l, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f00000002c0)="69758abac5e29a7ed0897840255d0fc9a1ad703db11e68c9e90df3017136a85de26bd81af7745f01fa4f5a9eb68db26681ed3e1eca501e00d2430d561ede79401f7bf06fcdb038f501357e7bc0cd64c97e6e54152f535597aaae87bad3bbfe413000b47429ae67ae7ca8c536c935", 0x6e, r5}, 0x68) ioctl$KVM_SET_USER_MEMORY_REGION(r7, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r9 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r9) ioctl$KVM_SET_REGS(r8, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) r10 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r10, 0x0, 0x2c, &(0x7f0000000000)="d22f7be5e7b72ccad7f1f4c8", 0xc) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r4, 0x10e, 0x1, &(0x7f0000000140)=0xb, 0x4) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0186405, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r4, 0x4048ae9b, 0x0) ioctl$KVM_RUN(r8, 0xae80, 0x0) ioctl$KVM_NMI(r8, 0xae9a) ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000003c0)=0x0) ptrace$getenv(0x4201, r11, 0x41d99da9, &(0x7f0000000400)) ioctl$KVM_RUN(r8, 0xae80, 0x0) 21:55:30 executing program 5: r0 = socket$inet(0x2, 0x805, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x13, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 21:55:30 executing program 0: mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1004, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:55:30 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000200)={{0x2, 0x0, @empty}, {0x0, @local}, 0x0, {0x2, 0x0, @dev}, 'veth1_to_hsr\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x4e23, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x82, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x106, 0x1}}, 0x20) [ 641.950521][ T9270] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 641.974214][ T9270] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 642.009749][ T9270] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 642.037226][ T9270] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 21:55:31 executing program 5: r0 = socket$inet(0x2, 0x805, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x14, &(0x7f0000000080), &(0x7f00000000c0)=0x4) [ 642.117982][ T9270] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 21:55:31 executing program 0: mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x3000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) [ 642.166497][ T9270] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 642.196894][ T9270] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 21:55:31 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000200)={{0x2, 0x0, @empty}, {0x0, @local}, 0x0, {0x2, 0x0, @dev}, 'veth1_to_hsr\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x4e23, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x82, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x106, 0x1}}, 0x20) [ 642.233356][ T9270] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 642.254711][ T9270] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 642.262688][ T9270] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 21:55:31 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000200)={{0x2, 0x0, @empty}, {0x0, @local}, 0x0, {0x2, 0x0, @dev}, 'veth1_to_hsr\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x4e23, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x82, 0x0) [ 642.277776][T25072] sctp: [Deprecated]: syz-executor.5 (pid 25072) Use of int in max_burst socket option. [ 642.277776][T25072] Use struct sctp_assoc_value instead [ 642.306173][ T9270] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 642.359821][ T9270] hid-generic 0000:0000:0000.0005: hidraw0: HID v0.00 Device [syz1] on syz1 [ 642.501619][ T9270] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 642.521572][ T9270] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 642.591301][ T9270] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 642.646780][ T9270] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 642.668406][ T9270] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 642.693705][ T9270] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 642.701973][ T9270] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 642.714084][ T9270] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 642.721706][ T9270] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 642.730479][ T9270] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 642.754496][ T9270] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 642.777396][ T9270] hid-generic 0000:0000:0000.0006: hidraw0: HID v0.00 Device [syz1] on syz1 21:55:31 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000200)={{0x2, 0x0, @empty}, {0x0, @local}, 0x0, {0x2, 0x0, @dev}, 'veth1_to_hsr\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x4e23, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x82, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x106, 0x1}}, 0x20) 21:55:31 executing program 0: mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0xb000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:55:31 executing program 5: r0 = socket$inet(0x2, 0x805, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x15, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 21:55:31 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000200)={{0x2, 0x0, @empty}, {0x0, @local}, 0x0, {0x2, 0x0, @dev}, 'veth1_to_hsr\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x4e23, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x82, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x106, 0x1}}, 0x20) 21:55:31 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, 0x0) ioctl$KVM_TRANSLATE(r3, 0xc018ae85, 0x0) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x10001, 0x0) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x200000000000000, 0x0) r7 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x0, 0x23c}, 0xfffffffffffffed6) ioctl$KVM_SET_USER_MEMORY_REGION(r7, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil}) ioctl$RTC_ALM_READ(r1, 0x80247008, &(0x7f00000001c0)) r8 = ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000340)={&(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f00000002c0)="69758abac5e29a7ed0897840255d0fc9a1ad703db11e68c9e90df3017136a85de26bd81af7745f01fa4f5a9eb68db26681ed3e1eca501e00d2430d561ede79401f7bf06fcdb038f501357e7bc0cd64c97e6e54152f535597aaae87bad3bbfe413000b47429ae67ae7ca8c536c935", 0x6e, r5}, 0x68) ioctl$KVM_SET_USER_MEMORY_REGION(r7, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r9 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r9) ioctl$KVM_SET_REGS(r8, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) r10 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r10, 0x0, 0x2c, &(0x7f0000000000)="d22f7be5e7b72ccad7f1f4c8", 0xc) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r4, 0x10e, 0x1, &(0x7f0000000140)=0xb, 0x4) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0186405, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r4, 0x4048ae9b, 0x0) ioctl$KVM_RUN(r8, 0xae80, 0x0) ioctl$KVM_NMI(r8, 0xae9a) ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000003c0)=0x0) ptrace$getenv(0x4201, r11, 0x41d99da9, &(0x7f0000000400)) ioctl$KVM_RUN(r8, 0xae80, 0x0) 21:55:31 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000200)={{0x2, 0x0, @empty}, {0x0, @local}, 0x0, {0x2, 0x0, @dev}, 'veth1_to_hsr\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x4e23, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x82, 0x0) 21:55:32 executing program 5: r0 = socket$inet(0x2, 0x805, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x16, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 21:55:32 executing program 0: mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x200000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:55:32 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000200)={{0x2, 0x0, @empty}, {0x0, @local}, 0x0, {0x2, 0x0, @dev}, 'veth1_to_hsr\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x4e23, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x82, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x106, 0x1}}, 0x20) 21:55:32 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000200)={{0x2, 0x0, @empty}, {0x0, @local}, 0x0, {0x2, 0x0, @dev}, 'veth1_to_hsr\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x4e23, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) 21:55:32 executing program 5: r0 = socket$inet(0x2, 0x805, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x17, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 21:55:32 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000200)={{0x2, 0x0, @empty}, {0x0, @local}, 0x0, {0x2, 0x0, @dev}, 'veth1_to_hsr\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x4e23, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x82, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x106, 0x1}}, 0x20) 21:55:32 executing program 0: mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x20000000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:55:32 executing program 5: r0 = socket$inet(0x2, 0x805, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x18, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 21:55:32 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000200)={{0x2, 0x0, @empty}, {0x0, @local}, 0x0, {0x2, 0x0, @dev}, 'veth1_to_hsr\x00'}) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x4e23, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) 21:55:32 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000200)={{0x2, 0x0, @empty}, {0x0, @local}, 0x0, {0x2, 0x0, @dev}, 'veth1_to_hsr\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x4e23, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) 21:55:33 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, 0x0) ioctl$KVM_TRANSLATE(r3, 0xc018ae85, 0x0) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x10001, 0x0) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x200000000000000, 0x0) r7 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x0, 0x23c}, 0xfffffffffffffed6) ioctl$KVM_SET_USER_MEMORY_REGION(r7, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil}) ioctl$RTC_ALM_READ(r1, 0x80247008, &(0x7f00000001c0)) r8 = ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000340)={&(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f00000002c0)="69758abac5e29a7ed0897840255d0fc9a1ad703db11e68c9e90df3017136a85de26bd81af7745f01fa4f5a9eb68db26681ed3e1eca501e00d2430d561ede79401f7bf06fcdb038f501357e7bc0cd64c97e6e54152f535597aaae87bad3bbfe413000b47429ae67ae7ca8c536c935", 0x6e, r5}, 0x68) ioctl$KVM_SET_USER_MEMORY_REGION(r7, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r9 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r9) ioctl$KVM_SET_REGS(r8, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) r10 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r10, 0x0, 0x2c, &(0x7f0000000000)="d22f7be5e7b72ccad7f1f4c8", 0xc) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r4, 0x10e, 0x1, &(0x7f0000000140)=0xb, 0x4) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0186405, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r4, 0x4048ae9b, 0x0) ioctl$KVM_RUN(r8, 0xae80, 0x0) ioctl$KVM_NMI(r8, 0xae9a) ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000003c0)=0x0) ptrace$getenv(0x4201, r11, 0x41d99da9, &(0x7f0000000400)) ioctl$KVM_RUN(r8, 0xae80, 0x0) 21:55:33 executing program 0: mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0xdfffa000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:55:33 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000200)={{0x2, 0x0, @empty}, {0x0, @local}, 0x0, {0x2, 0x0, @dev}, 'veth1_to_hsr\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x4e23, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x82, 0x0) 21:55:33 executing program 5: r0 = socket$inet(0x2, 0x805, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x19, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 21:55:33 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000200)={{0x2, 0x0, @empty}, {0x0, @local}, 0x0, {0x2, 0x0, @dev}, 'veth1_to_hsr\x00'}) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x4e23, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) 21:55:33 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000200)={{0x2, 0x0, @empty}, {0x0, @local}, 0x0, {0x2, 0x0, @dev}, 'veth1_to_hsr\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x4e23, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x82, 0x0) 21:55:33 executing program 5: r0 = socket$inet(0x2, 0x805, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x1a, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 21:55:33 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000200)={{0x2, 0x0, @empty}, {0x0, @local}, 0x0, {0x2, 0x0, @dev}, 'veth1_to_hsr\x00'}) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x4e23, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) 21:55:33 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000200)={{0x2, 0x0, @empty}, {0x0, @local}, 0x0, {0x2, 0x0, @dev}, 'veth1_to_hsr\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x4e23, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x82, 0x0) 21:55:33 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000200)={{0x2, 0x0, @empty}, {0x0, @local}, 0x0, {0x2, 0x0, @dev}, 'veth1_to_hsr\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x4e23, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x82, 0x0) 21:55:33 executing program 0: mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3002, 0x3, &(0x7f0000000000/0x3000)=nil) 21:55:33 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x4e23, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) 21:55:33 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, 0x0) ioctl$KVM_TRANSLATE(r3, 0xc018ae85, 0x0) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x10001, 0x0) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x200000000000000, 0x0) r7 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x0, 0x23c}, 0xfffffffffffffed6) ioctl$KVM_SET_USER_MEMORY_REGION(r7, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil}) ioctl$RTC_ALM_READ(r1, 0x80247008, &(0x7f00000001c0)) r8 = ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000340)={&(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f00000002c0)="69758abac5e29a7ed0897840255d0fc9a1ad703db11e68c9e90df3017136a85de26bd81af7745f01fa4f5a9eb68db26681ed3e1eca501e00d2430d561ede79401f7bf06fcdb038f501357e7bc0cd64c97e6e54152f535597aaae87bad3bbfe413000b47429ae67ae7ca8c536c935", 0x6e, r5}, 0x68) ioctl$KVM_SET_USER_MEMORY_REGION(r7, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r9 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r9) ioctl$KVM_SET_REGS(r8, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) r10 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r10, 0x0, 0x2c, &(0x7f0000000000)="d22f7be5e7b72ccad7f1f4c8", 0xc) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r4, 0x10e, 0x1, &(0x7f0000000140)=0xb, 0x4) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0186405, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r4, 0x4048ae9b, 0x0) ioctl$KVM_RUN(r8, 0xae80, 0x0) ioctl$KVM_NMI(r8, 0xae9a) ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000003c0)=0x0) ptrace$getenv(0x4201, r11, 0x41d99da9, &(0x7f0000000400)) ioctl$KVM_RUN(r8, 0xae80, 0x0) 21:55:33 executing program 0: mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3003, 0x3, &(0x7f0000000000/0x3000)=nil) 21:55:33 executing program 5: r0 = socket$inet(0x2, 0x805, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x1b, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 21:55:33 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000200)={{0x2, 0x0, @empty}, {0x0, @local}, 0x0, {0x2, 0x0, @dev}, 'veth1_to_hsr\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x4e23, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x82, 0x0) 21:55:33 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000200)={{0x2, 0x0, @empty}, {0x0, @local}, 0x0, {0x2, 0x0, @dev}, 'veth1_to_hsr\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x4e23, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x82, 0x0) 21:55:33 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000180)={{0x2, 0x4e23, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) 21:55:33 executing program 5: r0 = socket$inet(0x2, 0x805, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x1c, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 21:55:34 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000180)={{0x2, 0x4e23, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) 21:55:34 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000200)={{0x2, 0x0, @empty}, {0x0, @local}, 0x0, {0x2, 0x0, @dev}, 'veth1_to_hsr\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x4e23, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x106, 0x1}}, 0x20) 21:55:34 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000200)={{0x2, 0x0, @empty}, {0x0, @local}, 0x0, {0x2, 0x0, @dev}, 'veth1_to_hsr\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x4e23, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) 21:55:34 executing program 0: mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3004, 0x3, &(0x7f0000000000/0x3000)=nil) 21:55:34 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000180)={{0x2, 0x4e23, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) 21:55:34 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, 0x0) ioctl$KVM_TRANSLATE(r3, 0xc018ae85, 0x0) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x10001, 0x0) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x200000000000000, 0x0) r7 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x0, 0x23c}, 0xfffffffffffffed6) ioctl$KVM_SET_USER_MEMORY_REGION(r7, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil}) ioctl$RTC_ALM_READ(r1, 0x80247008, &(0x7f00000001c0)) r8 = ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000340)={&(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f00000002c0)="69758abac5e29a7ed0897840255d0fc9a1ad703db11e68c9e90df3017136a85de26bd81af7745f01fa4f5a9eb68db26681ed3e1eca501e00d2430d561ede79401f7bf06fcdb038f501357e7bc0cd64c97e6e54152f535597aaae87bad3bbfe413000b47429ae67ae7ca8c536c935", 0x6e, r5}, 0x68) ioctl$KVM_SET_USER_MEMORY_REGION(r7, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r9 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r9) ioctl$KVM_SET_REGS(r8, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) r10 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r10, 0x0, 0x2c, &(0x7f0000000000)="d22f7be5e7b72ccad7f1f4c8", 0xc) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r4, 0x10e, 0x1, &(0x7f0000000140)=0xb, 0x4) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0186405, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r4, 0x4048ae9b, 0x0) ioctl$KVM_RUN(r8, 0xae80, 0x0) ioctl$KVM_NMI(r8, 0xae9a) ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000003c0)=0x0) ptrace$getenv(0x4201, r11, 0x41d99da9, &(0x7f0000000400)) 21:55:34 executing program 5: r0 = socket$inet(0x2, 0x805, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x1d, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 21:55:34 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000200)={{0x2, 0x0, @empty}, {0x0, @local}, 0x0, {0x2, 0x0, @dev}, 'veth1_to_hsr\x00'}) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x4e23, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x106, 0x1}}, 0x20) 21:55:34 executing program 0: mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x1fffff, 0x3, &(0x7f0000000000/0x3000)=nil) 21:55:34 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000200)={{0x2, 0x0, @empty}, {0x0, @local}, 0x0, {0x2, 0x0, @dev}, 'veth1_to_hsr\x00'}) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x4e23, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) 21:55:34 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x4e23, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) 21:55:34 executing program 5: r0 = socket$inet(0x2, 0x805, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x1e, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 21:55:34 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x4e23, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) 21:55:34 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000200)={{0x2, 0x0, @empty}, {0x0, @local}, 0x0, {0x2, 0x0, @dev}, 'veth1_to_hsr\x00'}) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x4e23, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x106, 0x1}}, 0x20) 21:55:34 executing program 0: mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0xdfffe000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:55:34 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000200)={{0x2, 0x0, @empty}, {0x0, @local}, 0x0, {0x2, 0x0, @dev}, 'veth1_to_hsr\x00'}) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x4e23, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) 21:55:35 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000200)={{0x2, 0x0, @empty}, {0x0, @local}, 0x0, {0x2, 0x0, @dev}, 'veth1_to_hsr\x00'}) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x4e23, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) 21:55:35 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, 0x0) ioctl$KVM_TRANSLATE(r3, 0xc018ae85, 0x0) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x10001, 0x0) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x200000000000000, 0x0) r7 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x0, 0x23c}, 0xfffffffffffffed6) ioctl$KVM_SET_USER_MEMORY_REGION(r7, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil}) ioctl$RTC_ALM_READ(r1, 0x80247008, &(0x7f00000001c0)) r8 = ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000340)={&(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f00000002c0)="69758abac5e29a7ed0897840255d0fc9a1ad703db11e68c9e90df3017136a85de26bd81af7745f01fa4f5a9eb68db26681ed3e1eca501e00d2430d561ede79401f7bf06fcdb038f501357e7bc0cd64c97e6e54152f535597aaae87bad3bbfe413000b47429ae67ae7ca8c536c935", 0x6e, r5}, 0x68) ioctl$KVM_SET_USER_MEMORY_REGION(r7, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r9 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r9) ioctl$KVM_SET_REGS(r8, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) r10 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r10, 0x0, 0x2c, &(0x7f0000000000)="d22f7be5e7b72ccad7f1f4c8", 0xc) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r4, 0x10e, 0x1, &(0x7f0000000140)=0xb, 0x4) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0186405, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r4, 0x4048ae9b, 0x0) ioctl$KVM_RUN(r8, 0xae80, 0x0) ioctl$KVM_NMI(r8, 0xae9a) ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000003c0)) 21:55:35 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x4e23, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) 21:55:35 executing program 5: r0 = socket$inet(0x2, 0x805, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x21, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 21:55:35 executing program 0: mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0xffffe000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:55:35 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000200)={{0x2, 0x0, @empty}, {0x0, @local}, 0x0, {0x2, 0x0, @dev}, 'veth1_to_hsr\x00'}) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x4e23, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x106, 0x1}}, 0x20) 21:55:35 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x4e23, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) 21:55:35 executing program 5: r0 = socket$inet(0x2, 0x805, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x22, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 21:55:35 executing program 0: mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x2, &(0x7f0000000000/0x3000)=nil) 21:55:35 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x4e23, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) 21:55:35 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x4e23, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x106, 0x1}}, 0x20) 21:55:35 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000180)={{0x2, 0x4e23, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) 21:55:35 executing program 5: r0 = socket$inet(0x2, 0x805, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x23, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 21:55:36 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x4e23, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) 21:55:36 executing program 0: mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x4, &(0x7f0000000000/0x3000)=nil) 21:55:36 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x4e23, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x106, 0x1}}, 0x20) 21:55:36 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000180)={{0x2, 0x4e23, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) 21:55:36 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, 0x0) ioctl$KVM_TRANSLATE(r3, 0xc018ae85, 0x0) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x10001, 0x0) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x200000000000000, 0x0) r7 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x0, 0x23c}, 0xfffffffffffffed6) ioctl$KVM_SET_USER_MEMORY_REGION(r7, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil}) ioctl$RTC_ALM_READ(r1, 0x80247008, &(0x7f00000001c0)) r8 = ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000340)={&(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f00000002c0)="69758abac5e29a7ed0897840255d0fc9a1ad703db11e68c9e90df3017136a85de26bd81af7745f01fa4f5a9eb68db26681ed3e1eca501e00d2430d561ede79401f7bf06fcdb038f501357e7bc0cd64c97e6e54152f535597aaae87bad3bbfe413000b47429ae67ae7ca8c536c935", 0x6e, r5}, 0x68) ioctl$KVM_SET_USER_MEMORY_REGION(r7, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r9 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r9) ioctl$KVM_SET_REGS(r8, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) r10 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r10, 0x0, 0x2c, &(0x7f0000000000)="d22f7be5e7b72ccad7f1f4c8", 0xc) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r4, 0x10e, 0x1, &(0x7f0000000140)=0xb, 0x4) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0186405, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r4, 0x4048ae9b, 0x0) ioctl$KVM_RUN(r8, 0xae80, 0x0) ioctl$KVM_NMI(r8, 0xae9a) 21:55:36 executing program 5: r0 = socket$inet(0x2, 0x805, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x24, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 21:55:36 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x4e23, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) 21:55:36 executing program 0: mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x7, &(0x7f0000000000/0x3000)=nil) 21:55:36 executing program 5: r0 = socket$inet(0x2, 0x805, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x66, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 21:55:36 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x4e23, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x106, 0x1}}, 0x20) 21:55:36 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000180)={{0x2, 0x4e23, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) 21:55:36 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x4e23, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) 21:55:36 executing program 0: mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x8, &(0x7f0000000000/0x3000)=nil) 21:55:36 executing program 5: r0 = socket$inet(0x2, 0x805, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x6c, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 21:55:36 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x4e23, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) 21:55:36 executing program 3: ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000200)={{0x2, 0x0, @empty}, {0x0, @local}, 0x0, {0x2, 0x0, @dev}, 'veth1_to_hsr\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000180)={{0x2, 0x4e23, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x106, 0x1}}, 0x20) 21:55:37 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, 0x0) ioctl$KVM_TRANSLATE(r3, 0xc018ae85, 0x0) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x10001, 0x0) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x200000000000000, 0x0) r7 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x0, 0x23c}, 0xfffffffffffffed6) ioctl$KVM_SET_USER_MEMORY_REGION(r7, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil}) ioctl$RTC_ALM_READ(r1, 0x80247008, &(0x7f00000001c0)) r8 = ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000340)={&(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f00000002c0)="69758abac5e29a7ed0897840255d0fc9a1ad703db11e68c9e90df3017136a85de26bd81af7745f01fa4f5a9eb68db26681ed3e1eca501e00d2430d561ede79401f7bf06fcdb038f501357e7bc0cd64c97e6e54152f535597aaae87bad3bbfe413000b47429ae67ae7ca8c536c935", 0x6e, r5}, 0x68) ioctl$KVM_SET_USER_MEMORY_REGION(r7, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r9 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r9) ioctl$KVM_SET_REGS(r8, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) r10 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r10, 0x0, 0x2c, &(0x7f0000000000)="d22f7be5e7b72ccad7f1f4c8", 0xc) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r4, 0x10e, 0x1, &(0x7f0000000140)=0xb, 0x4) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0186405, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r4, 0x4048ae9b, 0x0) ioctl$KVM_RUN(r8, 0xae80, 0x0) 21:55:37 executing program 3: ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000200)={{0x2, 0x0, @empty}, {0x0, @local}, 0x0, {0x2, 0x0, @dev}, 'veth1_to_hsr\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000180)={{0x2, 0x4e23, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x106, 0x1}}, 0x20) 21:55:37 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x4e23, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) 21:55:37 executing program 0: mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0xe, &(0x7f0000000000/0x3000)=nil) 21:55:37 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x4e23, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) 21:55:37 executing program 5: r0 = socket$inet(0x2, 0x805, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x6d, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 21:55:37 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x4e23, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) 21:55:37 executing program 5: r0 = socket$inet(0x2, 0x805, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x6f, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 21:55:37 executing program 0: mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0xf, &(0x7f0000000000/0x3000)=nil) 21:55:37 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x4e23, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) 21:55:37 executing program 3: ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000200)={{0x2, 0x0, @empty}, {0x0, @local}, 0x0, {0x2, 0x0, @dev}, 'veth1_to_hsr\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000180)={{0x2, 0x4e23, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x106, 0x1}}, 0x20) 21:55:37 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x4e23, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) 21:55:37 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, 0x0) ioctl$KVM_TRANSLATE(r3, 0xc018ae85, 0x0) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x10001, 0x0) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x200000000000000, 0x0) r7 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="ffe600005a0000010001002f3c520915f0e093471354204740ff167c02e4c537c6140f848d649762246e8de14b5b97cbb2c447527ecc0ec4e8035e9cfb75457f3dfc9951170f9926659d49d65b687571ba11f81e15a0deec1baeaf6855780c6a74289ebde0e0f034765e4d8748aa7f6e2cb342c54b18a644fbf6c499bfe05581bf56b98527b79ebdef414b9037ffff0e2707f589b7f9b92b8c6bb26dffb8390bcdc4dfe81e22e6b5a950826d04a5965b48a082d7615751809a0a0d48c7ffa61b1981fcec0dac462661ecc520ef92d1011ecd199e613841fd0884cfb46548c4e66abfcda9163ae18b37d33be53586384bd4a5596539eb9872808f1afdedc875b18dc62df99b7e45d53a22abb0e05f30b0a2721b50e28b4d9fc97304eebbc385b919a5906c0178a880c7abd3434733749abb89a914bf430e00bd14d5d90eb14cde000000000000008c23888bc98e1f52026452a63d1dc877000000000000000000e6ebcf3aa3caad650f7c231f36c458e111944544166d25658bbb5eddc3b9941738f122f15a9a7814d4a3387682370f5cdae68a9ffa3a3fecd792ec645a159cb24337a93e3572e02e26a4179fbb0f9d31e407330f0ea31e2bfc78b21f1cbfba290a7fe812832b186876289c86f1f5b8317f1977f01aae434a06db60afcea8fa3c3ae2daf67cdc3f1f3ff1517cac67b647403d46b26341c6e2b46a9f425ddc750a10184d61b03b37b6a5f8f1a20e5dcc1b4fd5395355aecd27ad06c29d722b68ae5de3d9350500a0cc966efb27afd1d9010e4fba13e2a1cff0a6f2399c68230a97a1342d296485709a3bf12ced"], 0x0, 0x23c}, 0xfffffffffffffed6) ioctl$KVM_SET_USER_MEMORY_REGION(r7, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil}) ioctl$RTC_ALM_READ(r1, 0x80247008, &(0x7f00000001c0)) r8 = ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000340)={&(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f00000002c0)="69758abac5e29a7ed0897840255d0fc9a1ad703db11e68c9e90df3017136a85de26bd81af7745f01fa4f5a9eb68db26681ed3e1eca501e00d2430d561ede79401f7bf06fcdb038f501357e7bc0cd64c97e6e54152f535597aaae87bad3bbfe413000b47429ae67ae7ca8c536c935", 0x6e, r5}, 0x68) ioctl$KVM_SET_USER_MEMORY_REGION(r7, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r9 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r9) ioctl$KVM_SET_REGS(r8, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) r10 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r10, 0x0, 0x2c, &(0x7f0000000000)="d22f7be5e7b72ccad7f1f4c8", 0xc) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r4, 0x10e, 0x1, &(0x7f0000000140)=0xb, 0x4) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0186405, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r4, 0x4048ae9b, 0x0) 21:55:37 executing program 5: r0 = socket$inet(0x2, 0x805, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x70, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 21:55:37 executing program 0: mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x8000, 0x0) ioctl$SG_SET_TIMEOUT(r0, 0x2201, &(0x7f0000000040)=0xcf16000000) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:55:37 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000200)={{0x2, 0x0, @empty}, {0x0, @local}, 0x0, {0x2, 0x0, @dev}, 'veth1_to_hsr\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x4e23, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x106, 0x1}}, 0x20) 21:55:37 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x4e23, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) 21:55:37 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x4e23, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) 21:55:37 executing program 5: r0 = socket$inet(0x2, 0x805, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x71, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 21:55:37 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x4e23, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) 21:55:37 executing program 0: mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x7ff, 0x80000000080000) r1 = socket$inet(0x2, 0x7, 0x5) connect$l2tp(r0, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x18}}, 0x2, 0x2, 0x1}}, 0x2e) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:55:37 