multicast1}, @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "bea295", 0x0, "d20434"}}}}}}, 0x0) 11:48:54 executing program 2: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x6) 11:48:54 executing program 1: socketpair$unix(0x1, 0x4000000000002, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x3fffffffffffee1, 0x2, 0x0) clock_gettime(0x7, &(0x7f0000000040)={0x0, 0x0}) recvmmsg(r0, &(0x7f0000001080)=[{{&(0x7f0000000ac0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x35d, &(0x7f0000000a80)=[{&(0x7f00000006c0)=""/246}, {&(0x7f00000007c0)=""/240}, {&(0x7f00000008c0)=""/163}, {&(0x7f0000000980)=""/234}], 0x6b, &(0x7f0000000680)=""/31, 0x1f}}], 0x3f747b8cbf977b6, 0x0, &(0x7f0000000b40)={0x0, r2+10000000}) 11:48:54 executing program 4: r0 = socket(0x200000000000011, 0x802, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f0000000000)={'team0\x00', {0x2, 0x0, @remote}}) 11:48:54 executing program 5: r0 = socket(0x10, 0x3, 0x0) sendto(r0, &(0x7f0000000140)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x144}, {&(0x7f00000000c0)=""/85, 0x630}, {&(0x7f0000000fc0)=""/4096, 0x24}, {&(0x7f0000000400)=""/120, 0x107c}, {&(0x7f0000000480)=""/60, 0x3c}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x15}], 0x8, &(0x7f0000002400)=""/191, 0xbf}}], 0x4000000000000f6, 0x0, &(0x7f0000003700)={0x77359400}) 11:48:54 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f00002b9fd4)={@multicast2, @loopback, 0x0, 0x1, [@loopback]}, 0x14) setsockopt$inet_mreqsrc(r0, 0x0, 0x25, &(0x7f0000231000)={@multicast2, @loopback, @loopback}, 0xc) 11:48:54 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) r3 = epoll_create(0x6) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r0, &(0x7f0000000100)={0x14}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 11:48:55 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) r3 = epoll_create(0x6) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r0, &(0x7f0000000100)={0x14}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 11:48:55 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1, 0xb, 0x20001, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000040), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r0, &(0x7f00000001c0)='`', 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, &(0x7f00000000c0)="a3", 0x0}, 0x20) 11:48:55 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80002, 0x0) recvmmsg(r0, &(0x7f0000003b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fb, &(0x7f0000000500)={0x2, 0x4e23, @multicast2}, 0x10) sendmsg$nl_netfilter(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)={0x14}, 0x14}}, 0x20000005) r2 = memfd_create(&(0x7f0000000580)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\b\x00\x00\x00\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe9\xaa\x9b\xc3\x14\xd2\xd1y\x1f\x9e\x856\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce(\xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(\xb8\xd9\xa3\xc4p\xf4\\>A\x11U\x99\x8d\xa3\x86\xb7\x1d\x87z\xd3\xc4\xdf\x13/\x97Yy\x8b{\x1df\x8d/\x90\xd3<\xf8\x18\xa4\x88\xcf\x048\xb4\xbe\xfa\xa5\xb7\xd6\xa5&);\x1br\xd2a\xf2\x8b\xa7\x15\xbe\x95\xeb\x1bB\xacoyP\xbb\x1c\xb9S-\xe0oK\xac\x00;S\x8a\x01\xd2\xca<\x04\xaf\x04\x9a\x9d\x84\xa5\x94J>F\xc5V\xc6\xfa\x8e\v\xe1\x82\x03`\xf8\xca\xf4\x89\r^Z44\x91\xeb\xf4$\xf3\x1d\xd5\xbd\xb6ZZ\xd8\xfdS\r\x98\x06/\x9a%m\xcf\xab u\xa6Fw\xde\xb4?\r\xbdK\xfb\xf2\x13\xb3\xfa\x00\xaaP\xc9t\x7f\'\xba\x12', 0x0) pwrite64(r2, &(0x7f0000000000)='/', 0x1, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000540)=0x102, 0x72) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000040), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) exit(0x7fffffffbffffffd) mlockall(0x3) accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) 11:48:55 executing program 2: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x6) 11:48:55 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) r3 = epoll_create(0x6) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r0, &(0x7f0000000100)={0x14}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 11:48:55 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) unshare(0x20000400) r1 = epoll_create(0x1) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, 0x0) 11:48:56 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) r3 = epoll_create(0x6) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r0, &(0x7f0000000100)={0x14}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 11:49:00 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000440)=@updpolicy={0xb8, 0x19, 0x523, 0x0, 0x0, {{@in=@multicast2, @in6, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) 11:49:00 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sysinfo(0x0) 11:49:00 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='mountstats\x00') sendfile(r0, r0, &(0x7f0000000880)=0x20013, 0x3f) 11:49:00 executing program 2: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x20, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x6) 11:49:00 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) r3 = epoll_create(0x6) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r0, &(0x7f0000000100)={0x14}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 11:49:00 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) r3 = epoll_create(0x6) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r0, &(0x7f0000000100)={0x14}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 11:49:00 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x80\x00'}) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x0) 11:49:00 executing program 4: socketpair$unix(0x1, 0x800000002, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'cryptd(crc32c-generic)\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003d00)=[{0x0, 0x0, &(0x7f0000002500)=[{&(0x7f0000000000)='s', 0x1}], 0x1}], 0x1, 0x0) 11:49:00 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000200)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000240)) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0x0) gettid() write$cgroup_pid(r1, &(0x7f0000000100), 0xda4fff08) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000900)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x5, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x5, 0x2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0xf, 0x1}, 0x14) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x660c, 0xf) [ 601.856963] input: syz1 as /devices/virtual/input/input62 11:49:01 executing program 5: openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_int(0xffffffffffffff9c, 0x0, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f00000000c0)={'bond0\x00', @random="01003a1e2410"}) 11:49:01 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000180)=ANY=[@ANYRES32=0x0], 0xfdd1) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0xffe00) 11:49:01 executing program 5: add_key$user(&(0x7f0000000140)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 11:49:01 executing program 3: socketpair(0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x8040, 0x0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000000)={0x0, 0x0, 0x80000000000005f, 0x0, 0x0, [{}]}) 11:49:01 executing program 0: setsockopt(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x100010) keyctl$session_to_parent(0x12) clock_gettime(0x0, 0x0) utimensat(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x40) getuid() 11:49:01 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) write$P9_RCREATE(r0, &(0x7f0000000040)={0x18}, 0x18) 11:49:03 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='stat\x00') lsetxattr$trusted_overlay_origin(0x0, 0x0, 0x0, 0x0, 0x0) write$P9_RREAD(r0, 0x0, 0x0) 11:49:03 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) truncate(&(0x7f0000000240)='./bus\x00', 0x800) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') lseek(r1, 0x0, 0x2) sendfile(r1, r2, 0x0, 0x8000fffffffe) 11:49:03 executing program 4: setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) poll(0x0, 0x0, 0x100) getpeername(0xffffffffffffffff, 0x0, 0x0) lgetxattr(0x0, 0x0, 0x0, 0x0) 11:49:03 executing program 5: clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2a) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x36}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) 11:49:03 executing program 2: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) rt_sigqueueinfo(r0, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}) ptrace$cont(0x20, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x6) 11:49:03 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') sendfile(r1, r2, 0x0, 0x8000fffffffe) 11:49:03 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) truncate(&(0x7f0000000240)='./bus\x00', 0x800) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lseek(r1, 0x0, 0x2) sendfile(r1, r2, 0x0, 0x8000fffffffe) 11:49:03 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000001440)={0xa, 0x4e22}, 0x1c) listen(r1, 0xfffd) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x11a, 0x20000005, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) write$binfmt_misc(r2, &(0x7f0000000200)={'syz0'}, 0x4) dup2(r0, r1) 11:49:03 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) truncate(&(0x7f0000000240)='./bus\x00', 0x800) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') socketpair$unix(0x1, 0x0, 0x0, 0x0) lseek(r1, 0x0, 0x2) sendfile(r1, r2, 0x0, 0x8000fffffffe) 11:49:03 executing program 3: 11:49:04 executing program 3: 11:49:04 executing program 4: 11:49:04 executing program 1: 11:49:04 executing program 2: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) rt_sigqueueinfo(r0, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}) ptrace$cont(0x20, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x6) 11:49:04 executing program 0: syz_open_procfs(0x0, &(0x7f0000000880)='net/ip_tables_targets\x00') 11:49:04 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') sendfile(r1, r2, 0x0, 0x8000fffffffe) 11:49:04 executing program 4: 11:49:04 executing program 3: 11:49:04 executing program 1: 11:49:04 executing program 3: 11:49:04 executing program 4: 11:49:04 executing program 1: 11:49:04 executing program 0: 11:49:04 executing program 5: 11:49:04 executing program 1: 11:49:05 executing program 2: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) rt_sigqueueinfo(r0, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}) ptrace$cont(0x20, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x6) 11:49:05 executing program 4: 11:49:05 executing program 0: 11:49:05 executing program 3: 11:49:05 executing program 5: 11:49:05 executing program 1: 11:49:05 executing program 3: 11:49:05 executing program 5: 11:49:05 executing program 4: 11:49:05 executing program 1: 11:49:05 executing program 0: 11:49:05 executing program 5: 11:49:06 executing program 4: 11:49:06 executing program 0: 11:49:06 executing program 3: 11:49:06 executing program 1: 11:49:06 executing program 2: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) ptrace$setopts(0x4206, r0, 0x0, 0x0) rt_sigqueueinfo(r0, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}) ptrace$cont(0x20, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x6) 11:49:06 executing program 5: 11:49:06 executing program 1: 11:49:06 executing program 0: 11:49:06 executing program 3: 11:49:06 executing program 4: 11:49:06 executing program 5: 11:49:06 executing program 2: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) ptrace$setopts(0x4206, r0, 0x0, 0x0) rt_sigqueueinfo(r0, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}) ptrace$cont(0x20, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x6) 11:49:06 executing program 1: 11:49:06 executing program 0: 11:49:06 executing program 3: 11:49:06 executing program 5: 11:49:06 executing program 4: 11:49:06 executing program 2: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) ptrace$setopts(0x4206, r0, 0x0, 0x0) rt_sigqueueinfo(r0, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}) ptrace$cont(0x20, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x6) 11:49:07 executing program 1: 11:49:07 executing program 5: 11:49:07 executing program 0: 11:49:07 executing program 3: 11:49:07 executing program 4: 11:49:07 executing program 2: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) rt_sigqueueinfo(r0, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}) ptrace$cont(0x20, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x6) 11:49:07 executing program 1: 11:49:07 executing program 5: 11:49:07 executing program 0: 11:49:07 executing program 3: 11:49:07 executing program 1: 11:49:07 executing program 4: 11:49:07 executing program 5: 11:49:07 executing program 3: 11:49:07 executing program 1: 11:49:07 executing program 0: 11:49:07 executing program 4: 11:49:08 executing program 2: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) rt_sigqueueinfo(r0, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}) ptrace$cont(0x20, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x6) 11:49:08 executing program 5: 11:49:08 executing program 3: 11:49:08 executing program 1: 11:49:08 executing program 0: 11:49:08 executing program 4: 11:49:08 executing program 3: 11:49:08 executing program 2: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) rt_sigqueueinfo(r0, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}) ptrace$cont(0x20, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x6) [ 609.266115] ptrace attach of "/root/syz-executor2"[20434] was attempted by "/root/syz-executor2"[20435] 11:49:08 executing program 4: 11:49:08 executing program 0: 11:49:08 executing program 5: 11:49:08 executing program 1: [ 609.426685] ptrace attach of "/root/syz-executor2"[20441] was attempted by "/root/syz-executor2"[20442] 11:49:08 executing program 2: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, 0x0) futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) rt_sigqueueinfo(0x0, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}) ptrace$cont(0x20, 0x0, 0x0, 0x0) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$cont(0x1f, 0x0, 0x0, 0x6) 11:49:08 executing program 5: 11:49:08 executing program 3: 11:49:08 executing program 1: 11:49:08 executing program 4: 11:49:08 executing program 0: 11:49:08 executing program 5: 11:49:08 executing program 3: 11:49:08 executing program 1: 11:49:09 executing program 4: 11:49:09 