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x4e23, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) 21:55:38 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000200)={{0x2, 0x0, @empty}, {0x0, @local}, 0x0, {0x2, 0x0, @dev}, 'veth1_to_hsr\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x4e23, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x106, 0x1}}, 0x20) 21:55:38 executing program 5: r0 = socket$inet(0x2, 0x805, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x72, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 21:55:38 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, 0x0) ioctl$KVM_TRANSLATE(r3, 0xc018ae85, 0x0) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x10001, 0x0) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x200000000000000, 0x0) r7 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="ffe600005a0000010001002f3c520915f0e093471354204740ff167c02e4c537c6140f848d649762246e8de14b5b97cbb2c447527ecc0ec4e8035e9cfb75457f3dfc9951170f9926659d49d65b687571ba11f81e15a0deec1baeaf6855780c6a74289ebde0e0f034765e4d8748aa7f6e2cb342c54b18a644fbf6c499bfe05581bf56b98527b79ebdef414b9037ffff0e2707f589b7f9b92b8c6bb26dffb8390bcdc4dfe81e22e6b5a950826d04a5965b48a082d7615751809a0a0d48c7ffa61b1981fcec0dac462661ecc520ef92d1011ecd199e613841fd0884cfb46548c4e66abfcda9163ae18b37d33be53586384bd4a5596539eb9872808f1afdedc875b18dc62df99b7e45d53a22abb0e05f30b0a2721b50e28b4d9fc97304eebbc385b919a5906c0178a880c7abd3434733749abb89a914bf430e00bd14d5d90eb14cde000000000000008c23888bc98e1f52026452a63d1dc877000000000000000000e6ebcf3aa3caad650f7c231f36c458e111944544166d25658bbb5eddc3b9941738f122f15a9a7814d4a3387682370f5cdae68a9ffa3a3fecd792ec645a159cb24337a93e3572e02e26a4179fbb0f9d31e407330f0ea31e2bfc78b21f1cbfba290a7fe812832b186876289c86f1f5b8317f1977f01aae434a06db60afcea8fa3c3ae2daf67cdc3f1f3ff1517cac67b647403d46b26341c6e2b46a9f425ddc750a10184d61b03b37b6a5f8f1a20e5dcc1b4fd5395355aecd27ad06c29d722b68ae5de3d9350500a0cc966efb27afd1d9010e4fba13e2a1cff0a6f2399c68230a97a1342d296485709a3bf12ced"], 0x0, 0x23c}, 0xfffffffffffffed6) ioctl$KVM_SET_USER_MEMORY_REGION(r7, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil}) ioctl$RTC_ALM_READ(r1, 0x80247008, &(0x7f00000001c0)) r8 = ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000340)={&(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f00000002c0)="69758abac5e29a7ed0897840255d0fc9a1ad703db11e68c9e90df3017136a85de26bd81af7745f01fa4f5a9eb68db26681ed3e1eca501e00d2430d561ede79401f7bf06fcdb038f501357e7bc0cd64c97e6e54152f535597aaae87bad3bbfe413000b47429ae67ae7ca8c536c935", 0x6e, r5}, 0x68) ioctl$KVM_SET_USER_MEMORY_REGION(r7, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r9 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r9) ioctl$KVM_SET_REGS(r8, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) r10 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r10, 0x0, 0x2c, &(0x7f0000000000)="d22f7be5e7b72ccad7f1f4c8", 0xc) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r4, 0x10e, 0x1, &(0x7f0000000140)=0xb, 0x4) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0186405, 0x0) 21:55:38 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000200)={{0x2, 0x0, @empty}, {0x0, @local}, 0x0, {0x2, 0x0, @dev}, 'veth1_to_hsr\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x4e23, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x106, 0x1}}, 0x20) 21:55:38 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x4e23, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) 21:55:38 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x4e23, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) 21:55:38 executing program 5: r0 = socket$inet(0x2, 0x805, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x73, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 21:55:38 executing program 0: mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x1, 0x0, 0x40000) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001700)='/dev/sequencer2\x00', 0x0, 0x0) connect$vsock_stream(r0, &(0x7f0000001740)={0x28, 0x0, 0x2710, @host}, 0x10) 21:55:38 executing program 5: r0 = socket$inet(0x2, 0x805, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x74, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 21:55:38 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x4e23, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) 21:55:38 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x4e23, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) 21:55:38 executing program 0: r0 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x8003, 0xa06) ioctl$VIDIOC_SUBDEV_S_DV_TIMINGS(r0, 0xc0845657, &(0x7f00000000c0)={0x0, @reserved}) r1 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x2, 0x2) setsockopt$TIPC_CONN_TIMEOUT(r1, 0x10f, 0x82, &(0x7f0000000040)=0x7bf1, 0x4) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000386000/0x4000)=nil) 21:55:38 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x4e23, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x106, 0x1}}, 0x20) 21:55:39 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x4e23, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) 21:55:39 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, 0x0) ioctl$KVM_TRANSLATE(r3, 0xc018ae85, 0x0) r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x10001, 0x0) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x200000000000000, 0x0) r7 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x0, 0x23c}, 0xfffffffffffffed6) ioctl$KVM_SET_USER_MEMORY_REGION(r7, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil}) ioctl$RTC_ALM_READ(r1, 0x80247008, &(0x7f00000001c0)) r8 = ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000340)={&(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f00000002c0)="69758abac5e29a7ed0897840255d0fc9a1ad703db11e68c9e90df3017136a85de26bd81af7745f01fa4f5a9eb68db26681ed3e1eca501e00d2430d561ede79401f7bf06fcdb038f501357e7bc0cd64c97e6e54152f535597aaae87bad3bbfe413000b47429ae67ae7ca8c536c935", 0x6e, r5}, 0x68) ioctl$KVM_SET_USER_MEMORY_REGION(r7, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r9 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r9) ioctl$KVM_SET_REGS(r8, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) r10 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r10, 0x0, 0x2c, &(0x7f0000000000)="d22f7be5e7b72ccad7f1f4c8", 0xc) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r4, 0x10e, 0x1, &(0x7f0000000140)=0xb, 0x4) 21:55:39 executing program 5: r0 = socket$inet(0x2, 0x805, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x75, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 21:55:39 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x4e23, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) 21:55:39 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x4e23, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x106, 0x1}}, 0x20) 21:55:39 executing program 0: r0 = socket(0x10, 0x1, 0x3) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000000), &(0x7f0000000040)=0x4) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x0, 0x1b078, r0, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000080)={0x5, 0xb692, 0x1, 0xff, 0x80000001, 0x10000, 0x200, 0x80000001, 0x0}, &(0x7f00000000c0)=0x20) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000100)={r1, @in={{0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x6, 0x2}, &(0x7f00000001c0)=0x88) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:55:39 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000180)={{0x2, 0x4e23, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) 21:55:39 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x4e23, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x106, 0x1}}, 0x20) 21:55:39 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000180)={{0x2, 0x4e23, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) 21:55:39 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x4e23, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) 21:55:39 executing program 5: r0 = socket$inet(0x2, 0x805, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x76, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 21:55:39 executing program 0: mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x70bd, 0x40000) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000003000/0x4000)=nil) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/qat_adf_ctl\x00', 0x200000, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x12) r1 = accept4(0xffffffffffffffff, &(0x7f0000000000)=@in={0x2, 0x0, @dev}, &(0x7f0000000080)=0x80, 0x800) openat$vim2m(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f00000000c0), &(0x7f0000000100)=0x4) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r0, 0x40405515, &(0x7f0000000140)={0x8, 0x0, 0x2, 0x6, '\x00', 0x401}) 21:55:39 executing program 5: r0 = socket$inet(0x2, 0x805, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7a, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 21:55:39 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, 0x0) ioctl$KVM_TRANSLATE(r3, 0xc018ae85, 0x0) syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x10001, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x200000000000000, 0x0) r6 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x0, 0x23c}, 0xfffffffffffffed6) ioctl$KVM_SET_USER_MEMORY_REGION(r6, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil}) ioctl$RTC_ALM_READ(r1, 0x80247008, &(0x7f00000001c0)) r7 = ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000340)={&(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f00000002c0)="69758abac5e29a7ed0897840255d0fc9a1ad703db11e68c9e90df3017136a85de26bd81af7745f01fa4f5a9eb68db26681ed3e1eca501e00d2430d561ede79401f7bf06fcdb038f501357e7bc0cd64c97e6e54152f535597aaae87bad3bbfe413000b47429ae67ae7ca8c536c935", 0x6e, r4}, 0x68) ioctl$KVM_SET_USER_MEMORY_REGION(r6, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r8 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r8) ioctl$KVM_SET_REGS(r7, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) r9 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r9, 0x0, 0x2c, &(0x7f0000000000)="d22f7be5e7b72ccad7f1f4c8", 0xc) 21:55:39 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000180)={{0x2, 0x4e23, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) 21:55:39 executing program 0: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x80, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000006000/0x2000)=nil, 0x2000}, &(0x7f0000000080)=0x10) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x80004, 0x120010, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f000000c000/0x2000)=nil, 0x2000, 0x0, 0x40000080000001, 0xffffffffffffffff) mremap(&(0x7f000000b000/0x11000)=nil, 0x11000, 0x1000, 0xffffffffffffffff, &(0x7f000000a000/0x1000)=nil) r1 = shmget(0x2, 0x1000, 0x40, &(0x7f0000011000/0x1000)=nil) shmctl$SHM_STAT(r1, 0xd, &(0x7f00000000c0)=""/48) mlockall(0x2004) 21:55:39 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x4e23, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) 21:55:39 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000200)={{0x2, 0x0, @empty}, {0x0, @local}, 0x0, {0x2, 0x0, @dev}, 'veth1_to_hsr\x00'}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x4e23, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x106, 0x1}}, 0x20) 21:55:39 executing program 5: r0 = socket$inet(0x2, 0x805, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7b, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 21:55:40 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x4e23, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) 21:55:40 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, 0x0) 21:55:40 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000200)={{0x2, 0x0, @empty}, {0x0, @local}, 0x0, {0x2, 0x0, @dev}, 'veth1_to_hsr\x00'}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x4e23, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x106, 0x1}}, 0x20) 21:55:40 executing program 0: mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) unshare(0x10100) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:55:40 executing program 5: r0 = socket$inet(0x2, 0x805, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7c, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 21:55:40 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x4e23, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) 21:55:40 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, 0x0) ioctl$KVM_TRANSLATE(r3, 0xc018ae85, 0x0) syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x10001, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x200000000000000, 0x0) r6 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x0, 0x23c}, 0xfffffffffffffed6) ioctl$KVM_SET_USER_MEMORY_REGION(r6, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil}) ioctl$RTC_ALM_READ(r1, 0x80247008, &(0x7f00000001c0)) r7 = ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000340)={&(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f00000002c0)="69758abac5e29a7ed0897840255d0fc9a1ad703db11e68c9e90df3017136a85de26bd81af7745f01fa4f5a9eb68db26681ed3e1eca501e00d2430d561ede79401f7bf06fcdb038f501357e7bc0cd64c97e6e54152f535597aaae87bad3bbfe413000b47429ae67ae7ca8c536c935", 0x6e, r4}, 0x68) ioctl$KVM_SET_USER_MEMORY_REGION(r6, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r8 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r8) ioctl$KVM_SET_REGS(r7, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2c, &(0x7f0000000000)="d22f7be5e7b72ccad7f1f4c8", 0xc) 21:55:40 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000200)={{0x2, 0x0, @empty}, {0x0, @local}, 0x0, {0x2, 0x0, @dev}, 'veth1_to_hsr\x00'}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x4e23, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x106, 0x1}}, 0x20) 21:55:40 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, 0x0) 21:55:40 executing program 0: mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x800, 0x0) ioctl$VIDIOC_G_TUNER(r0, 0xc054561d, &(0x7f0000000040)={0x3, "aee1bb7afea71e97dc589b9d2e2f19735ac0c1a6846222f554d8766956b6605a", 0x2, 0x1544, 0x0, 0x5, 0x7, 0x0, 0x3, 0x7}) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:55:40 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x4e23, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) 21:55:40 executing program 5: r0 = socket$inet(0x2, 0x805, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7d, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 21:55:40 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000200)={{0x2, 0x0, @empty}, {0x0, @local}, 0x0, {0x2, 0x0, @dev}, 'veth1_to_hsr\x00'}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x4e23, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x106, 0x1}}, 0x20) 21:55:40 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, 0x0) 21:55:40 executing program 0: mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x40000, 0x0) ioctl$UFFDIO_WAKE(r0, 0x8010aa02, &(0x7f0000000040)={&(0x7f000000b000/0x2000)=nil, 0x2000}) 21:55:40 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x4e23, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) 21:55:40 executing program 5: r0 = socket$inet(0x2, 0x805, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x3) 21:55:41 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x0, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) 21:55:41 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, 0x0) ioctl$KVM_TRANSLATE(r3, 0xc018ae85, 0x0) syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x10001, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x200000000000000, 0x0) r6 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x0, 0x23c}, 0xfffffffffffffed6) ioctl$KVM_SET_USER_MEMORY_REGION(r6, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil}) ioctl$RTC_ALM_READ(r1, 0x80247008, &(0x7f00000001c0)) r7 = ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000340)={&(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f00000002c0)="69758abac5e29a7ed0897840255d0fc9a1ad703db11e68c9e90df3017136a85de26bd81af7745f01fa4f5a9eb68db26681ed3e1eca501e00d2430d561ede79401f7bf06fcdb038f501357e7bc0cd64c97e6e54152f535597aaae87bad3bbfe413000b47429ae67ae7ca8c536c935", 0x6e, r4}, 0x68) ioctl$KVM_SET_USER_MEMORY_REGION(r6, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r8 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r8) ioctl$KVM_SET_REGS(r7, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2c, &(0x7f0000000000)="d22f7be5e7b72ccad7f1f4c8", 0xc) 21:55:41 executing program 0: r0 = signalfd(0xffffffffffffff9c, &(0x7f0000000000)={0x1ff}, 0x8) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x50, r0, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:55:41 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000200)={{0x2, 0x0, @empty}, {0x0, @local}, 0x0, {0x2, 0x0, @dev}, 'veth1_to_hsr\x00'}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x4e23, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x106, 0x1}}, 0x20) 21:55:41 executing program 5: r0 = socket$inet(0x2, 0x805, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x20000084) 21:55:41 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000180)={{0x2, 0x4e23, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) 21:55:41 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x0, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) 21:55:41 executing program 0: mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000006000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x20004) r0 = add_key$keyring(&(0x7f0000001100)='keyring\x00', &(0x7f0000001140)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r0, 0x0, 0x0) keyctl$get_persistent(0x16, 0x0, r0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:55:41 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000200)={{0x2, 0x0, @empty}, {0x0, @local}, 0x0, {0x2, 0x0, @dev}, 'veth1_to_hsr\x00'}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x4e23, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x106, 0x1}}, 0x20) 21:55:41 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000180)={{0x2, 0x4e23, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) 21:55:41 executing program 5: r0 = socket$inet(0x2, 0x805, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x2200, 0x0) ioctl$KVM_SET_ONE_REG(r1, 0x4010aeac, &(0x7f0000000040)={0x2, 0x5}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0xc) migrate_pages(r2, 0x2, &(0x7f0000000180)=0x80, &(0x7f00000001c0)=0x7) gettid() getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 21:55:41 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x0, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) 21:55:41 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000200)={{0x2, 0x0, @empty}, {0x0, @local}, 0x0, {0x2, 0x0, @dev}, 'veth1_to_hsr\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x4e23, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x106, 0x1}}, 0x20) 21:55:41 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, 0x0) ioctl$KVM_TRANSLATE(r3, 0xc018ae85, 0x0) syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x10001, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x200000000000000, 0x0) r6 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x0, 0x23c}, 0xfffffffffffffed6) ioctl$KVM_SET_USER_MEMORY_REGION(r6, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil}) ioctl$RTC_ALM_READ(r1, 0x80247008, &(0x7f00000001c0)) r7 = ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000340)={&(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f00000002c0)="69758abac5e29a7ed0897840255d0fc9a1ad703db11e68c9e90df3017136a85de26bd81af7745f01fa4f5a9eb68db26681ed3e1eca501e00d2430d561ede79401f7bf06fcdb038f501357e7bc0cd64c97e6e54152f535597aaae87bad3bbfe413000b47429ae67ae7ca8c536c935", 0x6e, r4}, 0x68) ioctl$KVM_SET_USER_MEMORY_REGION(r6, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r8 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r8) ioctl$KVM_SET_REGS(r7, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2c, &(0x7f0000000000)="d22f7be5e7b72ccad7f1f4c8", 0xc) 21:55:41 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000180)={{0x2, 0x4e23, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) 21:55:41 executing program 0: mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x800000000, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:55:41 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x4e23, @loopback}, {0x0, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) 21:55:42 executing program 5: r0 = socket$inet(0x2, 0x805, 0x10000) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x40, 0x0) ioctl$VHOST_SET_FEATURES(r1, 0x4008af00, &(0x7f0000000040)=0x10400801c) 21:55:42 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000200)={{0x2, 0x0, @empty}, {0x0, @local}, 0x0, {0x2, 0x0, @dev}, 'veth1_to_hsr\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x4e23, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x106, 0x1}}, 0x20) 21:55:42 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, 0x0) 21:55:42 executing program 0: mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$audion(&(0x7f00000001c0)='/dev/audio#\x00', 0x2, 0x4002) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000200)=r0, 0x4) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x80, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000040)={0x0, @in6={{0xa, 0x4e21, 0x1, @mcast2, 0x200}}, 0x8000, 0xff}, &(0x7f0000000100)=0x88) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dlm-control\x00', 0x10000, 0x0) write$P9_RSETATTR(r0, &(0x7f00000002c0)={0x7, 0x1b, 0x1}, 0x7) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000140)={0x100000000, 0x1, 0x5, 0xf44, r2}, &(0x7f0000000180)=0x10) syz_open_dev$midi(&(0x7f0000000280)='/dev/midi#\x00', 0x9, 0x400000) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:55:42 executing program 5: r0 = socket$inet(0x2, 0x803, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x54ecc2dc, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000100)={0x0, @in={{0x2, 0x4e21, @loopback}}}, &(0x7f00000001c0)=0x84) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000200)={r2, 0x5, 0x30}, &(0x7f0000000240)=0xc) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000040)) ioctl$VIDIOC_DV_TIMINGS_CAP(r1, 0xc0905664, &(0x7f0000000280)={0x0, 0x0, [], @bt={0x6, 0x6, 0xffffffffffffff80, 0xfffffffffffff2df, 0x0, 0x7, 0x2, 0xd}}) 21:55:42 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x4e23, @loopback}, {0x0, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) 21:55:42 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000200)={{0x2, 0x0, @empty}, {0x0, @local}, 0x0, {0x2, 0x0, @dev}, 'veth1_to_hsr\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x4e23, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x106, 0x1}}, 0x20) 21:55:42 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, 0x0) 21:55:42 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000200)={{0x2, 0x0, @empty}, {0x0, @local}, 0x0, {0x2, 0x0, @dev}, 'veth1_to_hsr\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x4e23, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x106, 0x1}}, 0x20) 21:55:42 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, 0x0) ioctl$KVM_TRANSLATE(r3, 0xc018ae85, 0x0) syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x10001, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x200000000000000, 0x0) r6 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x0, 0x23c}, 0xfffffffffffffed6) ioctl$KVM_SET_USER_MEMORY_REGION(r6, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil}) ioctl$RTC_ALM_READ(r1, 0x80247008, &(0x7f00000001c0)) ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000340)={&(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f00000002c0)="69758abac5e29a7ed0897840255d0fc9a1ad703db11e68c9e90df3017136a85de26bd81af7745f01fa4f5a9eb68db26681ed3e1eca501e00d2430d561ede79401f7bf06fcdb038f501357e7bc0cd64c97e6e54152f535597aaae87bad3bbfe413000b47429ae67ae7ca8c536c935", 0x6e, r4}, 0x68) ioctl$KVM_SET_USER_MEMORY_REGION(r6, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r7 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r1, 0x4c80, r7) r8 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r8, 0x0, 0x2c, &(0x7f0000000000)="d22f7be5e7b72ccad7f1f4c8", 0xc) 21:55:42 executing program 0: mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x3, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000001000/0x600000)=nil, 0x600000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vcs\x00', 0x40482, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(r0, 0xc004ae02, &(0x7f00000002c0)={0x1, [0x0]}) r1 = request_key(&(0x7f0000000140)='id_legacy\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='@\x00', 0x0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)="9256d9304113ff0b2b9d1d1cb082e85e458e7631bca1164c4702c2bc4bfff59e1fe2a46fc18980218ca1f52b0d501865fa5ab2dcecd3a1174e09a35c44d141886a4f521c549c409b7203f5079cf4827bfaf75f19e41a48eccf96fea33841d35f39c64b847423af89dd94e3d0aee02dc39a2bc93d06accac66695eb49114c722db477b89438985ca573fbfc8eda202c8ad44b413b3d", 0x95, r1) r2 = syz_open_dev$admmidi(&(0x7f0000000200)='/dev/admmidi#\x00', 0x40, 0x20400) write$P9_RREMOVE(r2, &(0x7f0000000240)={0x7, 0x7b, 0x1}, 0x7) 21:55:42 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x4e23, @loopback}, {0x0, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) 21:55:42 executing program 5: r0 = socket$inet(0x2, 0x805, 0x3f) ioctl$IOC_PR_RELEASE(r0, 0x401070ca, &(0x7f0000000000)={0xe5, 0x3}) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 21:55:42 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000200)={{0x2, 0x0, @empty}, {0x0, @local}, 0x0, {0x2, 0x0, @dev}, 'veth1_to_hsr\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x4e23, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x106, 0x1}}, 0x20) 21:55:42 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, 0x0) 21:55:42 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x400, 0x80) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, r0, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) r1 = dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x80000) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffff9c, 0xc010640b, &(0x7f0000000000)={0x0, 0x0, 0x9}) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffff9c, 0xc008640a, &(0x7f0000000040)={0x0}) ioctl$DRM_IOCTL_GEM_OPEN(r1, 0xc010640b, &(0x7f0000000180)={r2, r3, 0x200}) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @local, 0x1}, 0x1c) 21:55:43 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x4e23, @loopback}, {0x20000000304, @remote}, 0x0, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) 21:55:43 executing program 5: r0 = socket$inet(0x2, 0x0, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000000), &(0x7f0000000040)=0x4) syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x20de6ef8, 0xc80) 21:55:43 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x0, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) 21:55:43 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000200)={{0x2, 0x0, @empty}, {0x0, @local}, 0x0, {0x2, 0x0, @dev}, 'veth1_to_hsr\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x4e23, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x106, 0x1}}, 0x20) 21:55:43 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x4e23, @loopback}, {0x20000000304, @remote}, 0x0, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) 21:55:43 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, 0x0) ioctl$KVM_TRANSLATE(r3, 0xc018ae85, 0x0) syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x10001, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x200000000000000, 0x0) r6 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x0, 0x23c}, 0xfffffffffffffed6) ioctl$KVM_SET_USER_MEMORY_REGION(r6, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil}) ioctl$RTC_ALM_READ(r1, 0x80247008, &(0x7f00000001c0)) ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000340)={&(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f00000002c0)="69758abac5e29a7ed0897840255d0fc9a1ad703db11e68c9e90df3017136a85de26bd81af7745f01fa4f5a9eb68db26681ed3e1eca501e00d2430d561ede79401f7bf06fcdb038f501357e7bc0cd64c97e6e54152f535597aaae87bad3bbfe413000b47429ae67ae7ca8c536c935", 0x6e, r4}, 0x68) ioctl$KVM_SET_USER_MEMORY_REGION(r6, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r7 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r7, 0x0, 0x2c, &(0x7f0000000000)="d22f7be5e7b72ccad7f1f4c8", 0xc) 21:55:43 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mmap(&(0x7f0000008000/0x2000)=nil, 0x2000, 0x1, 0x1b076, r0, 0x55) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:55:43 executing program 5: r0 = socket$inet(0x2, 0x806, 0xfffffffffffffffd) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 21:55:43 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x4e23, @loopback}, {0x20000000304, @remote}, 0x0, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) 21:55:43 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000200)={{0x2, 0x0, @empty}, {0x0, @local}, 0x0, {0x2, 0x0, @dev}, 'veth1_to_hsr\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x4e23, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x106, 0x1}}, 0x20) 21:55:43 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x0, @loopback}, {0x0, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) 21:55:43 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x2, 0x0) prctl$PR_SVE_GET_VL(0x33, 0x19f77) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x88c000a2}, 0xc, &(0x7f0000000200)={&(0x7f00000000c0)={0x13c, r1, 0x1, 0x70bd2c, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DAEMON={0x38, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast2}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x6}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x2}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}]}, @IPVS_CMD_ATTR_DEST={0x3c, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x100}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@mcast1}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@multicast1}, @IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e24}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7f}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfff}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x4}, @IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast2}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x9}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x3}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @rand_addr=0x7c}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @local}]}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x7f}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}, @IPVS_CMD_ATTR_DAEMON={0x34, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @local}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth1\x00'}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x24000090}, 0xd0) setsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, &(0x7f0000000340)=0x5, 0x2) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000300)='/dev/sequencer\x00', 0x404000, 0x0) rt_sigprocmask(0x2, &(0x7f0000000280)={0xfffffffffffffffc}, &(0x7f00000002c0), 0x8) 21:55:43 executing program 5: r0 = socket$inet(0x2, 0x20805, 0x200000000000000) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 21:55:44 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x0, @loopback}, {0x0, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) 21:55:44 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, 0x0) ioctl$KVM_TRANSLATE(r3, 0xc018ae85, 0x0) syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x10001, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x200000000000000, 0x0) r6 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x0, 0x23c}, 0xfffffffffffffed6) ioctl$KVM_SET_USER_MEMORY_REGION(r6, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil}) ioctl$RTC_ALM_READ(r1, 0x80247008, &(0x7f00000001c0)) ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000340)={&(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f00000002c0)="69758abac5e29a7ed0897840255d0fc9a1ad703db11e68c9e90df3017136a85de26bd81af7745f01fa4f5a9eb68db26681ed3e1eca501e00d2430d561ede79401f7bf06fcdb038f501357e7bc0cd64c97e6e54152f535597aaae87bad3bbfe413000b47429ae67ae7ca8c536c935", 0x6e, r4}, 0x68) ioctl$KVM_SET_USER_MEMORY_REGION(r6, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r7 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r7, 0x0, 0x2c, &(0x7f0000000000)="d22f7be5e7b72ccad7f1f4c8", 0xc) 21:55:44 executing program 0: mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3}, 0x2c) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x33c) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0xdb}, 0x2c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x127) close(r1) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x1000006, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:55:44 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000200)={{0x2, 0x0, @empty}, {0x0, @local}, 0x0, {0x2, 0x0, @dev}, 'veth1_to_hsr\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000180)={{0x2, 0x4e23, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x106, 0x1}}, 0x20) 21:55:44 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000200)={{0x2, 0x0, @empty}, {0x0, @local}, 0x0, {0x2, 0x0, @dev}, 'veth1_to_hsr\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x4e23, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x106, 0x1}}, 0x20) 21:55:44 executing program 5: r0 = socket$inet(0x2, 0x0, 0x3f) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x96) r1 = fcntl$dupfd(r0, 0x406, r0) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000000)={0x3ff, 0x4, 0x1000, 0x4, 0x46}) 21:55:44 executing program 0: mmap(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x2, &(0x7f0000001000/0x3000)=nil) 21:55:44 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000200)={{0x2, 0x0, @empty}, {0x0, @local}, 0x0, {0x2, 0x0, @dev}, 'veth1_to_hsr\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000180)={{0x2, 0x4e23, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x106, 0x1}}, 0x20) 21:55:44 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x0, @loopback}, {0x0, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) 21:55:44 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000200)={{0x2, 0x0, @empty}, {0x0, @local}, 0x0, {0x2, 0x0, @dev}, 'veth1_to_hsr\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000180)={{0x2, 0x4e23, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x106, 0x1}}, 0x20) 21:55:44 executing program 0: mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x200000, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:55:44 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000200)={{0x2, 0x0, @empty}, {0x0, @local}, 0x0, {0x2, 0x0, @dev}, 'veth1_to_hsr\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000180)={{0x2, 0x4e23, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x106, 0x1}}, 0x20) 21:55:44 executing program 5: r0 = socket$inet(0x2, 0xa, 0x10004) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000140), &(0x7f0000000100)=0x18e) 21:55:44 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, 0x0) ioctl$KVM_TRANSLATE(r3, 0xc018ae85, 0x0) syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x10001, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x200000000000000, 0x0) r6 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x0, 0x23c}, 0xfffffffffffffed6) ioctl$KVM_SET_USER_MEMORY_REGION(r6, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil}) ioctl$RTC_ALM_READ(r1, 0x80247008, &(0x7f00000001c0)) ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000340)={&(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f00000002c0)="69758abac5e29a7ed0897840255d0fc9a1ad703db11e68c9e90df3017136a85de26bd81af7745f01fa4f5a9eb68db26681ed3e1eca501e00d2430d561ede79401f7bf06fcdb038f501357e7bc0cd64c97e6e54152f535597aaae87bad3bbfe413000b47429ae67ae7ca8c536c935", 0x6e, r4}, 0x68) r7 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r7, 0x0, 0x2c, &(0x7f0000000000)="d22f7be5e7b72ccad7f1f4c8", 0xc) 21:55:44 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x0, @loopback}, {0x20000000304, @remote}, 0x0, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) 21:55:44 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, 0x0) ioctl$KVM_TRANSLATE(r3, 0xc018ae85, 0x0) syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x10001, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x200000000000000, 0x0) r6 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x0, 0x23c}, 0xfffffffffffffed6) ioctl$KVM_SET_USER_MEMORY_REGION(r6, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil}) ioctl$RTC_ALM_READ(r1, 0x80247008, &(0x7f00000001c0)) ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000340)={&(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f00000002c0)="69758abac5e29a7ed0897840255d0fc9a1ad703db11e68c9e90df3017136a85de26bd81af7745f01fa4f5a9eb68db26681ed3e1eca501e00d2430d561ede79401f7bf06fcdb038f501357e7bc0cd64c97e6e54152f535597aaae87bad3bbfe413000b47429ae67ae7ca8c536c935", 0x6e, r4}, 0x68) ioctl$KVM_SET_USER_MEMORY_REGION(r6, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r7 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r7, 0x0, 0x2c, &(0x7f0000000000)="d22f7be5e7b72ccad7f1f4c8", 0xc) 21:55:45 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000200)={{0x2, 0x0, @empty}, {0x0, @local}, 0x0, {0x2, 0x0, @dev}, 'veth1_to_hsr\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x106, 0x1}}, 0x20) 21:55:45 executing program 0: r0 = socket$caif_seqpacket(0x25, 0x5, 0x2) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x20000000000001, 0x1b070, r0, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x1000, 0x240000000003, &(0x7f0000003000/0x1000)=nil) 21:55:45 executing program 5: r0 = socket$inet(0x2, 0x805, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x4) memfd_create(&(0x7f0000000000)='keyring]keyringsystem!em0md5sumbdev-\x00', 0x4) 21:55:45 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x0, @loopback}, {0x20000000304, @remote}, 0x0, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) 21:55:45 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000200)={{0x2, 0x0, @empty}, {0x0, @local}, 0x0, {0x2, 0x0, @dev}, 'veth1_to_hsr\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x106, 0x1}}, 0x20) 21:55:45 executing program 0: mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x40800, 0x0) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f0000000040)={0x8, 0xe955}) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:55:45 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200000, 0x0) ioctl$VIDIOC_G_EDID(r0, 0xc0245628, &(0x7f0000000100)={0x0, 0x5, 0xffffffffffff9726, [], &(0x7f0000000040)}) r1 = socket$inet(0x2, 0x805, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 21:55:45 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, 0x0) ioctl$KVM_TRANSLATE(r3, 0xc018ae85, 0x0) syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x10001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x200000000000000, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x0, 0x23c}, 0xfffffffffffffed6) ioctl$KVM_SET_USER_MEMORY_REGION(r5, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil}) ioctl$RTC_ALM_READ(r1, 0x80247008, &(0x7f00000001c0)) ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) r6 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r6, 0x0, 0x2c, &(0x7f0000000000)="d22f7be5e7b72ccad7f1f4c8", 0xc) 21:55:45 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x0, @loopback}, {0x20000000304, @remote}, 0x0, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) 21:55:45 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000200)={{0x2, 0x0, @empty}, {0x0, @local}, 0x0, {0x2, 0x0, @dev}, 'veth1_to_hsr\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x106, 0x1}}, 0x20) 21:55:45 executing program 5: r0 = socket$inet(0x2, 0x805, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) ioctl$DRM_IOCTL_WAIT_VBLANK(r1, 0xc010643a, &(0x7f0000000040)={0x4000000, 0x9, 0x9}) 21:55:45 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x2, 0x0) prctl$PR_SVE_GET_VL(0x33, 0x19f77) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x88c000a2}, 0xc, &(0x7f0000000200)={&(0x7f00000000c0)={0x13c, r1, 0x1, 0x70bd2c, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DAEMON={0x38, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast2}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x6}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x2}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}]}, @IPVS_CMD_ATTR_DEST={0x3c, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x100}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@mcast1}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@multicast1}, @IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e24}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7f}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfff}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x4}, @IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast2}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x9}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x3}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @rand_addr=0x7c}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @local}]}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x7f}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}, @IPVS_CMD_ATTR_DAEMON={0x34, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @local}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth1\x00'}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x24000090}, 0xd0) setsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, &(0x7f0000000340)=0x5, 0x2) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000300)='/dev/sequencer\x00', 0x404000, 0x0) rt_sigprocmask(0x2, &(0x7f0000000280)={0xfffffffffffffffc}, &(0x7f00000002c0), 0x8) 21:55:45 executing program 0: mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x1, 0x2) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffff9c, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x80000001, 0x6, [0x1ff, 0x1ff, 0x9, 0x4, 0xd55, 0x5]}, &(0x7f0000000080)=0x14) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={r1, @in={{0x2, 0x4e24, @loopback}}, 0xc8, 0x1000, 0x2, 0x3, 0x1}, &(0x7f0000000180)=0x98) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:55:45 executing program 4: mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x200000, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:55:45 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000200)={{0x2, 0x0, @empty}, {0x0, @local}, 0x0, {0x2, 0x0, @dev}, 'veth1_to_hsr\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x0, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x106, 0x1}}, 0x20) 21:55:46 executing program 5: r0 = dup(0xffffffffffffffff) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000000), 0x0) r1 = socket$inet(0x2, 0x805, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 21:55:46 executing program 0: mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0xffffffffffffae44, 0x80) ioctl$sock_ifreq(r0, 0x8937, &(0x7f0000000040)={'sit0\x00', @ifru_names='erspan0\x00'}) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:55:46 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, 0x0) ioctl$KVM_TRANSLATE(r3, 0xc018ae85, 0x0) syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x10001, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x200000000000000, 0x0) r6 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x0, 0x23c}, 0xfffffffffffffed6) ioctl$KVM_SET_USER_MEMORY_REGION(r6, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil}) ioctl$RTC_ALM_READ(r1, 0x80247008, &(0x7f00000001c0)) ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000340)={&(0x7f0000000000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f00000002c0)="69758abac5e29a7ed0897840255d0fc9a1ad703db11e68c9e90df3017136a85de26bd81af7745f01fa4f5a9eb68db26681ed3e1eca501e00d2430d561ede79401f7bf06fcdb038f501357e7bc0cd64c97e6e54152f535597aaae87bad3bbfe413000b47429ae67ae7ca8c536c935", 0x6e, r4}, 0x68) ioctl$KVM_SET_USER_MEMORY_REGION(r6, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r7 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r7, 0x0, 0x2c, &(0x7f0000000000)="d22f7be5e7b72ccad7f1f4c8", 0xc) 21:55:46 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, 0x0) ioctl$KVM_TRANSLATE(r3, 0xc018ae85, 0x0) syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x10001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x200000000000000, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="ffe600005a0000010001002f3c520915f0e093471354204740ff167c02e4c537c6140f848d649762246e8de14b5b97cbb2c447527ecc0ec4e8035e9cfb75457f3dfc9951170f9926659d49d65b687571ba11f81e15a0deec1baeaf6855780c6a74289ebde0e0f034765e4d8748aa7f6e2cb342c54b18a644fbf6c499bfe05581bf56b98527b79ebdef414b9037ffff0e2707f589b7f9b92b8c6bb26dffb8390bcdc4dfe81e22e6b5a950826d04a5965b48a082d7615751809a0a0d48c7ffa61b1981fcec0dac462661ecc520ef92d1011ecd199e613841fd0884cfb46548c4e66abfcda9163ae18b37d33be53586384bd4a5596539eb9872808f1afdedc875b18dc62df99b7e45d53a22abb0e05f30b0a2721b50e28b4d9fc97304eebbc385b919a5906c0178a880c7abd3434733749abb89a914bf430e00bd14d5d90eb14cde000000000000008c23888bc98e1f52026452a63d1dc877000000000000000000e6ebcf3aa3caad650f7c231f36c458e111944544166d25658bbb5eddc3b9941738f122f15a9a7814d4a3387682370f5cdae68a9ffa3a3fecd792ec645a159cb24337a93e3572e02e26a4179fbb0f9d31e407330f0ea31e2bfc78b21f1cbfba290a7fe812832b186876289c86f1f5b8317f1977f01aae434a06db60afcea8fa3c3ae2daf67cdc3f1f3ff1517cac67b647403d46b26341c6e2b46a9f425ddc750a10184d61b03b37b6a5f8f1a20e5dcc1b4fd5395355aecd27ad06c29d722b68ae5de3d9350500a0cc966efb27afd1d9010e4fba13e2a1cff0a6f2399c68230a97a1342d296485709a3bf12ced"], 0x0, 0x23c}, 0xfffffffffffffed6) ioctl$KVM_SET_USER_MEMORY_REGION(r5, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil}) ioctl$RTC_ALM_READ(r1, 0x80247008, &(0x7f00000001c0)) r6 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r6, 0x0, 0x2c, &(0x7f0000000000)="d22f7be5e7b72ccad7f1f4c8", 0xc) 21:55:46 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x2, 0x0) prctl$PR_SVE_GET_VL(0x33, 0x19f77) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x88c000a2}, 0xc, &(0x7f0000000200)={&(0x7f00000000c0)={0x13c, r1, 0x1, 0x70bd2c, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DAEMON={0x38, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast2}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x6}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x2}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}]}, @IPVS_CMD_ATTR_DEST={0x3c, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x100}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@mcast1}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@multicast1}, @IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e24}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7f}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfff}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x4}, @IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast2}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x9}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x3}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @rand_addr=0x7c}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @local}]}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x7f}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}, @IPVS_CMD_ATTR_DAEMON={0x34, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @local}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth1\x00'}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x24000090}, 0xd0) setsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, &(0x7f0000000340)=0x5, 0x2) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000300)='/dev/sequencer\x00', 0x404000, 0x0) rt_sigprocmask(0x2, &(0x7f0000000280)={0xfffffffffffffffc}, &(0x7f00000002c0), 0x8) 21:55:46 executing program 5: r0 = socket$inet(0x2, 0x2000801, 0x0) r1 = dup2(r0, r0) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000040)={0x4e7351a1, 0x9}) r2 = inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x80000801) inotify_rm_watch(r1, r2) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 21:55:46 executing program 0: pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4800) mmap(&(0x7f0000008000/0x3000)=nil, 0x3000, 0x2000000, 0x1b071, r0, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:55:46 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000200)={{0x2, 0x0, @empty}, {0x0, @local}, 0x0, {0x2, 0x0, @dev}, 'veth1_to_hsr\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x0, @loopback}, {0x0, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x106, 0x1}}, 0x20) 21:55:46 executing program 0: mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000, 0x20000000000043, &(0x7f0000ffa000/0x3000)=nil) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000080)=0x80, 0x800) bind$isdn_base(r0, &(0x7f00000000c0)={0x22, 0x6, 0x5, 0x5, 0x1}, 0x6) 21:55:46 executing program 5: r0 = socket$inet(0x2, 0x805, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x4) setsockopt$inet_tcp_int(r0, 0x6, 0xd, &(0x7f0000000040)=0x4, 0x4) syz_genetlink_get_family_id$nbd(&(0x7f0000000000)='nbd\x00') 21:55:46 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000200)={{0x2, 0x0, @empty}, {0x0, @local}, 0x0, {0x2, 0x0, @dev}, 'veth1_to_hsr\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x0, @loopback}, {0x0, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x106, 0x1}}, 0x20) 21:55:46 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x2, 0x0) prctl$PR_SVE_GET_VL(0x33, 0x19f77) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x88c000a2}, 0xc, &(0x7f0000000200)={&(0x7f00000000c0)={0x13c, r1, 0x1, 0x70bd2c, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DAEMON={0x38, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast2}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x6}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x2}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}]}, @IPVS_CMD_ATTR_DEST={0x3c, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x100}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@mcast1}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@multicast1}, @IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e24}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7f}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfff}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x4}, @IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast2}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x9}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x3}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @rand_addr=0x7c}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @local}]}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x7f}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}, @IPVS_CMD_ATTR_DAEMON={0x34, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @local}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth1\x00'}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x24000090}, 0xd0) setsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, &(0x7f0000000340)=0x5, 0x2) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000300)='/dev/sequencer\x00', 0x404000, 0x0) rt_sigprocmask(0x2, &(0x7f0000000280)={0xfffffffffffffffc}, &(0x7f00000002c0), 0x8) 21:55:46 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, 0x0) ioctl$KVM_TRANSLATE(r2, 0xc018ae85, 0x0) syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x10001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x200000000000000, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x0, 0x23c}, 0xfffffffffffffed6) ioctl$KVM_SET_USER_MEMORY_REGION(r4, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil}) r5 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r5, 0x0, 0x2c, &(0x7f0000000000)="d22f7be5e7b72ccad7f1f4c8", 0xc) 21:55:46 executing program 0: mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x100, 0x0) ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0186415, &(0x7f0000000040)={&(0x7f0000008000/0x1000)=nil, 0x5, 0x7, 0x80, &(0x7f0000008000/0x3000)=nil, 0x7ff}) 21:55:47 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, 0x0) ioctl$KVM_TRANSLATE(r3, 0xc018ae85, 0x0) syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x10001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x200000000000000, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x0, 0x23c}, 0xfffffffffffffed6) ioctl$KVM_SET_USER_MEMORY_REGION(r5, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil}) ioctl$RTC_ALM_READ(r1, 0x80247008, &(0x7f00000001c0)) r6 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r6, 0x0, 0x2c, &(0x7f0000000000)="d22f7be5e7b72ccad7f1f4c8", 0xc) 21:55:47 executing program 5: r0 = socket$inet(0x2, 0x805, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x400, 0x0) getsockopt$XDP_STATISTICS(r1, 0x11b, 0x7, &(0x7f0000000040), &(0x7f0000000100)=0x18) 21:55:47 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000200)={{0x2, 0x0, @empty}, {0x0, @local}, 0x0, {0x2, 0x0, @dev}, 'veth1_to_hsr\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x0, @loopback}, {0x0, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x106, 0x1}}, 0x20) 21:55:47 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x2, 0x0) prctl$PR_SVE_GET_VL(0x33, 0x19f77) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x88c000a2}, 0xc, &(0x7f0000000200)={&(0x7f00000000c0)={0x13c, r1, 0x1, 0x70bd2c, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DAEMON={0x38, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast2}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x6}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x2}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}]}, @IPVS_CMD_ATTR_DEST={0x3c, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x100}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@mcast1}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@multicast1}, @IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e24}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7f}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfff}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x4}, @IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast2}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x9}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x3}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @rand_addr=0x7c}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @local}]}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x7f}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}, @IPVS_CMD_ATTR_DAEMON={0x34, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @local}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth1\x00'}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x24000090}, 0xd0) setsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, &(0x7f0000000340)=0x5, 0x2) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x2, &(0x7f0000000280)={0xfffffffffffffffc}, &(0x7f00000002c0), 0x8) 21:55:47 executing program 0: mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/icmp\x00') ioctl$VIDIOC_SUBDEV_G_FRAME_INTERVAL(r0, 0xc0305615, &(0x7f0000000040)={0x0, {0x3, 0x4}}) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r0, 0x40a45321, &(0x7f00000000c0)={{0x8001, 0x87e7}, 'port0\x00', 0xe8, 0x80000, 0x3f, 0x9, 0x1000, 0x0, 0x6, 0x0, 0x4, 0x56}) ioctl$DRM_IOCTL_ADD_BUFS(r0, 0xc0186416, &(0x7f0000000080)={0x0, 0xf603, 0x10000, 0x9, 0x2, 0x3}) prctl$PR_SET_SECUREBITS(0x1c, 0x4) ioctl$SCSI_IOCTL_SYNC(r0, 0x4) 21:55:47 executing program 5: mq_unlink(&(0x7f0000000000)='\x00') r0 = socket$inet(0x2, 0x805, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 21:55:47 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x2, 0x0) prctl$PR_SVE_GET_VL(0x33, 0x19f77) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x88c000a2}, 0xc, &(0x7f0000000200)={&(0x7f00000000c0)={0x13c, r1, 0x1, 0x70bd2c, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DAEMON={0x38, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast2}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x6}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x2}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}]}, @IPVS_CMD_ATTR_DEST={0x3c, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x100}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@mcast1}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@multicast1}, @IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e24}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7f}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfff}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x4}, @IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast2}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x9}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x3}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @rand_addr=0x7c}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @local}]}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x7f}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}, @IPVS_CMD_ATTR_DAEMON={0x34, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @local}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth1\x00'}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x24000090}, 0xd0) setsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, &(0x7f0000000340)=0x5, 0x2) rt_sigprocmask(0x2, &(0x7f0000000280)={0xfffffffffffffffc}, &(0x7f00000002c0), 0x8) 21:55:47 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000200)={{0x2, 0x0, @empty}, {0x0, @local}, 0x0, {0x2, 0x0, @dev}, 'veth1_to_hsr\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x0, @loopback}, {0x20000000304, @remote}, 0x0, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x106, 0x1}}, 0x20) 21:55:47 executing program 5: r0 = socket$inet(0x2, 0x805, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000140), &(0x7f0000000180)=0x4) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x4) setsockopt$inet_dccp_buf(r0, 0x21, 0xc2, &(0x7f0000000300)="3d0b2cd5e4fe181c8a7062b0b04d6cc625d38ddfc8bfaa69d69a01a0deeed2acef9d1ddc294d521d9c2e74555cca8cfbeb24d9f957b70018ffb56042c8eb95adeadc09b5e7a9db75a671b1ef2c3738ccd30ce125a07471d6641ecea76671822691eaa656f8a87d2e118871b768cd2ddf5b46980e19dde21961b7af54728a21c78fc3d653497b4f29ee8abc5e21924b240231c07f55c83420ab7a9a95ce96ee8fd8cc8731f4436c4df83c031bca823c5631ba5b0158e611ed478d3ac125f110e9d318efdfd6a12222db88662d29392d43bf3eb57a25d59684d13eb782b223d99c05000500e2b058e2", 0xcc) 21:55:47 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000200)={{0x2, 0x0, @empty}, {0x0, @local}, 0x0, {0x2, 0x0, @dev}, 'veth1_to_hsr\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x0, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x106, 0x1}}, 0x20) 21:55:47 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, 0x0) ioctl$KVM_TRANSLATE(r2, 0xc018ae85, 0x0) syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x10001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x200000000000000, 0x0) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x0, 0x23c}, 0xfffffffffffffed6) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r4, 0x0, 0x2c, &(0x7f0000000000)="d22f7be5e7b72ccad7f1f4c8", 0xc) 21:55:47 executing program 0: mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) r0 = accept4$vsock_stream(0xffffffffffffff9c, &(0x7f0000000000)={0x28, 0x0, 0x0, @hyper}, 0x10, 0x800) r1 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x3, 0x2) ioctl$UFFDIO_ZEROPAGE(r1, 0xc020aa04, &(0x7f00000000c0)={{&(0x7f0000004000/0x1000)=nil, 0x1000}}) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000180)=0xc, 0xfffffffffffffee4) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000100)) setsockopt$inet6_MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f00000001c0)={{0xa, 0x4e22, 0x70a7, @dev={0xfe, 0x80, [], 0xf}, 0xff}, {0xa, 0x4e23, 0x2, @dev={0xfe, 0x80, [], 0x21}}, 0x1, [0x2, 0x2, 0x0, 0x5, 0x9, 0x95, 0x4, 0x1]}, 0x5c) 21:55:47 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000200)={{0x2, 0x0, @empty}, {0x0, @local}, 0x0, {0x2, 0x0, @dev}, 'veth1_to_hsr\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x0, @loopback}, {0x20000000304, @remote}, 0x0, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x106, 0x1}}, 0x20) 21:55:47 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x2, 0x0) prctl$PR_SVE_GET_VL(0x33, 0x19f77) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x88c000a2}, 0xc, &(0x7f0000000200)={&(0x7f00000000c0)={0x13c, r1, 0x1, 0x70bd2c, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DAEMON={0x38, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast2}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x6}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x2}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}]}, @IPVS_CMD_ATTR_DEST={0x3c, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x100}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@mcast1}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@multicast1}, @IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e24}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7f}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfff}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x4}, @IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast2}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x9}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x3}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @rand_addr=0x7c}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @local}]}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x7f}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}, @IPVS_CMD_ATTR_DAEMON={0x34, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @local}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth1\x00'}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x24000090}, 0xd0) rt_sigprocmask(0x2, &(0x7f0000000280)={0xfffffffffffffffc}, &(0x7f00000002c0), 0x8) 21:55:47 executing program 5: r0 = socket$inet(0x2, 0x805, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x2, 0x80) ioctl$RTC_IRQP_SET(r1, 0x4004700c, 0x1bc0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r2, 0x300, 0x70bd29, 0x25dfdbff, {}, ["", "", "", "", ""]}, 0x1c}}, 0x20000000) 21:55:48 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x2, 0x0) prctl$PR_SVE_GET_VL(0x33, 0x19f77) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x88c000a2}, 0xc, &(0x7f0000000200)={&(0x7f00000000c0)={0x13c, r1, 0x1, 0x70bd2c, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DAEMON={0x38, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast2}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x6}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x2}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}]}, @IPVS_CMD_ATTR_DEST={0x3c, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x100}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@mcast1}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@multicast1}, @IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e24}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7f}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfff}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x4}, @IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast2}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x9}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x3}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @rand_addr=0x7c}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @local}]}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x7f}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}, @IPVS_CMD_ATTR_DAEMON={0x34, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @local}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth1\x00'}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x24000090}, 0xd0) setsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, &(0x7f0000000340)=0x5, 0x2) rt_sigprocmask(0x2, &(0x7f0000000280)={0xfffffffffffffffc}, &(0x7f00000002c0), 0x8) 21:55:48 executing program 0: mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x740, 0x8}, 0xff36) r1 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @local}, &(0x7f0000000080)=0x1c, 0x80800) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000001200)={r0, &(0x7f00000001c0)="5bf2b3d6", &(0x7f0000000200)=""/4096}, 0x18) signalfd(r0, &(0x7f0000000180)={0x6}, 0x8) openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x101082, 0x0) accept4$inet6(r1, &(0x7f0000001240), &(0x7f0000001280)=0x1c, 0x80800) r2 = dup3(r0, r1, 0x80000) getsockopt$inet6_udp_int(r2, 0x11, 0x65, &(0x7f0000000100), &(0x7f0000000140)=0x4) 21:55:48 executing program 2: openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x2, 0x0) prctl$PR_SVE_GET_VL(0x33, 0x19f77) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') rt_sigprocmask(0x2, &(0x7f0000000280)={0xfffffffffffffffc}, &(0x7f00000002c0), 0x8) 21:55:48 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000200)={{0x2, 0x0, @empty}, {0x0, @local}, 0x0, {0x2, 0x0, @dev}, 'veth1_to_hsr\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x0, @loopback}, {0x20000000304, @remote}, 0x0, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x106, 0x1}}, 0x20) 21:55:48 executing program 5: r0 = socket$inet(0x2, 0x400000000000a, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x200000, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(r1, 0xc040564b, &(0x7f0000000100)={0x4000000, 0x0, 0x3001, 0x8, 0x7, {0x1, 0x2}}) ioctl$VIDIOC_STREAMOFF(r1, 0x40045613, &(0x7f0000000040)=0x1) 21:55:48 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, 0x0) ioctl$KVM_TRANSLATE(r2, 0xc018ae85, 0x0) syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x10001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x200000000000000, 0x0) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r4, 0x0, 0x2c, &(0x7f0000000000)="d22f7be5e7b72ccad7f1f4c8", 0xc) 21:55:48 executing program 2: openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x2, 0x0) prctl$PR_SVE_GET_VL(0x33, 0x19f77) rt_sigprocmask(0x2, &(0x7f0000000280)={0xfffffffffffffffc}, &(0x7f00000002c0), 0x8) 21:55:48 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x2, 0x0) prctl$PR_SVE_GET_VL(0x33, 0x19f77) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x88c000a2}, 0xc, &(0x7f0000000200)={&(0x7f00000000c0)={0x13c, r1, 0x1, 0x70bd2c, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DAEMON={0x38, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast2}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x6}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x2}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}]}, @IPVS_CMD_ATTR_DEST={0x3c, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x100}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@mcast1}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@multicast1}, @IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e24}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7f}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfff}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x4}, @IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast2}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x9}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x3}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @rand_addr=0x7c}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @local}]}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x7f}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}, @IPVS_CMD_ATTR_DAEMON={0x34, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @local}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth1\x00'}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x24000090}, 0xd0) setsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, &(0x7f0000000340)=0x5, 0x2) rt_sigprocmask(0x2, &(0x7f0000000280)={0xfffffffffffffffc}, &(0x7f00000002c0), 0x8) 21:55:48 executing program 0: mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0xb282, 0x1) 21:55:48 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000200)={{0x2, 0x0, @empty}, {0x0, @local}, 0x0, {0x2, 0x0, @dev}, 'veth1_to_hsr\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x0, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, 0x0, 0x0) 21:55:48 executing program 2: openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x2, 0x0) rt_sigprocmask(0x2, &(0x7f0000000280)={0xfffffffffffffffc}, &(0x7f00000002c0), 0x8) 21:55:48 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x48, &(0x7f0000000540)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) r1 = socket$inet(0x2, 0x805, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000140), &(0x7f0000000180)=0x4) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x101000, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0106434, &(0x7f0000000040)={0x1, 0x0, 0x1, 0x200}) ioctl$DRM_IOCTL_AGP_BIND(r2, 0x40086436, &(0x7f0000000100)={r3, 0x25}) 21:55:48 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r3, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r4, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_CREATE(r6, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r6, &(0x7f0000000040), 0x4) fsetxattr$trusted_overlay_origin(r3, &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x2) write$UHID_DESTROY(r6, &(0x7f00000000c0), 0x4) ioctl$VIDIOC_S_CTRL(r5, 0xc008561c, &(0x7f0000000100)={0x3}) write$FUSE_LK(r4, 0x0, 0x0) unshare(0x40000000) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r5, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:55:48 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000200)={{0x2, 0x0, @empty}, {0x0, @local}, 0x0, {0x2, 0x0, @dev}, 'veth1_to_hsr\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x0, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, 0x0, 0x0) 21:55:48 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x2, 0x0) prctl$PR_SVE_GET_VL(0x33, 0x19f77) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x88c000a2}, 0xc, &(0x7f0000000200)={&(0x7f00000000c0)={0x13c, r1, 0x1, 0x70bd2c, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DAEMON={0x38, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast2}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x6}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x2}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}]}, @IPVS_CMD_ATTR_DEST={0x3c, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x100}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@mcast1}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@multicast1}, @IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e24}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7f}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfff}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x4}, @IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast2}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x9}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x3}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @rand_addr=0x7c}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @local}]}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x7f}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}, @IPVS_CMD_ATTR_DAEMON={0x34, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @local}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth1\x00'}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x24000090}, 