executing program 0: 11:49:09 executing program 3: 11:49:09 executing program 2: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, 0x0) futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) rt_sigqueueinfo(0x0, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}) ptrace$cont(0x20, 0x0, 0x0, 0x0) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$cont(0x1f, 0x0, 0x0, 0x6) 11:49:09 executing program 1: 11:49:09 executing program 5: 11:49:09 executing program 0: 11:49:09 executing program 3: 11:49:09 executing program 4: 11:49:09 executing program 5: 11:49:09 executing program 1: 11:49:09 executing program 3: 11:49:09 executing program 0: 11:49:09 executing program 4: 11:49:09 executing program 5: 11:49:10 executing program 2: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, 0x0) futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) rt_sigqueueinfo(0x0, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}) ptrace$cont(0x20, 0x0, 0x0, 0x0) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$cont(0x1f, 0x0, 0x0, 0x6) 11:49:10 executing program 1: 11:49:10 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = socket$nl_route(0x10, 0x3, 0x0) pread64(r0, &(0x7f0000000340)=""/39, 0xb8, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 11:49:10 executing program 4: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) remap_file_pages(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x0, 0xe31a, 0x0) madvise(&(0x7f0000003000/0x1000)=nil, 0x1000, 0x1) 11:49:10 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x2000011, r0, 0x0) 11:49:10 executing program 3: mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000) [ 611.512161] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 611.518875] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 611.547539] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready 11:49:10 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) rt_sigqueueinfo(r0, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}) ptrace$cont(0x20, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x6) 11:49:10 executing program 3: inotify_add_watch(0xffffffffffffffff, 0x0, 0x200) 11:49:10 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x20, 0x0, &(0x7f0000000140)) 11:49:10 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000005440)="2e000000120081aee4050cecdb4cb9040a485e510befccd77f3e9cf0758ef9000600b0eba06ac400040003000000", 0x2e}], 0x1}, 0x0) 11:49:10 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000001c0)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, 0x0, 0x0) llistxattr(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) [ 611.624737] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 611.762018] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 11:49:10 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) ioperm(0x310, 0xd, 0x0) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000333f88)={0x2, 0x1, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x40}}, 0x0) socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) shmget(0x0, 0x1000, 0x54000082, &(0x7f0000ffc000/0x1000)=nil) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) 11:49:10 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000002c0)={{}, 'syz1\x00'}) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r0, &(0x7f0000000440)={'syz1\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) 11:49:11 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0x103}) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x1) close(r0) [ 612.087960] input: syz1 as /devices/virtual/input/input64 [ 612.137344] input: syz1 as /devices/virtual/input/input65 11:49:11 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/snmp\x00') 11:49:11 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e24}, 0x1c) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) ppoll(&(0x7f0000000000)=[{r1, 0x41a}], 0x1, &(0x7f0000000200)={0x0, r2+30000000}, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1a) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, 0x0) 11:49:11 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) rt_sigqueueinfo(r0, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}) ptrace$cont(0x20, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x6) 11:49:11 executing program 4: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fremovexattr(r0, &(0x7f0000000040)=@random={'trusted.', 'vboxnet1\x00'}) 11:49:11 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0x103}) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x1) close(r0) 11:49:12 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'lo\x00'}, 0x3c3) ioctl(r1, 0x800000000008982, &(0x7f0000000000)) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) 11:49:12 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003b40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = memfd_create(0x0, 0x0) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000540)=0x102, 0x72) bind$inet(0xffffffffffffffff, &(0x7f0000942000)={0x2, 0x0, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000040), &(0x7f00000000c0)=0x68) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) setxattr$trusted_overlay_origin(0x0, &(0x7f0000000340)='trusted.overlay.origin\x00', &(0x7f0000000380)='y\x00', 0x2, 0x0) sendmsg$nl_generic(r0, 0x0, 0x4008080) 11:49:12 executing program 4: ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x6685) r0 = socket$packet(0x11, 0x0, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$nl_route(0x10, 0x3, 0x0) pread64(r1, 0x0, 0x0, 0x0) dup2(r0, 0xffffffffffffffff) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) 11:49:12 executing program 3: mknod(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) semget(0xffffffffffffffff, 0x0, 0x0) mount(&(0x7f0000000040)=ANY=[], &(0x7f0000000400)='./file0\x00', &(0x7f0000000000)='sysfs\x00', 0x402, 0x0) 11:49:12 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'lo\x00'}, 0x3c3) ioctl(r1, 0x800000000008982, &(0x7f0000000000)) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) [ 613.091518] 8021q: VLANs not supported on lo [ 613.240094] 8021q: VLANs not supported on lo 11:49:12 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000001c0)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) llistxattr(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) 11:49:12 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) pwritev(r0, &(0x7f0000000380)=[{&(0x7f0000000300)="ec93cb5fce", 0x5}], 0x1, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000000)=0x1) sendfile(r0, r1, 0x0, 0x3f) fadvise64(r0, 0x0, 0x0, 0x4) 11:49:12 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'lo\x00'}, 0x3c3) ioctl(r1, 0x800000000008982, &(0x7f0000000000)) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) [ 613.509633] 8021q: VLANs not supported on lo 11:49:12 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) readv(r0, &(0x7f0000000080)=[{&(0x7f0000000300)=""/148, 0x94}], 0x1) 11:49:12 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_open_procfs(0x0, &(0x7f0000000600)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\a\x00\x00\xa4\xd1\x19i\x8f\x1c\x12u\x0fy\x80XC\xff\x00\x00\x00\x00\x00\x00\x00\xe9\x01\xd2\xdau\xcb\x85\xb4\xb7\xa15\x05\x88t<\x8d\x9b\xaf\x1f\x02\xac\xc7\xed\xbc\xd7\xa0q\xfb53\x1c\xe3\x9cZ\x8b\v\xd6\xdc\xaf!\xbc!\x13\x17\xff\xef3\x86|\xcc[\x8f\x149\xb5m4\x16b\xbc\x88\x80\x97\x98C\xb3G\xc5\xa6d)\xc5i\xc0\x80<\x86\x8b\xca\x14u5R6\xbe\x93Bd\x85\xf9\x9f\x87\x99\x8fH\xad\x7f\xfa)\xbd\xa0\x80\xd7\x01\xb7\r%$\a!\x8f\xada.\aE\x83\xa1\x04\xad\x95\xfc\x03\xe1*\xcc\xda&\x1c\xbc:\x92\xa8\xbd\x8c\x82l\to\x8d\'\fT9J\x03\xeaO\xe6\xe8\xb2\x0e\xb9 \xee\x958\xb2\xfd\xd8\xb4C#6s(jI\nT)\xed\x04{\xe1\x012\x9a\x18\x99\f\x82:\xcb$E3\x97\xdct\x95\xa4^}{<\x00\x96\x16\xea\x9f\x91\xf3\xbe\xb5\xca\x13\xfa=\xe3t\x18\x89\x98\x85D\x88s\xa2\xc6u\xcb&\xba\xb2d\x1aL\x9e\xf8\xd8X\xf5)\xf6\x9a+\f\x92{}\x1e\\<\xa5\x1b\x82\xe3?\xbbF9)\xc84\xe1\xb9\f\xa8X.\x99\x12\xff\x9dE\x8c\xa5\x99\'\xff\xedI\x9c\x14\xa7\x89\x1e\x8a\x96\x1dr\xc3\xd2\t\xf0\xf3\x15\xa3\x1fIi\xba\xf1\x00\x00') 11:49:12 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000080)={0x2, 'lo\x00'}, 0x18) 11:49:12 executing program 4: socketpair(0x0, 0x0, 0x0, 0x0) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) r0 = openat$random(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/urandom\x00', 0x401, 0x0) socket$inet(0x2, 0x0, 0x0) setrlimit(0x0, 0x0) futimesat(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(r0, 0x0, 0x0) 11:49:12 executing program 2: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) rt_sigqueueinfo(r0, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}) ptrace$cont(0x20, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x6) [ 613.951767] IPVS: sync thread started: state = BACKUP, mcast_ifn = lo, syncid = 0, id = 0 11:49:13 executing program 0: clone(0xfffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() exit_group(0x0) ptrace(0x10, r0) 11:49:13 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000080)={0x2, 'lo\x00'}, 0x18) 11:49:13 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_mr_vif\x00') readv(r0, &(0x7f0000000100)=[{&(0x7f0000000080)=""/94, 0x43}], 0x1) 11:49:13 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/sockstat\x00') clock_gettime(0x0, &(0x7f0000002000)) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) 11:49:13 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') getdents(r0, &(0x7f0000000040)=""/46, 0x2e) 11:49:13 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000080)={0x2, 'lo\x00'}, 0x18) 11:49:13 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'lo\x00'}, 0x3c3) ioctl(r0, 0x800000000008982, &(0x7f0000000000)) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, r0) symlinkat(0x0, 0xffffffffffffffff, 0x0) 11:49:13 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000400)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x6100) ftruncate(r2, 0x8200) r3 = open(&(0x7f0000005a40)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8000fffffffe) 11:49:13 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x2, 0x0, 0x6, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x9100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x8, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x400000000005, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xd, &(0x7f0000000480)={&(0x7f0000000380), 0x0, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000500)=r0, 0x4) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xf, 0x4, 0x4, 0x9}, 0x11) r2 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0xe, 0x5f, &(0x7f0000000a80)=ANY=[@ANYBLOB="850000002f0000000800000000705f14dcc22592998c6a53b2f4873e960834860b6cff5da72975619b2ec17c8bf2039ef5beae09d44437b88936fde5d7d323c8ef36f47e21af70f98e4443d5e027f9ba00f916a9d681213b1f2e58f8b3befa6d803d1990cb40d3b02f1c1bd431343d453bf58eab709ef59041f53b6232827a521348010022911af396154a7a4646280000000000008fea9820d0fa4f9728f7ebef807dc3d6246007d10b4ec638d4c6be1190097503194945cfba0b0d793ff672317695c4ff03000091ed1c2317f1f1f75fa9e2b659a17a3e6daf16209c2c4d4915b93ec9486796289c9b8baf1ac663f76f859ce9eeda8636d0442eeaa2854a439c94c138053cf89a43d7b178802fe62469b614c7ac3ad2fccd416716332e218a65c4207f98c658ff4d4b479263330cf51fcdf1a2eb8fde3c92943db7fa66c7727b398b16548409af29f3342737133ebf4106c576b34e92b741df1e09e5ec9359f587119c2c35f3a2efd431774ecb2b57152c1282615b78dbe6c8e68fa5857d31dbfdf665bfb5e9ce2bd7a71390f2ed9f2a3f3644d05c2a92830000000000000000000000000000ae40d832fefc43abf17de8d954b91dc254f8862a084a9858b55e1aba1daedb425ea4af9876fd98d193b6a917b60aa8d76dd9495cdff7fc2730e2653a3ed11c537c41a66e9932805c1da309d0eaeb8ad74b493b963a1607a2d519d22b0a50b3d994160e703dc3df4921ecd359af3b6a31a1dda0210529405cb05999b13c8a1dd958dd8b461775056d2860ef2b6a7348e3fe0c31fe410d5e00000000000000000000002b36607de93d13a61c70a9e3898d1f618ba299eda9c7036386c1e6dbc567d0f2ed793f5da4e98d8ce1730f7102f6e3788ae64db95e29a28cc5ade4efb455fdadb0f495b832b51681e53f4f0acf438710bffd7c0000000006bf1a1ff7e9dc7fe3a03c846c0ae327151d1c09635a9b99812e4cc044d3268285c230da5bbd4a93642c50d789ad5b7ed5d84b0c020000005e6156f6c5e0350ea51d2c397462b052b445aedca1ae4000000000000000000000000000000000"], 0x0, 0x1}, 0x48) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r3 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r3, r2, 0x4}, 0x10) close(r1) r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff, 0x80000001, 0x18}, 0xc) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)}, 0x10) close(r4) gettid() ioctl$TUNGETIFF(r2, 0x800454d2, &(0x7f0000000040)) r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_ID(r5, 0x80082407, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0x40286608, 0x20000001) 11:49:13 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) connect$inet6(r0, &(0x7f0000000300)={0xa, 0x4e23, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x19}}}, 0x1c) 11:49:13 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000080)={0x2, 'lo\x00'}, 0x18) 11:49:13 executing program 2: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) rt_sigqueueinfo(r0, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}) ptrace$cont(0x20, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x6) 11:49:13 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) close(r0) 11:49:13 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000000)=@req={0x1000, 0x4, 0x1000, 0x4}, 0x10) poll(&(0x7f0000000040)=[{r0, 0x4028}, {0xffffffffffffffff, 0x2000}], 0x2, 0x0) 11:49:13 executing program 1: keyctl$join(0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) connect$inet6(r0, &(0x7f0000000300)={0xa, 0x4e23, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x19}}}, 0x1c) 11:49:13 executing program 5: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6100) truncate(&(0x7f0000000240)='./bus\x00', 0x800) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='/exe\x00\x00\x00\x00\x00\x04\t\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\x0e\xe9\xa9\x0fy\x80XC\x9e\xd5T\xfa\aBJ\xde\xe9\x01\xd2\xdau\xaf0\x02\x00\xf5\xab\xfb\x98E\xf9\xe1\x98Y\xc9i2\x06\xf2\xc6\v\x00\x00\x00\a\x19\xe1\xd6n\x97\x01#\xd8\x93\xd9t\xe5\xb9\xc3(Vw\xb2\x13\x98#\xe5P\f\x92\xab[\x94\xda:}\xe1\x9f\x06;\xb7e\xb0+\xd5\xb6`\xfb\x7f\xa8\x98\xc6\xf5\xc66\x9c?60h\xd1\n\xf83\xf6G[\xbe\x8byg%[\x17v\a\xba\x10\x0flFTq\x822\xdb\xdad\xaa\x1fi\xcf\x9a\xb5\xb3\xea>\xd64R\xb7\xeb\xd3|\x9d\xaefN2.