0xd0) setsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, &(0x7f0000000340)=0x5, 0x2) rt_sigprocmask(0x2, &(0x7f0000000280)={0xfffffffffffffffc}, &(0x7f00000002c0), 0x8) 21:55:48 executing program 2: rt_sigprocmask(0x2, &(0x7f0000000280)={0xfffffffffffffffc}, &(0x7f00000002c0), 0x8) 21:55:49 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, 0x0) ioctl$KVM_TRANSLATE(r2, 0xc018ae85, 0x0) syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x10001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x200000000000000, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r3, 0x0, 0x2c, &(0x7f0000000000)="d22f7be5e7b72ccad7f1f4c8", 0xc) 21:55:49 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000200)={{0x2, 0x0, @empty}, {0x0, @local}, 0x0, {0x2, 0x0, @dev}, 'veth1_to_hsr\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x0, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, 0x0, 0x0) 21:55:49 executing program 5: r0 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000240)=0x14, 0x80800) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, 0xfffffffffffffffe) r1 = socket$inet(0x2, 0x805, 0x0) read(r1, &(0x7f0000000200)=""/56, 0xfffffe89) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0xbd) getsockopt$inet_opts(r1, 0x0, 0xd, &(0x7f0000000100)=""/215, &(0x7f0000000000)=0xd7) 21:55:49 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x2, 0x0) prctl$PR_SVE_GET_VL(0x33, 0x19f77) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x88c000a2}, 0xc, &(0x7f0000000200)={&(0x7f00000000c0)={0x13c, r1, 0x1, 0x70bd2c, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DAEMON={0x38, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast2}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x6}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x2}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}]}, @IPVS_CMD_ATTR_DEST={0x3c, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x100}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@mcast1}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@multicast1}, @IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e24}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7f}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfff}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x4}, @IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast2}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x9}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x3}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @rand_addr=0x7c}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @local}]}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x7f}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}, @IPVS_CMD_ATTR_DAEMON={0x34, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @local}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth1\x00'}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x24000090}, 0xd0) rt_sigprocmask(0x2, &(0x7f0000000280)={0xfffffffffffffffc}, &(0x7f00000002c0), 0x8) [ 660.080976][ T9270] hid-generic 0000:0000:0000.0007: unknown main item tag 0x0 [ 660.103814][ T9270] hid-generic 0000:0000:0000.0007: hidraw0: HID v0.00 Device [syz1] on syz1 21:55:49 executing program 2: rt_sigprocmask(0x0, &(0x7f0000000280)={0xfffffffffffffffc}, &(0x7f00000002c0), 0x8) [ 660.133576][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 660.139482][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 660.154810][T26065] IPVS: ftp: loaded support on port[0] = 21 21:55:49 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000200)={{0x2, 0x0, @empty}, {0x0, @local}, 0x0, {0x2, 0x0, @dev}, 'veth1_to_hsr\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x0, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x106, 0x1}}, 0x20) 21:55:49 executing program 5: r0 = syz_open_dev$dmmidi(&(0x7f0000000280)='/dev/dmmidi#\x00', 0x6, 0x101000) ioctl$KDGKBDIACR(r0, 0x4b4a, &(0x7f00000002c0)=""/242) r1 = socket$inet(0x2, 0x805, 0xfffffffffffffffd) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x4) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)={0x0, 0x8000}, &(0x7f0000000040)=0x8) setsockopt$IPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x41, &(0x7f0000000140)=ANY=[@ANYBLOB="6d616c6500000012000000000000000000dc00000000edff020000000700000500000000000000000000000000000000000000000000000000000000000000000000000000001000"/120], 0x78) setsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000100)=@assoc_id=r2, 0x4) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cachefiles\x00', 0x0, 0x0) mknod(&(0x7f0000000240)='./file0\x00', 0x420, 0x8) ioctl$UI_BEGIN_FF_ERASE(r0, 0xc00c55ca, &(0x7f00000003c0)={0xf, 0x1, 0x11b5f7d}) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000200)={r2, 0x7}, 0x8) setsockopt$inet6_tcp_buf(r0, 0x6, 0x0, &(0x7f0000000400)="f723675d2e34870e72bd311a60aa5803656c86572d0aa04a26227a5f916a5c43fe8fb84538776bb6a3deb39d0ec968dbc5eb8655494f5fed17a41ba6210fc05ce46ea17f194321aa0b80a4d54d29365af2f0d1a1a847770d785e51c7af7b32e52f72da330e8a19d9455a738f817181ce7213b2569379dbe42a0e1142d14233ce5b158e44faf3000023b0b8056ec74fe3d3db82d252e55c0a80b0aaedb189fd018fd7ebbabbc3eeb20e3c03a56bf21825f4b335056c0bf6061aa04172f3334e81975440e54e0ab0e903c22d6d63638aa1d875ca0c47ed98", 0xd7) 21:55:49 executing program 4: openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x2, 0x0) prctl$PR_SVE_GET_VL(0x33, 0x19f77) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') rt_sigprocmask(0x2, &(0x7f0000000280)={0xfffffffffffffffc}, &(0x7f00000002c0), 0x8) [ 660.373561][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 660.379430][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 660.453546][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 660.459440][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 660.465360][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 660.471163][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 660.742616][T26052] IPVS: ftp: loaded support on port[0] = 21 21:55:52 executing program 0: mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x8, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0xdaf, 0x101001) ioctl$DRM_IOCTL_ADD_BUFS(r0, 0xc0186416, &(0x7f0000000040)={0x401, 0x1b2, 0x101, 0x4, 0x8, 0x80000000}) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) ioctl$KDGKBTYPE(r0, 0x4b33, &(0x7f00000001c0)) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000080)=0x0) ptrace$setregs(0xf, r1, 0xfffffffffffffff7, &(0x7f00000000c0)="807e26f9ed2b2eef7374d14f98d9ac29ecbd8a27ea1b7f410105c36f4d1cde46ef1b39632c893561f1e7e38676bf6d57359a9aba59df7615bbd81b1ff9e18cb6ddec1af7fd6428efd36418c6b24847c38aa20d5a911e6cc2f5663f0f022006735d4e7f30a3ecaea8e8c5ffd8053178dba198fc4ff773f51139856663ac732cdc38a1d81f50602e4bc6bd16713f2d3c99144631ed1afac98ce578428656406f356a80a858406a6f49abdfaf4545d8cbfa26553b7132df968b83544438acf6ea41794a75faab0e3c58b324cff5e389e4f49ec99d6c7076303679cb0055f68bff9f3d2af718aa7a42100ded3d9be4b6") 21:55:52 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, 0x0) ioctl$KVM_TRANSLATE(r2, 0xc018ae85, 0x0) syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x10001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r3, 0x0, 0x2c, &(0x7f0000000000)="d22f7be5e7b72ccad7f1f4c8", 0xc) 21:55:52 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000200)={{0x2, 0x0, @empty}, {0x0, @local}, 0x0, {0x2, 0x0, @dev}, 'veth1_to_hsr\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x0, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x106, 0x1}}, 0x20) 21:55:52 executing program 2: rt_sigprocmask(0x0, 0x0, &(0x7f00000002c0), 0x0) 21:55:52 executing program 5: r0 = socket$inet(0x2, 0x805, 0xfffffffffffffffe) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0xfffffd90) 21:55:52 executing program 4: openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x2, 0x0) prctl$PR_SVE_GET_VL(0x33, 0x19f77) rt_sigprocmask(0x2, &(0x7f0000000280)={0xfffffffffffffffc}, &(0x7f00000002c0), 0x8) 21:55:52 executing program 2: rt_sigprocmask(0x0, 0x0, &(0x7f00000002c0), 0x0) 21:55:52 executing program 5: r0 = socket$inet(0x2, 0x805, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(&(0x7f0000000000), 0x3, 0x1) socket$vsock_dgram(0x28, 0x2, 0x0) 21:55:52 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000200)={{0x2, 0x0, @empty}, {0x0, @local}, 0x0, {0x2, 0x0, @dev}, 'veth1_to_hsr\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x0, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x106, 0x1}}, 0x20) 21:55:52 executing program 4: openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x2, 0x0) rt_sigprocmask(0x2, &(0x7f0000000280)={0xfffffffffffffffc}, &(0x7f00000002c0), 0x8) 21:55:52 executing program 0: mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x1000000, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x2, 0x2) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000040)={0x0, 0x3, 0x800, 0x2}) accept4$packet(r0, &(0x7f0000002c40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002c80)=0x14, 0x80800) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000002cc0)={0x0, 0x0}, &(0x7f0000002d00)=0xc) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000002d40)={{{@in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, @in=@broadcast, 0x4e24, 0x489a, 0x4e22, 0x2, 0xa, 0x20, 0xa0, 0x3b, r1, r2}, {0x1, 0x400, 0x516, 0x9, 0x3f, 0xfffffffffffffff8, 0x8, 0x6}, {0x0, 0xcece, 0x1}, 0x9, 0x6e6bb3, 0x0, 0x1, 0x3, 0x3}, {{@in=@rand_addr=0xb1, 0x4d4, 0x3b}, 0x2, @in=@broadcast, 0x3503, 0x3, 0x3, 0x7, 0xffff, 0x4a3}}, 0xe8) 21:55:52 executing program 2: rt_sigprocmask(0x0, 0x0, &(0x7f00000002c0), 0x0) 21:55:52 executing program 5: r0 = socket$inet(0x2, 0x805, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000140), &(0x7f00000001c0)=0x229) 21:55:52 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, 0x0) ioctl$KVM_TRANSLATE(r2, 0xc018ae85, 0x0) syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x10001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r3, 0x0, 0x2c, &(0x7f0000000000)="d22f7be5e7b72ccad7f1f4c8", 0xc) 21:55:52 executing program 4: rt_sigprocmask(0x2, &(0x7f0000000280)={0xfffffffffffffffc}, &(0x7f00000002c0), 0x8) 21:55:53 executing program 0: mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r0, 0x84, 0x1c, &(0x7f0000000040), &(0x7f0000000080)=0x4) socket$netlink(0x10, 0x3, 0x7) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x200000, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:55:53 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000200)={{0x2, 0x0, @empty}, {0x0, @local}, 0x0, {0x2, 0x0, @dev}, 'veth1_to_hsr\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x0, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, 0x0, 0x106, 0x1}}, 0x20) 21:55:53 executing program 2: rt_sigprocmask(0x0, 0x0, 0x0, 0x0) 21:55:53 executing program 4: rt_sigprocmask(0x0, &(0x7f0000000280)={0xfffffffffffffffc}, &(0x7f00000002c0), 0x8) 21:55:53 executing program 5: r0 = socket$inet(0x2, 0x5, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 21:55:53 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000200)={{0x2, 0x0, @empty}, {0x0, @local}, 0x0, {0x2, 0x0, @dev}, 'veth1_to_hsr\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x0, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, 0x0, 0x106, 0x1}}, 0x20) 21:55:53 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, 0x0) ioctl$KVM_TRANSLATE(r2, 0xc018ae85, 0x0) syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x10001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r3, 0x0, 0x2c, &(0x7f0000000000)="d22f7be5e7b72ccad7f1f4c8", 0xc) 21:55:53 executing program 0: mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x90000, 0x1) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB="40015500", @ANYRES16=r1, @ANYBLOB="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"], 0x140}, 0x1, 0x0, 0x0, 0x20008040}, 0x40080) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:55:53 executing program 2: rt_sigprocmask(0x0, 0x0, 0x0, 0x0) 21:55:53 executing program 5: r0 = socket$inet(0x2, 0x805, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r1 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x10000) sendmsg$nl_generic(r1, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x10c}, 0x1, 0x0, 0x0, 0x20000050}, 0x40) r2 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x100000000, 0x2080) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f00000001c0)=0x5, 0xfffffffffffffdb8) syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) 21:55:53 executing program 4: rt_sigprocmask(0x0, 0x0, &(0x7f00000002c0), 0x0) 21:55:53 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000200)={{0x2, 0x0, @empty}, {0x0, @local}, 0x0, {0x2, 0x0, @dev}, 'veth1_to_hsr\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x0, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, 0x0, 0x106, 0x1}}, 0x20) 21:55:53 executing program 2: rt_sigprocmask(0x0, 0x0, 0x0, 0x0) 21:55:53 executing program 0: mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer2\x00', 0x220000, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f00000001c0)={0xc, 0x8, 0xfa00, {&(0x7f0000000040)}}, 0x10) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:55:53 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, 0x0) ioctl$KVM_TRANSLATE(r2, 0xc018ae85, 0x0) syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x10001, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r3, 0x0, 0x2c, &(0x7f0000000000)="d22f7be5e7b72ccad7f1f4c8", 0xc) 21:55:53 executing program 4: rt_sigprocmask(0x0, 0x0, &(0x7f00000002c0), 0x0) 21:55:53 executing program 5: r0 = socket$inet(0x2, 0x805, 0x0) ioctl$sock_netdev_private(r0, 0x89f9, &(0x7f0000000000)="2ecbe7e8dc8120fee2166122da20448d505723ae345258e403025a3c38f900034fe36357381437c89a6568fef4ea8ed9") getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 21:55:53 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000200)={{0x2, 0x0, @empty}, {0x0, @local}, 0x0, {0x2, 0x0, @dev}, 'veth1_to_hsr\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x0, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x0, 0x1}}, 0x20) 21:55:53 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, 0x0) ioctl$KVM_TRANSLATE(r2, 0xc018ae85, 0x0) syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x10001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r3, 0x0, 0x2c, &(0x7f0000000000)="d22f7be5e7b72ccad7f1f4c8", 0xc) 21:55:54 executing program 4: rt_sigprocmask(0x0, 0x0, &(0x7f00000002c0), 0x0) 21:55:54 executing program 0: mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) 21:55:54 executing program 5: r0 = socket$inet(0x2, 0x805, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x2000, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x4) sendfile(r0, r0, &(0x7f0000000000), 0x948) syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x7f, 0x40000) syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x1, 0x2) 21:55:54 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000200)={{0x2, 0x0, @empty}, {0x0, @local}, 0x0, {0x2, 0x0, @dev}, 'veth1_to_hsr\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x0, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x0, 0x1}}, 0x20) 21:55:54 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, 0x0) ioctl$KVM_TRANSLATE(r2, 0xc018ae85, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r3, 0x0, 0x2c, &(0x7f0000000000)="d22f7be5e7b72ccad7f1f4c8", 0xc) 21:55:54 executing program 4: rt_sigprocmask(0x0, 0x0, 0x0, 0x0) 21:55:54 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, 0x0) ioctl$KVM_TRANSLATE(r2, 0xc018ae85, 0x0) syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x10001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r3, 0x0, 0x2c, &(0x7f0000000000)="d22f7be5e7b72ccad7f1f4c8", 0xc) 21:55:54 executing program 5: r0 = accept4(0xffffffffffffffff, &(0x7f0000000000)=@ipx, &(0x7f0000000080)=0x80, 0x80000) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000000c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="1a00000007000000af9acd0c9cfe01cf690680be590b9c965d932b5154378c09db28fe99aa395c5d839cdd6541af3c46fa760eaa4eda677b2e6953fee31f4660d555eacc718dccad28fe28422e2270416eaf48b233cca73937a3c3b71e408cb1e59ab96187f1b1f1e5a2aaaf7cce2e20c31e8ca4c1a56c3e4fc1b21facfa6ac4a05980aabac5e2ca"], &(0x7f0000000180)=0x22) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f00000001c0)={r1, 0x3}, &(0x7f0000000200)=0x8) socket$inet(0x2, 0x804, 0x0) socket$inet(0x2, 0x807, 0x800) restart_syscall() 21:55:54 executing program 4: rt_sigprocmask(0x0, 0x0, 0x0, 0x0) 21:55:54 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000200)={{0x2, 0x0, @empty}, {0x0, @local}, 0x0, {0x2, 0x0, @dev}, 'veth1_to_hsr\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x0, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)}}, 0x20) 21:55:54 executing program 0: mbind(&(0x7f000000c000/0x2000)=nil, 0x2000, 0x1, &(0x7f0000000000)=0xfffffffffffffffd, 0x4, 0x2) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x7, 0x80000) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in={{0x2, 0x4e20, @loopback}}, 0x6, 0x1, 0x515c4489, 0x800, 0x22}, &(0x7f0000000180)=0x98) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f00000001c0)={r1, 0xf4, "681cc912dabc0b749d8b04986465b2b074f54a3a0e2562bfd9d067a2a7d682ef77c0d9d616cfc10dca00b7225b55c40e974527e2f5dc9092deec6ea75a302658c2be69c65292d56a93e24e3eed1025d53333b86aa4375301fb611ba9e147e6e561a8c9942774e59002cc923c797ed98814ab3c98044f6c08e663d598134dfd05f39bb2c0ac6e7c282002dcb5895b50ec06a56897595bc9905ec9fcc099dc249494ce985d977a415955a59aaa89583bbf7d7b5b730103a27079615ae2588c9883fd71133421157acea86ddb8e8764173fb0b066c475662bcefe47c0ccfc990cb26ac3dde8f221ac9980cee04d0dcdb61b897f4d48"}, &(0x7f00000002c0)=0xfc) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000300)={0x55, 0x1f, 0x5, 0x9, 0x7, 0x4}) fcntl$getownex(r0, 0x10, &(0x7f0000000080)) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f000000e000/0x3000)=nil, 0x3000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:55:54 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r2, 0x0, 0x2c, &(0x7f0000000000)="d22f7be5e7b72ccad7f1f4c8", 0xc) 21:55:54 executing program 4: rt_sigprocmask(0x0, 0x0, 0x0, 0x0) 21:55:54 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000200)={{0x2, 0x0, @empty}, {0x0, @local}, 0x0, {0x2, 0x0, @dev}, 'veth1_to_hsr\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x0, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)}}, 0x20) 21:55:54 executing program 0: r0 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x9, 0x0) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000080)={&(0x7f0000009000/0x2000)=nil, 0x2000}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x3, &(0x7f0000000000)=0x1, 0x5, 0x1) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) mremap(&(0x7f000000c000/0x2000)=nil, 0x2000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:55:54 executing program 5: r0 = socket$inet(0x2, 0x805, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x6, 0x400000) getsockopt$XDP_MMAP_OFFSETS(r1, 0x11b, 0x1, &(0x7f0000000100), &(0x7f0000000040)=0x60) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 21:55:55 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, 0x0) ioctl$KVM_TRANSLATE(r2, 0xc018ae85, 0x0) syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x10001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r3, 0x0, 0x2c, &(0x7f0000000000)="d22f7be5e7b72ccad7f1f4c8", 0xc) 21:55:55 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000200)={{0x2, 0x0, @empty}, {0x0, @local}, 0x0, {0x2, 0x0, @dev}, 'veth1_to_hsr\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x0, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040), 0x0, 0x1}}, 0x20) 21:55:55 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, 0x0) ioctl$KVM_TRANSLATE(r2, 0xc018ae85, 0x0) syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x10001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r3, 0x0, 0x2c, &(0x7f0000000000)="d22f7be5e7b72ccad7f1f4c8", 0xc) 21:55:55 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r2, 0x0, 0x2c, &(0x7f0000000000)="d22f7be5e7b72ccad7f1f4c8", 0xc) 21:55:55 executing program 5: r0 = socket$inet(0x2, 0x805, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) getsockopt$TIPC_CONN_TIMEOUT(r1, 0x10f, 0x82, &(0x7f0000000040), &(0x7f0000000100)=0x4) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 21:55:55 executing program 0: mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm_plock\x00', 0x200, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r0, 0xc0105303, &(0x7f0000000140)={0x701, 0x101, 0x20}) setsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, &(0x7f0000000180)=0xfffffffffffffff9, 0x2) r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x100000000, 0x200) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r1, &(0x7f00000000c0)={0xa, 0x4, 0xfa00, {r2}}, 0xc) 21:55:55 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r2, 0x0, 0x2c, &(0x7f0000000000)="d22f7be5e7b72ccad7f1f4c8", 0xc) 21:55:55 executing program 5: r0 = socket$inet(0x2, 0x805, 0x4000000000) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 21:55:55 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, 0x0) ioctl$KVM_TRANSLATE(r2, 0xc018ae85, 0x0) syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x10001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2c, &(0x7f0000000000)="d22f7be5e7b72ccad7f1f4c8", 0xc) 21:55:55 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000200)={{0x2, 0x0, @empty}, {0x0, @local}, 0x0, {0x2, 0x0, @dev}, 'veth1_to_hsr\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x0, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040), 0x106, 0x1}}, 0x20) 21:55:55 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r2, 0x0, 0x2c, &(0x7f0000000000)="d22f7be5e7b72ccad7f1f4c8", 0xc) 21:55:55 executing program 0: mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:55:55 executing program 5: r0 = socket$inet(0x2, 0x805, 0x0) recvfrom$inet(r0, &(0x7f0000000100)=""/163, 0xa3, 0x0, &(0x7f0000000000)={0x2, 0x4e20, @broadcast}, 0x10) 21:55:55 executing program 4: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r3, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r4, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_CREATE(r6, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r6, &(0x7f0000000040), 0x4) fsetxattr$trusted_overlay_origin(r3, &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x2) write$UHID_DESTROY(r6, &(0x7f00000000c0), 0x4) ioctl$VIDIOC_S_CTRL(r5, 0xc008561c, &(0x7f0000000100)={0x3}) write$FUSE_LK(r4, 0x0, 0x0) unshare(0x40000000) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r5, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:55:55 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r3, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r4, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_CREATE(r6, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r6, &(0x7f0000000040), 0x4) fsetxattr$trusted_overlay_origin(r3, &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x2) write$UHID_DESTROY(r6, &(0x7f00000000c0), 0x4) ioctl$VIDIOC_S_CTRL(r5, 0xc008561c, &(0x7f0000000100)={0x3}) write$FUSE_LK(r4, 0x0, 0x0) unshare(0x40000000) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r5, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:55:55 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, 0x0) ioctl$KVM_TRANSLATE(r2, 0xc018ae85, 0x0) syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x10001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2c, &(0x7f0000000000)="d22f7be5e7b72ccad7f1f4c8", 0xc) 21:55:56 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r1, 0x0, 0x2c, &(0x7f0000000000)="d22f7be5e7b72ccad7f1f4c8", 0xc) 21:55:56 executing program 5: r0 = socket$inet(0x2, 0x0, 0xfffffffffffffefe) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x2, 0x0) ioctl$RNDZAPENTCNT(r1, 0x5204, &(0x7f0000000100)=0x7) 21:55:56 executing program 0: mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) getpgrp(0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:55:56 executing program 5: r0 = socket$inet(0x2, 0x80000, 0x8001) getsockopt$inet_buf(r0, 0x0, 0x35, &(0x7f0000000100)=""/209, &(0x7f0000000000)=0xd1) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x4) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, &(0x7f0000000200)={0x0, @in={{0x2, 0x4e23, @empty}}, 0x100000, 0x8b5}, &(0x7f0000000040)=0x88) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f00000002c0)={r1, 0xb379, 0xfffffffffffffc00, 0x8}, 0x10) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dlm-monitor\x00', 0x100, 0x0) write$USERIO_CMD_REGISTER(r2, &(0x7f0000000380)={0x0, 0x4}, 0x2) 21:55:56 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, 0x0) ioctl$KVM_TRANSLATE(r2, 0xc018ae85, 0x0) syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x10001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2c, &(0x7f0000000000)="d22f7be5e7b72ccad7f1f4c8", 0xc) 21:55:56 executing program 0: remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) gettid() mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:55:56 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r0, 0x0, 0x2c, &(0x7f0000000000)="d22f7be5e7b72ccad7f1f4c8", 0xc) [ 667.332278][ T5] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 667.339914][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 667.339984][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 667.369570][T26346] IPVS: ftp: loaded support on port[0] = 21 [ 667.395095][T26336] IPVS: ftp: loaded support on port[0] = 21 [ 667.413561][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 667.419592][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 667.425543][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 667.431452][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 667.452705][ T5] hid-generic 0000:0000:0000.0008: hidraw0: HID v0.00 Device [syz1] on syz1 21:55:56 executing program 0: mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x2, 0x2) ioctl$SCSI_IOCTL_STOP_UNIT(r0, 0x6) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:55:56 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r0, 0x0, 0x2c, &(0x7f0000000000)="d22f7be5e7b72ccad7f1f4c8", 0xc) 21:55:58 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, 0x0) ioctl$KVM_TRANSLATE(r2, 0xc018ae85, 0x0) syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x10001, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r3, 0x0, 0x2c, &(0x7f0000000000)="d22f7be5e7b72ccad7f1f4c8", 0xc) 21:55:58 executing program 5: r0 = socket$inet(0x2, 0x805, 0x0) getsockname$inet(r0, &(0x7f0000000000)={0x2, 0x0, @loopback}, &(0x7f0000000100)=0x97) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 21:55:58 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x400080, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_PUBL_GET(r0, &(0x7f0000000340)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10400a}, 0xc, &(0x7f0000000300)={&(0x7f00000000c0)={0x23c, r1, 0x12, 0x70bd2a, 0x25dfdbff, {}, [@TIPC_NLA_LINK={0xa0, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100000000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}]}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2528}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x25}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x10000}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_NET={0x54, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x8}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xd6b}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x709}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x10001}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x80000001}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x8}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xff}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xad}]}, @TIPC_NLA_BEARER={0x64, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_NAME={0x18, 0x1, @l2={'eth', 0x3a, 'veth1_to_hsr\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0x4, @mcast1, 0x6}}}}]}, @TIPC_NLA_NET={0x38, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x7}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x2}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x80}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x80000001}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x7fff}]}, @TIPC_NLA_BEARER={0x5c, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x40}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'nlmon0\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x80000001}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'gretap0\x00'}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'bcsh0\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x4}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'sit0\x00'}}]}, @TIPC_NLA_BEARER={0x3c, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x4}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8000}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x7}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'caif0\x00'}}]}]}, 0x23c}, 0x1, 0x0, 0x0, 0x40}, 0x40) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:55:58 executing program 4: remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) gettid() mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:55:58 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r0, 0x0, 0x2c, &(0x7f0000000000)="d22f7be5e7b72ccad7f1f4c8", 0xc) 21:55:58 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r3, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r4, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_CREATE(r6, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r6, &(0x7f0000000040), 0x4) fsetxattr$trusted_overlay_origin(r3, &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x2) write$UHID_DESTROY(r6, &(0x7f00000000c0), 0x4) ioctl$VIDIOC_S_CTRL(r5, 0xc008561c, &(0x7f0000000100)={0x3}) write$FUSE_LK(r4, 0x0, 0x0) unshare(0x40000000) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r5, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:55:58 executing program 1: socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2c, &(0x7f0000000000)="d22f7be5e7b72ccad7f1f4c8", 0xc) 21:55:59 executing program 5: r0 = socket$inet(0x2, 0x3, 0x7) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0xe773, 0x8000) write$FUSE_STATFS(r1, &(0x7f0000000100)={0x60, 0xffffffffffffffda, 0x2, {{0x7, 0x401, 0x9a, 0x80000000, 0x5, 0x0, 0x800, 0x7}}}, 0x60) 21:55:59 executing program 0: mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) r0 = dup(0xffffffffffffff9c) getsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f00000000c0), &(0x7f0000000100)=0x8) r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r1, 0x40605346, &(0x7f0000000040)={0x4, 0x1, {0x2, 0x10000003, 0x4, 0x0, 0x10000}}) 21:55:59 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, 0x0) ioctl$KVM_TRANSLATE(r2, 0xc018ae85, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r3, 0x0, 0x2c, &(0x7f0000000000)="d22f7be5e7b72ccad7f1f4c8", 0xc) 21:55:59 executing program 4: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r3, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r4, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_CREATE(r6, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r6, &(0x7f0000000040), 0x4) fsetxattr$trusted_overlay_origin(r3, &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x2) write$UHID_DESTROY(r6, &(0x7f00000000c0), 0x4) ioctl$VIDIOC_S_CTRL(r5, 0xc008561c, &(0x7f0000000100)={0x3}) write$FUSE_LK(r4, 0x0, 0x0) unshare(0x40000000) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r5, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:55:59 executing program 1: socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2c, &(0x7f0000000000)="d22f7be5e7b72ccad7f1f4c8", 0xc) [ 670.247070][ T5] hid-generic 0000:0000:0000.0009: unknown main item tag 0x0 [ 670.267412][T26405] IPVS: ftp: loaded support on port[0] = 21 [ 670.321869][ T5] hid-generic 0000:0000:0000.0009: hidraw0: HID v0.00 Device [syz1] on syz1 21:55:59 executing program 0: mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) shmget(0x3, 0x1000, 0x26, &(0x7f000000a000/0x1000)=nil) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:55:59 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) pwritev(r0, &(0x7f0000000200)=[{}, {&(0x7f0000000100)="e0624e22a050c5c3910b73496b846f4914ad11b00b6e121531647c8540b362675dbcb587cb0f8f35b2629097aaa8befe729b6f8631727b0238b9e1a91cf54d48560cd1dfb64d7461cb5b9beacc1eca03ae30d0760353e520f41d91ed9f1656c6fecd4307d8b80859ce64f054629ed57bd20a2fc78e35118f35c299738d8f7aaf16fffc791f9ed3ceb202993612fd8f128c9662193874ca26bdbf87db5c603525480a6e856453ff13101216f5fd92d45e4bd8f2916cd268bab5b9942869a3e209f5", 0xc1}, {&(0x7f0000000040)="612bd033e011d0a98644aded4acfc3d1936f", 0x12}], 0x3, 0x0) r1 = socket$inet(0x2, 0x805, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x8000, 0x0) sendmmsg$unix(r2, &(0x7f0000001880)=[{&(0x7f0000000240)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f0000001800)=[{&(0x7f00000002c0)="94e15998c87570844d903332414cc849bf5d508cb794fab5d29842a642f2326bb645ba87637f5767731a164da28c7e74f4fbe9a369bd545bc7a5b0ce7f8a249deaced3224f7ad61ab723f1b706b5652a1ecdb668cdb59475daf669a5765cbd7323352781b7576c69a13b94f3885548ee87febb22583f3711160d17d0c13c7397266c279995fdbe0633a0e53b2d9b906be9ed9e7747a1202b54779714f7a7bfd9e03fb000d3cd253d89", 0xa9}, {&(0x7f0000000380)="44113bd86d9b1bf6fd64d6074ec49ce7cd5ebbecdf11282572eebc45315cb00376558fb2d6cde273037918981c31050077a3e85e583d4040d5da07d6a071cd", 0x3f}, {&(0x7f00000003c0)="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", 0x1000}, {&(0x7f00000013c0)="e9b5ad47f6b052df4f1199034299a11eb0e2917df198eb4cc2c547e61c508b70898f2c69a48edda9854d1bfdb41631b4e1d8e4bb6c661435a130d1b7557769f26e7e1b229d9d1ca4befd0ccca334a486126810f6f3c19be18dbdb831efbede204fd29dbfcea6e033ee46b860e93b8ef0498091cb9b3c82d4b364dde36208dc272edbd41bc49d761311f3662b9be7368ad0b709cbc0cb6f9a68dd8cfb939d443206f3d08500c598a201598844b94eb70ea29fe4", 0xb3}, {&(0x7f0000001480)="47ff8639611a22b54c77475c5a39c55c3ffd5d6ccd00d1d5328f6b28e1dea1f9b4dcd7b28e7fe092b0065769643edb08c2563dfd91a60406d8ff75874a8eb813b1b54104e240b8343a835fef0b484f4669ce64441a9902343f48288eefd8165ba5e0723ae3f76e7ab9ee305443a423a6d6b9d5d5b44db08bf4eeea95bf006cf706d845ed3fbb69a8e83ee446d6e037c1cc7441f02ce61b71b6c11b4f6dc0b70ebf00a6dca3286d4894a5256ab8fc58aee78e63020a9d387442922fb38e3c319bdc47dde03719c5f1fb3b0a9425", 0xcd}, {&(0x7f0000001580)="54a1cf879e399be1a2f8a236cdae3f2e8ccf80a80d458a2f00f256de3cacab60fd620038c4c9431d85c0612668ace3c7b30edb5733fd956f7a3bbf0a0966668651c6636da1c4c249aafdd8f5a0280357f61c0797b990985bc169de4686220ec29100426838cabb0fdd78eab924bd954001c5dd97458910d40b6fec18cc6bf00e4288e0d4336a728faff94e", 0x8b}, {&(0x7f0000001640)="bd5142d4a1d644b1c006c09ab9ec91cedd3c902d22bad6cd038895514ef4a5fef1f4a99976afbdb9d7bd8672ef2115954e8e8f0da51a64679b73d32be66b0f16be70", 0x42}, {&(0x7f00000016c0)="1b1d608f4725a077c99764710aed0f113fe0e5c10f664588b6e7aa9544fbaa54aae826edc4e5cb225c", 0x29}, {&(0x7f0000001700)="0e456294f8ddec30f7a6dd14ef4f929973c1f5d1a13ef4b104d31176be586b4b5cd34acc8d74b07a2eb5125b67d42f6e47418a1fb86ab388213dd592ffe63752c4faa15493b81c39235fc3bc51d5a4a2e85a042a415104cc9f70d8d9ad1064c67a6b07106ec35478cee69220e81247ee7e5cf9ddcf63cb67ff41e46bbb3f25822de2031e66dbfed8c8e3ad0ed124c338370dc8c142ee5520be07f656a991fc9efc4e9f406ed71687f2962cc29bca33c8911967e0b039b660b38fecbab2338006b34be7970755c1bfb0bcfc", 0xcb}], 0x9, 0x0, 0x0, 0x81}], 0x1, 0x20000081) 21:55:59 executing program 1: socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2c, &(0x7f0000000000)="d22f7be5e7b72ccad7f1f4c8", 0xc) [ 670.534238][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 670.535038][ C0] protocol 88fb is buggy, dev hsr_slave_1 21:55:59 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r2, 0x0, 0x2c, &(0x7f0000000000)="d22f7be5e7b72ccad7f1f4c8", 0xc) [ 670.589588][T26417] IPVS: ftp: loaded support on port[0] = 21 21:55:59 executing program 0: mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) r0 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f0000000280)={0x5, 0x10, 0xfa00, {&(0x7f0000000000), r1, 0x1}}, 0x18) mremap(&(0x7f0000007000/0x2000)=nil, 0x2000, 0x4000, 0x3, &(0x7f0000001000/0x4000)=nil) [ 670.773821][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 670.779667][ C1] protocol 88fb is buggy, dev hsr_slave_1 21:56:01 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r3, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r4, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_CREATE(r6, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r6, &(0x7f0000000040), 0x4) fsetxattr$trusted_overlay_origin(r3, &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x2) write$UHID_DESTROY(r6, &(0x7f00000000c0), 0x4) ioctl$VIDIOC_S_CTRL(r5, 0xc008561c, &(0x7f0000000100)={0x3}) write$FUSE_LK(r4, 0x0, 0x0) unshare(0x40000000) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r5, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:56:01 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r0, 0x0, 0x0, &(0x7f0000000000)="d22f7be5e7b72ccad7f1f4c8", 0xc) 21:56:01 executing program 5: r0 = socket$inet(0x2, 0x805, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000000)=ANY=[@ANYBLOB="0100e508", @ANYRES32=0x0], &(0x7f0000000100)=0x252) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000180)={r1}, 0x378) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000200)='/dev/cachefiles\x00', 0x1fe, 0x0) ioctl$EVIOCSREP(r2, 0x40084503, &(0x7f0000000140)=[0xfffffffffffffffa, 0x5]) 21:56:01 executing program 0: mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@mcast2, 0x7, 0x1, 0xff, 0x5, 0x7, 0x8}, &(0x7f0000000040)=0x20) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x5, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:56:01 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r2, 0x0, 0x2c, &(0x7f0000000000)="d22f7be5e7b72ccad7f1f4c8", 0xc) 21:56:01 executing program 4: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r3, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r4, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_CREATE(r6, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r6, &(0x7f0000000040), 0x4) fsetxattr$trusted_overlay_origin(r3, &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x2) write$UHID_DESTROY(r6, &(0x7f00000000c0), 0x4) ioctl$VIDIOC_S_CTRL(r5, 0xc008561c, &(0x7f0000000100)={0x3}) write$FUSE_LK(r4, 0x0, 0x0) unshare(0x40000000) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r5, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:56:02 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r0, 0x0, 0x0, &(0x7f0000000000)="d22f7be5e7b72ccad7f1f4c8", 0xc) 21:56:02 executing program 5: r0 = socket$inet(0x2, 0x3, 0x6) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x14) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r1, 0xc05c5340, &(0x7f0000000100)={0x80000001, 0x9, 0x0, {0x77359400}, 0x80000001, 0xff}) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000040), &(0x7f00000000c0)=0xffffffffffffffac) accept4$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000180)=0x14, 0x80000) connect$can_bcm(r1, &(0x7f00000001c0)={0x1d, r2}, 0x10) 21:56:02 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r2, 0x0, 0x2c, &(0x7f0000000000)="d22f7be5e7b72ccad7f1f4c8", 0xc) 21:56:02 executing program 0: mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) setsockopt$RDS_RECVERR(r0, 0x114, 0x5, &(0x7f0000000040)=0x1, 0x4) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) ioctl$DRM_IOCTL_GET_MAP(r0, 0xc0186404, &(0x7f0000000080)={&(0x7f0000ff4000/0x9000)=nil, 0x4, 0x7, 0x2, &(0x7f000000a000/0x1000)=nil, 0x4}) ioctl$GIO_SCRNMAP(r0, 0x4b40, &(0x7f00000000c0)=""/253) 21:56:02 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r0, 0x0, 0x0, &(0x7f0000000000)="d22f7be5e7b72ccad7f1f4c8", 0xc) [ 673.384678][ T3128] hid-generic 0000:0000:0000.000A: unknown main item tag 0x0 [ 673.401609][T26460] IPVS: ftp: loaded support on port[0] = 21 21:56:02 executing program 0: mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x800) r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x4200, 0x0) socket$isdn_base(0x22, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000180)={'ip6gretap0\x00', {0x2, 0x4e20, @broadcast}}) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000200)='nbd\x00') ioctl$UI_BEGIN_FF_ERASE(r0, 0xc00c55ca, &(0x7f00000001c0)={0xb, 0x2, 0x5}) sendmsg$NBD_CMD_CONNECT(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB="04000057", @ANYRES16=r1, @ANYBLOB="080628bd7000fddbdf25010000000c000500030000000000000008000100000000000c0002000000000000000000"], 0x34}, 0x1, 0x0, 0x0, 0x80}, 0x44000) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) [ 673.450739][ T3128] hid-generic 0000:0000:0000.000A: hidraw0: HID v0.00 Device [syz1] on syz1 [ 673.461407][T26476] IPVS: ftp: loaded support on port[0] = 21 [ 673.573547][ C0] net_ratelimit: 4 callbacks suppressed [ 673.573556][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 673.585833][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 673.653579][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 673.659456][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 673.665469][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 673.671301][ C0] protocol 88fb is buggy, dev hsr_slave_1 21:56:03 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r3, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r4, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_CREATE(r6, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r6, &(0x7f0000000040), 0x4) fsetxattr$trusted_overlay_origin(r3, &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x2) write$UHID_DESTROY(r6, &(0x7f00000000c0), 0x4) ioctl$VIDIOC_S_CTRL(r5, 0xc008561c, &(0x7f0000000100)={0x3}) write$FUSE_LK(r4, 0x0, 0x0) unshare(0x40000000) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r5, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) 21:56:03 executing program 5: r0 = socket$inet(0x2, 0x8, 0x3) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x4) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000540)={0x80, {{0x2, 0x4e24, @remote}}, 0x3, 0x7, [{{0x2, 0x4e24, @broadcast}}, {{0x2, 0x4e21, @broadcast}}, {{0x2, 0x4e23, @multicast1}}, {{0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x26}}}, {{0x2, 0x4e20, @rand_addr=0x1}}, {{0x2, 0x4e21, @broadcast}}]}, 0x40c) 21:56:03 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r0, 0x0, 0x2c, 0x0, 0x0) 21:56:03 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r1, 0x0, 0x2c, &(0x7f0000000000)="d22f7be5e7b72ccad7f1f4c8", 0xc) 21:56:03 executing program 0: mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffff9c, 0x28, &(0x7f0000000140)={0x0, 0x0}}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={r0, 0x0, 0x18}, 0xc) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x10000, 0x32) ioctl$VHOST_GET_VRING_ENDIAN(r2, 0x4008af14, &(0x7f0000000100)={0x2, 0x4}) ioctl$FS_IOC_MEASURE_VERITY(r1, 0xc0046686, &(0x7f0000000040)={0x3, 0x66, "433f8a96d242137a3649cc87d6c3c8dcb10226ede1c509e2d67b89d024c7ab16c84494a8958bb48032d23d97acc9afa355aab77dc9991e66607f86094bedbcc4cb52300a47101b1f61276049691fb7a4521fa9a4c07331c635e6edfaebfc0839690d4d34dabf"}) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:56:03 executing program 4: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r3, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r4, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_CREATE(r6, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r6, &(0x7f0000000040), 0x4) fsetxattr$trusted_overlay_origin(r3, &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x2) write$UHID_DESTROY(r6, &(0x7f00000000c0), 0x4) ioctl$VIDIOC_S_CTRL(r5, 0xc008561c, &(0x7f0000000100)={0x3}) write$FUSE_LK(r4, 0x0, 0x0) unshare(0x40000000) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r5, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:56:03 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r0, 0x0, 0x2c, 0x0, 0x0) 21:56:03 executing program 0: mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000011000/0x1000)=nil, 0x1000, 0x12000, 0x3, &(0x7f0000007000/0x12000)=nil) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, &(0x7f0000000040)) 21:56:03 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r0, 0x0, 0x2c, &(0x7f0000000000)="d22f7be5e7b72ccad7f1f4c8", 0xc) 21:56:03 executing program 5: r0 = socket$inet(0x2, 0x805, 0xfffffffffffffff8) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x3a) [ 674.373219][ T9292] hid-generic 0000:0000:0000.000B: unknown main item tag 0x0 [ 674.395682][ T9292] hid-generic 0000:0000:0000.000B: hidraw0: HID v0.00 Device [syz1] on syz1 21:56:03 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r0, 0x0, 0x2c, 0x0, 0x0) [ 674.472902][T26519] IPVS: ftp: loaded support on port[0] = 21 21:56:03 executing program 0: mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x8, 0x200040) setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x81, &(0x7f0000000180)={'filter\x00', 0x0, 0x0, 0x0, [], 0x3, &(0x7f0000000140)=[{}, {}, {}, {}], 0x0, [{}, {}, {}]}, 0x80) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x10000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000040)={0x103ff, 0x1, 0x2, 0x2000, &(0x7f000000a000/0x2000)=nil}) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000080)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f00000000c0)=0x10) [ 674.578133][T26524] IPVS: ftp: loaded support on port[0] = 21 [ 674.693543][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 674.700165][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 674.933550][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 674.939510][ C1] protocol 88fb is buggy, dev hsr_slave_1 21:56:04 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r3, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r4, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_CREATE(r6, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r6, &(0x7f0000000040), 0x4) fsetxattr$trusted_overlay_origin(r3, &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x2) write$UHID_DESTROY(r6, &(0x7f00000000c0), 0x4) ioctl$VIDIOC_S_CTRL(r5, 0xc008561c, &(0x7f0000000100)={0x3}) write$FUSE_LK(r4, 0x0, 0x0) unshare(0x40000000) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r5, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) 21:56:04 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r0, 0x0, 0x2c, &(0x7f0000000000), 0x0) 21:56:04 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r0, 0x0, 0x2c, &(0x7f0000000000)="d22f7be5e7b72ccad7f1f4c8", 0xc) 21:56:04 executing program 5: r0 = socket$inet(0x2, 0x802, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x4) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffff9c, 0xc0086426, &(0x7f0000000100)={0x3, &(0x7f0000000040)=[{}, {}, {0x0}]}) ioctl$DRM_IOCTL_DMA(r1, 0xc0286429, &(0x7f0000000240)={r2, 0x3, &(0x7f0000000140)=[0x8, 0xfffffffffffffffa, 0x2a], &(0x7f0000000180)=[0x6], 0x0, 0x6, 0x2, &(0x7f00000001c0)=[0x0, 0x4, 0x3e000000000, 0x1ff, 0x4, 0x1000], &(0x7f0000000200)=[0x4, 0x0, 0x80000001, 0x7, 0x800, 0xdf, 0xed00000000000000, 0x80000001, 0x100000001]}) 21:56:04 executing program 0: mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x2000001, 0x1b071, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000080)='fou\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x61}, 0xc, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB='L\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="20032cbd7000fddbdf250100000008000a004e21000008000600ac14141908000b00", @ANYRES32=r2, @ANYBLOB="080001004e21000008000600ac1414aa080001004e220000080002000a0000006156df0f51eff537b29e67a09cbe15d2f8634dc5e840b50152241e679db4408e250cc027a6eede6a6d726c4646bc08cb0f08540beb731ee6b4f2ba0d89877e14408bdfeea403fb3f87a53fc770acf9765ff6a27f9332e730fa30528e058da8e05955884450ce88eee8a585f7a0196f955b05df5096ef7a1c24989df41cc4e9da58b8ebd63c9d804959b4170e73caf2626e376256dad92a6e2d1225c95cbf2120892c15c869e5b760f2691c4fa6c26f1f2ec82d82aafaa4a39ff5a3e9842730dd05d2d47117b8eab5ee80d014b931ee4d4877fc64e0"], 0x4c}, 0x1, 0x0, 0x0, 0x40}, 0x4000880) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) r3 = geteuid() setfsuid(r3) 21:56:04 executing program 4: mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffff9c, 0x28, &(0x7f0000000140)={0x0, 0x0}}, 0x10) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={r0, 0x0, 0x18}, 0xc) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x10000, 0x32) ioctl$VHOST_GET_VRING_ENDIAN(r2, 0x4008af14, &(0x7f0000000100)={0x2, 0x4}) ioctl$FS_IOC_MEASURE_VERITY(r1, 0xc0046686, &(0x7f0000000040)={0x3, 0x66, "433f8a96d242137a3649cc87d6c3c8dcb10226ede1c509e2d67b89d024c7ab16c84494a8958bb48032d23d97acc9afa355aab77dc9991e66607f86094bedbcc4cb52300a47101b1f61276049691fb7a4521fa9a4c07331c635e6edfaebfc0839690d4d34dabf"}) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:56:04 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r0, 0x0, 0x2c, &(0x7f0000000000)="d22f7be5e7b72ccad7f1f4c8", 0xc) 21:56:04 executing program 5: r0 = socket$inet(0x2, 0x805, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0xfff, 0x3060c84cc2d1c717) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040)=@assoc_id=0x0, &(0x7f0000000100)=0x4) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000140)={r2, @in={{0x2, 0x4e20, @broadcast}}, 0x1, 0x401, 0x1ff, 0x9, 0x80}, &(0x7f0000000200)=0x98) 21:56:04 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r3, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r4, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_CREATE(r6, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r6, &(0x7f0000000040), 0x4) fsetxattr$trusted_overlay_origin(r3, &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x2) write$UHID_DESTROY(r6, &(0x7f00000000c0), 0x4) ioctl$VIDIOC_S_CTRL(r5, 0xc008561c, &(0x7f0000000100)={0x3}) write$FUSE_LK(r4, 0x0, 0x0) unshare(0x40000000) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r5, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) 21:56:04 executing program 0: remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x1000, 0x4000) ioctl$VT_RELDISP(r0, 0x5605) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000080)={@in6={{0xa, 0x4e20, 0xae, @dev={0xfe, 0x80, [], 0x1c}, 0x7}}, 0x0, 0x2, 0x0, "74377af0733bed0288989343bbc713d8e8b8ed3c80e363b8db24e272ac34c6a173663b5c9209937eb54abd843ff3b30836506dff6b4342ddd4192bf09a5842d1c0da8f23cbc8319b9b8c9f3b5f76e21c"}, 0xd8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) ioctl$RTC_ALM_READ(r0, 0x80247008, &(0x7f00000001c0)) ioctl$CAPI_INSTALLED(r0, 0x80024322) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'veth0_to_team\x00', 0x8001}) 21:56:04 executing program 5: r0 = socket$inet(0x2, 0x4, 0x100000000000008) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x422080, 0x0) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f00000002c0)=0x3, 0xfffffffffffffe06) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000100), &(0x7f0000000040)=0x4) r2 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$DRM_IOCTL_GET_UNIQUE(r2, 0xc0086401, &(0x7f0000000080)={0xf4, &(0x7f0000000140)=""/244}) 21:56:04 executing program 2: socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2c, &(0x7f0000000000)="d22f7be5e7b72ccad7f1f4c8", 0xc) [ 675.471885][ T9292] hid-generic 0000:0000:0000.000C: unknown main item tag 0x0 [ 675.513386][ T9292] hid-generic 0000:0000:0000.000C: hidraw0: HID v0.00 Device [syz1] on syz1 [ 675.525219][T26580] IPVS: ftp: loaded support on port[0] = 21 [ 675.673090][T26591] IPVS: ftp: loaded support on port[0] = 21 21:56:05 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r3, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r4, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_CREATE(r6, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r6, &(0x7f0000000040), 0x4) fsetxattr$trusted_overlay_origin(r3, &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x2) write$UHID_DESTROY(r6, &(0x7f00000000c0), 0x4) ioctl$VIDIOC_S_CTRL(r5, 0xc008561c, &(0x7f0000000100)={0x3}) write$FUSE_LK(r4, 0x0, 0x0) unshare(0x40000000) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r5, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) 21:56:05 executing program 0: r0 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x2000000000002, 0x80000) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400800}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0xa0, r1, 0x10, 0x70bd2b, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}]}, @IPVS_CMD_ATTR_DAEMON={0x30, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @rand_addr=0x20}}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_STATE={0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x100000000}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7fffffff}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xfffffffffffffffb}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e20}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}]}]}, 0xa0}, 0x1, 0x0, 0x0, 0x4004010}, 0x8000) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000040)=[@in={0x2, 0x4e23, @multicast2}, @in6={0xa, 0x4e23, 0x80000001, @mcast2, 0xff}], 0x2c) r3 = creat(&(0x7f00000011c0)='./file0\x00', 0x20) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f0000001200)=[@in={0x2, 0x4e24, @multicast1}, @in6={0xa, 0x4e22, 0x101, @empty, 0xff}, @in={0x2, 0x4e24, @empty}, @in={0x2, 0x4e24, @empty}, @in={0x2, 0x4e23, @multicast2}], 0x5c) 21:56:05 executing program 2: socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2c, &(0x7f0000000000)="d22f7be5e7b72ccad7f1f4c8", 0xc) 21:56:05 executing program 4: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r3, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r4, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_CREATE(r6, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r6, &(0x7f0000000040), 0x4) fsetxattr$trusted_overlay_origin(r3, &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x2) write$UHID_DESTROY(r6, &(0x7f00000000c0), 0x4) ioctl$VIDIOC_S_CTRL(r5, 0xc008561c, &(0x7f0000000100)={0x3}) write$FUSE_LK(r4, 0x0, 0x0) unshare(0x40000000) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r5, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:56:05 executing program 5: r0 = socket$inet(0x2, 0x805, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r1 = dup3(r0, r0, 0x80000) r2 = syz_genetlink_get_family_id$team(&(0x7f0000001540)='team\x00') getsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f0000001580)={@multicast1, @multicast2, 0x0}, &(0x7f00000015c0)=0xc) getsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000001600)={@multicast1, @local, 0x0}, &(0x7f0000001640)=0xc) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000001680)={{{@in=@dev, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000001780)=0xe8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000017c0)={'veth0_to_hsr\x00', 0x0}) getpeername$packet(0xffffffffffffffff, &(0x7f0000001800)={0x11, 0x0, 0x0}, &(0x7f0000001840)=0x14) getsockopt$inet_mreqn(r0, 0x0, 0x0, &(0x7f0000001ac0)={@loopback, @rand_addr, 0x0}, &(0x7f0000001b00)=0xc) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000001cc0)={'tunl0\x00', 0x0}) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000001d00)={{{@in6=@ipv4={[], [], @dev}, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000001e00)=0xe8) getsockname$packet(0xffffffffffffff9c, &(0x7f0000001e40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001e80)=0x14) clock_gettime(0x0, &(0x7f0000008a40)={0x0, 0x0}) recvmmsg(r0, &(0x7f0000008940)=[{{&(0x7f0000001ec0)=@ethernet={0x0, @remote}, 0x80, &(0x7f00000032c0)=[{&(0x7f0000001f40)=""/4096, 0x1000}, {&(0x7f0000002f40)=""/64, 0x40}, {&(0x7f0000002f80)=""/117, 0x75}, {&(0x7f0000003000)=""/62, 0x3e}, {&(0x7f0000003040)=""/244, 0xf4}, {&(0x7f0000003140)=""/156, 0x9c}, {&(0x7f0000003200)=""/151, 0x97}], 0x7, &(0x7f0000003300)=""/170, 0xaa}}, {{0x0, 0x0, &(0x7f0000004600)=[{&(0x7f00000033c0)=""/169, 0xa9}, {&(0x7f0000003480)=""/73, 0x49}, {&(0x7f0000003500)=""/4096, 0x1000}, {&(0x7f0000004500)=""/43, 0x2b}, {&(0x7f0000004540)=""/188, 0xbc}], 0x5, &(0x7f0000004640)=""/231, 0xe7}, 0x6}, {{&(0x7f0000004740)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000004800)=[{&(0x7f00000047c0)=""/26, 0x1a}], 0x1, &(0x7f0000004840)=""/4096, 0x1000}, 0x4dc800000000000}, {{&(0x7f0000005840)=@sco, 0x80, &(0x7f0000005c80)=[{&(0x7f00000058c0)=""/33, 0x21}, {&(0x7f0000005900)=""/201, 0xc9}, {&(0x7f0000005a00)=""/209, 0xd1}, {&(0x7f0000005b00)=""/244, 0xf4}, {&(0x7f0000005c00)=""/115, 0x73}], 0x5}, 0x7}, {{&(0x7f0000005cc0)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000006e40)=[{&(0x7f0000005d40)=""/4096, 0x1000}, {&(0x7f0000006d40)=""/233, 0xe9}], 0x2, &(0x7f0000006e80)=""/84, 0x54}, 0x8ad}, {{&(0x7f0000006f00)=@ipx, 0x80, &(0x7f0000007240)=[{&(0x7f0000006f80)=""/31, 0x1f}, {&(0x7f0000006fc0)=""/247, 0xf7}, {&(0x7f00000070c0)=""/78, 0x4e}, {&(0x7f0000007140)=""/115, 0x73}, {&(0x7f00000071c0)=""/102, 0x66}], 0x5, &(0x7f0000007280)=""/203, 0xcb}}, {{&(0x7f0000007380)=@hci, 0x80, &(0x7f00000088c0)=[{&(0x7f0000007400)=""/128, 0x80}, {&(0x7f0000007480)=""/92, 0x5c}, {&(0x7f0000007500)=""/174, 0xae}, {&(0x7f00000075c0)=""/51, 0x33}, {&(0x7f0000007600)=""/122, 0x7a}, {&(0x7f0000007680)=""/4096, 0x1000}, {&(0x7f0000008680)=""/98, 0x62}, {&(0x7f0000008700)=""/117, 0x75}, {&(0x7f0000008780)=""/81, 0x51}, {&(0x7f0000008800)=""/182, 0xb6}], 0xa}, 0x8}], 0x7, 0x0, &(0x7f0000008a80)={r12, r13+10000000}) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000000), &(0x7f0000000040)=0x4) sendmsg$TEAM_CMD_OPTIONS_GET(r1, &(0x7f0000009040)={&(0x7f0000001500)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000009000)={&(0x7f0000008ac0)={0x528, r2, 0x410, 0x70bd28, 0x25dfdbfe, {}, [{{0x8, 0x1, r3}, {0x1a0, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x8001}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x678a24c2}}, {0x8, 0x6, r4}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x80000001}}, {0x8, 0x6, r5}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x20, 0x3ff, 0x2, 0x1}]}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x1000}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r6}}}]}}, {{0x8, 0x1, r7}, {0x1dc, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x9}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x1ff}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r9}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x1}}}]}}, {{0x8, 0x1, r10}, {0xb8, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r11}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x1}}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8}}}]}}, {{0x8, 0x1, r14}, {0xc0, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x5396}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}]}}]}, 0x528}, 0x1, 0x0, 0x0, 0x10}, 0x40) 21:56:05 executing program 2: socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2c, &(0x7f0000000000)="d22f7be5e7b72ccad7f1f4c8", 0xc) 21:56:05 executing program 0: mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x4, 0x800) mmap$xdp(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x180000000) 21:56:05 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r0, 0x0, 0x0, &(0x7f0000000000)="d22f7be5e7b72ccad7f1f4c8", 0xc) 21:56:05 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r3, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r4, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_CREATE(r6, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r6, &(0x7f0000000040), 0x4) fsetxattr$trusted_overlay_origin(r3, &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x2) write$UHID_DESTROY(r6, &(0x7f00000000c0), 0x4) ioctl$VIDIOC_S_CTRL(r5, 0xc008561c, &(0x7f0000000100)={0x3}) write$FUSE_LK(r4, 0x0, 0x0) unshare(0x40000000) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r5, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) [ 676.488200][ T3128] hid-generic 0000:0000:0000.000D: unknown main item tag 0x0 21:56:05 executing program 5: r0 = socket$inet(0x2, 0x805, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='nr0\x00'}) socket$inet_tcp(0x2, 0x1, 0x0) [ 676.534655][ T9292] hid-generic 0000:0000:0000.000E: unknown main item tag 0x0 [ 676.583526][T26631] IPVS: ftp: loaded support on port[0] = 21 [ 676.604880][ T3128] hid-generic 0000:0000:0000.000D: hidraw0: HID v0.00 Device [syz1] on syz1 21:56:05 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r0, 0x0, 0x0, &(0x7f0000000000)="d22f7be5e7b72ccad7f1f4c8", 0xc) [ 676.652067][ T9292] hid-generic 0000:0000:0000.000E: hidraw1: HID v0.00 Device [syz1] on syz1 21:56:05 executing program 0: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = socket$xdp(0x2c, 0x3, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r1, 0x0, 0x487, &(0x7f0000000040), &(0x7f0000000080)=0x30) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, r0, 0x8) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) [ 676.971671][T26610] IPVS: ftp: loaded support on port[0] = 21 [ 677.034343][ T9292] hid-generic 0000:0000:0000.000F: unknown main item tag 0x0 [ 677.048011][ T9292] hid-generic 0000:0000:0000.000F: hidraw0: HID v0.00 Device [syz1] on syz1 [ 677.159235][T26659] IPVS: ftp: loaded support on port[0] = 21 21:56:08 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r3, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r4, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_CREATE(r6, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r6, &(0x7f0000000040), 0x4) fsetxattr$trusted_overlay_origin(r3, &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x2) write$UHID_DESTROY(r6, &(0x7f00000000c0), 0x4) ioctl$VIDIOC_S_CTRL(r5, 0xc008561c, &(0x7f0000000100)={0x3}) write$FUSE_LK(r4, 0x0, 0x0) unshare(0x40000000) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r5, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:56:08 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r0, 0x0, 0x0, &(0x7f0000000000)="d22f7be5e7b72ccad7f1f4c8", 0xc) 21:56:08 executing program 0: mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) flock(r0, 0x5) 21:56:08 executing program 5: r0 = socket$inet(0x2, 0xa, 0x200000004) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r0, 0x84, 0x1c, &(0x7f0000000100), &(0x7f0000000040)=0xfffffffffffffc26) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 21:56:08 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, 0x0) ioctl$KVM_TRANSLATE(r2, 0xc018ae85, 0x0) syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x10001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x200000000000000, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r3, 0x0, 0x2c, &(0x7f0000000000)="d22f7be5e7b72ccad7f1f4c8", 0xc) 21:56:08 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x48, &(0x7f0000000540)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) r1 = socket$inet(0x2, 0x805, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000140), &(0x7f0000000180)=0x4) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x101000, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0106434, &(0x7f0000000040)={0x1, 0x0, 0x1, 0x200}) ioctl$DRM_IOCTL_AGP_BIND(r2, 0x40086436, &(0x7f0000000100)={r3, 0x25}) 21:56:08 executing program 5: r0 = socket$inet(0x2, 0x805, 0x0) ioctl$VIDIOC_LOG_STATUS(r0, 0x5646, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000080), &(0x7f0000000000)=0x2c7) 21:56:08 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r0, 0x0, 0x2c, 0x0, 0x0) 21:56:08 executing program 0: mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x2, 0x20800) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80042407, &(0x7f0000000040)) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:56:08 executing program 5: r0 = socket$inet(0x2, 0x805, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000080), &(0x7f0000000000)=0x4) ioctl$TCSETSW(r1, 0x5403, &(0x7f0000000100)={0x40, 0x7fff, 0x1000, 0xfa6, 0x10, 0x2, 0x6, 0x3ff, 0xffff, 0x1, 0x0, 0xd03}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='pids.current\x00', 0x0, 0x0) connect$inet6(r2, &(0x7f0000000140)={0xa, 0x4e21, 0x7, @remote, 0xffffffffffffffc1}, 0x1c) ioctl$TIOCSCTTY(r2, 0x540e, 0x0) 21:56:08 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r0, 0x0, 0x2c, 0x0, 0x0) [ 679.661090][ T3128] hid-generic 0000:0000:0000.0010: unknown main item tag 0x0 [ 679.689953][ T3128] hid-generic 0000:0000:0000.0010: hidraw0: HID v0.00 Device [syz1] on syz1 [ 679.800700][T26697] IPVS: ftp: loaded support on port[0] = 21 [ 679.813639][ C0] net_ratelimit: 18 callbacks suppressed [ 679.813659][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 679.825373][ C0] protocol 88fb is buggy, dev hsr_slave_1 21:56:08 executing program 0: mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x42000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x68, r1, 0x420, 0x70bd2d, 0x25dfdbfb, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x1e, @link='syz1\x00'}}}, [""]}, 0x68}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) [ 679.893601][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 679.899528][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 679.905507][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 679.911329][ C0] protocol 88fb is buggy, dev hsr_slave_1 21:56:09 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r3, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r4, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_CREATE(r6, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r6, &(0x7f0000000040), 0x4) fsetxattr$trusted_overlay_origin(r3, &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x2) write$UHID_DESTROY(r6, &(0x7f00000000c0), 0x4) ioctl$VIDIOC_S_CTRL(r5, 0xc008561c, &(0x7f0000000100)={0x3}) write$FUSE_LK(r4, 0x0, 0x0) unshare(0x40000000) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r5, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) 21:56:09 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r0, 0x0, 0x2c, 0x0, 0x0) 21:56:09 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, 0x0) ioctl$KVM_TRANSLATE(r2, 0xc018ae85, 0x0) syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x10001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x200000000000000, 0x0) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r4, 0x0, 0x2c, &(0x7f0000000000)="d22f7be5e7b72ccad7f1f4c8", 0xc) 21:56:09 executing program 5: r0 = socket$inet(0x2, 0x808, 0xfffffffffffff9bb) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 21:56:09 executing program 0: remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x1000, 0x200000000000006, &(0x7f0000002000/0x1000)=nil) r0 = syz_open_dev$midi(0xfffffffffffffffe, 0x400000000, 0x80100) getsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000040), &(0x7f0000000080)=0x8) truncate(&(0x7f00000000c0)='./file0\x00', 0x28) ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f0000000100)={0x7fffffff, 0x3}) statfs(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140)=""/208) lsetxattr$security_evm(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='security.evm\x00', &(0x7f00000002c0)=@v2={0x3, 0x1, 0x3, 0x1, 0xf4, "b52e67e31d62fec9641760e84f0cc34edd8abfab27042f6696ce9ec32bda91d648a069760e71ab8a8fe2d538de18cfb9ad5711ffd2133ec6e1fa1f66480e578e31eb157bba5200ddeba8262a48d6c3acf0c6603f07c80e2c3158df8a17acc83982331f573fb38def775a6de90224c47a3305db54c76e1159df095eaa0a38f3600dd0553218e715eb5f4dae555b833288a0b27d8b6daba5770eea659e77fc7dee8d89b44aeef632e2050d139e419f0758f39f6586b376fe1624cb954a0caa5dcbe90f87c1202e7919c2d32c1b02084297a9e1d005c700ce6fadb1048a71f3d6da8b386b1d77f75c4f0c2b78a50c189ec769774568"}, 0xfe, 0x1) 21:56:09 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r3, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r4, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_CREATE(r6, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r6, &(0x7f0000000040), 0x4) fsetxattr$trusted_overlay_origin(r3, &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x2) write$UHID_DESTROY(r6, &(0x7f00000000c0), 0x4) ioctl$VIDIOC_S_CTRL(r5, 0xc008561c, &(0x7f0000000100)={0x3}) write$FUSE_LK(r4, 0x0, 0x0) unshare(0x40000000) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r5, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:56:09 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r0, 0x0, 0x2c, &(0x7f0000000000), 0x0) 21:56:09 executing program 5: fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffff9c) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x200, 0x80) syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0x5, 0x42040) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x2000, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0x2, &(0x7f0000000000), 0xe9f9c11dbf2fa7ec) r1 = socket$inet(0x2, 0x805, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 21:56:09 executing program 0: mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='loginuid\x00') r1 = fcntl$getown(r0, 0x9) sched_getparam(r1, &(0x7f0000000100)) r2 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0xfff, 0xa0c01) ioctl$KVM_IOEVENTFD(r0, 0x4040ae79, &(0x7f00000000c0)={0x100000, &(0x7f0000000040), 0x0, r2, 0xa}) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) [ 680.621894][ T3128] hid-generic 0000:0000:0000.0011: unknown main item tag 0x0 [ 680.679828][T26745] IPVS: ftp: loaded support on port[0] = 21 [ 680.684734][ T3128] hid-generic 0000:0000:0000.0011: hidraw0: HID v0.00 Device [syz1] on syz1 21:56:09 executing program 2: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r3, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r4, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_CREATE(r6, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r6, &(0x7f0000000040), 0x4) fsetxattr$trusted_overlay_origin(r3, &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x2) write$UHID_DESTROY(r6, &(0x7f00000000c0), 0x4) ioctl$VIDIOC_S_CTRL(r5, 0xc008561c, &(0x7f0000000100)={0x3}) write$FUSE_LK(r4, 0x0, 0x0) unshare(0x40000000) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r5, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) [ 680.743259][T26736] IPVS: ftp: loaded support on port[0] = 21 21:56:09 executing program 5: r0 = socket$inet(0x2, 0x803, 0x10000) bind(r0, &(0x7f0000000180)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x80) r1 = socket$inet(0x2, 0x805, 0x1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x480000, 0x2) ioctl$VIDIOC_QUERYSTD(r2, 