\b\xad\x8f`)\xfe\x8f\xd0\xb3Lq\x17H\x04q\xae\xca\n?\xc9\xec\xeb(P\x9c\xa8\xa8>O\x8b\x85\x13\x18\b\xbc\\\xfbL\xc2N\x19\x01v\x9c\bL\b\'\x12\xb4pfkm\xdd\xf7L\xedi9s\xba\x1d\xed\x8b') socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) lseek(r0, 0x0, 0x2) sendfile(r0, r1, 0x0, 0x8000fffffffe) 11:49:14 executing program 3: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000080)=@loop={'/dev/loop', 0x0}, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='f2fs\x00', 0x0, 0x0) 11:49:14 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) 11:49:14 executing program 3: getitimer(0x1, &(0x7f0000000500)) 11:49:14 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='map_files\x00') exit(0x0) fchmod(r0, 0x0) 11:49:14 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/loop-control\x00', 0x0, 0x0) pipe(0x0) perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x85a, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) 11:49:15 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) 11:49:15 executing program 3: socketpair$unix(0x1, 0x800000000003, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e24}, 0x1c) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) ppoll(&(0x7f0000000000)=[{r1, 0x41a}], 0x1, &(0x7f0000000200)={0x0, r2+30000000}, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1a) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) 11:49:15 executing program 2: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) rt_sigqueueinfo(r0, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}) ptrace$cont(0x20, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x6) 11:49:15 executing program 4: pipe(&(0x7f0000e2aff8)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = gettid() readv(r0, &(0x7f0000616fa0)=[{&(0x7f0000e4bfb4)=""/57, 0x39}], 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r3, 0x5452, &(0x7f0000008ff8)=0x3) fcntl$setsig(r3, 0xa, 0x12) fcntl$setownex(r3, 0xf, &(0x7f00002cb000)={0x0, r2}) recvmsg(r4, &(0x7f000070bfc8)={0x0, 0x0, 0x0}, 0x0) dup2(r0, r4) tkill(r2, 0x16) write$P9_RWRITE(r1, &(0x7f0000000340)={0xb}, 0xb) 11:49:15 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) time(0x0) close(r0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) dup2(0xffffffffffffffff, 0xffffffffffffffff) getpeername$netlink(r0, 0x0, &(0x7f0000000040)) getsockname$inet(0xffffffffffffffff, 0x0, 0x0) 11:49:16 executing program 1: keyctl$join(0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) connect$inet6(r0, &(0x7f0000000300)={0xa, 0x4e23, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x19}}}, 0x1c) 11:49:16 executing program 0: r0 = epoll_create1(0x0) r1 = socket(0x11, 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000080)) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000040)={0x4}) epoll_wait(r0, &(0x7f0000000000)=[{}], 0x1, 0x0) 11:49:16 executing program 5: write$P9_RLCREATE(0xffffffffffffffff, 0x0, 0xfffffffffffffeaf) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) fchown(r0, 0x0, 0x0) fdatasync(0xffffffffffffffff) 11:49:16 executing program 3: socketpair$unix(0x1, 0x800000000003, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e24}, 0x1c) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) ppoll(&(0x7f0000000000)=[{r1, 0x41a}], 0x1, &(0x7f0000000200)={0x0, r2+30000000}, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1a) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) 11:49:16 executing program 2: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) rt_sigqueueinfo(r0, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}) ptrace$cont(0x20, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x6) 11:49:16 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000001c0)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_INIT(r0, 0x0, 0x0) 11:49:16 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000002c0)={{}, 'syz1\x00'}) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) [ 617.333962] input: syz1 as /devices/virtual/input/input66 [ 617.353768] input: syz1 as /devices/virtual/input/input67 11:49:16 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x32600) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x3ff800) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) write$cgroup_pid(r1, &(0x7f0000000000), 0xfffffea6) 11:49:16 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vga_arbiter\x00', 0x4000, 0x0) 11:49:16 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x80\x00\x00\x00\'\xd9\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x80\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xe7\xa2\xa4R\x00\x00\x00\x00\x00\x00\x80\x00'}) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) readv(r0, &(0x7f0000001580)=[{0x0}, {&(0x7f00000000c0)=""/17, 0x11}, {&(0x7f00000013c0)=""/250, 0xfa}, {&(0x7f0000000100)=""/166, 0xa6}, {&(0x7f0000000240)=""/23, 0x17}, {&(0x7f00000014c0)=""/154, 0x9a}, {&(0x7f0000000280)=""/27, 0x1b}], 0x7) [ 617.843607] input: syz1 as /devices/virtual/input/input68 [ 617.871449] input: syz1 as /devices/virtual/input/input69 11:49:18 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x11, 0xa, 0x0, 0x0) 11:49:18 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/igmp\x00') preadv(r0, &(0x7f0000001300)=[{0x0}, {&(0x7f0000000200)=""/4096, 0x1000}], 0x2, 0x0) 11:49:18 executing program 2: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) rt_sigqueueinfo(r0, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}) ptrace$cont(0x20, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x6) 11:49:18 executing program 5: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000180)={'sy.'}, &(0x7f0000000440)='syz', 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 11:49:18 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x10e6) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) creat(&(0x7f0000000040)='./file0/file0\x00', 0x0) write$FUSE_DIRENT(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000b7f5ec2d70046ce656d316e6f246576656d31000000000000000000f386616a1a0a3c0000000000002c0e0000000000619fed3823b7c9c6bd3276ce8c9461000000000000051c0005000000000079737465746a48be1b31486dcc6370757365746367726f757024a3d030914ce146ddb4ddefa62f4fe745fe700471"], 0x90) 11:49:18 executing program 3: socketpair$unix(0x1, 0x800000000003, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e24}, 0x1c) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) ppoll(&(0x7f0000000000)=[{r1, 0x41a}], 0x1, &(0x7f0000000200)={0x0, r2+30000000}, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1a) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) 11:49:18 executing program 5: socketpair$unix(0x1, 0x1, 0x0, 0x0) clone(0x900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'lo\x00'}, 0x3c3) ioctl(r0, 0x800000000008982, &(0x7f0000000000)) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) symlinkat(0x0, 0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00') 11:49:18 executing program 0: setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, 0x0, 0x0) open(0x0, 0x0, 0x0) clone(0xfffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000001000)={{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x800000200000, @remote}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x5c) setsockopt$inet_int(r0, 0x0, 0x40, &(0x7f0000000ffc), 0x4) 11:49:18 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/sockstat\x00') clock_gettime(0x0, &(0x7f0000002000)) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x0) [ 619.293265] 8021q: VLANs not supported on lo 11:49:18 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='/exe\x00\x00\x00\x00\x00\x00') io_setup(0x4404, &(0x7f0000000240)=0x0) io_submit(r1, 0x1, &(0x7f0000000100)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) 11:49:18 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000001c0)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50}, 0x50) 11:49:18 executing program 5: mknod(0x0, 0x0, 0x0) semget(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) mount(&(0x7f0000000040)=ANY=[], &(0x7f0000000400)='./file0\x00', &(0x7f0000000440)='sysfs\x00', 0x0, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000100)='./file0\x00') statfs(0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x40, 0x0) 11:49:18 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) connect$inet6(r0, &(0x7f0000000300)={0xa, 0x4e23, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x19}}}, 0x1c) 11:49:18 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) close(r0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) getsockname$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, 0x0, 0x0) 11:49:19 executing program 2: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) rt_sigqueueinfo(r0, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}) ptrace$cont(0x20, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x6) 11:49:19 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='reno\x00', 0x5) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) 11:49:19 executing program 1: timer_create(0x0, 0x0, &(0x7f0000000180)) timer_delete(0x0) 11:49:19 executing program 3: socketpair$unix(0x1, 0x800000000003, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e24}, 0x1c) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) ppoll(&(0x7f0000000000)=[{r1, 0x41a}], 0x1, &(0x7f0000000200)={0x0, r2+30000000}, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1a) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) 11:49:19 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000001c0)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000005c0), 0x1000) readlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000500)=""/180, 0xb4) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_DIRENT(r0, &(0x7f0000000340)=ANY=[@ANYBLOB], 0x0) 11:49:19 executing program 5: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$search(0xa, r0, &(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, 0x0) 11:49:19 executing program 1: chdir(0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000340)='./file1\x00', 0x0) rename(&(0x7f0000000480)='./file0\x00', &(0x7f0000000440)='./file1/file0\x00') 11:49:19 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/udp6\x00') clock_gettime(0x0, &(0x7f0000002000)) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) 11:49:19 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)) 11:49:20 executing program 1: open$dir(0x0, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x4003ff) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) sendfile(r1, r1, 0x0, 0x8800000) 11:49:20 executing program 0: pipe(&(0x7f0000e2aff8)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = gettid() readv(r0, &(0x7f0000616fa0)=[{&(0x7f0000e4bfb4)=""/57, 0x39}], 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r3, 0x5452, &(0x7f0000008ff8)=0x3) fcntl$setsig(r3, 0xa, 0x12) fcntl$setownex(r3, 0xf, &(0x7f00002cb000)={0x0, r2}) recvmsg(r4, &(0x7f000070bfc8)={0x0, 0x0, 0x0}, 0x0) dup2(r0, r4) tkill(r2, 0x16) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$P9_RWRITE(r1, &(0x7f0000000340)={0xb}, 0xb) 11:49:20 executing program 2: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) rt_sigqueueinfo(r0, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}) ptrace$cont(0x20, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x6) 11:49:20 executing program 5: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1, 0x10, 0xffffffffffffffff, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1f, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e24}, 0x1c) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3f, 0x0, 0x0) ppoll(&(0x7f0000000000)=[{r1, 0x41a}], 0x1, &(0x7f0000000200)={0x0, r2+30000000}, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1a) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r3 = syz_genetlink_get_family_id$team(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@multicast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000840)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000880)={{{@in, @in=@local}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f0000000980)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000b00)={{{@in6=@remote, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@local}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'team0\x00'}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000f80)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000f40)={&(0x7f0000000c80)={0x120, r3, 0x100, 0x70bd27, 0x5, {}, [{{0x8}, {0xf8, 0x2, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x8}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r4}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffffffa}}}]}}, {{0x8, 0x1, r5}, {0x4}}]}, 0x120}, 0x1, 0x0, 0x0, 0x8000}, 0xc0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) 11:49:20 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETAF(r1, 0x541b, &(0x7f0000000000)) 11:49:20 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB="240000001900010000000000000000000a000000000000f6ffffffff0700060021000010"], 0x1}}, 0x0) 11:49:21 executing program 3: 11:49:21 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'syz_tun\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @random="b286998f745e"}, 0x10) 11:49:21 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) unlink(&(0x7f00000001c0)='./file0\x00') dup3(r0, r1, 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000100)='.\x00', 0x0, 0x6000, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) [ 622.298411] device syz_tun entered promiscuous mode [ 622.351836] device syz_tun left promiscuous mode 11:49:21 executing program 3: 11:49:21 executing program 4: [ 622.493911] ip6_tunnel: ip6tnl1 xmit: Local address not yet configured! 11:49:21 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='/\x02roup.stap\x00', 0x2761, 0x0) 11:49:21 executing program 3: r0 = getpid() r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) sched_setaffinity(r0, 0x8, &(0x7f00000000c0)=0xb25) write$binfmt_elf64(r1, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000200)='ramfs\x00', 0x0, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000640)='trusted.overlay.upper\x00', 0x0, 0x0, 0x0) 11:49:23 executing program 0: 11:49:23 executing program 2: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) futex(0x0, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) rt_sigqueueinfo(r0, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}) ptrace$cont(0x20, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x6) 11:49:23 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00003dd000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000001c0)=""/246) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x4004743d, &(0x7f000082ef0a)=""/246) 11:49:23 executing program 5: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1, 0x10, 0xffffffffffffffff, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1f, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e24}, 0x1c) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3f, 0x0, 0x0) ppoll(&(0x7f0000000000)=[{r1, 0x41a}], 0x1, &(0x7f0000000200)={0x0, r2+30000000}, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1a) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r3 = syz_genetlink_get_family_id$team(0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@multicast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000840)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000880)={{{@in, @in=@local}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f0000000980)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000b00)={{{@in6=@remote, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@local}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000c40)={'team0\x00'}) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000f80)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000f40)={&(0x7f0000000c80)={0x120, r3, 0x100, 0x70bd27, 0x5, {}, [{{0x8}, {0xf8, 0x2, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x8}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r4}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffffffa}}}]}}, {{0x8, 0x1, r5}, {0x4}}]}, 0x120}, 0x1, 0x0, 0x0, 0x8000}, 0xc0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) 11:49:23 executing program 1: 11:49:23 executing program 3: 11:49:24 executing program 1: 11:49:24 executing program 3: 11:49:24 executing program 2: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) futex(0x0, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) rt_sigqueueinfo(r0, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}) ptrace$cont(0x20, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x6) 11:49:24 executing program 0: 11:49:24 executing program 4: 11:49:24 executing program 2: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) futex(0x0, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) rt_sigqueueinfo(r0, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}) ptrace$cont(0x20, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x6) 11:49:24 executing program 1: 11:49:24 executing program 3: 11:49:24 executing program 4: 11:49:24 executing program 5: 11:49:24 executing program 3: 11:49:24 executing program 2: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) futex(&(0x7f0000000140), 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) rt_sigqueueinfo(r0, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}) ptrace$cont(0x20, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x6) 11:49:24 executing program 0: 11:49:24 executing program 4: 11:49:24 executing program 1: 11:49:25 executing program 4: 11:49:25 executing program 3: 11:49:25 executing program 1: 11:49:25 executing program 0: 11:49:25 executing program 2: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) futex(&(0x7f0000000140), 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) rt_sigqueueinfo(r0, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}) ptrace$cont(0x20, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x6) 11:49:25 executing program 5: 11:49:25 executing program 4: 11:49:25 executing program 2: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) futex(&(0x7f0000000140), 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) rt_sigqueueinfo(r0, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}) ptrace$cont(0x20, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x6) 11:49:25 executing program 1: 11:49:25 executing program 3: 11:49:25 executing program 5: 11:49:25 executing program 0: 11:49:25 executing program 4: 11:49:25 executing program 1: 11:49:25 executing program 3: 11:49:25 executing program 5: 11:49:25 executing program 2: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) futex(&(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) rt_sigqueueinfo(r0, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}) ptrace$cont(0x20, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x6) 11:49:25 executing program 0: 11:49:25 executing program 4: 11:49:25 executing program 1: 11:49:25 executing program 3: 11:49:26 executing program 1: 11:49:26 executing program 5: 11:49:26 executing program 2: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) futex(&(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) rt_sigqueueinfo(r0, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}) ptrace$cont(0x20, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x6) 11:49:26 executing program 3: 11:49:26 executing program 0: 11:49:26 executing program 4: 11:49:26 executing program 5: 11:49:26 executing program 1: 11:49:26 executing program 0: 11:49:26 executing program 4: 11:49:26 executing program 2: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) futex(&(0x7f0000000140)=0x2, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) rt_sigqueueinfo(r0, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}) ptrace$cont(0x20, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x6) 11:49:26 executing program 3: 11:49:26 executing program 5: 11:49:26 executing program 1: 11:49:26 executing program 4: 11:49:26 executing program 0: 11:49:26 executing program 1: 11:49:26 executing program 5: 11:49:26 executing program 3: 11:49:26 executing program 2: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) rt_sigqueueinfo(r0, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}) ptrace$cont(0x20, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x6) 11:49:27 executing program 4: 11:49:27 executing program 0: 11:49:27 executing program 2: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) rt_sigqueueinfo(r0, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}) ptrace$cont(0x20, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x6) 11:49:27 executing program 1: 11:49:27 executing program 3: 11:49:27 executing program 4: 11:49:27 executing program 5: 11:49:27 executing program 0: 11:49:27 executing program 1: 11:49:27 executing program 3: 11:49:27 executing program 5: 11:49:27 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000400)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) ftruncate(r1, 0x8200) r2 = open(&(0x7f0000005a40)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8000fffffffe) 11:49:27 executing program 3: 11:49:27 executing program 0: 11:49:28 executing program 2: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) rt_sigqueueinfo(r0, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}) ptrace$cont(0x20, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x6) 11:49:28 executing program 5: 11:49:28 executing program 3: 11:49:28 executing program 1: 11:49:28 executing program 0: 11:49:28 executing program 4: 11:49:28 executing program 3: 11:49:28 executing program 4: 11:49:28 executing program 5: 11:49:28 executing program 0: 11:49:28 executing program 1: 11:49:28 executing program 3: 11:49:28 executing program 2: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) rt_sigqueueinfo(r0, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}) ptrace$cont(0x20, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x6) 11:49:28 executing program 4: 11:49:28 executing program 5: 11:49:28 executing program 0: 11:49:28 executing program 1: 11:49:28 executing program 3: 11:49:29 executing program 1: 11:49:29 executing program 3: 11:49:29 executing program 0: 11:49:29 executing program 4: 11:49:29 executing program 5: 11:49:29 executing program 3: syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/packet\x00') 11:49:29 executing program 2: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) rt_sigqueueinfo(r0, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}) ptrace$cont(0x20, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x6) 11:49:29 executing program 5: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000600)='personality\x00Y\xf7\x9a!3\xd1`\x03\x9d\x11{\xb5\x9f(\xc8\xd2\xd6y\x04\xde\xcb!,\xc71b\xb4n\xf8\xf0\x83\x19\x84B\xa8\xab\x02\x04Gu7\xca\x889\x12\xbd\nj\xe4GhI\x91\xf2z\x9e\xea\x1e5\xad\xfe\xe9\xf1\x9c\x91\xc7\xc0\xd7,\x14\xf3\xf9\xd9\xbb^F\xdb\x9d\xa9\xea\x02a\xccUO3\x15v?r\x91\\\xa0\\\xf0\xa7|\xafNz;\x93\x18\xe8KM\xaaHseV#_`+<\x12\xe2\x8a\xfa\xd8\x86\xb8\x9e\x8a4\t\x1e\xbe\xf7\x1d\xe2\xab\x8a\xef\x89[$\xb9\x02\x87\x00y\xfe\x93.h\x04\x02\x03\xb7>~&\xb6,\x7f\xe6\x9eu\xf72l\\\xa1=\xc4\xc80t\xceC)\x90\x1aV\x8d\x8964\x06\xe3\xcb\xc1\xbf\x1e\x14\xfd\x85\x8b\xcc\xf3~a\x88g\x9c\xbd\x04c\xf0\xb0\xd4\xa2\xca\xf6\xa0\xdbw\xdb\x8e\xc3\x98\xe0\x8fR\x9d\xa2\xc8k\'}\xa9uzY\x03\xc6\x14\xa8f\xdez\x01x*\xb8\x8b3\xe32\xa6\xc0\xdc\xf7{\xb2\xf5\xa1\xfd\xfd\xc4\x1f\xe8\xf5`^Sy\xced\xb3\n\xbadG\x81\x18\x0e\xf9%\xd1\xc0+\x05DfH\xf9r\xfc0\xe0\xb3\xaa6\'L\x8a\xd5\xec\x91\xadMmV6U\xee\xbe\xf6\xbeG\xe1o\xf4[\x9ah\xa3\xaa\x02') sendfile(r0, r1, 0x0, 0x88001) 11:49:29 executing program 0: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) ioctl$sock_SIOCGIFBR(r0, 0x8940, 0x0) 11:49:29 executing program 1: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) poll(&(0x7f0000001480)=[{}], 0x1, 0x0) 11:49:29 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) rt_sigqueueinfo(r0, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}) ptrace$cont(0x20, r0, 0x0, 0x0) tkill(r0, 0x2f) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x0) 11:49:29 executing program 3: ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) rt_sigqueueinfo(0x0, 0x0, 0x0) ptrace$cont(0x18, 0x0, 0x400000000000, 0x5) ptrace$cont(0x18, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') ptrace$cont(0x1f, 0x0, 0x400, 0x1) 11:49:29 executing program 4: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) madvise(&(0x7f0000003000/0x1000)=nil, 0x1000, 0x1) 11:49:30 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20000802, &(0x7f0000000340)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) 11:49:30 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:semanage_exec_t:s0\x00', 0x25, 0x1) 11:49:30 executing program 1: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000002c0)={0x14, 0x0, &(0x7f0000000400)=[@acquire_done], 0x0, 0x0, 0x0}) 11:49:30 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000802, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r0, &(0x7f0000000000)="ee045d7bc65b7f73634d58e31dac5ba0e98641fc01f328bf72b8d0aabd51eb0e2d2ff364ac217d49a07539e70b0aadde3f874cfa", 0x34, 0x11, 0x0, 0x0) sendto$inet(r0, &(0x7f0000d7cfcb), 0xfffffffffffffd8b, 0x1, 0x0, 0xfffffffffffffde0) 11:49:30 executing program 4: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) close(r0) syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x2) io_setup(0x4000000000b, &(0x7f0000000340)=0x0) io_submit(r1, 0x1, &(0x7f0000b52fd8)=[&(0x7f0000587000)={0x0, 0x0, 0x0, 0x8, 0x0, r0, 0x0}]) [ 631.244004] binder: 21181:21184 BC_ACQUIRE_DONE u0000000000000000 no match 11:49:30 executing program 2: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) rt_sigqueueinfo(r0, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}) ptrace$cont(0x20, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x6) 11:49:30 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$fuseblk(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='.useblk\x00', 0x0, 0x0) 11:49:30 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0x2, 0x0, 0xffffffffffffff19) 11:49:30 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) r1 = dup2(r0, r0) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) fsync(0xffffffffffffffff) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, 0x0) ioctl$TCGETS(r1, 0x5401, &(0x7f00000005c0)) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x14) 11:49:30 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) write$P9_RRENAMEAT(0xffffffffffffffff, 0x0, 0x0) sendmsg(r0, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x80c0) 11:49:30 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000802, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r0, &(0x7f0000d7cfcb), 0xfffffffffffffd8b, 0x0, 0x0, 0xfffffffffffffde0) 11:49:31 executing program 1: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000000c0)={0x4, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="07630440"], 0x0, 0x0, 0x0}) 11:49:31 executing program 4: socket$inet6(0xa, 0x3, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/raw6\x00') readv(r1, &(0x7f0000000380)=[{&(0x7f0000000880)=""/4096, 0x1000}], 0x1) 11:49:31 executing program 3: getpgrp(0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='cmdline\x00') perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x85a, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/172, 0x6}], 0x1, 0x0) syz_open_procfs(0x0, &(0x7f00000001c0)) [ 632.087545] binder: 21216:21217 DecRefs 0 refcount change on invalid ref 0 ret -22 11:49:31 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) setrlimit(0x400000000000007, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xc, 0x4, 0x4, 0x9, 0x0, r0}, 0x2c) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) pipe(0x0) 11:49:31 executing program 1: r0 = perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) 11:49:31 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@bridge_dellink={0x20, 0x11, 0x711}, 0x20}}, 0x0) 11:49:31 executing program 2: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) rt_sigqueueinfo(0x0, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}) ptrace$cont(0x20, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x6) 11:49:31 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x7fffffff) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2}) ppoll(&(0x7f0000000300)=[{r2}], 0x1, 0x0, 0x0, 0x0) read$eventfd(r2, &(0x7f0000000080), 0x8) 11:49:31 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f00000002c0)={0x2, 0x0, @ioapic={0x0, 0x0, 0x0, 0xffffffff, 0x0, [{}, {}, {}, {}, {}, {0x0, 0x1ec8}, {}, {}, {0x0, 0x1, 0x0, [], 0x7fffffff}]}}) 11:49:31 