0x8008563f, &(0x7f0000000040)) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000100), &(0x7f00000000c0)=0xfffffffffffffce1) getsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f0000000080)=0x8001, &(0x7f0000000140)=0x2) 21:56:09 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, 0x0) ioctl$KVM_TRANSLATE(r2, 0xc018ae85, 0x0) syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x10001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x200000000000000, 0x0) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x0, 0x23c}, 0xfffffffffffffed6) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r4, 0x0, 0x2c, &(0x7f0000000000)="d22f7be5e7b72ccad7f1f4c8", 0xc) [ 680.933539][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 680.939503][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 681.173678][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 681.179532][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 681.409141][ T3128] hid-generic 0000:0000:0000.0012: unknown main item tag 0x0 [ 681.424259][ T3128] hid-generic 0000:0000:0000.0012: hidraw0: HID v0.00 Device [syz1] on syz1 [ 681.496884][T26778] IPVS: ftp: loaded support on port[0] = 21 21:56:12 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x2, 0x0) prctl$PR_SVE_GET_VL(0x33, 0x19f77) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x88c000a2}, 0xc, &(0x7f0000000200)={&(0x7f00000000c0)={0x13c, r1, 0x1, 0x70bd2c, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DAEMON={0x38, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast2}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x6}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x2}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}]}, @IPVS_CMD_ATTR_DEST={0x3c, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x100}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@mcast1}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@multicast1}, @IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e24}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7f}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfff}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x4}, @IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast2}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x9}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x3}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @rand_addr=0x7c}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @local}]}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x7f}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}, @IPVS_CMD_ATTR_DAEMON={0x34, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @local}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth1\x00'}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x24000090}, 0xd0) rt_sigprocmask(0x2, &(0x7f0000000280)={0xfffffffffffffffc}, &(0x7f00000002c0), 0x8) 21:56:12 executing program 0: mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x20000001b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:56:12 executing program 5: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/attr/exec\x00', 0x2, 0x0) r0 = socket$inet(0x2, 0x7ffff, 0x7b) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000100)={0x0, 0x401}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000180)={r1, 0x5, 0x20}, &(0x7f00000001c0)=0xc) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000000), &(0x7f00000000c0)=0x3d) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000080)={@broadcast, @remote}, 0x8) 21:56:12 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r3, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r4, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_CREATE(r6, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r6, &(0x7f0000000040), 0x4) fsetxattr$trusted_overlay_origin(r3, &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x2) write$UHID_DESTROY(r6, &(0x7f00000000c0), 0x4) ioctl$VIDIOC_S_CTRL(r5, 0xc008561c, &(0x7f0000000100)={0x3}) write$FUSE_LK(r4, 0x0, 0x0) unshare(0x40000000) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r5, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:56:12 executing program 4: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r3, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r4, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_CREATE(r6, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r6, &(0x7f0000000040), 0x4) fsetxattr$trusted_overlay_origin(r3, &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x2) write$UHID_DESTROY(r6, &(0x7f00000000c0), 0x4) ioctl$VIDIOC_S_CTRL(r5, 0xc008561c, &(0x7f0000000100)={0x3}) write$FUSE_LK(r4, 0x0, 0x0) unshare(0x40000000) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r5, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:56:12 executing program 2: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r3, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r4, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_CREATE(r6, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r6, &(0x7f0000000040), 0x4) fsetxattr$trusted_overlay_origin(r3, &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x2) write$UHID_DESTROY(r6, &(0x7f00000000c0), 0x4) ioctl$VIDIOC_S_CTRL(r5, 0xc008561c, &(0x7f0000000100)={0x3}) write$FUSE_LK(r4, 0x0, 0x0) unshare(0x40000000) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r5, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:56:13 executing program 0: mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x1, 0x2) r1 = signalfd(0xffffffffffffffff, &(0x7f0000000040)={0xa093}, 0x8) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) 21:56:13 executing program 5: r0 = socket$inet(0x2, 0x805, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x4) openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000000), &(0x7f0000000040)=0x4) [ 684.075788][T16729] hid-generic 0000:0000:0000.0013: unknown main item tag 0x0 [ 684.125003][T16729] hid-generic 0000:0000:0000.0013: hidraw0: HID v0.00 Device [syz1] on syz1 [ 684.173762][T26804] IPVS: ftp: loaded support on port[0] = 21 21:56:13 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_TRANSLATE(0xffffffffffffffff, 0xc018ae85, 0x0) ioctl$KVM_TRANSLATE(r2, 0xc018ae85, 0x0) syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x10001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/kvm\x00', 0x200000000000000, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="ffe600005a0000010001002f3c520915f0e093471354204740ff167c02e4c537c6140f848d649762246e8de14b5b97cbb2c447527ecc0ec4e8035e9cfb75457f3dfc9951170f9926659d49d65b687571ba11f81e15a0deec1baeaf6855780c6a74289ebde0e0f034765e4d8748aa7f6e2cb342c54b18a644fbf6c499bfe05581bf56b98527b79ebdef414b9037ffff0e2707f589b7f9b92b8c6bb26dffb8390bcdc4dfe81e22e6b5a950826d04a5965b48a082d7615751809a0a0d48c7ffa61b1981fcec0dac462661ecc520ef92d1011ecd199e613841fd0884cfb46548c4e66abfcda9163ae18b37d33be53586384bd4a5596539eb9872808f1afdedc875b18dc62df99b7e45d53a22abb0e05f30b0a2721b50e28b4d9fc97304eebbc385b919a5906c0178a880c7abd3434733749abb89a914bf430e00bd14d5d90eb14cde000000000000008c23888bc98e1f52026452a63d1dc877000000000000000000e6ebcf3aa3caad650f7c231f36c458e111944544166d25658bbb5eddc3b9941738f122f15a9a7814d4a3387682370f5cdae68a9ffa3a3fecd792ec645a159cb24337a93e3572e02e26a4179fbb0f9d31e407330f0ea31e2bfc78b21f1cbfba290a7fe812832b186876289c86f1f5b8317f1977f01aae434a06db60afcea8fa3c3ae2daf67cdc3f1f3ff1517cac67b647403d46b26341c6e2b46a9f425ddc750a10184d61b03b37b6a5f8f1a20e5dcc1b4fd5395355aecd27ad06c29d722b68ae5de3d9350500a0cc966efb27afd1d9010e4fba13e2a1cff0a6f2399c68230a97a1342d296485709a3bf12ced"], 0x0, 0x23c}, 0xfffffffffffffed6) ioctl$KVM_SET_USER_MEMORY_REGION(r4, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil}) r5 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r5, 0x0, 0x2c, &(0x7f0000000000)="d22f7be5e7b72ccad7f1f4c8", 0xc) [ 684.234443][T26806] IPVS: ftp: loaded support on port[0] = 21 21:56:13 executing program 0: mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000008000/0x3000)=nil, 0x3000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:56:13 executing program 5: r0 = socket$inet(0x2, 0x805, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000080), &(0x7f0000000040)=0xffffffffffffff52) 21:56:13 executing program 5: r0 = socket$inet(0x2, 0x805, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x40200, 0x0) ioctl$KDSETMODE(r1, 0x4b3a, 0x400) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 21:56:13 executing program 0: mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) r0 = syz_open_dev$media(&(0x7f0000000140)='/dev/media#\x00', 0x5, 0x200) umount2(&(0x7f0000000000)='./file0\x00', 0x1) socket$can_raw(0x1d, 0x3, 0x1) ioctl$VIDIOC_G_PARM(r0, 0xc0cc5615, &(0x7f0000000040)={0x0, @output={0x1000, 0x1, {0x1}, 0x5, 0x3ff}}) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x100, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) [ 684.637349][T26786] IPVS: ftp: loaded support on port[0] = 21 21:56:13 executing program 5: r0 = socket$inet(0x2, 0x805, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x1, 0x0) ioctl$TIOCGDEV(r1, 0x80045432, &(0x7f0000000040)) 21:56:14 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x0, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) 21:56:17 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r3, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r4, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_CREATE(r6, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r6, &(0x7f0000000040), 0x4) fsetxattr$trusted_overlay_origin(r3, &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x2) write$UHID_DESTROY(r6, &(0x7f00000000c0), 0x4) ioctl$VIDIOC_S_CTRL(r5, 0xc008561c, &(0x7f0000000100)={0x3}) write$FUSE_LK(r4, 0x0, 0x0) unshare(0x40000000) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r5, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:56:17 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x4e23, @loopback}, {0x20000000304, @remote}, 0x0, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) [ 688.932897][T16729] hid-generic 0000:0000:0000.0014: unknown main item tag 0x0 [ 688.956537][T16729] hid-generic 0000:0000:0000.0014: hidraw0: HID v0.00 Device [syz1] on syz1 21:56:18 executing program 5: r0 = socket$inet(0x2, 0x805, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x4) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, &(0x7f00000001c0)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000007a000000dec02c0b9bebb53f3faf6a03ca46018089582832859f344423c8de997c09ef702cc34e42d5965f466e06c82ae7a990546be896c05365c4a611e9bd7389ee90f1168e03883b3a8e1effdd344245cff94646a4dca009309c21a978254f9fc0afbd32d7cae996eda7ca29841f740b19fc394615b66573c867c370f8f5301809b40c06263a"], &(0x7f0000000000)=0x9e) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e24, 0x200, @empty, 0x1000}}, 0x0, 0x9, 0xf0, 0x7, 0xffffffff}, &(0x7f0000000040)=0x98) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000280)={r1, 0x6}, &(0x7f00000002c0)=0x8) 21:56:18 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x0, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) 21:56:18 executing program 2: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r3, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r4, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_CREATE(r6, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r6, &(0x7f0000000040), 0x4) fsetxattr$trusted_overlay_origin(r3, &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x2) write$UHID_DESTROY(r6, &(0x7f00000000c0), 0x4) ioctl$VIDIOC_S_CTRL(r5, 0xc008561c, &(0x7f0000000100)={0x3}) write$FUSE_LK(r4, 0x0, 0x0) unshare(0x40000000) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r5, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:56:18 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x4e23, @loopback}, {0x20000000304, @remote}, 0x0, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) 21:56:18 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, 0x0) 21:56:18 executing program 5: r0 = socket$inet(0x2, 0x805, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x400080, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 21:56:18 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x0, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) [ 689.229782][T26853] IPVS: ftp: loaded support on port[0] = 21 [ 689.253624][ C0] net_ratelimit: 10 callbacks suppressed [ 689.253634][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 689.265323][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 689.481219][ T5] hid-generic 0000:0000:0000.0015: unknown main item tag 0x0 [ 689.493669][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 689.499520][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 689.555667][ T5] hid-generic 0000:0000:0000.0015: hidraw0: HID v0.00 Device [syz1] on syz1 [ 689.573567][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 689.579421][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 689.585376][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 689.591179][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 689.728709][T26883] IPVS: ftp: loaded support on port[0] = 21 21:56:18 executing program 0: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x20, 0x200) io_uring_enter(r0, 0x1, 0x7, 0x2, &(0x7f0000000040)={0x4}, 0x8) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:56:18 executing program 5: r0 = socket$inet(0x2, 0x805, 0x81) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000180), &(0x7f00000001c0)=0x3) fcntl$setpipe(r0, 0x407, 0x81) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x100, 0x10000) recvfrom$packet(r1, &(0x7f0000000040)=""/35, 0x23, 0x40000120, 0x0, 0x0) 21:56:18 executing program 4: r0 = socket$inet(0x2, 0x805, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x4) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, &(0x7f00000001c0)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000007a000000dec02c0b9bebb53f3faf6a03ca46018089582832859f344423c8de997c09ef702cc34e42d5965f466e06c82ae7a990546be896c05365c4a611e9bd7389ee90f1168e03883b3a8e1effdd344245cff94646a4dca009309c21a978254f9fc0afbd32d7cae996eda7ca29841f740b19fc394615b66573c867c370f8f5301809b40c06263a"], &(0x7f0000000000)=0x9e) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e24, 0x200, @empty, 0x1000}}, 0x0, 0x9, 0xf0, 0x7, 0xffffffff}, &(0x7f0000000040)=0x98) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000280)={r1, 0x6}, &(0x7f00000002c0)=0x8) 21:56:18 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x0, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) 21:56:18 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r3, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r4, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_CREATE(r6, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r6, &(0x7f0000000040), 0x4) fsetxattr$trusted_overlay_origin(r3, &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x2) write$UHID_DESTROY(r6, &(0x7f00000000c0), 0x4) ioctl$VIDIOC_S_CTRL(r5, 0xc008561c, &(0x7f0000000100)={0x3}) write$FUSE_LK(r4, 0x0, 0x0) unshare(0x40000000) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r5, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:56:18 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x0, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) 21:56:19 executing program 4: r0 = socket$inet(0x2, 0x805, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x4) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, &(0x7f00000001c0)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000007a000000dec02c0b9bebb53f3faf6a03ca46018089582832859f344423c8de997c09ef702cc34e42d5965f466e06c82ae7a990546be896c05365c4a611e9bd7389ee90f1168e03883b3a8e1effdd344245cff94646a4dca009309c21a978254f9fc0afbd32d7cae996eda7ca29841f740b19fc394615b66573c867c370f8f5301809b40c06263a"], &(0x7f0000000000)=0x9e) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e24, 0x200, @empty, 0x1000}}, 0x0, 0x9, 0xf0, 0x7, 0xffffffff}, &(0x7f0000000040)=0x98) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000280)={r1, 0x6}, &(0x7f00000002c0)=0x8) 21:56:19 executing program 2: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r3, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r4, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_CREATE(r6, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r6, &(0x7f0000000040), 0x4) fsetxattr$trusted_overlay_origin(r3, &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x2) write$UHID_DESTROY(r6, &(0x7f00000000c0), 0x4) ioctl$VIDIOC_S_CTRL(r5, 0xc008561c, &(0x7f0000000100)={0x3}) write$FUSE_LK(r4, 0x0, 0x0) unshare(0x40000000) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r5, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:56:19 executing program 0: remap_file_pages(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x2) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:56:19 executing program 5: r0 = socket$inet(0x2, 0x803, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x401, 0x200) ioctl$BLKROTATIONAL(r1, 0x127e, &(0x7f0000000040)) [ 690.152214][T26903] IPVS: ftp: loaded support on port[0] = 21 [ 690.213914][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 690.219932][ C0] protocol 88fb is buggy, dev hsr_slave_1 21:56:19 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x0, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) 21:56:19 executing program 4: r0 = socket$inet(0x2, 0x805, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x4) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, &(0x7f00000001c0)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000007a000000dec02c0b9bebb53f3faf6a03ca46018089582832859f344423c8de997c09ef702cc34e42d5965f466e06c82ae7a990546be896c05365c4a611e9bd7389ee90f1168e03883b3a8e1effdd344245cff94646a4dca009309c21a978254f9fc0afbd32d7cae996eda7ca29841f740b19fc394615b66573c867c370f8f5301809b40c06263a"], &(0x7f0000000000)=0x9e) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e24, 0x200, @empty, 0x1000}}, 0x0, 0x9, 0xf0, 0x7, 0xffffffff}, &(0x7f0000000040)=0x98) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000280)={r1, 0x6}, &(0x7f00000002c0)=0x8) 21:56:19 executing program 0: mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x80080, 0x0) r1 = socket$inet_sctp(0x2, 0x0, 0x84) getsockopt$sock_timeval(r1, 0x1, 0x15, &(0x7f00000001c0), &(0x7f0000000200)=0x8) fsetxattr$security_smack_transmute(r0, &(0x7f0000000140)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000180)='TRUE', 0x4, 0x1) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) remap_file_pages(&(0x7f0000006000/0x3000)=nil, 0x3000, 0x4, 0x8001, 0x2) r2 = dup(0xffffffffffffff9c) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000240)={0x0, 0x2}, &(0x7f0000000280)=0xc) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000340)='veth1_to_hsr\x00', 0x10) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f00000002c0)={r3, 0x6, "f9d71f1e732f"}, &(0x7f0000000300)=0xe) ioctl$KVM_SET_XSAVE(r2, 0x5000aea5, 0x0) fcntl$getown(r0, 0x9) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000000)={0x0, 0x2}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000080)=@assoc_value={r4, 0x2}, &(0x7f00000000c0)=0x8) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) fsetxattr$security_selinux(r1, &(0x7f0000000380)='security.selinux\x00', &(0x7f00000003c0)='system_u:object_r:wtmp_t:s0\x00', 0x1c, 0x1) 21:56:19 executing program 5: r0 = socket$inet(0x2, 0x805, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x4) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000100)=ANY=[@ANYBLOB="6fc9000002004e210000000000000000000000000000000000000000cebf1d9961dd801c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000760000000000000000000000000300000002004e24e00000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e2200000009000000000000000000000000000000000000007e55a92cc9000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000170000000000000000000000000000000000000000000000000000000000000000000002004e20ac1414220000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500"/524], 0x20c) [ 690.495189][ T3128] hid-generic 0000:0000:0000.0016: unknown main item tag 0x0 [ 690.544526][ T3128] hid-generic 0000:0000:0000.0016: hidraw0: HID v0.00 Device [syz1] on syz1 21:56:19 executing program 4: r0 = socket$inet(0x2, 0x805, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x4) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, &(0x7f00000001c0)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000007a000000dec02c0b9bebb53f3faf6a03ca46018089582832859f344423c8de997c09ef702cc34e42d5965f466e06c82ae7a990546be896c05365c4a611e9bd7389ee90f1168e03883b3a8e1effdd344245cff94646a4dca009309c21a978254f9fc0afbd32d7cae996eda7ca29841f740b19fc394615b66573c867c370f8f5301809b40c06263a"], &(0x7f0000000000)=0x9e) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e24, 0x200, @empty, 0x1000}}, 0x0, 0x9, 0xf0, 0x7, 0xffffffff}, &(0x7f0000000040)=0x98) 21:56:19 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000180)={{0x2, 0x0, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) 21:56:19 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r3, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r4, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_CREATE(r6, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r6, &(0x7f0000000040), 0x4) fsetxattr$trusted_overlay_origin(r3, &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x2) write$UHID_DESTROY(r6, &(0x7f00000000c0), 0x4) ioctl$VIDIOC_S_CTRL(r5, 0xc008561c, &(0x7f0000000100)={0x3}) write$FUSE_LK(r4, 0x0, 0x0) unshare(0x40000000) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r5, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:56:19 executing program 5: io_setup(0x2, &(0x7f0000000000)=0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) r2 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x0, 0x1) r3 = fspick(0xffffffffffffffff, &(0x7f0000001140)='./file0\x00', 0x1) io_submit(r0, 0x2, &(0x7f0000001240)=[&(0x7f0000001100)={0x0, 0x0, 0x0, 0x7, 0x100000000, r1, &(0x7f0000000100)="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", 0x1000, 0x7ff, 0x0, 0x1, r2}, &(0x7f0000001200)={0x0, 0x0, 0x0, 0x8, 0x3, r3, &(0x7f0000001180)="1fc92bc1838022cbe28999a3b03e0688bfbab553ccc6682f0a5b18bd1f21cb43e616cf474aff458d13a450f91b36d36623c41cdbf8c56583856a87a062c6657b0f609a69913aee321938df30fbd3693ff5b6fba26bc00e13f2d5523e96bad8190f091c640c04675c1d0449cd2fc5b20860a2247152c0cd54", 0x78, 0x200, 0x0, 0x1, 0xffffffffffffff9c}]) r4 = socket$inet(0x2, 0x400000801, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r4, 0x84, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 21:56:19 executing program 0: mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x1, 0x40) ioctl$KVM_GET_DIRTY_LOG(r0, 0x4010ae42, &(0x7f0000000040)={0x10005, 0x0, &(0x7f0000009000/0x4000)=nil}) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) [ 691.194093][ T3128] hid-generic 0000:0000:0000.0017: unknown main item tag 0x0 [ 691.260916][ T3128] hid-generic 0000:0000:0000.0017: hidraw0: HID v0.00 Device [syz1] on syz1 [ 691.306297][T26971] IPVS: ftp: loaded support on port[0] = 21 [ 691.396810][T26922] IPVS: ftp: loaded support on port[0] = 21 21:56:22 executing program 2: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r3, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r4, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_CREATE(r6, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r6, &(0x7f0000000040), 0x4) fsetxattr$trusted_overlay_origin(r3, &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x2) write$UHID_DESTROY(r6, &(0x7f00000000c0), 0x4) ioctl$VIDIOC_S_CTRL(r5, 0xc008561c, &(0x7f0000000100)={0x3}) write$FUSE_LK(r4, 0x0, 0x0) unshare(0x40000000) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r5, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:56:22 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000180)={{0x2, 0x0, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) 21:56:22 executing program 4: r0 = socket$inet(0x2, 0x805, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x4) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, &(0x7f00000001c0)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000007a000000dec02c0b9bebb53f3faf6a03ca46018089582832859f344423c8de997c09ef702cc34e42d5965f466e06c82ae7a990546be896c05365c4a611e9bd7389ee90f1168e03883b3a8e1effdd344245cff94646a4dca009309c21a978254f9fc0afbd32d7cae996eda7ca29841f740b19fc394615b66573c867c370f8f5301809b40c06263a"], &(0x7f0000000000)=0x9e) 21:56:22 executing program 0: mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) r0 = accept4(0xffffffffffffff9c, &(0x7f0000000000)=@l2, &(0x7f0000000080)=0x80, 0x80800) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000000c0)={0x80000000, 0x3, 0x203, 0x33, 0xfafe, 0x4a3, 0x80, 0x8, 0x0}, &(0x7f0000000100)=0x20) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000140)={0x7, 0x2, 0x5af4, 0x13, r1}, 0x10) 21:56:22 executing program 5: r0 = socket$inet(0x2, 0x3, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 21:56:22 executing program 3: openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r0 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f000095bffc), 0x4) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r1, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r2, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r3, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r5 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_CREATE(r5, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r5, &(0x7f0000000040), 0x4) fsetxattr$trusted_overlay_origin(r2, &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x2) write$UHID_DESTROY(r5, &(0x7f00000000c0), 0x4) ioctl$VIDIOC_S_CTRL(r4, 0xc008561c, &(0x7f0000000100)={0x3}) write$FUSE_LK(r3, 0x0, 0x0) unshare(0x40000000) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r4, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:56:22 executing program 4: r0 = socket$inet(0x2, 0x805, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, &(0x7f00000001c0)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000007a000000dec02c0b9bebb53f3faf6a03ca46018089582832859f344423c8de997c09ef702cc34e42d5965f466e06c82ae7a990546be896c05365c4a611e9bd7389ee90f1168e03883b3a8e1effdd344245cff94646a4dca009309c21a978254f9fc0afbd32d7cae996eda7ca29841f740b19fc394615b66573c867c370f8f5301809b40c06263a"], &(0x7f0000000000)=0x9e) 21:56:22 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000180)={{0x2, 0x0, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) 21:56:22 executing program 0: remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0xfffffffffffffffc) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) [ 693.418019][ T5] hid-generic 0000:0000:0000.0018: unknown main item tag 0x0 [ 693.451671][ T5] hid-generic 0000:0000:0000.0018: hidraw0: HID v0.00 Device [syz1] on syz1 [ 693.481172][T26995] IPVS: ftp: loaded support on port[0] = 21 21:56:22 executing program 5: r0 = socket$inet(0x2, 0x805, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0xd8f6, 0x200002) ioctl$sock_bt_bnep_BNEPCONNDEL(r1, 0x400442c9, &(0x7f0000000040)={0x3f, @local}) 21:56:22 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x0, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) 21:56:22 executing program 4: getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000001c0)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000007a000000dec02c0b9bebb53f3faf6a03ca46018089582832859f344423c8de997c09ef702cc34e42d5965f466e06c82ae7a990546be896c05365c4a611e9bd7389ee90f1168e03883b3a8e1effdd344245cff94646a4dca009309c21a978254f9fc0afbd32d7cae996eda7ca29841f740b19fc394615b66573c867c370f8f5301809b40c06263a"], &(0x7f0000000000)=0x9e) [ 693.659958][T27006] IPVS: ftp: loaded support on port[0] = 21 21:56:23 executing program 2: openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r0 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f000095bffc), 0x4) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r1, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r2, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r3, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r5 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_CREATE(r5, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r5, &(0x7f0000000040), 0x4) fsetxattr$trusted_overlay_origin(r2, &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x2) write$UHID_DESTROY(r5, &(0x7f00000000c0), 0x4) ioctl$VIDIOC_S_CTRL(r4, 0xc008561c, &(0x7f0000000100)={0x3}) write$FUSE_LK(r3, 0x0, 0x0) unshare(0x40000000) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r4, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:56:23 executing program 0: mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x101, 0x40400) getsockname$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, &(0x7f0000000080)=0x10) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:56:23 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x2002, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000180)={0x0, @in6={{0xa, 0x4e23, 0xa13, @mcast2, 0x6}}, 0x0, 0x7fff, 0x3, 0x7f, 0x1}, &(0x7f0000000240)=0x98) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000280)={r1, 0x4, 0x2, 0x20}, &(0x7f00000002c0)=0x10) r2 = socket$inet(0x2, 0x4, 0x5) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x841, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r2, 0x84, 0x7, &(0x7f0000000140), &(0x7f0000000100)=0x4) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000000), &(0x7f00000000c0)=0xfffffffffffffea8) 21:56:23 executing program 4: getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000001c0)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000007a000000dec02c0b9bebb53f3faf6a03ca46018089582832859f344423c8de997c09ef702cc34e42d5965f466e06c82ae7a990546be896c05365c4a611e9bd7389ee90f1168e03883b3a8e1effdd344245cff94646a4dca009309c21a978254f9fc0afbd32d7cae996eda7ca29841f740b19fc394615b66573c867c370f8f5301809b40c06263a"], &(0x7f0000000000)=0x9e) 21:56:23 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x0, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) 21:56:23 executing program 3: openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r0 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f000095bffc), 0x4) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r1, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r2, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r3, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r5 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_CREATE(r5, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r5, &(0x7f0000000040), 0x4) fsetxattr$trusted_overlay_origin(r2, &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x2) write$UHID_DESTROY(r5, &(0x7f00000000c0), 0x4) ioctl$VIDIOC_S_CTRL(r4, 0xc008561c, &(0x7f0000000100)={0x3}) write$FUSE_LK(r3, 0x0, 0x0) unshare(0x40000000) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r4, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:56:23 executing program 4: getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000001c0)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000007a000000dec02c0b9bebb53f3faf6a03ca46018089582832859f344423c8de997c09ef702cc34e42d5965f466e06c82ae7a990546be896c05365c4a611e9bd7389ee90f1168e03883b3a8e1effdd344245cff94646a4dca009309c21a978254f9fc0afbd32d7cae996eda7ca29841f740b19fc394615b66573c867c370f8f5301809b40c06263a"], &(0x7f0000000000)=0x9e) 21:56:23 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x0, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) 21:56:23 executing program 0: openat$ion(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ion\x00', 0x400000, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x402, 0x0) r0 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x2) r1 = ioctl$TIOCGPTPEER(r0, 0x5441, 0xff) mmap(&(0x7f0000007000/0x1000)=nil, 0x1000, 0x2000000, 0x1b071, r1, 0x0) ioctl$TIOCLINUX4(r0, 0x541c, &(0x7f0000000000)) [ 694.373624][ C0] net_ratelimit: 14 callbacks suppressed [ 694.373634][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 694.385188][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 694.454804][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 694.461920][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 694.470220][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 694.476410][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 694.498245][T27042] IPVS: ftp: loaded support on port[0] = 21 21:56:23 executing program 5: r0 = socket$inet(0x2, 0x805, 0x0) ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000000)) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f0000000040)) 21:56:23 executing program 4: r0 = socket$inet(0x2, 0x0, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, &(0x7f00000001c0)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000007a000000dec02c0b9bebb53f3faf6a03ca46018089582832859f344423c8de997c09ef702cc34e42d5965f466e06c82ae7a990546be896c05365c4a611e9bd7389ee90f1168e03883b3a8e1effdd344245cff94646a4dca009309c21a978254f9fc0afbd32d7cae996eda7ca29841f740b19fc394615b66573c867c370f8f5301809b40c06263a"], &(0x7f0000000000)=0x9e) 21:56:23 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x0, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) [ 694.829828][T27059] IPVS: ftp: loaded support on port[0] = 21 21:56:24 executing program 2: openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r0 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f000095bffc), 0x4) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r1, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r2, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r3, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r5 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_CREATE(r5, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r5, &(0x7f0000000040), 0x4) fsetxattr$trusted_overlay_origin(r2, &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x2) write$UHID_DESTROY(r5, &(0x7f00000000c0), 0x4) ioctl$VIDIOC_S_CTRL(r4, 0xc008561c, &(0x7f0000000100)={0x3}) write$FUSE_LK(r3, 0x0, 0x0) unshare(0x40000000) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r4, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:56:24 executing program 0: mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x400000, 0x0) ioctl$VIDIOC_STREAMOFF(r0, 0x40045613, &(0x7f0000000080)=0x87) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:56:24 executing program 5: r0 = socket$inet(0x2, 0x805, 0x0) r1 = socket$inet(0x2, 0x1, 0x9) r2 = syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x3, 0x800) r3 = syz_open_dev$vbi(&(0x7f0000000200)='/dev/vbi#\x00', 0x3, 0x2) renameat(r2, &(0x7f00000001c0)='./file0\x00', r3, &(0x7f0000000240)='./file0\x00') getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x7) r4 = dup3(r1, r0, 0x80000) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000000)={0x0, 0x9, 0x20, 0x100000000, 0x400}, &(0x7f0000000040)=0x18) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r4, 0x84, 0xa, &(0x7f0000000100)={0x1, 0x8cc, 0x20c, 0x5014, 0x1, 0x7, 0xfff, 0x10001, r5}, &(0x7f0000000140)=0x20) 21:56:24 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x0, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) 21:56:24 executing program 4: r0 = socket$inet(0x2, 0x0, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, &(0x7f00000001c0)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000007a000000dec02c0b9bebb53f3faf6a03ca46018089582832859f344423c8de997c09ef702cc34e42d5965f466e06c82ae7a990546be896c05365c4a611e9bd7389ee90f1168e03883b3a8e1effdd344245cff94646a4dca009309c21a978254f9fc0afbd32d7cae996eda7ca29841f740b19fc394615b66573c867c370f8f5301809b40c06263a"], &(0x7f0000000000)=0x9e) [ 