executing program 4: clone(0x0, 0x0, 0x0, 0x0, 0x0) munlock(&(0x7f0000000000/0x1000)=nil, 0x1000) 11:49:31 executing program 5: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x1bab, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000006000/0x3000)=nil, 0x3000, 0x0) [ 632.808517] kvm: apic: phys broadcast and lowest prio 11:49:32 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x100000000024) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x3}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000040)=0x10000, 0x4) write$binfmt_script(r0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmmsg(r0, &(0x7f0000000080)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) 11:49:32 executing program 4: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x859, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) flock(r1, 0x1) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) gettid() dup2(r0, r1) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, 0x0) timer_settime(0x0, 0x0, 0x0, 0x0) tkill(0x0, 0x1000000000016) 11:49:32 executing program 5: socket$inet6(0xa, 0x3, 0x4) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/raw6\x00') readv(r0, &(0x7f0000000380)=[{&(0x7f0000000880)=""/4096, 0x1000}, {0x0}], 0x2) 11:49:32 executing program 3: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/user\x00') ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, 0x0) 11:49:32 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhci\x00', 0x2, 0x0) write$uinput_user_dev(r0, 0x0, 0x0) 11:49:32 executing program 5: socket$inet6(0xa, 0x3, 0x4) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/raw6\x00') readv(r0, &(0x7f0000000380)=[{&(0x7f0000000880)=""/4096, 0x1000}, {0x0}], 0x2) 11:49:32 executing program 3: mknod(&(0x7f00000003c0)='./bus\x00', 0x8000, 0x236161bb) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x2, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="840df61841ec4b00ffffffff"], 0x1) pwritev(r0, &(0x7f0000001640)=[{&(0x7f0000000000), 0xffffff91}], 0x1, 0x0) pwritev(r0, &(0x7f0000000540)=[{&(0x7f0000004180)="b9", 0x1}], 0x1, 0x0) 11:49:34 executing program 2: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) rt_sigqueueinfo(0x0, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}) ptrace$cont(0x20, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x6) 11:49:34 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x20000000001, 0x31, 0xffffffffffffffff, 0x0) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000080)) 11:49:34 executing program 5: socket$inet6(0xa, 0x3, 0x4) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/raw6\x00') readv(r0, &(0x7f0000000380)=[{&(0x7f0000000880)=""/4096, 0x1000}, {0x0}], 0x2) 11:49:34 executing program 4: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x859, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) flock(r0, 0x2) r1 = epoll_create1(0x0) flock(r1, 0x1) fcntl$notify(r0, 0x402, 0x0) gettid() dup2(0xffffffffffffffff, r1) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) 11:49:34 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x7fffffff) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2}) ppoll(&(0x7f0000000300)=[{r2}], 0x1, 0x0, 0x0, 0x0) read$eventfd(r2, &(0x7f0000000080), 0x8) 11:49:34 executing program 3: clone(0x0, 0x0, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) 11:49:35 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip_tables_matches\x00') preadv(r0, &(0x7f00000009c0)=[{&(0x7f0000000400)=""/89, 0x59}, {&(0x7f0000000480)=""/226, 0xe2}], 0x2, 0x0) 11:49:35 executing program 5: socket$inet6(0xa, 0x3, 0x4) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/raw6\x00') readv(r0, &(0x7f0000000380)=[{&(0x7f0000000880)=""/4096, 0x1000}, {0x0}], 0x2) 11:49:35 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000840)='clear_refs\x00\xb0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96\x04\x00\x00\x00\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfgx\xa1\x96\xad\x93\xaa=-z\x06r\b\'yY\xe3\x1e\xf2a\xfa\x1c\xcb\x16YNp%\xd8J\xe4\a\xabJA9\xdc\x9a\x16\xb9\'\x00\x00\x00\x00\x00\x00\x00\x00\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000440)='syscall\x00') sendfile(r0, r1, 0x0, 0x1) 11:49:35 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) readv(r0, &(0x7f00000000c0)=[{&(0x7f0000000000)=""/1, 0x1}], 0x1) 11:49:35 executing program 5: socket$inet6(0xa, 0x3, 0x4) readv(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000880)=""/4096, 0x1000}, {0x0}], 0x2) 11:49:35 executing program 3: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)=0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) ioctl$UI_DEV_DESTROY(0xffffffffffffffff, 0x5502) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@local, @in=@multicast2}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000840)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000880)={{{@in=@multicast1, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, &(0x7f0000000980)=0xe8) ioctl$sock_FIOSETOWN(r1, 0x8901, &(0x7f0000000000)=r0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x3ac}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='cpuset\x00') preadv(r2, &(0x7f00000017c0), 0x1a1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r3, 0x40086602, &(0x7f0000000340)) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) 11:49:38 executing program 2: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) rt_sigqueueinfo(0x0, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}) ptrace$cont(0x20, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x6) 11:49:38 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000380)) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102801ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = gettid() openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0xb, 0x4, @tid=r5}, &(0x7f0000000080)) ioctl$EVIOCGKEYCODE(r2, 0x80084504, 0x0) timer_settime(0x0, 0x3, &(0x7f000004a000)={{0x0, 0x1}, {0x7, 0xe4c}}, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) getuid() fchown(0xffffffffffffffff, 0x0, 0x0) epoll_create1(0x0) futimesat(0xffffffffffffffff, 0x0, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) msgget$private(0x0, 0x40) mknod$loop(&(0x7f0000000280)='./file0\x00', 0x800, 0x1) syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x684000) 11:49:38 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/raw6\x00') readv(r0, &(0x7f0000000380)=[{&(0x7f0000000880)=""/4096, 0x1000}, {0x0}], 0x2) 11:49:38 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x7fffffff) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2}) ppoll(&(0x7f0000000300)=[{r2}], 0x1, 0x0, 0x0, 0x0) read$eventfd(r2, &(0x7f0000000080), 0x8) 11:49:38 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhci\x00', 0x0, 0x0) close(r0) 11:49:38 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_RELBIT(r0, 0x40045566, 0x210) 11:49:38 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x0, 0x0) readv(r0, &(0x7f0000001540)=[{&(0x7f0000000000)=""/52, 0x34}], 0x1) 11:49:38 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/raw6\x00') readv(r0, &(0x7f0000000380)=[{&(0x7f0000000880)=""/4096, 0x1000}, {0x0}], 0x2) 11:49:38 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/softnet_stat\x00') preadv(r0, &(0x7f00000012c0)=[{&(0x7f0000000000)=""/153, 0x99}], 0x1, 0x0) 11:49:38 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/softnet_stat\x00') 11:49:38 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/raw6\x00') readv(r0, &(0x7f0000000380)=[{&(0x7f0000000880)=""/4096, 0x1000}, {0x0}], 0x2) 11:49:38 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x7c, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000008c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x3f1) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 11:49:38 executing program 2: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) rt_sigqueueinfo(r0, 0x0, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}) ptrace$cont(0x20, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x6) 11:49:38 executing program 3: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)=0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) ioctl$UI_DEV_DESTROY(0xffffffffffffffff, 0x5502) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@local, @in=@multicast2}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000840)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000880)={{{@in=@multicast1, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, &(0x7f0000000980)=0xe8) ioctl$sock_FIOSETOWN(r1, 0x8901, &(0x7f0000000000)=r0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x3ac}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='cpuset\x00') preadv(r2, &(0x7f00000017c0), 0x1a1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) 11:49:38 executing program 5: socket$inet6(0xa, 0x0, 0x4) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/raw6\x00') readv(r0, &(0x7f0000000380)=[{&(0x7f0000000880)=""/4096, 0x1000}, {0x0}], 0x2) 11:49:38 executing program 0: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0) flistxattr(r0, &(0x7f0000000000)=""/5, 0x5) 11:49:38 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x7fffffff) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2}) ppoll(&(0x7f0000000300)=[{r2}], 0x1, 0x0, 0x0, 0x0) read$eventfd(r2, &(0x7f0000000080), 0x8) 11:49:39 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x2, 0x0) write$binfmt_aout(r0, &(0x7f0000000240), 0x20) 11:49:39 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_SWBIT(r0, 0x4004556d, 0x0) 11:49:39 executing program 5: socket$inet6(0xa, 0x0, 0x4) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/raw6\x00') readv(r0, &(0x7f0000000380)=[{&(0x7f0000000880)=""/4096, 0x1000}, {0x0}], 0x2) 11:49:39 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x2, 0x0) write$binfmt_aout(r0, &(0x7f0000000240), 0x20) 11:49:39 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x0, 0x0) fadvise64(r0, 0x0, 0x0, 0x0) 11:49:39 executing program 5: socket$inet6(0xa, 0x0, 0x4) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/raw6\x00') readv(r0, &(0x7f0000000380)=[{&(0x7f0000000880)=""/4096, 0x1000}, {0x0}], 0x2) 11:49:39 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x2, 0x0) write$binfmt_aout(r0, &(0x7f0000000240), 0x20) 11:49:39 executing program 2: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) rt_sigqueueinfo(r0, 0x0, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}) ptrace$cont(0x20, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x6) 11:49:40 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x2, 0x0) write$binfmt_aout(r0, &(0x7f0000000240), 0x20) 11:49:40 executing program 3: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhci\x00', 0x2, 0x0) write$uinput_user_dev(r0, 0x0, 0x17a) 11:49:40 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) fsetxattr$security_smack_transmute(r0, &(0x7f0000000000)='security.SMACK64TRANSMUTE\x00', 0x0, 0x0, 0x0) 11:49:40 executing program 5: socket$inet6(0xa, 0x3, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/raw6\x00') readv(r0, &(0x7f0000000380)=[{&(0x7f0000000880)=""/4096, 0x1000}, {0x0}], 0x2) 11:49:40 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x7fffffff) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2}) read$eventfd(r2, &(0x7f0000000080), 0x8) 11:49:40 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_ERASE(r0, 0xc00c55ca, &(0x7f0000000000)={0x10}) 11:49:40 executing program 0: write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000240), 0x20) 11:49:40 executing program 3: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x0, 0x0) read(r0, 0x0, 0x0) 11:49:40 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x7fffffff) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2}) read$eventfd(r2, &(0x7f0000000080), 0x8) 11:49:40 executing program 5: socket$inet6(0xa, 0x3, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/raw6\x00') readv(r0, &(0x7f0000000380)=[{&(0x7f0000000880)=""/4096, 0x1000}, {0x0}], 0x2) 11:49:40 executing program 0: write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000240), 0x20) 11:49:42 executing program 2: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) rt_sigqueueinfo(r0, 0x0, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}) ptrace$cont(0x20, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x6) 11:49:42 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x0) 11:49:42 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) read(r0, 0x0, 0x0) 11:49:42 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x7fffffff) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2}) read$eventfd(r2, &(0x7f0000000080), 0x8) 11:49:42 executing program 5: socket$inet6(0xa, 0x3, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/raw6\x00') readv(r0, &(0x7f0000000380)=[{&(0x7f0000000880)=""/4096, 0x1000}, {0x0}], 0x2) 11:49:42 executing program 0: write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000240), 0x20) 11:49:43 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$binfmt_aout(r0, &(0x7f0000000240), 0x20) 11:49:43 executing program 4: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhci\x00', 0x2, 0x0) write$P9_RLERROR(r0, &(0x7f0000000000)=ANY=[@ANYBLOB='h\x00'], 0x2) 11:49:43 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip_tables_matches\x00') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000009c0)=[{&(0x7f0000000400)=""/89, 0x59}, {&(0x7f0000000480)=""/226, 0xe2}], 0x2, 0x0) 11:49:43 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = eventfd(0x7fffffff) ppoll(&(0x7f0000000300)=[{r1}], 0x1, 0x0, 0x0, 0x0) read$eventfd(r1, &(0x7f0000000080), 0x8) 11:49:43 executing program 5: socket$inet6(0xa, 0x3, 0x4) r0 = syz_open_procfs(0x0, 0x0) readv(r0, &(0x7f0000000380)=[{&(0x7f0000000880)=""/4096, 0x1000}, {0x0}], 0x2) 11:49:43 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$binfmt_aout(r0, &(0x7f0000000240), 0x20) 11:49:43 executing program 2: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) rt_sigqueueinfo(r0, 0x12, 0x0) ptrace$cont(0x20, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x6) 11:49:43 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/softnet_stat\x00') close(r0) 11:49:43 executing program 4: add_key$keyring(&(0x7f0000000100)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 11:49:43 executing program 5: socket$inet6(0xa, 0x3, 0x4) syz_open_procfs(0x0, &(0x7f00000001c0)='net/raw6\x00') readv(0xffffffffffffffff, &(0x7f0000000380)=[{&(0x7f0000000880)=""/4096, 0x1000}, {0x0}], 0x2) 11:49:43 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$binfmt_aout(r0, &(0x7f0000000240), 0x20) 11:49:44 executing program 5: socket$inet6(0xa, 0x3, 0x4) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/raw6\x00') readv(r0, 0x0, 0x0) 11:49:44 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) getresuid(&(0x7f0000001580), &(0x7f0000000080), &(0x7f00000000c0)) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000380)) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x0, 0x0, 0x0) connect$inet6(r4, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102801ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = gettid() openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0xb, 0x4, @tid=r5}, &(0x7f0000000080)) ioctl$EVIOCGKEYCODE(r2, 0x80084504, 0x0) timer_settime(0x0, 0x3, &(0x7f000004a000)={{0x0, 0x1}, {0x7, 0xe4c}}, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) getuid() fchown(0xffffffffffffffff, 0x0, 0x0) epoll_create1(0x80000) futimesat(0xffffffffffffffff, 0x0, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) msgget$private(0x0, 0x40) mknod$loop(&(0x7f0000000280)='./file0\x00', 0x800, 0x1) syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x684000) 11:49:44 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) write$binfmt_aout(r0, &(0x7f0000000240), 0x20) 11:49:44 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x80002, 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) r4 = fcntl$dupfd(r3, 0x0, r2) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r4, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000180)={0x0}}, 0x0) 11:49:44 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = eventfd(0x7fffffff) ppoll(&(0x7f0000000300)=[{r1}], 0x1, 0x0, 0x0, 0x0) read$eventfd(r1, &(0x7f0000000080), 0x8) 11:49:44 executing program 5: socket$inet6(0xa, 0x3, 0x4) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/raw6\x00') readv(r0, 0x0, 0x0) 11:49:44 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) write$binfmt_aout(r0, &(0x7f0000000240), 0x20) 11:49:44 executing program 2: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) rt_sigqueueinfo(r0, 0x12, 0x0) ptrace$cont(0x20, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x6) 11:49:44 executing program 5: socket$inet6(0xa, 0x3, 0x4) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/raw6\x00') readv(r0, 0x0, 0x0) 11:49:44 executing program 4: getresgid(&(0x7f0000004f80), &(0x7f0000004fc0), &(0x7f0000005000)) 11:49:44 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) getresuid(&(0x7f0000001580), &(0x7f0000000080), &(0x7f00000000c0)) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000380)) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x0, 0x0, 0x0) connect$inet6(r4, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102801ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = gettid() openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0xb, 0x4, @tid=r5}, &(0x7f0000000080)) ioctl$EVIOCGKEYCODE(r2, 0x80084504, 0x0) timer_settime(0x0, 0x3, &(0x7f000004a000)={{0x0, 0x1}, {0x7, 0xe4c}}, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) getuid() fchown(0xffffffffffffffff, 0x0, 0x0) epoll_create1(0x80000) futimesat(0xffffffffffffffff, 0x0, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) msgget$private(0x0, 0x40) mknod$loop(&(0x7f0000000280)='./file0\x00', 0x800, 0x1) syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x684000) 11:49:44 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) write$binfmt_aout(r0, &(0x7f0000000240), 0x20) 11:49:44 executing program 5: socket$inet6(0xa, 0x3, 0x4) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/raw6\x00') readv(r0, &(0x7f0000000380)=[{&(0x7f0000000880)=""/4096, 0x1000}], 0x1) 11:49:44 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) getresuid(&(0x7f0000001580), &(0x7f0000000080), &(0x7f00000000c0)) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102801ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = gettid() openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0xb, 0x4, @tid=r4}, &(0x7f0000000080)) ioctl$EVIOCGKEYCODE(r2, 0x80084504, 0x0) timer_settime(0x0, 0x3, &(0x7f000004a000)={{0x0, 0x1}, {0x7, 0xe4c}}, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) fchown(0xffffffffffffffff, 0x0, 0x0) futimesat(0xffffffffffffffff, 0x0, 0x0) msgget$private(0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x684000) 11:49:45 executing program 0: openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x2, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000240), 0x20) 11:49:45 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) getresuid(&(0x7f0000001580), &(0x7f0000000080), &(0x7f00000000c0)) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000380)) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x0, 0x0, 0x0) connect$inet6(r4, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102801ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = gettid() openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0xb, 0x4, @tid=r5}, &(0x7f0000000080)) ioctl$EVIOCGKEYCODE(r2, 0x80084504, 0x0) timer_settime(0x0, 0x3, &(0x7f000004a000)={{0x0, 0x1}, {0x7, 0xe4c}}, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) getuid() fchown(0xffffffffffffffff, 0x0, 0x0) epoll_create1(0x80000) futimesat(0xffffffffffffffff, 0x0, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) msgget$private(0x0, 0x40) mknod$loop(&(0x7f0000000280)='./file0\x00', 0x800, 0x1) syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x684000) 11:49:45 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = eventfd(0x7fffffff) ppoll(&(0x7f0000000300)=[{r1}], 0x1, 0x0, 0x0, 0x0) read$eventfd(r1, &(0x7f0000000080), 0x8) 11:49:45 executing program 5: socket$inet6(0xa, 0x3, 0x4) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/raw6\x00') readv(r0, &(0x7f0000000380), 0x0) 11:49:45 executing program 0: openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x2, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000240), 0x20) 11:49:45 executing program 2: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) rt_sigqueueinfo(r0, 0x12, 0x0) ptrace$cont(0x20, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x6) 11:49:45 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) getresuid(&(0x7f0000001580), &(0x7f0000000080), &(0x7f00000000c0)) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102801ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = gettid() openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0xb, 0x4, @tid=r4}, &(0x7f0000000080)) ioctl$EVIOCGKEYCODE(r2, 0x80084504, 0x0) timer_settime(0x0, 0x3, &(0x7f000004a000)={{0x0, 0x1}, {0x7, 0xe4c}}, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) fchown(0xffffffffffffffff, 0x0, 0x0) futimesat(0xffffffffffffffff, 0x0, 0x0) msgget$private(0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x684000) 11:49:45 executing program 0: openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x2, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000240), 0x20) 11:49:45 executing program 5: socket$inet6(0xa, 0x3, 0x4) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/raw6\x00') readv(r0, &(0x7f0000000380), 0x0) 11:49:45 executing program 3: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) rt_sigqueueinfo(r0, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}) ptrace$cont(0x20, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x6) 11:49:45 executing program 3: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000180)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$binfmt_script(r0, 0x0, 0x37b) 11:49:45 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) getresuid(&(0x7f0000001580), &(0x7f0000000080), &(0x7f00000000c0)) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102801ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = gettid() openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0xb, 0x4, @tid=r4}, &(0x7f0000000080)) ioctl$EVIOCGKEYCODE(r2, 0x80084504, 0x0) timer_settime(0x0, 0x3, &(0x7f000004a000)={{0x0, 0x1}, {0x7, 0xe4c}}, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) fchown(0xffffffffffffffff, 0x0, 0x0) futimesat(0xffffffffffffffff, 0x0, 0x0) msgget$private(0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x684000) 11:49:45 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x2, 0x0) write$binfmt_aout(r0, 0x0, 0x0) 11:49:45 executing program 5: socket$inet6(0xa, 0x3, 0x4) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/raw6\x00') readv(r0, &(0x7f0000000380), 0x0) 11:49:46 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)) ppoll(&(0x7f0000000300)=[{}], 0x1, 0x0, 0x0, 0x0) read$eventfd(0xffffffffffffffff, &(0x7f0000000080), 0x8) 11:49:46 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x2, 0x0) write$binfmt_aout(r0, 0x0, 0x0) 11:49:46 executing program 4: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(r0, 0x0, 0x0, 0x0) 11:49:46 executing program 2: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) rt_sigqueueinfo(r0, 0x12, &(0x7f0000000000)) ptrace$cont(0x20, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x6) 11:49:46 executing program 5: socket$inet6(0xa, 0x3, 0x4) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/raw6\x00') readv(r0, &(0x7f0000000380)=[{0x0}], 0x1) 11:49:46 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) getresuid(&(0x7f0000001580), 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000380)) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000400)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x131f64) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102801ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0xb, 0x4, @tid=r3}, &(0x7f0000000080)) ioctl$EVIOCGKEYCODE(r2, 0x80084504, 0x0) timer_settime(0x0, 0x3, &(0x7f000004a000)={{0x0, 0x1}, {0x7, 0xe4c}}, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) getuid() fchown(0xffffffffffffffff, 0x0, 0x0) futimesat(0xffffffffffffffff, 0x0, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) msgget$private(0x0, 0x0) mknod$loop(&(0x7f0000000280)='./file0\x00', 0x800, 0x1) r4 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r4, 0xc0605345, &(0x7f0000000180)={0x800000000000103, 0x2, {0x2, 0x0, 0xa5, 0x1}}) 11:49:46 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x2, 0x0) write$binfmt_aout(r0, 0x0, 0x0) 11:49:46 executing program 4: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)=0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0xc) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) ioctl$UI_DEV_DESTROY(0xffffffffffffffff, 0x5502) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000740)={{{@in=@local, @in=@multicast2}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000840)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000880)={{{@in=@multicast1, @in6=@remote}}, {{@in=@multicast1}, 0x0, @in6=@loopback}}, &(0x7f0000000980)=0xe8) ioctl$sock_FIOSETOWN(r1, 0x8901, &(0x7f0000000000)=r0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000100)=@ipx, 0x80, 0x0, 0x0, 0x0, 0x3ac}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='cpuset\x00') preadv(r2, &(0x7f00000017c0), 0x1a1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r3, 0x40086602, &(0x7f0000000340)) 11:49:46 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_PHYS(r0, 0x4008556c, &(0x7f0000000000)='syz0\x00') 11:49:46 executing program 3: clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2a) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 11:49:46 executing program 5: socket$inet6(0xa, 0x3, 0x4) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/raw6\x00') readv(r0, &(0x7f0000000380)=[{0x0}], 0x1) 11:49:46 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) symlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000100)='./file0/file0\x00') rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000140)='./file0/file1\x00') 11:49:46 executing program 3: socketpair$unix(0x1, 0x80000000000003, 0x0, &(0x7f0000044ff8)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f00000bd000), 0x4924924924922c9, 0x0) connect$unix(r0, &(0x7f0000000000)=@file={0x0, './file0/../file0\x00'}, 0x6e) [ 647.861348] ptrace attach of "/root/syz-executor3"[21656] was attempted by "/root/syz-executor3"[21658] 11:49:47 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r0 = eventfd(0x7fffffff) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000000)={r0}) ppoll(&(0x7f0000000300)=[{r0}], 0x1, 0x0, 0x0, 0x0) read$eventfd(r0, &(0x7f0000000080), 0x8) 11:49:47 executing program 5: socket$inet6(0xa, 0x3, 0x4) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/raw6\x00') readv(r0, &(0x7f0000000380)=[{0x0}], 0x1) 11:49:47 executing program 2: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) rt_sigqueueinfo(r0, 0x12, &(0x7f0000000000)) ptrace$cont(0x20, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x6) 11:49:47 executing program 5: mincore(&(0x7f00003fc000/0xc00000)=nil, 0xc00000, &(0x7f0000001280)=""/4096) 11:49:47 executing program 0: sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) 11:49:47 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x1, 0x82) r1 = memfd_create(&(0x7f0000000300)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000080)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x1) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 648.711439] cgroup: fork rejected by pids controller in /syz4 11:49:48 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCADDDLCI(r0, 0x8980, 0x0) 11:49:48 executing program 0: r0 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r0, &(0x7f0000000000), 0x1c) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x2140, &(0x7f0000006700)) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x0, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40007aa, 0x8000) 11:49:48 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000580)='/dev/loop#\x00', 0x1, 0x82) r1 = memfd_create(&(0x7f0000000300)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000080)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x1) ioctl$LOOP_CLR_FD(r0, 0x4c01) 11:49:48 executing program 3: pipe2(0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0x208200) r3 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8000fffffffe) r4 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x0) r5 = creat(&(0x7f0000000180)='./file0\x00', 0x0) write$P9_RREMOVE(r5, &(0x7f0000000280)={0x7}, 0xff7f) syncfs(r1) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000100)={0x0, r5, 0x0, 0x0, 0x1f}) getpgid(0xffffffffffffffff) 11:49:48 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r0 = eventfd(0x7fffffff) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000000)={r0}) ppoll(&(0x7f0000000300)=[{r0}], 0x1, 0x0, 0x0, 0x0) read$eventfd(r0, &(0x7f0000000080), 0x8) 11:49:48 executing program 5: socketpair$unix(0x1, 0x200000005, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f000039a000)=[{0x20, 0x0, 0x0, 0xfffff038}, {0x6}]}, 0x10) 11:49:48 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000040)=0x6) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000240)) 11:49:48 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000040)=0x6) 11:49:50 executing program 0: syz_emit_ethernet(0xfed1, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x0, 0x5}}}}}, 0x0) 11:49:50 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r0 = eventfd(0x7fffffff) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000000)={r0}) ppoll(&(0x7f0000000300)=[{r0}], 0x1, 0x0, 0x0, 0x0) read$eventfd(r0, &(0x7f0000000080), 0x8) 11:49:50 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xa, &(0x7f00000000c0)=0x2, 0x4) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f0000000080)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x66) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000000)=@generic={0x2, 0x7fffffff, 0x5}) close(r1) write(r0, &(0x7f0000000280)="a28deb4cc86f470aaf6c5a481744afa013b5b7dbc0c046de13af5dfc1343a71f9fc18d684332e9e4c13b992b49f69efbf395144cfafeb53b93995abdb053d90e265962d897273641cbc836c5724e67fa806c74a18b81fdf6bf4311eca6d6fe0c1c20f202c06bc3bb283f39ceb72578d4124d74e3119bd563d5374193516e18b9f697f3fdaf0596611578e07fd7a0aae50d9949551d42be8c1258483ed0c7e6968e8e9ea64250dfdb3ceb58d3640b3397", 0xb0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f0000000040)=0xe8) bind$packet(r1, &(0x7f0000000100)={0x11, 0x1b, r2, 0x1, 0xfb7}, 0x14) 11:49:50 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000340)='veth1\x00', 0x10) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000040)=0x2, 0x4) sendmmsg(r1, &(0x7f0000005ac0)=[{{0x0, 0x0, &(0x7f0000001640)=[{&(0x7f0000000200)="fb", 0x1}], 0x1}, 0x20}], 0x1, 0x0) 11:49:50 executing program 2: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) rt_sigqueueinfo(r0, 0x12, &(0x7f0000000000)) ptrace$cont(0x20, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x6) 11:49:50 executing program 5: r0 = socket(0x4000000000010, 0x2, 0x0) sendmsg$nl_route(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=@ipv6_getnetconf={0x14, 0x52, 0x101}, 0x14}}, 0x0) recvmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 11:49:50 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02030609100000000000004c9e0000000200130002090000000000000000000105000600200000000a00000000000020000500e50000070000001f000048ece3de97300fe40000000200010000000000000000020000000005000500000000000a00000000ecfffffe1700000000000000000000000001170000000000000040"], 0x80}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x400000000000002, 0x0) 11:49:50 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000140)='./file0/file1\x00') link(&(0x7f00000000c0)='./file0/file1\x00', &(0x7f0000000100)='./file0/file0\x00') 11:49:50 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_RESET_LINK_STATS(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x30, r1, 0xd03, 0x0, 0x0, {{}, 0x0, 0x410c, 0x0, {0x14, 0x14, 'broadcast-link\x00'}}}, 0x30}}, 0x0) 11:49:51 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000000080)=0x1, 0x4) r4 = socket$l2tp(0x18, 0x1, 0x1) ioctl(r4, 0x1000008912, &(0x7f00000000c0)="0a5c2d023c126285718070") setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000040)='vcan0\x00', 0x10) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000400)={0x0, 0x8d9c, 0x10001}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 11:49:51 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_RESET_LINK_STATS(r0, &(0x7f00000001c0)={0x0, 0x9effffff00000000, &(0x7f0000000180)={&(0x7f0000000100)={0x30, r1, 0xd03, 0x0, 0x0, {{}, 0x0, 0x410c, 0x0, {0x14, 0x14, 'broadcast-link\x00'}}}, 0x30}}, 0x0) 11:49:51 executing program 5: syz_emit_ethernet(0x66, &(0x7f0000000280)={@random="01ba3c201a7c", @remote, [], {@ipv6={0x86dd, {0x0, 0x3, "02290f", 0x30, 0x0, 0x0, @ipv4={[0x2]}, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11]}}}}}}}}, 0x0) 11:49:51 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000280)={@random="01ba3c201a7c", @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x11, 0x0, @ipv4={[0x2]}, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11]}}}}}}}}, 0x0) 11:49:51 executing program 2: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) rt_sigqueueinfo(r0, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x6) 11:49:51 executing program 5: r0 = socket$inet6(0xa, 0x3, 0xaa) sendto$inet6(r0, 0x0, 0x9, 0x0, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback={0x0, 0x8}}, 0x1c) 11:49:51 executing program 3: r0 = socket(0x200000000000011, 0x802, 0x0) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000080)=@add_del={0x2, &(0x7f0000000040)='irlan0\x00\x00\x00\x00\x00\x00\x06\x00'}) 11:49:51 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x803, 0x5) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0a5c2d023c126285718070") setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f00002b9fd4)={@multicast2, @loopback, 0x0, 0x1, [@loopback]}, 0x14) 11:49:51 executing program 1: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = eventfd(0x7fffffff) ioctl$KVM_IRQFD(r0, 0x4020ae76, &(0x7f0000000000)={r1}) ppoll(&(0x7f0000000300)=[{r1}], 0x1, 0x0, 0x0, 0x0) read$eventfd(r1, &(0x7f0000000080), 0x8) 11:49:51 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x20000000003, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fc, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) sendmmsg(r0, &(0x7f0000008a40)=[{{0x0, 0x0, &(0x7f0000006800)=[{&(0x7f0000005580)="d9", 0x1}], 0x1}}], 0x1, 0x4040095) sendto$inet(r0, &(0x7f00000007c0)="0690938ddc845794e84f5a123660c5e073a21961cbec526d562837b8ee4c9bc1e490af59fff88d42048556d192049c3b75163c4205106fdbd6dcdf0682342729bd5b98bed9501bc521eb72d1398766963051afaaa8b1ac12a926757b44d86248a12a447647dd8b7da4dc4ffcd6c2ad0739077a65366abc124819d884e25c5dfc3345", 0x82, 0x44081, 0x0, 0x0) 11:49:51 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\xea', 0x1ff) 11:49:51 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) ioctl$EXT4_IOC_RESIZE_FS(r0, 0x40086610, &(0x7f0000000140)) 11:49:52 executing program 4: 11:49:52 executing program 5: r0 = socket$inet6(0xa, 0x4000000080002, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0xffffffffffffffff, 0x0, @ipv4}, 0x2c) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x50}}, {{0x0, 0xf0ffffff7f0000, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40001ab, 0x0) 11:49:52 executing program 0: 11:49:52 executing program 3: 11:49:52 executing program 2: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) rt_sigqueueinfo(r0, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x6) 11:49:52 executing program 0: 11:49:52 executing program 3: 11:49:52 executing program 5: 11:49:52 executing program 4: 11:49:52 executing program 1: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = eventfd(0x7fffffff) ioctl$KVM_IRQFD(r0, 0x4020ae76, &(0x7f0000000000)={r1}) ppoll(&(0x7f0000000300)=[{r1}], 0x1, 0x0, 0x0, 0x0) read$eventfd(r1, &(0x7f0000000080), 0x8) 11:49:52 executing program 3: 11:49:52 executing program 5: 11:49:52 executing program 4: 11:49:52 executing program 0: 11:49:52 executing program 5: 11:49:52 executing program 4: 11:49:53 executing program 2: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) rt_sigqueueinfo(r0, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x6) 11:49:53 executing program 3: 11:49:53 executing program 0: 11:49:53 executing program 5: 11:49:53 executing program 4: 11:49:53 executing program 1: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = eventfd(0x7fffffff) ioctl$KVM_IRQFD(r0, 0x4020ae76, &(0x7f0000000000)={r1}) ppoll(&(0x7f0000000300)=[{r1}], 0x1, 0x0, 0x0, 0x0) read$eventfd(r1, &(0x7f0000000080), 0x8) 11:49:53 executing program 5: 11:49:53 executing program 0: 11:49:53 executing program 3: 11:49:53 executing program 4: 11:49:53 executing program 5: 11:49:53 executing program 0: 11:49:54 executing program 2: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) rt_sigqueueinfo(r0, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}) ptrace$cont(0x20, 0x0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x6) 11:49:54 executing program 3: 11:49:54 executing program 4: 11:49:54 executing program 5: 11:49:54 executing program 0: 11:49:54 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x7fffffff) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2}) ppoll(&(0x7f0000000300)=[{r2}], 0x1, 0x0, 0x0, 0x0) read$eventfd(r2, &(0x7f0000000080), 0x8) 11:49:54 executing program 4: 11:49:54 executing program 0: 11:49:54 executing program 3: 11:49:54 executing program 5: 11:49:54 executing program 5: 11:49:54 executing program 0: 11:49:57 executing program 2: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) rt_sigqueueinfo(r0, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}) ptrace$cont(0x20, 0x0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x6) 11:49:57 executing program 4: 11:49:57 executing program 3: 11:49:57 executing program 5: 11:49:57 executing program 0: 11:49:57 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x7fffffff) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2}) ppoll(&(0x7f0000000300)=[{r2}], 0x1, 0x0, 0x0, 0x0) read$eventfd(r2, &(0x7f0000000080), 0x8) 11:49:57 executing program 3: 11:49:57 executing program 5: 11:49:57 executing program 0: 11:49:57 executing program 4: 11:49:57 executing program 5: 11:49:57 executing program 0: 11:49:58 executing program 2: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) rt_sigqueueinfo(r0, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}) ptrace$cont(0x20, 0x0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x6) 11:49:58 executing program 3: 11:49:58 executing program 4: 11:49:58 executing program 0: 11:49:58 executing program 5: 11:49:58 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x7fffffff) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2}) ppoll(&(0x7f0000000300)=[{r2}], 0x1, 0x0, 0x0, 0x0) read$eventfd(r2, &(0x7f0000000080), 0x8) 11:49:58 executing program 4: 11:49:58 executing program 5: 11:49:58 executing program 0: 11:49:58 executing program 3: 11:49:58 executing program 4: 11:49:58 executing program 5: 11:49:59 executing program 2: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) rt_sigqueueinfo(r0, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}) ptrace$cont(0x20, r0, 0x0, 0x0) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x6) 11:49:59 executing program 0: 11:49:59 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCADDDLCI(r0, 0x8980, 0x0) 11:49:59 executing program 5: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x400, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f00000013c0)={0x1, 0x0, {0x0, 0x0, 0x0, 0xb, 0x0, 0x7f}}) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) setitimer(0x0, 0x0, 0x0) 11:49:59 executing program 4: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000800)='/proc/thread-self/attr/current\x00', 0x2, 0x0) sendfile(r0, r0, 0x0, 0x27) 11:49:59 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = eventfd(0x7fffffff) ioctl$KVM_IRQFD(r0, 0x4020ae76, &(0x7f0000000000)={r1}) ppoll(&(0x7f0000000300)=[{r1}], 0x1, 0x0, 0x0, 0x0) read$eventfd(r1, &(0x7f0000000080), 0x8) [ 660.227089] rtc_cmos 00:00: Alarms can be up to one day in the future 11:49:59 executing program 0: ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0xfffffff) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) socket$inet6(0xa, 0x7, 0x0) read(0xffffffffffffffff, &(0x7f0000000340)=""/94, 0x5e) open$dir(0x0, 0x40000, 0xd1) syslog(0x3, &(0x7f00000000c0)=""/147, 0x37a8ec531be3c41f) open(&(0x7f0000000e00)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000200)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, &(0x7f00000002c0)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') sendfile(r0, r0, &(0x7f0000000180)=0x74000000, 0x5) [ 660.281755] rtc_cmos 00:00: Alarms can be up to one day in the future 11:49:59 executing program 4: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000007000)={0xfffffffffffffc44, 0x0, &(0x7f0000000200)=ANY=[], 0x0, 0x0, &(0x7f0000000080)}) 11:49:59 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/raw6\x00') readv(r0, &(0x7f0000000180)=[{&(0x7f0000000040)=""/229, 0xe5}], 0x1) 11:49:59 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000380)='net/fib_trie\x00') read(r0, &(0x7f0000000040)=""/230, 0xffffffffffffffda) 11:49:59 executing program 4: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000007000)={0xfffffffffffffc44, 0x0, &(0x7f0000000200)=ANY=[], 0x0, 0x0, &(0x7f0000000080)}) 11:49:59 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) lstat(0x0, 0x0) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) lsetxattr$security_evm(0x0, 0x0, 0x0, 0x0, 0x0) 11:50:00 executing program 2: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) rt_sigqueueinfo(r0, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}) ptrace$cont(0x20, r0, 0x0, 0x0) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x6) 11:50:00 executing program 3: r0 = creat(&(0x7f00000000c0)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xffffffb2) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) io_setup(0x9, &(0x7f0000000080)=0x0) io_submit(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) chmod(&(0x7f0000000180)='./file1\x00', 0x0) 11:50:00 executing program 4: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000007000)={0xfffffffffffffc44, 0x0, &(0x7f0000000200)=ANY=[], 0x0, 0x0, &(0x7f0000000080)}) 11:50:00 executing program 0: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000800)='/proc/thread-self/attr/current\x00', 0x2, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x27) 11:50:00 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = eventfd(0x7fffffff) ioctl$KVM_IRQFD(r0, 0x4020ae76, &(0x7f0000000000)={r1}) ppoll(&(0x7f0000000300)=[{r1}], 0x1, 0x0, 0x0, 0x0) read$eventfd(r1, &(0x7f0000000080), 0x8) 11:50:00 executing program 4: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000007000)={0xfffffffffffffc44, 0x0, &(0x7f0000000200)=ANY=[], 0x0, 0x0, &(0x7f0000000080)}) 11:50:00 executing program 0: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000800)='/proc/thread-self/attr/current\x00', 0x2, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendfile(r0, r0, 0x0, 0x27) 11:50:00 executing program 0: chdir(&(0x7f0000000200)='./file0\x00') ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000000)) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) geteuid() open$dir(0x0, 0x0, 0x0) syslog(0x0, 0x0, 0x0) open(&(0x7f0000000e00)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000200)=ANY=[], 0x0, 0x0, 0x0, &(0x7f00000002c0)) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') sendfile(r0, r0, &(0x7f0000000180)=0x74000000, 0x5) 11:50:00 executing program 4: ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000007000)={0xfffffffffffffc44, 0x0, &(0x7f0000000200)=ANY=[], 0x0, 0x0, &(0x7f0000000080)}) 11:50:00 executing program 4: r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000007000)={0xfffffffffffffc44, 0x0, &(0x7f0000000200)=ANY=[], 0x0, 0x0, &(0x7f0000000080)}) 11:50:00 executing program 5: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='smaps\x00') sendfile(r0, r1, 0x0, 0x88001) 11:50:00 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='pagemap\x00') sendfile(r0, r1, &(0x7f0000000040)=0x404f00, 0x800a) 11:50:01 executing program 2: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) rt_sigqueueinfo(r0, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}) ptrace$cont(0x20, r0, 0x0, 0x0) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x6) 11:50:01 executing program 3: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$KDDISABIO(0xffffffffffffffff, 0x4b37) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='smaps\x00') sendfile(r0, r1, 0x0, 0x88001) 11:50:01 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = eventfd(0x7fffffff) ioctl$KVM_IRQFD(r0, 0x4020ae76, &(0x7f0000000000)={r1}) ppoll(&(0x7f0000000300)=[{r1}], 0x1, 0x0, 0x0, 0x0) read$eventfd(r1, &(0x7f0000000080), 0x8) 11:50:01 executing program 4: syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000007000)={0xfffffffffffffc44, 0x0, &(0x7f0000000200)=ANY=[], 0x0, 0x0, &(0x7f0000000080)}) 11:50:01 executing program 0: getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000080), 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) stat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x400000002, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_emit_ethernet(0x3a, &(0x7f0000000080)={@local, @link_local, [], {@ipv4={0x800, {{0x9, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223, 0x3e8}, @local, {[@lsrr={0x83, 0xb, 0x5ef, [@remote={0xac, 0x223}, @multicast1]}, @ssrr={0x89, 0x3}]}}, @igmp={0x0, 0x0, 0x0, @broadcast}}}}}, 0x0) 11:50:01 executing program 5: creat(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = inotify_init1(0x0) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000000)='./file0\x00', 0x2000000) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x0) inotify_add_watch(r0, &(0x7f0000ac5000)='./file0\x00', 0xa400295c) inotify_add_watch(r1, &(0x7f00000000c0)='./file0\x00', 0x800) 11:50:01 executing program 4: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, 0x0) 11:50:01 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/unix\x00') sendfile(r0, r1, 0x0, 0x800a) 11:50:01 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000280)={@random="01ba3c201a7c", @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x30, 0x2f, 0x0, @ipv4={[0x2]}, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @loopback={0x4}, @dev={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11]}}}}}}}}, 0x0) 11:50:01 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000480)='./bus\x00', 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) 11:50:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x80002, 0x100000000000088) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000040)=0x4a, 0x4) bind$inet6(r1, &(0x7f0000d85fe4)={0xa, 0x4e23}, 0x1c) recvfrom$inet6(r1, 0x0, 0xd81109af37574b85, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x802, 0x88) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, 0x0, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) [ 662.728458] binder: 22063:22070 ioctl c0306201 0 returned -14 11:50:01 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, 0x0, &(0x7f00000001c0)) sendmmsg(r0, &(0x7f00000038c0)=[{{&(0x7f0000000040)=@nl=@unspec, 0x80, &(0x7f0000000100), 0x1a5, &(0x7f0000000380)}}, {{&(0x7f00000000c0)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000240), 0x2b5, &(0x7f0000000480), 0x3c8}}], 0x2, 0x0) 11:50:04 executing program 4: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000007000)={0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)}) 11:50:04 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2}) ppoll(&(0x7f0000000300)=[{r2}], 0x1, 0x0, 0x0, 0x0) read$eventfd(r2, &(0x7f0000000080), 0x8) 11:50:04 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000000)=0x1, 0x270) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='bond0\x00', 0x10) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) syz_genetlink_get_family_id$tipc2(0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000013, &(0x7f0000000040), 0x4) sendmmsg(r0, &(0x7f0000000840)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001340)=[{0x10, 0x0, 0x2}], 0x10}}], 0x1, 0x0) 11:50:04 executing program 5: 11:50:04 executing program 2: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) rt_sigqueueinfo(r0, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}) ptrace$cont(0x20, r0, 0x0, 0x0) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x0, 0x6) 11:50:04 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f00000002c0)={'irlan0\x00', {0x2, 0x4e21, @broadcast}}) sendmsg$TIPC_CMD_GET_NODES(r0, &(0x7f0000000280)={&(0x7f0000000180), 0xc, 0x0}, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f0000000300)={0x4, 0xfffffffffffffffa, 0x40, 0x8}) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)="390000001300090468fe0704000000000000ff3f03000000450001070000001419001a0015000a00070008000200000800005d14a4e91ee438", 0x39}], 0x1) [ 665.324669] netlink: 'syz-executor0': attribute type 8 has an invalid length. [ 665.332141] netlink: 9 bytes leftover after parsing attributes in process `syz-executor0'. [ 665.340599] netlink: 9 bytes leftover after parsing attributes in process `syz-executor0'. 11:50:04 executing program 5: r0 = socket(0x200000000000011, 0x802, 0x4001000dd86) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) bind$packet(r0, &(0x7f00000000c0)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @dev}, 0x14) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000140)="fb", 0x1}], 0x1) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) 11:50:04 executing program 4: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000007000)={0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)}) [ 665.470623] netlink: 'syz-executor0': attribute type 8 has an invalid length. [ 665.478213] netlink: 9 bytes leftover after parsing attributes in process `syz-executor0'. [ 665.486855] netlink: 9 bytes leftover after parsing attributes in process `syz-executor0'. 11:50:04 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x800000018, &(0x7f0000000100)=0x7fc, 0x4) 11:50:04 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0xa, &(0x7f0000b86000)={0x0, 0x0}, 0x10) [ 665.613070] ================================================================== [ 665.620485] BUG: KMSAN: uninit-value in check_6rd+0x65a/0x710 [ 665.621567] CPU: 0 PID: 22111 Comm: syz-executor5 Not tainted 4.20.0-rc7+ #3 [ 665.621567] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 665.641736] Call Trace: [ 665.641736] dump_stack+0x1c9/0x220 [ 665.648706] kmsan_report+0x12d/0x290 [ 665.648706] __msan_warning+0x76/0xc0 [ 665.648706] check_6rd+0x65a/0x710 11:50:04 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmsg(r0, &(0x7f0000003000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002e40)=[{0x10}], 0x10}, 0x4000) [ 665.648706] sit_tunnel_xmit+0xb58/0x34d0 [ 665.648706] ? dev_hard_start_xmit+0xb3/0xc80 [ 665.648706] ? ipip6_tunnel_uninit+0x800/0x800 [ 665.648706] dev_hard_start_xmit+0x627/0xc80 [ 665.648706] __dev_queue_xmit+0x3173/0x3cf0 [ 665.648706] dev_queue_xmit+0x4b/0x60 [ 665.648706] ? __netdev_pick_tx+0x1290/0x1290 [ 665.648706] packet_sendmsg+0x7cbd/0x9200 [ 665.648706] ? kmsan_memcpy_metadata+0xb/0x10 [ 665.648706] ? __msan_memcpy+0x61/0x70 [ 665.648706] ? do_iter_readv_writev+0x822/0xac0 [ 665.648706] ? __se_sys_writev+0x9b/0xb0 [ 665.711774] ? do_syscall_64+0xcd/0x110 [ 665.711774] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 665.711774] ? balance_callback+0x48/0x260 [ 665.711774] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 665.731949] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 665.731949] ? aa_sk_perm+0x7ab/0x9e0 [ 665.731949] ? compat_packet_setsockopt+0x360/0x360 [ 665.731949] sock_write_iter+0x3f4/0x4f0 [ 665.731949] ? sock_read_iter+0x4e0/0x4e0 [ 665.731949] do_iter_readv_writev+0x822/0xac0 [ 665.731949] ? sock_read_iter+0x4e0/0x4e0 11:50:04 executing program 4: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000007000)={0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)}) [ 665.731949] do_iter_write+0x302/0xd80 [ 665.731949] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 665.731949] ? import_iovec+0x41f/0x680 [ 665.731949] do_writev+0x397/0x860 [ 665.731949] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 665.731949] ? prepare_exit_to_usermode+0x137/0x460 [ 665.731949] ? syscall_return_slowpath+0x50/0x680 [ 665.731949] __se_sys_writev+0x9b/0xb0 [ 665.731949] __x64_sys_writev+0x4a/0x70 [ 665.731949] do_syscall_64+0xcd/0x110 [ 665.731949] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 665.731949] RIP: 0033:0x457669 [ 665.731949] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 665.820851] RSP: 002b:00007f4f355d4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 665.820851] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457669 [ 665.820851] RDX: 0000000000000001 RSI: 00000000200003c0 RDI: 0000000000000003 [ 665.820851] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 665.820851] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4f355d56d4 [ 665.820851] R13: 00000000004c3a1f R14: 00000000004daea8 R15: 00000000ffffffff [ 665.820851] [ 665.820851] Uninit was created at: [ 665.820851] kmsan_internal_poison_shadow+0x92/0x150 [ 665.820851] kmsan_kmalloc+0xa1/0x100 [ 665.820851] kmsan_slab_alloc+0xe/0x10 [ 665.820851] __kmalloc_node_track_caller+0xf06/0x1120 [ 665.820851] __alloc_skb+0x318/0xa40 [ 665.820851] alloc_skb_with_frags+0x1c9/0xa80 [ 665.820851] sock_alloc_send_pskb+0xb5d/0x1140 [ 665.911784] packet_sendmsg+0x66a2/0x9200 [ 665.911784] sock_write_iter+0x3f4/0x4f0 [ 665.911784] do_iter_readv_writev+0x822/0xac0 [ 665.911784] do_iter_write+0x302/0xd80 [ 665.911784] do_writev+0x397/0x860 [ 665.911784] __se_sys_writev+0x9b/0xb0 [ 665.911784] __x64_sys_writev+0x4a/0x70 [ 665.911784] do_syscall_64+0xcd/0x110 [ 665.911784] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 665.911784] ================================================================== [ 665.911784] Disabling lock debugging due to kernel taint [ 665.911784] Kernel panic - not syncing: panic_on_warn set ... [ 665.911784] CPU: 0 PID: 22111 Comm: syz-executor5 Tainted: G B 4.20.0-rc7+ #3 [ 665.911784] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 665.981678] Call Trace: [ 665.981678] dump_stack+0x1c9/0x220 [ 665.981678] panic+0x3f0/0x98f [ 665.981678] kmsan_report+0x290/0x290 [ 665.981678] __msan_warning+0x76/0xc0 [ 665.981678] check_6rd+0x65a/0x710 [ 665.981678] sit_tunnel_xmit+0xb58/0x34d0 [ 665.981678] ? dev_hard_start_xmit+0xb3/0xc80 [ 665.981678] ? ipip6_tunnel_uninit+0x800/0x800 [ 665.981678] dev_hard_start_xmit+0x627/0xc80 [ 665.981678] __dev_queue_xmit+0x3173/0x3cf0 [ 665.981678] dev_queue_xmit+0x4b/0x60 [ 665.981678] ? __netdev_pick_tx+0x1290/0x1290 [ 665.981678] packet_sendmsg+0x7cbd/0x9200 [ 665.981678] ? kmsan_memcpy_metadata+0xb/0x10 [ 665.981678] ? __msan_memcpy+0x61/0x70 [ 665.981678] ? do_iter_readv_writev+0x822/0xac0 [ 665.981678] ? __se_sys_writev+0x9b/0xb0 [ 665.981678] ? do_syscall_64+0xcd/0x110 [ 665.981678] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 665.981678] ? balance_callback+0x48/0x260 [ 665.981678] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 665.981678] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 665.981678] ? aa_sk_perm+0x7ab/0x9e0 [ 665.981678] ? compat_packet_setsockopt+0x360/0x360 [ 665.981678] sock_write_iter+0x3f4/0x4f0 [ 665.981678] ? sock_read_iter+0x4e0/0x4e0 [ 665.981678] do_iter_readv_writev+0x822/0xac0 [ 665.981678] ? sock_read_iter+0x4e0/0x4e0 [ 665.981678] do_iter_write+0x302/0xd80 [ 665.981678] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 665.981678] ? import_iovec+0x41f/0x680 [ 665.981678] do_writev+0x397/0x860 [ 665.981678] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 665.981678] ? prepare_exit_to_usermode+0x137/0x460 [ 665.981678] ? syscall_return_slowpath+0x50/0x680 [ 665.981678] __se_sys_writev+0x9b/0xb0 [ 665.981678] __x64_sys_writev+0x4a/0x70 [ 665.981678] do_syscall_64+0xcd/0x110 [ 665.981678] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 665.981678] RIP: 0033:0x457669 [ 665.981678] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 665.981678] RSP: 002b:00007f4f355d4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 665.981678] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457669 [ 665.981678] RDX: 0000000000000001 RSI: 00000000200003c0 RDI: 0000000000000003 [ 665.981678] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 665.981678] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4f355d56d4 [ 665.981678] R13: 00000000004c3a1f R14: 00000000004daea8 R15: 00000000ffffffff [ 665.981678] Kernel Offset: disabled [ 665.981678] Rebooting in 86400 seconds..