695.493563][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 695.499491][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 695.689950][T27104] IPVS: ftp: loaded support on port[0] = 21 [ 695.733595][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 695.739445][ C1] protocol 88fb is buggy, dev hsr_slave_1 21:56:26 executing program 3: openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r0 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f000095bffc), 0x4) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r1, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r2, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r3, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r5 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_CREATE(r5, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r5, &(0x7f0000000040), 0x4) fsetxattr$trusted_overlay_origin(r2, &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x2) write$UHID_DESTROY(r5, &(0x7f00000000c0), 0x4) ioctl$VIDIOC_S_CTRL(r4, 0xc008561c, &(0x7f0000000100)={0x3}) write$FUSE_LK(r3, 0x0, 0x0) unshare(0x40000000) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r4, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:56:26 executing program 2: openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r0 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f000095bffc), 0x4) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r1, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r2, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r3, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r5 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_CREATE(r5, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r5, &(0x7f0000000040), 0x4) fsetxattr$trusted_overlay_origin(r2, &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x2) write$UHID_DESTROY(r5, &(0x7f00000000c0), 0x4) ioctl$VIDIOC_S_CTRL(r4, 0xc008561c, &(0x7f0000000100)={0x3}) write$FUSE_LK(r3, 0x0, 0x0) unshare(0x40000000) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r4, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:56:26 executing program 0: mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x20, 0x482080) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x6, 0x5, 0xa000}, 0x4) 21:56:26 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x0, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) 21:56:26 executing program 5: r0 = socket$inet(0x2, 0x805, 0x0) getitimer(0x1, &(0x7f0000000040)) fcntl$setsig(r0, 0xa, 0x1c) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000000), &(0x7f00000000c0)=0x1) 21:56:26 executing program 4: r0 = socket$inet(0x2, 0x0, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, &(0x7f00000001c0)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000007a000000dec02c0b9bebb53f3faf6a03ca46018089582832859f344423c8de997c09ef702cc34e42d5965f466e06c82ae7a990546be896c05365c4a611e9bd7389ee90f1168e03883b3a8e1effdd344245cff94646a4dca009309c21a978254f9fc0afbd32d7cae996eda7ca29841f740b19fc394615b66573c867c370f8f5301809b40c06263a"], &(0x7f0000000000)=0x9e) 21:56:26 executing program 0: mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$UHID_CREATE(r0, &(0x7f0000000040)={0x0, 'syz1\x00', 'syz1\x00', 'syz1\x00', &(0x7f0000000000)=""/39, 0x27, 0xfffffffeffffffff, 0x6, 0x2, 0x1, 0x1000}, 0x11c) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:56:26 executing program 5: socket$packet(0x11, 0x3, 0x300) r0 = socket$inet(0x2, 0x805, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 21:56:26 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x0, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) 21:56:26 executing program 4: socket$inet(0x2, 0x805, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000001c0)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000007a000000dec02c0b9bebb53f3faf6a03ca46018089582832859f344423c8de997c09ef702cc34e42d5965f466e06c82ae7a990546be896c05365c4a611e9bd7389ee90f1168e03883b3a8e1effdd344245cff94646a4dca009309c21a978254f9fc0afbd32d7cae996eda7ca29841f740b19fc394615b66573c867c370f8f5301809b40c06263a"], &(0x7f0000000000)=0x9e) 21:56:26 executing program 0: mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000001000/0x4000)=nil, 0x4000}, &(0x7f0000000080)=0x8) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) r1 = gettid() ptrace$setopts(0x4206, r1, 0x400, 0x2) [ 697.887136][ T9268] hid-generic 0000:0000:0000.0019: unknown main item tag 0x0 [ 697.909260][T27136] IPVS: ftp: loaded support on port[0] = 21 [ 697.933131][ T9268] hid-generic 0000:0000:0000.0019: hidraw0: HID v0.00 Device [syz1] on syz1 21:56:26 executing program 5: io_setup(0x7, &(0x7f0000000000)=0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x0, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000001180), &(0x7f00000011c0)=0x14) io_submit(r0, 0x1, &(0x7f0000001140)=[&(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0x200, r1, &(0x7f0000000100)="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", 0x1000, 0x91, 0x0, 0x2, r2}]) r3 = socket$inet(0x2, 0x805, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r3, 0x84, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$sock_inet_tcp_SIOCOUTQNSD(r2, 0x894b, &(0x7f00000013c0)) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000001200)=@sack_info={0x0, 0x1, 0x401}, &(0x7f0000001240)=0xc) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000001500)={r4, 0xc8, "7f0e8c1a7463cee76f1f0c6e7968b25ae9a682c0d35027aa442c9c51bddd9b336a5fc35b73895f9d1240f26d98aae2ea4b2d5de1376fae3598be19ae39aaeba6e4a5ae3641e8b0f160ab684a13faeedbb865b13653364acc54821a13962026ba5b4e90fcad0dd70ef58ac611b9e2912f280f57a7f7fe7c19a73fe5f2e25d9475712c95de18c04ef73350660eb86fc893b78e4e6b6f01a5e02f2da929c484ba42fe15db07506d38af1088e9603ab1e6042755e23f787919125ae9d22dfe2c784103b094a477e298a5"}, &(0x7f0000001600)=0xd0) [ 697.959756][T27143] IPVS: ftp: loaded support on port[0] = 21 21:56:27 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r3, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r4, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_CREATE(r6, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r6, &(0x7f0000000040), 0x4) fsetxattr$trusted_overlay_origin(r3, &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x2) write$UHID_DESTROY(r6, &(0x7f00000000c0), 0x4) ioctl$VIDIOC_S_CTRL(r5, 0xc008561c, &(0x7f0000000100)={0x3}) write$FUSE_LK(r4, 0x0, 0x0) unshare(0x40000000) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:56:27 executing program 4: socket$inet(0x2, 0x805, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000001c0)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000007a000000dec02c0b9bebb53f3faf6a03ca46018089582832859f344423c8de997c09ef702cc34e42d5965f466e06c82ae7a990546be896c05365c4a611e9bd7389ee90f1168e03883b3a8e1effdd344245cff94646a4dca009309c21a978254f9fc0afbd32d7cae996eda7ca29841f740b19fc394615b66573c867c370f8f5301809b40c06263a"], &(0x7f0000000000)=0x9e) 21:56:27 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x0, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) 21:56:27 executing program 0: mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x119000, 0x0) ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0084320, &(0x7f0000000080)={0x0, &(0x7f0000000040)="4a95ea443d409b6e12efbd4680fa6f0c80f4dc377edafbe4d6"}) fcntl$setflags(r0, 0x2, 0x8000000001) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) fcntl$getownex(r0, 0x10, &(0x7f0000000180)={0x0, 0x0}) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x0, 0x0) tkill(r1, 0x23) 21:56:27 executing program 4: socket$inet(0x2, 0x805, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000001c0)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000007a000000dec02c0b9bebb53f3faf6a03ca46018089582832859f344423c8de997c09ef702cc34e42d5965f466e06c82ae7a990546be896c05365c4a611e9bd7389ee90f1168e03883b3a8e1effdd344245cff94646a4dca009309c21a978254f9fc0afbd32d7cae996eda7ca29841f740b19fc394615b66573c867c370f8f5301809b40c06263a"], &(0x7f0000000000)=0x9e) 21:56:27 executing program 2: openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r0 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f000095bffc), 0x4) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r1, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r2, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r3, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r5 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_CREATE(r5, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r5, &(0x7f0000000040), 0x4) fsetxattr$trusted_overlay_origin(r2, &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x2) write$UHID_DESTROY(r5, &(0x7f00000000c0), 0x4) ioctl$VIDIOC_S_CTRL(r4, 0xc008561c, &(0x7f0000000100)={0x3}) write$FUSE_LK(r3, 0x0, 0x0) unshare(0x40000000) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r4, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:56:27 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x0, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) 21:56:27 executing program 0: mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000008000/0x1000)=nil) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x200000000000, 0x0, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x10000, 0x0) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000040)={{&(0x7f000000c000/0x1000)=nil, 0x1000}, 0x1}) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='reno\x00', 0x5) 21:56:27 executing program 4: r0 = socket$inet(0x2, 0x805, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, 0x0, &(0x7f0000000000)) 21:56:27 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x0, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) 21:56:27 executing program 0: mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) [ 698.976580][T26845] hid-generic 0000:0000:0000.001A: unknown main item tag 0x0 [ 699.005932][T26845] hid-generic 0000:0000:0000.001A: hidraw0: HID v0.00 Device [syz1] on syz1 21:56:31 executing program 5: r0 = socket$inet(0x2, 0x809, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 21:56:31 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x0, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) 21:56:31 executing program 4: r0 = socket$inet(0x2, 0x805, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, 0x0, &(0x7f0000000000)) 21:56:31 executing program 0: mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x80000, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000080)) ioctl$KVM_IRQ_LINE(r0, 0x4008ae61, &(0x7f0000000040)={0x100000000, 0x7}) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0xfffffd, 0x3fd, 0x40) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:56:31 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r3, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r4, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_CREATE(r6, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r6, &(0x7f0000000040), 0x4) fsetxattr$trusted_overlay_origin(r3, &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x2) write$UHID_DESTROY(r6, &(0x7f00000000c0), 0x4) ioctl$VIDIOC_S_CTRL(r5, 0xc008561c, &(0x7f0000000100)={0x3}) write$FUSE_LK(r4, 0x0, 0x0) unshare(0x40000000) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:56:31 executing program 2: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r3, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r4, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_CREATE(r6, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r6, &(0x7f0000000040), 0x4) fsetxattr$trusted_overlay_origin(r3, &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x2) write$UHID_DESTROY(r6, &(0x7f00000000c0), 0x4) ioctl$VIDIOC_S_CTRL(r5, 0xc008561c, &(0x7f0000000100)={0x3}) write$FUSE_LK(r4, 0x0, 0x0) unshare(0x40000000) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) [ 702.693677][ C0] net_ratelimit: 16 callbacks suppressed [ 702.693686][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 702.705252][ C0] protocol 88fb is buggy, dev hsr_slave_1 21:56:31 executing program 0: remap_file_pages(&(0x7f000000b000/0x4000)=nil, 0x4000, 0x4, 0xffffffff80000000, 0x40020) r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x8, 0x842) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r0, 0x4018620d, &(0x7f0000000040)={0x73622a85, 0x1, 0x3}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000200)=ANY=[@ANYRES32=0x0, @ANYBLOB="0000a6bd1856114502000600014d131dfc3a495139683101818cf82c80"], &(0x7f00000000c0)=0xc) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000100)={r1}, 0x8) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, &(0x7f0000000140)={0x0}) ioctl$DRM_IOCTL_GEM_FLINK(r0, 0xc008640a, &(0x7f0000000180)={0x0}) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, &(0x7f00000001c0)={r2, r3, 0x6}) [ 702.773565][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 702.779494][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 702.785465][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 702.791290][ C0] protocol 88fb is buggy, dev hsr_slave_1 21:56:31 executing program 4: r0 = socket$inet(0x2, 0x805, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, 0x0, &(0x7f0000000000)) 21:56:31 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x0, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) [ 702.926006][T27218] IPVS: ftp: loaded support on port[0] = 21 21:56:32 executing program 5: r0 = socket$inet(0x2, 0x805, 0x0) socket$inet(0x2, 0x804, 0x2) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 21:56:32 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x0, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) [ 703.084163][T26845] hid-generic 0000:0000:0000.001B: unknown main item tag 0x0 [ 703.109754][T26845] hid-generic 0000:0000:0000.001B: hidraw0: HID v0.00 Device [syz1] on syz1 21:56:32 executing program 4: r0 = socket$inet(0x2, 0x805, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, &(0x7f00000001c0)=ANY=[], &(0x7f0000000000)) 21:56:32 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x0, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) 21:56:32 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) ioctl$PPPIOCSPASS(r0, 0x40087446, &(0x7f0000000100)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000003e40)={0x0, 0x0}) recvmmsg(0xffffffffffffffff, &(0x7f0000003dc0)=[{{0x0, 0x0, &(0x7f0000000f40)=[{&(0x7f0000000dc0)=""/174, 0xae}, {&(0x7f0000000e80)=""/191, 0xbf}], 0x2, &(0x7f0000000f80)=""/4096, 0x1000}, 0x6}, {{&(0x7f0000001f80)=@nl, 0x80, &(0x7f0000002680)=[{&(0x7f0000002000)=""/248, 0xf8}, {&(0x7f0000002100)=""/161, 0xa1}, {&(0x7f00000021c0)=""/89, 0x59}, {&(0x7f0000002240)=""/68, 0x44}, {&(0x7f00000022c0)=""/105, 0x69}, {&(0x7f0000002340)=""/134, 0x86}, {&(0x7f0000002400)=""/24, 0x18}, {&(0x7f0000002440)=""/239, 0xef}, {&(0x7f0000002540)=""/104, 0x68}, {&(0x7f00000025c0)=""/143, 0x8f}], 0xa, &(0x7f0000002700)=""/183, 0xb7}, 0x80}, {{&(0x7f00000027c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000003d40)=[{&(0x7f0000002840)=""/4096, 0x1000}, {&(0x7f0000003840)=""/161, 0xa1}, {&(0x7f0000003900)=""/219, 0xdb}, {&(0x7f0000003a00)=""/238, 0xee}, {&(0x7f0000003b00)=""/210, 0xd2}, {&(0x7f0000003c00)=""/170, 0xaa}, {&(0x7f0000003cc0)}, {&(0x7f0000003d00)}], 0x8, &(0x7f0000003d80)=""/25, 0x19}, 0xfffffffeffffffff}], 0x3, 0x100, &(0x7f0000003e80)={r1, r2+30000000}) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000003f00)='TIPCv2\x00') sendmsg$TIPC_NL_NODE_GET(r3, &(0x7f0000004080)={&(0x7f0000003ec0)={0x10, 0x0, 0x0, 0x1800200}, 0xc, &(0x7f0000004040)={&(0x7f0000003f40)={0xf8, r4, 0x400, 0x70bd29, 0x25dfdbff, {}, [@TIPC_NLA_MEDIA={0xa4, 0x5, [@TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1ff}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x800}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffff3ac9980}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000000}]}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}]}, @TIPC_NLA_LINK={0x10, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}, @TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}]}]}, 0xf8}, 0x1, 0x0, 0x0, 0x80}, 0x4000) r5 = socket$inet(0x2, 0x805, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r5, 0x84, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x4) [ 703.398331][T27238] IPVS: ftp: loaded support on port[0] = 21 21:56:32 executing program 4: r0 = socket$inet(0x2, 0x805, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, &(0x7f00000001c0)=ANY=[], &(0x7f0000000000)) 21:56:32 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r3, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r4, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_CREATE(r6, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r6, &(0x7f0000000040), 0x4) fsetxattr$trusted_overlay_origin(r3, &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x2) write$UHID_DESTROY(r6, &(0x7f00000000c0), 0x4) ioctl$VIDIOC_S_CTRL(r5, 0xc008561c, &(0x7f0000000100)={0x3}) write$FUSE_LK(r4, 0x0, 0x0) unshare(0x40000000) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:56:32 executing program 4: r0 = socket$inet(0x2, 0x805, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, &(0x7f00000001c0)=ANY=[], &(0x7f0000000000)) [ 703.797879][T26845] hid-generic 0000:0000:0000.001C: unknown main item tag 0x0 [ 703.813542][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 703.819878][ C0] protocol 88fb is buggy, dev hsr_slave_1 21:56:32 executing program 2: syz_execute_func(&(0x7f0000000200)="980c2c0f050520d0f807913e3e2ef3420f53de4141e2e91e7979855b660f162f0fc4014ef04680b64f002d00c1c4c31d6f3a7f21fc22ebc48265b8dc2e41812047002b0003e86eba0dfe8c738888a1c40fbbf3470f582ee2ed5d3a0808294003b00b0000000f73d53944d1f466f347adc46291ae8ca0656000000f01cc740f2d96000000c4c20d2bf41d1d440f2b550142c4b33120b15ff3b15ffb110f0fca38048336000000") syz_execute_func(&(0x7f0000000100)="43dd25010000006565d93457664a0f3a602b8ce2a0c4ce02fe36f3af89f4f8b29816608f16082e9f450f3804e76640a7fedd660f5b3cf2c403f9df313239345116868bf2f29fc481d9d8dbdff56fd7c14a288112100000") [ 703.845122][T26845] hid-generic 0000:0000:0000.001C: hidraw0: HID v0.00 Device [syz1] on syz1 [ 704.053575][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 704.059456][ C1] protocol 88fb is buggy, dev hsr_slave_1 21:56:34 executing program 0: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000000)={0x7, {0x100, 0x8, 0xffffffff80000000, 0xffff}, {0xd77a, 0x8, 0xd567, 0x3f}, {0x3, 0x100}}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mmap(&(0x7f000000d000/0x3000)=nil, 0x3000, 0x0, 0x23070, r1, 0x0) 21:56:34 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x0, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) 21:56:34 executing program 4: r0 = socket$inet(0x2, 0x805, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, &(0x7f00000001c0)=ANY=[@ANYBLOB], &(0x7f0000000000)=0x1) 21:56:34 executing program 5: r0 = socket$inet(0x2, 0x80000, 0xfffffffffffffffc) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 21:56:34 executing program 2: setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) syz_execute_func(&(0x7f00000005c0)="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") syz_execute_func(&(0x7f0000000080)="43dd25310000006565d93457c4c2e19c3b085dfc37b88282821c41dee0e1a61f0ba69d1ea1ca23cae63acaca014e113e3664f342ac0ca7fdf2430f8103b3d800666fc4a27920b89200000078") syz_execute_func(&(0x7f0000000000)="43dd25310000006565d93457c4c2e19c3bc442f9921c7dfd2f8fe80faeeff30f122d2bbd0000f00fc07094c4e17f104564653e0f01d5c4621596ac13d7f1ef0c") 21:56:34 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r3, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r4, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_CREATE(r6, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r6, &(0x7f0000000040), 0x4) fsetxattr$trusted_overlay_origin(r3, &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x2) write$UHID_DESTROY(r6, &(0x7f00000000c0), 0x4) ioctl$VIDIOC_S_CTRL(r5, 0xc008561c, &(0x7f0000000100)={0x3}) write$FUSE_LK(r4, 0x0, 0x0) unshare(0x40000000) ioctl$VIDIOC_S_JPEGCOMP(r5, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:56:34 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) connect$rxrpc(r1, &(0x7f0000000080)=@in6={0x21, 0x6, 0x2, 0x1c, {0xa, 0x4e22, 0x6, @local, 0xf4a}}, 0x24) openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x400000, 0x0) r2 = socket$inet(0x2, 0x805, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r2, 0x84, 0x7, &(0x7f0000000100), &(0x7f0000000000)=0x20d) ioctl$KVM_DEASSIGN_DEV_IRQ(r0, 0x4040ae75, &(0x7f00000000c0)={0x7, 0x9, 0x1ff, 0x400}) 21:56:34 executing program 2: syz_execute_func(&(0x7f0000000200)="980c2c0f050520d0f807913e3e2ef3420f53de4141e2e91e7979855b660f162f0fc4014ef04680b64f002d00c1c4c31d6f3a7f21fc22ebc48265b8dc2e41812047002b0003e86eba0dfe8c738888a1c40fbbf3470f582ee2ed5d3a0808294003b00b0000000f73d53944d1f466f347adc46291ae8ca0656000000f01cc740f2d96000000c4c20d2bf41d1d440f2b550142c4b33120b15ff3b15ffb110f0fca38048336000000") syz_execute_func(&(0x7f0000000340)="43dd25010000006565d93457664a0f3a602b8ce2a0c4ce02fe36f3af66400f3a41e8a9f8b29816608f16082e9f450f3804e745c6e84ffedd660f5b3cf2c403f9df313239345116868bf2f29fc481d9d8dbdff56fd7c14a288112100000") 21:56:34 executing program 4: r0 = socket$inet(0x2, 0x805, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, &(0x7f00000001c0)=ANY=[@ANYBLOB], &(0x7f0000000000)=0x1) 21:56:34 executing program 1: socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000180)={{0x2, 0x0, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) 21:56:34 executing program 0: remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) [ 705.854404][T27302] IPVS: ftp: loaded support on port[0] = 21 21:56:34 executing program 4: r0 = socket$inet(0x2, 0x805, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, &(0x7f00000001c0)=ANY=[@ANYBLOB], &(0x7f0000000000)=0x1) 21:56:34 executing program 2: syz_execute_func(&(0x7f0000000380)="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") syz_execute_func(&(0x7f0000000080)="43dd25310000006565d934576f0feea52900004a42472f13900080e800085dfc0ffd0b0200f00fba3bcfcd6bfebaba66460f3815d0004d1e41e400ae6567f390c441f9284c1ad25f8d33cac46318788a9ba99699439940dbc72e26473d0f964ba7a7450f28329898a16af4c4e15d75660058bd") 21:56:35 executing program 5: r0 = socket$inet(0x2, 0x805, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x8000, 0x0) sendto$unix(r1, &(0x7f0000000100)="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", 0x1000, 0x20008840, 0x0, 0x0) 21:56:35 executing program 1: socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000180)={{0x2, 0x0, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) 21:56:35 executing program 0: mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x100, 0x280280) setsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000040)=0x1, 0x4) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:56:35 executing program 4: r0 = socket$inet(0x2, 0x805, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, &(0x7f00000001c0)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000007a000000dec02c0b9bebb53f3faf6a03ca46018089582832859f344423c8de997c09ef702cc34e42d5965f466e06c82ae7a99054"], &(0x7f0000000000)=0x1) 21:56:35 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r3, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r4, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_CREATE(r6, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r6, &(0x7f0000000040), 0x4) fsetxattr$trusted_overlay_origin(r3, &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x2) write$UHID_DESTROY(r6, &(0x7f00000000c0), 0x4) ioctl$VIDIOC_S_CTRL(r5, 0xc008561c, &(0x7f0000000100)={0x3}) write$FUSE_LK(r4, 0x0, 0x0) unshare(0x40000000) ioctl$VIDIOC_S_JPEGCOMP(r5, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:56:35 executing program 1: socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000180)={{0x2, 0x0, @loopback}, {0x20000000304, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) 21:56:35 executing program 2: syz_execute_func(&(0x7f00000001c0)="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") syz_execute_func(&(0x7f0000000140)="43dd25310000006565d934574d0faea529000000472f13900080e800085dfc0ffd0b02000002cd6bfebaba66460f3815d0004d1e41e400ae6567f390c441f9284c1ad25f8d33cac46318788a9ba99699439940dbc72e26473d0f964ba7a7450f28329898a16af4c4e15d75660058bd") 21:56:35 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x2, 0x0) ioctl$void(r0, 0xc0045c79) r1 = socket$inet(0x2, 0x805, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 21:56:35 executing program 4: r0 = socket$inet(0x2, 0x805, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, &(0x7f00000001c0)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000007a000000dec02c0b9bebb53f3faf6a03ca46018089582832859f344423c8de997c09ef702cc34e42d5965f466e06c82ae7a99054"], &(0x7f0000000000)=0x1) 21:56:35 executing program 0: mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) r0 = creat(&(0x7f0000000000)='./file0\x00', 0xa) ioctl$TIOCGICOUNT(r0, 0x545d, 0x0) 21:56:35 executing program 2: syz_execute_func(&(0x7f0000000480)="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") openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/pf\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="43dd25310000006565d93457c4c2e19c3bc442f9921c7dfd2f8fe80faeeff30f122d2bbd0000f00fc07094c4e17f104564653e0f01d5c4621596ac13d7f1ef0c") 21:56:35 executing program 4: r0 = socket$inet(0x2, 0x805, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, &(0x7f00000001c0)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000007a000000dec02c0b9bebb53f3faf6a03ca46018089582832859f344423c8de997c09ef702cc34e42d5965f466e06c82ae7a99054"], &(0x7f0000000000)=0x1) 21:56:35 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, 0x0) 21:56:35 executing program 5: r0 = socket$inet(0x2, 0x805, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r1 = dup3(r0, r0, 0x80000) readahead(r0, 0x2706, 0x5) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000340)={&(0x7f0000000100)={0x220, r2, 0x100, 0x70bd2d, 0x25dfdbfd, {}, [@TIPC_NLA_MEDIA={0x98, 0x5, [@TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x516}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffffffffffb}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xa49f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x86d}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100}]}]}, @TIPC_NLA_LINK={0x10, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}, @TIPC_NLA_LINK={0x120, 0x4, [@TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}]}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2dcb}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3ff}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000000}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}]}]}, @TIPC_NLA_MON={0x44, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x642}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xfffffffffffff51b}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}]}]}, 0x220}, 0x1, 0x0, 0x0, 0x20000000}, 0x1) 21:56:35 executing program 0: mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x40063) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) umount2(&(0x7f0000000000)='./file0\x00', 0x8) [ 706.824984][ T9317] hid-generic 0000:0000:0000.001D: unknown main item tag 0x0 [ 706.863404][T27374] IPVS: ftp: loaded support on port[0] = 21 [ 706.914997][ T9317] hid-generic 0000:0000:0000.001D: hidraw0: HID v0.00 Device [syz1] on syz1 21:56:36 executing program 4: r0 = socket$inet(0x2, 0x805, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, &(0x7f00000001c0)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000007a000000dec02c0b9bebb53f3faf6a03ca46018089582832859f344423c8de997c09ef702cc34e42d5965f466e06c82ae7a990546be896c05365c4a611e9bd7389ee90f1168e03883b3a8e1effdd344245cff94646a4dca009309c21a978"], &(0x7f0000000000)=0x1) 21:56:36 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r3, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r4, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_CREATE(r6, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r6, &(0x7f0000000040), 0x4) fsetxattr$trusted_overlay_origin(r3, &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x2) write$UHID_DESTROY(r6, &(0x7f00000000c0), 0x4) ioctl$VIDIOC_S_CTRL(r5, 0xc008561c, &(0x7f0000000100)={0x3}) write$FUSE_LK(r4, 0x0, 0x0) unshare(0x40000000) ioctl$VIDIOC_S_JPEGCOMP(r5, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:56:36 executing program 2: syz_execute_func(&(0x7f0000000140)="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") syz_execute_func(&(0x7f0000000340)="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") sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000100)="f508b57b646f8babe1f856b6f2c6ad1b724165b531", 0x15}], 0x1}, 0x0) syz_execute_func(&(0x7f00000002c0)="43dd25010100007565d93457476d951912ff826d6d96752666420fe982000000007b5bf78f29a89daf0000000036a76426440f01fc46ae38bfd5") mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x410, 0xffffffffffffffff, 0x0) 21:56:36 executing program 0: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x10000, 0x0) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x0, 0x1b071, r0, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:56:36 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, 0x0) 21:56:36 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x20080, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000180)={'L+', 0x5}, 0x28, 0x1) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000080)={'ip6gretap0\x00', {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}) r1 = socket$inet(0x2, 0x805, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000000), &(0x7f0000000100)=0x4) 21:56:36 executing program 4: r0 = socket$inet(0x2, 0x805, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, &(0x7f00000001c0)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000007a000000dec02c0b9bebb53f3faf6a03ca46018089582832859f344423c8de997c09ef702cc34e42d5965f466e06c82ae7a990546be896c05365c4a611e9bd7389ee90f1168e03883b3a8e1effdd344245cff94646a4dca009309c21a978"], &(0x7f0000000000)=0x1) 21:56:36 executing program 4: r0 = socket$inet(0x2, 0x805, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, &(0x7f00000001c0)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000007a000000dec02c0b9bebb53f3faf6a03ca46018089582832859f344423c8de997c09ef702cc34e42d5965f466e06c82ae7a990546be896c05365c4a611e9bd7389ee90f1168e03883b3a8e1effdd344245cff94646a4dca009309c21a978"], &(0x7f0000000000)=0x1) 21:56:36 executing program 0: mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f0000fff000/0x1000)=nil) r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x3, 0x410000) ioctl$KVM_SET_TSC_KHZ(r0, 0xaea2, 0x5) write$FUSE_POLL(r0, &(0x7f0000000040)={0x18, 0x0, 0x2, {0x5}}, 0x18) connect$tipc(r0, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x1, {0x41, 0x3, 0x1}}, 0x10) write$uinput_user_dev(r0, &(0x7f00000000c0)={'syz0\x00', {0x5, 0x8, 0x10, 0x8}, 0x52, [0xc60, 0x7, 0x2, 0xffffffffffffffbd, 0x4, 0x1, 0x1, 0xfff, 0x1cc57576, 0x8, 0x5179, 0x7, 0xfffffffffffffffd, 0x1, 0xffff, 0x5, 0x10000, 0x2, 0x3, 0x3, 0x10001, 0x0, 0x8, 0x5e15, 0x6, 0x8, 0x3a3, 0x200, 0x200, 0x5, 0x2, 0x2, 0x1000, 0x81, 0x559, 0x0, 0x8, 0x6, 0x0, 0x3, 0xed4, 0x516605be, 0x100, 0xe6c7, 0xb730, 0x5, 0x8000, 0x0, 0x2da2, 0x8, 0x9, 0x1000, 0x9, 0xfe, 0x6, 0x40, 0x0, 0x0, 0x1ff, 0x8000, 0x7fff, 0x6, 0x8000], [0x4, 0x9, 0x3f, 0x2, 0x80, 0x3ff, 0x7, 0x3, 0x3, 0x6, 0xffff, 0x8, 0x4, 0x2, 0x3ff, 0x7, 0x3b62, 0xfffffffffffffff7, 0x0, 0xffffffffffffff01, 0x0, 0x1ff, 0xfffffffffffffff4, 0xed7, 0x0, 0x7, 0x0, 0x8001, 0x9, 0x8, 0x7, 0x7, 0x9, 0x20, 0x3, 0x5, 0xfffffffffffffc60, 0x1, 0x5, 0x2, 0x5, 0xf3cd, 0x72, 0x6, 0x6, 0x400, 0x4, 0x5, 0x65, 0x1000, 0x7, 0x80000001, 0xc9, 0x80000001, 0x8, 0x7, 0x100000000, 0x1000, 0x95, 0x5, 0xffffffff9db6816c, 0x4, 0x8000, 0x187], [0x81, 0x1, 0xde3, 0xfffffffffffffffa, 0x4, 0x1, 0xffff, 0x800, 0x972, 0x800, 0x3, 0x154, 0x1f, 0x1, 0x3, 0x4, 0x10001, 0x3, 0x52d4, 0x3f, 0x1, 0x0, 0xed01, 0x3, 0x2, 0x0, 0x20, 0x4, 0x8, 0x7, 0x8, 0x9, 0x7, 0xa8, 0x95f9, 0x3, 0xf1, 0x8, 0x5, 0x401, 0x65, 0xff, 0x1, 0x7c28e57, 0x7, 0x8596, 0x0, 0x4, 0xffffffffffffff00, 0xf, 0x3, 0x9, 0x2, 0x10001, 0x7ff, 0x0, 0xff, 0x6a0e, 0x8001, 0x6, 0x0, 0x7f, 0x10000], [0x6, 0x7f, 0x0, 0x2, 0x101, 0xfffffffffffffff8, 0xffffffff, 0x3, 0xfffffffffffffffd, 0x0, 0x172c56b30000000, 0x16ae, 0x0, 0x1f, 0x5, 0x3, 0x3f, 0x566, 0xffffffffffffffc0, 0x5, 0x1, 0x0, 0x1, 0x8, 0x47d, 0xc9f1, 0x400, 0x6, 0x5, 0xffff, 0x800, 0x8000, 0x3, 0x7, 0x2, 0x4, 0x5, 0x423d, 0x6, 0x9, 0xdf5, 0x8, 0x2, 0x9, 0x0, 0x7, 0x3, 0x7ff, 0x4, 0x0, 0x8, 0x100000001, 0x1, 0x8000, 0x10001, 0x1, 0xa00000000000000, 0xaf, 0x1, 0x2be, 0x1f, 0xa660, 0x5]}, 0x45c) 21:56:36 executing program 5: r0 = socket$inet(0x2, 0x805, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x3, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x7) 21:56:36 executing program 2: pipe2(&(0x7f0000000040), 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x14e}}, 0x0) syz_execute_func(&(0x7f0000000180)="f2af91930f0124eda133fa20430fbafce842f66188d0d4f814c1ab5be2f9660f3a0fae5e090000ba44d8d1c401f5ef1ac4817d73d74ec4a275bd153c78ab7749f216c863fa43c4c2750ade1bdbae95c4e1a05d6b06aa420f383c02c401405c6bfdc402b504a60080000068d768f833c4a1cd61b3b23c0000ab26dbc1a1fe5ff6f6df0804f4c4efa59cc442abf58f104eb547288ba6452e000054c4431d3e660f6e7f3c") 21:56:36 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, 0x0) [ 707.680007][ T9317] hid-generic 0000:0000:0000.001E: unknown main item tag 0x0 [ 707.740239][ T9317] hid-generic 0000:0000:0000.001E: hidraw0: HID v0.00 Device [syz1] on syz1 [ 707.756528][T27425] IPVS: ftp: loaded support on port[0] = 21 21:56:36 executing program 4: r0 = socket$inet(0x2, 0x805, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, &(0x7f00000001c0)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000007a000000dec02c0b9bebb53f3faf6a03ca46018089582832859f344423c8de997c09ef702cc34e42d5965f466e06c82ae7a990546be896c05365c4a611e9bd7389ee90f1168e03883b3a8e1effdd344245cff94646a4dca009309c21a978254f9fc0afbd32d7cae996eda7ca29841f740b19fc"], &(0x7f0000000000)=0x1) [ 707.973565][ C0] net_ratelimit: 18 callbacks suppressed [ 707.973574][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 707.979403][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 708.213619][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 708.219494][ C1] protocol 88fb is buggy, dev hsr_slave_1 21:56:37 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r3, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r4, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_CREATE(r6, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r6, &(0x7f0000000040), 0x4) fsetxattr$trusted_overlay_origin(r3, &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x2) write$UHID_DESTROY(r6, &(0x7f00000000c0), 0x4) ioctl$VIDIOC_S_CTRL(r5, 0xc008561c, &(0x7f0000000100)={0x3}) write$FUSE_LK(r4, 0x0, 0x0) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r5, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:56:37 executing program 5: r0 = socket$inet(0x2, 0x805, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000080), &(0x7f0000000000)=0x4) 21:56:37 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x0, @loopback}, {0x0, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) 21:56:37 executing program 0: syz_genetlink_get_family_id$net_dm(&(0x7f0000000000)='NET_DM\x00') mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x20000, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x8, 0x402280) recvmsg$kcm(r1, &(0x7f0000000340)={&(0x7f00000000c0)=@isdn, 0x80, &(0x7f0000000240)=[{&(0x7f0000000140)=""/199, 0xc7}], 0x1, &(0x7f0000000280)=""/134, 0x86}, 0x10000) ioctl$NBD_SET_SIZE_BLOCKS(r0, 0xab07, 0x8001) mremap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:56:37 executing program 4: r0 = socket$inet(0x2, 0x805, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, &(0x7f00000001c0)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000007a000000dec02c0b9bebb53f3faf6a03ca46018089582832859f344423c8de997c09ef702cc34e42d5965f466e06c82ae7a990546be896c05365c4a611e9bd7389ee90f1168e03883b3a8e1effdd344245cff94646a4dca009309c21a978254f9fc0afbd32d7cae996eda7ca29841f740b19fc"], &(0x7f0000000000)=0x1) 21:56:37 executing program 2: pipe2(&(0x7f0000000040), 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x14a}}, 0x0) syz_execute_func(&(0x7f0000000180)="f2af91930f0124eda133fa20430fbafce842f66188d0d4f814c1ab5be2f9660f3a0fae5e090000ba44d8d1c401f5ef1ac4817d73d74ec4a275bd153c78ab7749f216c863fa43c4c2750ade1bdbae95c4e1a05d6b06aa420f383c02c401405c6bfdc402b504a60080000068d768f833c4a1cd61b3b23c0000ab26dbc1a1fe5ff6f6df0804f4c4efa59cc442abf58f104eb547288ba6452e000054c4431d3e660f6e7f3c") 21:56:37 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x0, @loopback}, {0x0, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) 21:56:37 executing program 5: r0 = socket$inet(0x2, 0x805, 0x0) r1 = syz_open_dev$radio(&(0x7f00000001c0)='/dev/radio#\x00', 0x1, 0x2) ioctl$EVIOCGKEY(r1, 0x80404518, &(0x7f0000000200)=""/46) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x6}, 0x8) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 21:56:37 executing program 4: r0 = socket$inet(0x2, 0x805, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, &(0x7f00000001c0)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000007a000000dec02c0b9bebb53f3faf6a03ca46018089582832859f344423c8de997c09ef702cc34e42d5965f466e06c82ae7a990546be896c05365c4a611e9bd7389ee90f1168e03883b3a8e1effdd344245cff94646a4dca009309c21a978254f9fc0afbd32d7cae996eda7ca29841f740b19fc"], &(0x7f0000000000)=0x1) 21:56:37 executing program 0: mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0xffffffff, 0x400) ioctl$KVM_CREATE_PIT2(r0, 0x4040ae77, &(0x7f0000000040)={0xeb8}) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0xfffffffffffffffc) fcntl$setpipe(r0, 0x407, 0x0) ioctl$VIDIOC_TRY_FMT(r0, 0xc0cc5640, &(0x7f0000000080)={0x4, @pix_mp={0x8a, 0x100, 0x39555659, 0x4, 0xc, [{0x7fff, 0xf800}, {0x1, 0x3}, {0x78a, 0x6}, {0x6, 0xe7}, {0x2, 0xff}, {0x9, 0x9}, {0x7, 0xfffffffc00000000}, {0x6, 0x5}], 0x80000001, 0x5bcc, 0x0, 0x2, 0x1}}) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:56:37 executing program 2: pipe2(&(0x7f0000000040), 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80001000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") sendmsg$key(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="02000000bf0100000000000000000000ba010000086e000021232948de042774602f36cddb4aa287b3b3312d91f7cd26167f6444b666a5c2b5023d6da31997c5864183bb5548c8d5210899d6b5b6d5efcd76ffd06e3e62e26c761a6047d17f3aed967ad2b9eaceeae2cb7df923371fd5e88cb2109310447fd0b311245765d6097e53a8c17cc048956f81eae779bb571cacac48a457bd4d0318be01a875d806aca226452f0a40a6eaa49bd51e448d160dee6cb1b7154b67078c77c404f67883fdeea217dddce5faf01620da79e102ffa9192e2b0b89fc559edd377d1ba0dce6baf4f99d80879756b350f508274acd1cd428d448cf820f4706031e75835813e13b954579822cabf5c49c204788c967997833ccbf197ef5fe6a6fa3b8cc8808fb8af13058263c1f576dad05236f0aa8d4d9d46f05a2d510e430f553756fd3aae8cba7bac5f2ca2a3eb779f29b0a7f"], 0x14d}}, 0x0) syz_execute_func(&(0x7f0000000180)="f2af91930f0124eda133fa20430fbafce842f66188d0d4f814c1ab5be2f9660f3a0fae5e090000ba44d8d1c401f5ef1ac4817d73d74ec4a275bd153c78ab7749f216c863fa43c4c2750ade1bdbae95c4e1a05d6b06aa420f383c02c401405c6bfdc402b504a60080000068d768f833c4a1cd61b3b23c0000ab26dbc1a1fe5ff6f6df0804f4c4efa59cc442abf58f104eb547288ba6452e000054c4431d3e660f6e7f3c") [ 708.663637][ T9317] hid-generic 0000:0000:0000.001F: unknown main item tag 0x0 21:56:37 executing program 4: r0 = socket$inet(0x2, 0x805, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, &(0x7f00000001c0)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000007a000000dec02c0b9bebb53f3faf6a03ca46018089582832859f344423c8de997c09ef702cc34e42d5965f466e06c82ae7a990546be896c05365c4a611e9bd7389ee90f1168e03883b3a8e1effdd344245cff94646a4dca009309c21a978254f9fc0afbd32d7cae996eda7ca29841f740b19fc394615b66573c867c370"], &(0x7f0000000000)=0x1) [ 708.708285][ T9317] hid-generic 0000:0000:0000.001F: hidraw0: HID v0.00 Device [syz1] on syz1 21:56:37 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r3, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r4, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_CREATE(r6, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r6, &(0x7f0000000040), 0x4) fsetxattr$trusted_overlay_origin(r3, &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x2) write$UHID_DESTROY(r6, &(0x7f00000000c0), 0x4) ioctl$VIDIOC_S_CTRL(r5, 0xc008561c, &(0x7f0000000100)={0x3}) write$FUSE_LK(r4, 0x0, 0x0) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r5, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:56:38 executing program 5: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x400240, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/xfrm_stat\x00') ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x805, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r2, 0x84, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x4) getrandom(&(0x7f0000000100)=""/140, 0x8c, 0x1) ioctl$TIOCSRS485(r0, 0x542f, &(0x7f00000001c0)={0x7, 0x7fff, 0xe051}) 21:56:38 executing program 4: r0 = socket$inet(0x2, 0x805, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, &(0x7f00000001c0)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000007a000000dec02c0b9bebb53f3faf6a03ca46018089582832859f344423c8de997c09ef702cc34e42d5965f466e06c82ae7a990546be896c05365c4a611e9bd7389ee90f1168e03883b3a8e1effdd344245cff94646a4dca009309c21a978254f9fc0afbd32d7cae996eda7ca29841f740b19fc394615b66573c867c370"], &(0x7f0000000000)=0x1) 21:56:38 executing program 0: syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x200000, 0x0) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, r0, 0x0) mremap(&(0x7f0000006000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) ioctl$SCSI_IOCTL_GET_IDLUN(r0, 0x5382, &(0x7f0000000080)) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000200)=0x8000000000000007, 0x3e4) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x44, r1, 0x400, 0x70bd26, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x28, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x35}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0xa, 0xc}}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x20000080}, 0x0) 21:56:38 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x0, @loopback}, {0x0, @remote}, 0x5, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) 21:56:38 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 21:56:38 executing program 5: r0 = socket$inet(0x2, 0x803, 0x6) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r1 = syz_open_dev$sndpcmc(&(0x7f0000000240)='/dev/snd/pcmC#D#c\x00', 0xb3, 0x0) bind$tipc(r1, &(0x7f0000000280)=@nameseq={0x1e, 0x1, 0x3, {0x1, 0x0, 0x2}}, 0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000100)={0x9, 0x200, 0x8, 0x40, 0x0}, &(0x7f0000000140)=0x10) bind$inet(r0, &(0x7f00000002c0)={0x2, 0x4e20, @rand_addr=0x1c30}, 0x10) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f0000000180)={r2, @in6={{0xa, 0x4e20, 0x58, @mcast2, 0xc3}}}, 0x84) accept4$inet(r0, &(0x7f0000000000)={0x2, 0x0, @dev}, &(0x7f0000000040)=0x10, 0x800) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000300)={r2, @in6={{0xa, 0x4e20, 0x10001, @ipv4={[], [], @local}, 0x7}}, 0xfffffffffffffffc, 0x5, 0x8, 0x7, 0x2}, 0x98) 21:56:38 executing program 4: r0 = socket$inet(0x2, 0x805, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, &(0x7f00000001c0)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000007a000000dec02c0b9bebb53f3faf6a03ca46018089582832859f344423c8de997c09ef702cc34e42d5965f466e06c82ae7a990546be896c05365c4a611e9bd7389ee90f1168e03883b3a8e1effdd344245cff94646a4dca009309c21a978254f9fc0afbd32d7cae996eda7ca29841f740b19fc394615b66573c867c370"], &(0x7f0000000000)=0x1) 21:56:38 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{0x2, 0x0, @loopback}, {0x20000000304, @remote}, 0x0, {0x2, 0x0, @local}, '\xfb\x17C\x1a3\x00'}) 21:56:38 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r3, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r4, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_CREATE(r6, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r6, &(0x7f0000000040), 0x4) fsetxattr$trusted_overlay_origin(r3, &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x2) write$UHID_DESTROY(r6, &(0x7f00000000c0), 0x4) ioctl$VIDIOC_S_CTRL(r5, 0xc008561c, &(0x7f0000000100)={0x3}) write$FUSE_LK(r4, 0x0, 0x0) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r5, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:56:38 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50000}]}) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000180)=""/4096, 0x0) 21:56:38 executing program 0: mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) sigaltstack(&(0x7f0000ffb000/0x4000)=nil, &(0x7f00000000c0)) 21:56:38 executing program 4: r0 = socket$inet(0x2, 0x805, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, &(0x7f00000001c0)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000007a000000dec02c0b9bebb53f3faf6a03ca46018089582832859f344423c8de997c09ef702cc34e42d5965f466e06c82ae7a990546be896c05365c4a611e9bd7389ee90f1168e03883b3a8e1effdd344245cff94646a4dca009309c21a978254f9fc0afbd32d7cae996eda7ca29841f740b19fc394615b66573c867c370f8f5301809"], &(0x7f0000000000)=0x1) 21:56:38 executing program 5: r0 = socket$inet(0x2, 0x1, 0x0) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xfffffffffffffd3d, 0xc, 0x5}, {0x0, [0x0, 0x0, 0x7f]}}, &(0x7f0000000100)=""/93, 0x29, 0x5d}, 0x230) r2 = msgget$private(0x0, 0x82) msgctl$IPC_STAT(r2, 0x2, &(0x7f0000000200)=""/173) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000180)=ANY=[@ANYBLOB="04060bdc8d1f0041f9e867", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESDEC=r1], &(0x7f00000001c0)=0x5) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 21:56:38 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fchdir(r0) [ 709.814903][ T9269] hid-generic 0000:0000:0000.0020: unknown main item tag 0x0 21:56:38 executing program 0: mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) r0 = getgid() setfsgid(r0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) [ 709.857424][ T9269] hid-generic 0000:0000:0000.0020: hidraw0: HID v0.00 Device [syz1] on syz1 21:56:38 executing program 4: r0 = socket$inet(0x2, 0x805, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, &(0x7f00000001c0)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000007a000000dec02c0b9bebb53f3faf6a03ca46018089582832859f344423c8de997c09ef702cc34e42d5965f466e06c82ae7a990546be896c05365c4a611e9bd7389ee90f1168e03883b3a8e1effdd344245cff94646a4dca009309c21a978254f9fc0afbd32d7cae996eda7ca29841f740b19fc394615b66573c867c370f8f5301809"], &(0x7f0000000000)=0x1) 21:56:39 executing program 2: syz_execute_func(&(0x7f0000000380)="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") syz_execute_func(&(0x7f0000000080)="43dd25310000006565d934570d0daea529000000472f13900080e800085dfc0ffd0b0200c462fd22be0e000000cd6bfebaba66460f3815d0004d1e41e400ae6567f390c441f9284c1ad2c4027932458d8d3326ff96a1f6000058588a9ba99699439940dbc72e26473d0f964ba7a7450f28329898a16af4c4e15d75660058bd") 21:56:39 executing program 5: r0 = socket$inet(0x2, 0x805, 0x0) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x4040, 0x0) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000100)={0x0, 0x7f, 0x81, 0x7ff, 0x8, 0x4, 0x1000, 0x20, {0x0, @in6={{0xa, 0x4e23, 0x3f2, @empty, 0xfb7}}, 0x0, 0x100000000, 0x5, 0x4, 0x7}}, &(0x7f0000000040)=0xb0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000001c0)={r2, 0x80, 0x9, 0x8, 0x8, 0x7ff80000000}, &(0x7f0000000200)=0x14) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 21:56:39 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r3, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r4, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_CREATE(r6, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r6, &(0x7f0000000040), 0x4) fsetxattr$trusted_overlay_origin(r3, &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x2) write$UHID_DESTROY(r6, &(0x7f00000000c0), 0x4) ioctl$VIDIOC_S_CTRL(r5, 0xc008561c, &(0x7f0000000100)={0x3}) unshare(0x40000000) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r5, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:56:39 executing program 1: syz_execute_func(&(0x7f0000000340)="96419cc481782feb0f05bf04411100c4a37bf0c55c41e2e9666bf86402480057000f33b8c4f4014e4e4e5b4b264ad80f30091e1edee509c421045f4607c421dd5831c4e10bf8c42646770364660f3838520a470f898c00000096ea33ed33ed4877f866440ff4697683397fd3fb0000c4227d215106662ad78fa820ce3416f9f30f5904797c7c66f2ab440fec3f67ddddc4a17b12620d0fddf6c6c466c4e221af75432ec3c4e2899294d80000000019c2c44231ae83cd0000000b0b0000c4414e53d2c58160160033debbc6efc6a8f2aec4e109f3fb00f1ebeb628f8f7d9b6500f236f04283a900800000002626802d08000000ba41d805000000005c450f91f3c4638d6e8df9ffffff0043ffffff0f4133f9fb11fc0fdfb83aa2f1fb3be2") syz_execute_func(&(0x7f0000000180)="43dd25310000006565d93457c4a2790ec3470f13149066450f134d7dc4a2452c7500104a0fe3f421f421696d6242b2673e672667400ff155058f4948015500c401fa2c491d66440f38012af30f5afefbc2660fc482c13f0bc402f1926c520e") 21:56:39 executing program 4: r0 = socket$inet(0x2, 0x805, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, &(0x7f00000001c0)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000007a000000dec02c0b9bebb53f3faf6a03ca46018089582832859f344423c8de997c09ef702cc34e42d5965f466e06c82ae7a990546be896c05365c4a611e9bd7389ee90f1168e03883b3a8e1effdd344245cff94646a4dca009309c21a978254f9fc0afbd32d7cae996eda7ca29841f740b19fc394615b66573c867c370f8f5301809"], &(0x7f0000000000)=0x1) 21:56:39 executing program 0: mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm_plock\x00', 0x280402, 0x0) set_robust_list(&(0x7f00000000c0)={&(0x7f0000000000), 0x8, &(0x7f0000000080)={&(0x7f0000000040)}}, 0xc) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:56:39 executing program 2: syz_execute_func(&(0x7f0000000200)="980c2c0f050520d0f807913e3e2ef3420f53de4141e2e91e7979855b660f162f0fc4014ef04680b64f002d00c1c4c31d6f3a7f21fc22ebc48265b8dc2e41812047002b0003e86eba0dfe8c738888a1c40fbbf3470f582ee2ed5d3a0808294003b00b0000000f73d53944d1f466f347adc46291ae8ca0656000000f01cc740f2d96000000c4c20d2bf41d1d440f2b550142c4b33120b15ff3b15ffb110f0fca38048336000000") syz_execute_func(&(0x7f0000000000)="43dd25010000006565d93457664a0f3a602b8ce2a0c401782b56a602fe407c0089f4f8f3470f5eae6594719a16608f161e082c2cf7450f3804e745c6e84ffedd2edf2c56c403f968019939345116868bf2f29fc4660f514ac4626d01b000000000c14a288112100000") [ 710.293558][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 710.299752][ C1] protocol 88fb is buggy, dev hsr_slave_1 21:56:39 executing program 1: syz_execute_func(&(0x7f0000000480)="96c4217a2df1c4a2791dcd1c040f05bf04411100c4a37bf0c55c41e2e9660f380a0e000f33b8c4f4014e4e4e5b4b264ad80f30091e1edee509c421045f4607c421dd5831c4e10bf8c45b64660f3838520a470f898c00000096c4c2550a14653223333333ed8fe8189ff2bb4877f866440ff4697683397fd3fb000034c4227d215106062ad7450f01ee66400f64287c7c66f2ab440fec3f67dddde8e80f79cec466b1f72ec3c4e2899294d80000000019c2c2b0c10b0b8f0001c1cdfe01c1cdfed2c581601643d9ee0fc60fc6a0a8f3f3000000f1ebeb628f8f709b6500f2e4f0428ba940800000000026802d08000000bac749c4d05d5d0f91f3c4638d6e8df9ffffff00ffff410f4acefb110f66474eb83aa2f1fbfbe2") syz_execute_func(&(0x7f0000000240)="43dd25310000006565d93457c4e1f9c5cb73470f761f0f94f6c4a2499710c4e2d13aaefeefd7ff653e0f212dd5d5fdecc4a3815dbd9989999908c46155dba32200007a0031ffc4a2919224fb") [ 710.373581][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 710.379458][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 710.385396][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 710.391391][ C0] protocol 88fb is buggy, dev hsr_slave_1 21:56:39 executing program 5: r0 = socket$inet(0x2, 0x805, 0x8000) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 21:56:39 executing program 4: r0 = socket$inet(0x2, 0x805, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, &(0x7f00000001c0)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000007a000000dec02c0b9bebb53f3faf6a03ca46018089582832859f344423c8de997c09ef702cc34e42d5965f466e06c82ae7a990546be896c05365c4a611e9bd7389ee90f1168e03883b3a8e1effdd344245cff94646a4dca009309c21a978254f9fc0afbd32d7cae996eda7ca29841f740b19fc394615b66573c867c370f8f5301809b40c06"], &(0x7f0000000000)=0x1) [ 710.445801][ T9269] hid-generic 0000:0000:0000.0021: unknown main item tag 0x0 [ 710.466984][T27576] IPVS: ftp: loaded support on port[0] = 21 [ 710.478152][ T9269] hid-generic 0000:0000:0000.0021: hidraw0: HID v0.00 Device [syz1] on syz1 21:56:39 executing program 2: syz_execute_func(&(0x7f0000000100)="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") syz_execute_func(&(0x7f0000000080)="43dd2521000000b376d93457932bace341f1bb212196b31470a9c541c541000100806a3e00004081eff4373413c4a205af670921a8d9d929cacaca7c81d2c1c22e66654f9744a9a736066d6d973e404c9766450ff344af042e6d660f6785000000808fc978db6705c442fd2a1d71250000") 21:56:39 executing program 0: syz_execute_func(&(0x7f0000000380)="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") syz_execute_func(&(0x7f0000000100)="43dd25310000006565d934574d0faea5290000004726dc2f13900080e800c48279326f0002000002cd6b3815d0004d1e663ef3460f38f676d8ae6567f390c441f9284c1ad25f8fa8cac46318788a9ba99699439940dbc7c4817c5bb100000000a7450f28329898a16af4c4e15d75660058bd") socket$inet6_udp(0x1c, 0x2, 0x0) 21:56:39 executing program 1: syz_execute_func(&(0x7f0000000200)="980c2c0f050520d0f807913e3e2ef3420f53de4141e2e91e7979855b660f162f0fc4014ef04680b64f002d00c1c4c31d6f3a7f21fc22ebc48265b8dc2e41812047002b0003e86eba0dfe8c738888a1c40fbbf3470f582ee2ed5d3a0808294003b00b0000000f73d53944d1f466f347adc46291ae8ca0656000000f01cc740f2d96000000c4c20d2bf41d1d440f2b550142c4b33120b15ff3b15ffb110f0fca38048336000000") syz_execute_func(&(0x7f0000000080)="43dd25010000006565d93457664a0f3a602b8ce2a0c401782b56a602fe36f3af8933f4f4b29816608f161e082c2cc6e83443dad5c403f9680199393451da7942868bf2f29fc4660f5108d7c14a288112100000") 21:56:39 executing program 4: r0 = socket$inet(0x2, 0x805, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, &(0x7f00000001c0)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000007a000000dec02c0b9bebb53f3faf6a03ca46018089582832859f344423c8de997c09ef702cc34e42d5965f466e06c82ae7a990546be896c05365c4a611e9bd7389ee90f1168e03883b3a8e1effdd344245cff94646a4dca009309c21a978254f9fc0afbd32d7cae996eda7ca29841f740b19fc394615b66573c867c370f8f5301809b40c06"], &(0x7f0000000000)=0x1) 21:56:40 executing program 2: syz_execute_func(&(0x7f0000000000)="980c2c0f050520d0f807913e3e2ef3420f53de4141e2e91e7979855b660f162f0fc4014ef04680b64f002d00c1c4c31d6f3a7f21fc22ebc48265b8dc2e41812047002b0003e86eba0dfe8c738888a1c40fbbf3470f582ee2ed5d3a0808294003b00b0000000f73d53944d1f466f347adc46291ae8ca0656000000f01cc740f2d96000000c4c20d2bf41d1d440f2b550142c4b33120b15ff3b15ffb110f0fca38048336000000") syz_execute_func(&(0x7f00000000c0)="43dd25010000006565d93457458da001782b56a636f3af89f4f81b1b9816608f161ef008d42c2c0f3804e72e0fbab8902c000000c4027918e5c403f96801993934513a16868bf2f29fc4660f5108c4626d01b000000000c14a2881121026f3400f6f1b") 21:56:40 executing program 5: r0 = socket$inet(0x2, 0x0, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000080), &(0x7f0000000000)=0x4) 21:56:40 executing program 0: syz_execute_func(&(0x7f0000000200)="980c2c0f050520d0f807913e3e2ef3420f53de4141e2e91e7979855b660f162f0fc4014ef04680b64f002d00c1c4c31d6f3a7f21fc22ebc48265b8dc2e41812047002b0003e86eba0dfe8c738888a1c40fbbf3470f582ee2ed5d3a0808294003b00b0000000f73d53944d1f466f347adc46291ae8ca0656000000f01cc740f2d96000000c4c20d2bf41d1d440f2b550142c4b33120b15ff3b15ffb110f0fca38048336000000") syz_execute_func(&(0x7f0000000000)="43dd25010000006565d93457664a0f3a602b8c650f6b84c300800000c4ce180936f3af89f440dab49e7e18e1978f16082e9f400f1d600f45c6e84fdefedddd0f5b3cf2c403f9df3132393451ca4c1686478bf2f29fc4c4d9d8dbdff56f0f288112000000") 21:56:40 executing program 4: r0 = socket$inet(0x2, 0x805, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, &(0x7f00000001c0)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000007a000000dec02c0b9bebb53f3faf6a03ca46018089582832859f344423c8de997c09ef702cc34e42d5965f466e06c82ae7a990546be896c05365c4a611e9bd7389ee90f1168e03883b3a8e1effdd344245cff94646a4dca009309c21a978254f9fc0afbd32d7cae996eda7ca29841f740b19fc394615b66573c867c370f8f5301809b40c06"], &(0x7f0000000000)=0x1) 21:56:40 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r3, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r4, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_CREATE(r6, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r6, &(0x7f0000000040), 0x4) fsetxattr$trusted_overlay_origin(r3, &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x2) write$UHID_DESTROY(r6, &(0x7f00000000c0), 0x4) ioctl$VIDIOC_S_CTRL(r5, 0xc008561c, &(0x7f0000000100)={0x3}) unshare(0x40000000) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r5, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:56:40 executing program 1: syz_execute_func(&(0x7f0000000200)="980c2c0f050520d0f807913e3e2ef3420f53de4141e2e91e7979855b660f162f0fc4014ef04680b64f002d00c1c4c31d6f3a7f21fc22ebc48265b8dc2e41812047002b0003e86eba0dfe8c738888a1c40fbbf3470f582ee2ed5d3a0808294003b00b0000000f73d53944d1f466f347adc46291ae8ca0656000000f01cc740f2d96000000c4c20d2bf41d1d440f2b550142c4b33120b15ff3b15ffb110f0fca38048336000000") syz_execute_func(&(0x7f0000000540)="43dd25010000006565d93457664a0f3a602b8ce2a0c401782b56a602fe6626f2ab89f4f8b29816608f161e66f20fd6eac6e834feddc403f9680199393451da7942868bf2f29fc4660f5108d7c14a288112100000") 21:56:40 executing program 4: r0 = socket$inet(0x2, 0x805, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, &(0x7f00000001c0)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000007a000000dec02c0b9bebb53f3faf6a03ca46018089582832859f344423c8de997c09ef702cc34e42d5965f466e06c82ae7a990546be896c05365c4a611e9bd7389ee90f1168e03883b3a8e1effdd344245cff94646a4dca009309c21a978254f9fc0afbd32d7cae996eda7ca29841f740b19fc394615b66573c867c370f8f5301809b40c0626"], &(0x7f0000000000)=0x1) 21:56:40 executing program 0: syz_execute_func(&(0x7f0000000580)="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") getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x105, &(0x7f0000000040)=ANY=[@ANYBLOB="2bcacbf0778018fd65f09c854c6d4e870e0951b2bfa31897cdce03000000054725520c29fa1a0000000081fd7b0004bc7f0880"], 0x0) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="43dd25310000006565d93457c4c2e19c3bc442f9921c7dfd2f8fe8085dfcf30f122d2bbd0000c4c1c2c2e610653e0f01d5c4e3e50ca7fdffffff07660f71cd20") 21:56:40 executing program 1: syz_execute_func(&(0x7f0000000100)="9636f3a7c4a2791dcd1c040f05bf04411100c4a37bf0c55c41e2e9660ff8aa0248005733b8c4f4014e4e4e5b30091e1e26ff32f30b0b045f4607c421dd583101c10b9cf8c4c464660f3838520a470f898c000000863363b6d3fada066477f866440ff4697683397fd3fb000066410f3a62f0dc662ad726660f73d30066400f64286c7c66f2ab440fec3f67dddda8e80fddf6c6c466b1f743d911c112e419c2c2b0c1030a0000c4414e53d2c58160160035ee0fc60f660f5a18f1c4827d32eb628f8f7d9b6500f2366766410f3a1517022626802d08000000baf266440f8f0d000000450f91f328c4e3638d6e8df9ffff5c00fc00410f4a2ccefba70fc4e25136660f3824a4cdb71f0000f18fc800cf920000000000fbe2") syz_execute_func(&(0x7f0000000240)="43dd25310000006565d93457c4c2e19c3bc442f9921c7dfd2f8fe8660f380b3d00000000f30f122d2bbd0000c4c1c2c2e610653e0f01d5c4e3e50ca7fdffffff0776c20f71ed20") 21:56:40 executing program 2: syz_execute_func(&(0x7f0000000380)="96419cc4a2791dcd0f05bf04411100c4a37bf0c55c41e2e9666bf86402480057000f33b8c4f4014e4e4e5b4b264ad80f30091e1edee509c421045f4607c421dd5831c4e10bf8c42646770364660f3838520a470f898c00000096ea33ed33ed4877f866440ff4697683397fd3fb0000c4227d215106662ad78fa820ce3416f9f30f5904797c7c66f2ab440fec3f67dddda8e8c402759e89f7875dbbf4c466b1f72ec3c4e2899294d80000000019c2c44231ae83cd0000000b0bf042f75e88c4414e53d2c58160160035ee0fc60fc6a8f2ae000000f1ebeb628f8f7d9b6500f236f04283a900800000002626802d08000000ba41d805000000005c450f91f3c4638d6e8df9ffffff0043ffffff0f4acefb11fc0fdfb83aa2f1fb3be2") sendmsg(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f00000005c0)="f233ddcff3743ca351702e6c411fae2601", 0x11}], 0x1}, 0x0) syz_execute_func(&(0x7f0000000540)="43dd25310000006565d934574d0faea5290000004726dc2f13900080e800085dfcc48279326f0002000002cd6b3815d0004d1e41e400ae6567f390c441f9284c1ad25f8d33cac46318788a9ba99699439940dbc7c4817c5bb100000000a7450f28329898a16af4c4e15d75660058bd") 21:56:40 executing program 5: r0 = socket$inet(0x2, 0x805, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x200000, 0x0) ioctl$TIOCSSOFTCAR(r1, 0x541a, &(0x7f0000000080)=0x80000001) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000040), &(0x7f00000000c0)=0xffffffffffffff02) 21:56:40 executing program 4: r0 = socket$inet(0x2, 0x805, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, &(0x7f00000001c0)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000007a000000dec02c0b9bebb53f3faf6a03ca46018089582832859f344423c8de997c09ef702cc34e42d5965f466e06c82ae7a990546be896c05365c4a611e9bd7389ee90f1168e03883b3a8e1effdd344245cff94646a4dca009309c21a978254f9fc0afbd32d7cae996eda7ca29841f740b19fc394615b66573c867c370f8f5301809b40c0626"], &(0x7f0000000000)=0x1) [ 711.461915][ T9269] hid-generic 0000:0000:0000.0022: unknown main item tag 0x0 [ 711.487981][ T9269] hid-generic 0000:0000:0000.0022: hidraw0: HID v0.00 Device [syz1] on syz1 [ 711.529599][T27646] IPVS: ftp: loaded support on port[0] = 21 21:56:40 executing program 2: syz_execute_func(&(0x7f0000000080)="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") syz_execute_func(&(0x7f0000000040)="43dd25310000006565d934570faeb34fd30000c4e3556e49135b085dfcf31f122d2bbd0040c8c8c2c2e610e4e4d1a7fd5783c4c4c20dbb0ab5fc") 21:56:40 executing program 1: syz_execute_func(&(0x7f0000000340)="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") msgsnd(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00f3"], 0x1, 0x0) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0x69, &(0x7f0000000140)={{0x1c, 0xffffffffffffffff, 0x0, @empty}, {0x1c, 0xffffffffffffffff, 0x0, @loopback}}, 0x5c) syz_execute_func(&(0x7f00000000c0)="43dd25310000006565d93457c4e1f9c5cb73470f761f0f94f66766440fd9e1c4e2d13aaefeefd7ff653e0f212dd5d5fdece1e1a7fd31ffc4a2919224fb90") 21:56:40 executing program 0: syz_execute_func(&(0x7f00000003c0)="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") pwritev(0xffffffffffffffff, &(0x7f0000001b80)=[{&(0x7f0000000180)="15f8d2c74187034f928189510e33159253c15603dd04f966b922b5d91482979ccaf34592fc18df970000004b0e736b439342b04a1d2b525e5b1dad93d1a85bfaeb952ed33e91e28205b2065ab3a5ce828b334912ee6d97940fcb95426ede898d86f0e915298d7fe7459f198bfdb34e778c5b0c20ea5998336fe42e3d375bc4b131a240e5df34243bf9be", 0x8a}], 0x1, 0x0) syz_execute_func(&(0x7f0000000100)="43dd25010100007565d93457476d951912ff826d6d96752666420fe98200000000e92a000000c421481285440000006426440f01fc12d8bfd5") 21:56:40 executing program 4: r0 = socket$inet(0x2, 0x805, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, &(0x7f00000001c0)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000007a000000dec02c0b9bebb53f3faf6a03ca46018089582832859f344423c8de997c09ef702cc34e42d5965f466e06c82ae7a990546be896c05365c4a611e9bd7389ee90f1168e03883b3a8e1effdd344245cff94646a4dca009309c21a978254f9fc0afbd32d7cae996eda7ca29841f740b19fc394615b66573c867c370f8f5301809b40c0626"], &(0x7f0000000000)=0x1) 21:56:41 executing program 5: r0 = socket$inet(0x2, 0x805, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x200, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000040)={0x101, 0x8, 0x0, 0x1, 0x3b29, 0x20, 0x20, 0x0, 0x0}, &(0x7f0000000100)=0x20) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000140)={r2, 0x81, 0x1, [0x6]}, &(0x7f0000000180)=0xa) 21:56:41 executing program 2: syz_execute_func(&(0x7f0000000080)="96419cc4a2791dcd1c040f05bf04411100c4a37bf0c55c41e2e9660ff8aa02480057f3de99f73d000033b8c4f4014e4e4e5b4b264ad80f41ad1e1e46c1d2000946c42741839fa59d0000b527854607c421dd5831e9e9e10bf8c45b64660f38385a0a470f898c00000096ea26400f00a43902000000ed480277f8f8440ff4697683397fd3fb8f4894a2c92c05b57d215104662ad726660f73d30066400f64287c7c66f2ab440fec3f67dddda8e80fddf6c6c466b1f72ec3c4e2899294d80000000019c2c2b0c10b0b660fe4bb46739a48c4414e53d2c4c1fc518ce00ce6fa2cc6a8f2ae000000f1ebeb628f8f7d9b6500f236f04283a900800000002626802d08000000ba49c45c455a91b7c4638d6e8df9ffffff2323ffff410f4acefbc423f96c20ecc4e251bcdfb83aa2f1fbfb22c1e2") syz_execute_func(&(0x7f0000000040)="43dd25310000006565d934570faeb34fd30000c4e3556e49135b085dfcf31f122d2bbd0040c8c8c2c2e610e4e4d1a7fd5783c4c4c20dbb0ab5fc") 21:56:41 executing program 0: syz_execute_func(&(0x7f0000000400)="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") syz_execute_func(&(0x7f0000000380)="43dd2521000000b365d93457b6efeface341c4c27d2030bb212196b31470a9c541c5410001410f29ad000000004081eff4373413c4a205af670921a8d9d9caca642e66460f381dc681d2c1c2f466654f44a9a736066d4c975b66450ff344af042e6d440fb478e08fc978db6705c442fd2a1d71250000") 21:56:41 executing program 1: syz_execute_func(&(0x7f0000000200)="980c2c0f050520d0f807913e3e2ef3420f53de4141e2e91e7979855b660f162f0fc4014ef04680b64f002d00c1c4c31d6f3a7f21fc22ebc48265b8dc2e41812047002b0003e86eba0dfe8c738888a1c40fbbf3470f582ee2ed5d3a0808294003b00b0000000f73d53944d1f466f347adc46291ae8ca0656000000f01cc740f2d96000000c4c20d2bf41d1d440f2b550142c4b33120b15ff3b15ffb110f0fca38048336000000") syz_execute_func(&(0x7f0000000100)="43dd25010000006565d93457664a0f3a602b8cc461df10d4c4ce18090fae0789f440dab49e7e18e1978f16082e9f130145cae84ffeddb80f5b3cf2c403f9df31323934511686478bf2f29fc4c4d9d8dbdff56f0f2881120019003f00") 21:56:41 executing program 4: r0 = socket$inet(0x2, 0x805, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, &(0x7f00000001c0)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000007a000000dec02c0b9bebb53f3faf6a03ca46018089582832859f344423c8de997c09ef702cc34e42d5965f466e06c82ae7a990546be896c05365c4a611e9bd7389ee90f1168e03883b3a8e1effdd344245cff94646a4dca009309c21a978254f9fc0afbd32d7cae996eda7ca29841f740b19fc394615b66573c867c370f8f5301809b40c06263a"], 0x0) 21:56:41 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r3, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r4, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_CREATE(r6, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r6, &(0x7f0000000040), 0x4) fsetxattr$trusted_overlay_origin(r3, &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x2) write$UHID_DESTROY(r6, &(0x7f00000000c0), 0x4) ioctl$VIDIOC_S_CTRL(r5, 0xc008561c, &(0x7f0000000100)={0x3}) unshare(0x40000000) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r5, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:56:41 executing program 2: syz_execute_func(&(0x7f0000000200)="980c2c0f050520d0f807913e3e2ef3420f53de4141e2e91e7979855b660f162f0fc4014ef04680b64f002d00c1c4c31d6f3a7f21fc22ebc48265b8dc2e41812047002b0003e86eba0dfe8c738888a1c40fbbf3470f582ee2ed5d3a0808294003b00b0000000f73d53944d1f466f347adc46291ae8ca0656000000f01cc740f2d96000000c4c20d2bf41d1d440f2b550142c4b33120b15ff3b15ffb110f0fca38048336000000") syz_execute_func(&(0x7f0000000340)="43dd25010000006565d93457c4c17b2c8700000080e2a0c401782b56a626122236f3af89f4f8b298082c2cf7450f3804e7456646df7b9d660f5b3cf2c403f968019939345116868bf2f29fc4f30f1afbd7c14a288112100000") 21:56:41 executing program 4: r0 = socket$inet(0x2, 0x805, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, &(0x7f00000001c0)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000007a000000dec02c0b9bebb53f3faf6a03ca46018089582832859f344423c8de997c09ef702cc34e42d5965f466e06c82ae7a990546be896c05365c4a611e9bd7389ee90f1168e03883b3a8e1effdd344245cff94646a4dca009309c21a978254f9fc0afbd32d7cae996eda7ca29841f740b19fc394615b66573c867c370f8f5301809b40c06263a"], 0x0) 21:56:41 executing program 1: syz_execute_func(&(0x7f0000000440)="964a19e9c4a2791dcd1c040f05bf04411100c4a37bf0c55c41e2e9660ff8aa02480057000f33b8c4f4014ea74b264ad80f30091e1edee509c421045f4607c421dd5831c4e10bf8c45b64660f3838520a470f898c00000096a4ea33ed33ed4877f866440ff4697683397fd3fb0000c4227d215106662ad7450f01ee66400f64287c7c440fec3f67dddde8e80f79ceb066b1f72ec362e2899294d8000000000000c2c5c0e3c5c0e31287f613788a0b0b0000c4414e53d2c581601643d9ee0fc60fc6a8f2ae000000f1ebeb628f8f709b6500f236f04283a900800000002626802d08000000bac9c2c8d05d5d1d4b000000c4638d6e8df9ffffff00ffff410f4acefbc4a29993a40f0000010066474eb83aa2f1fbfbe2") syz_execute_func(&(0x7f0000000200)="43dd25010000006565d934570f90e2c40209472b3e0f7c38b7c8a3082e9f9fc422d0f2df2145e8f30f7080070000006434342666400f3a41c8aec46111f872009f450f0191eca9b6b31f4183526ddbc4e2c9dd4b6513e198dc151a15da15da0f2881120000b6") 21:56:41 executing program 0: pipe(&(0x7f00000002c0)) r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mISDNtimer\x00', 0x0, 0x0) ioctl$IMADDTIMER(r0, 0x80044940, &(0x7f0000000040)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100)={0x20}, 0x0, &(0x7f0000000200), 0x0) 21:56:41 executing program 5: r0 = socket$inet(0x2, 0x808, 0x0) shutdown(r0, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000080), &(0x7f0000000040)=0x7b) syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x7, 0x10000) 21:56:41 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x75, &(0x7f00000000c0)={0x87}, 0x8) [ 712.413380][ T9317] hid-generic 0000:0000:0000.0023: unknown main item tag 0x0 [ 712.442561][T27707] IPVS: ftp: loaded support on port[0] = 21 [ 712.452545][ T9317] hid-generic 0000:0000:0000.0023: hidraw0: HID v0.00 Device [syz1] on syz1 21:56:41 executing program 4: r0 = socket$inet(0x2, 0x805, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, &(0x7f00000001c0)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000007a000000dec02c0b9bebb53f3faf6a03ca46018089582832859f344423c8de997c09ef702cc34e42d5965f466e06c82ae7a990546be896c05365c4a611e9bd7389ee90f1168e03883b3a8e1effdd344245cff94646a4dca009309c21a978254f9fc0afbd32d7cae996eda7ca29841f740b19fc394615b66573c867c370f8f5301809b40c06263a"], 0x0) 21:56:41 executing program 1: syz_execute_func(&(0x7f00000003c0)="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") pwritev(0xffffffffffffffff, &(0x7f0000001b80)=[{&(0x7f0000000180)="15f8d2c74187034f928189510e33159253c15603dd04f966b922b5d91482979ccaf34592fc18df970000004b0e736b439342b04a1d2b525e5b1dad93d1a85bfaeb952ed33e91e28205b2065ab3a5ce828b334912ee6d97940fcb95426ede898d86f0e915298d7fe7459f198bfdb34e778c5b0c20ea5998336fe42e3d375bc4b131a240e5df34243bf9be", 0x8a}], 0x1, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000240)="6608a3e5fce880da1b60a54326c0de2a6c7766825f44a6bbed8db81e62ac314bde", 0x21}], 0x1, 0x0) syz_execute_func(&(0x7f0000000100)="43dd25010100007565d93457476d951912ff826d6d96752666420fe98200000000e92a000000c421481285440000006426440f01fc12d8bfd5") 21:56:41 executing program 0: syz_execute_func(&(0x7f00000003c0)="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") syz_execute_func(&(0x7f0000000100)="43dd25310000006565d93457c4216dc6af0c00000091470f139000800000085dfcf30f122d2bbd00003740cccc0fc4464200abe0a64f1f41a8006547d9c213cae5cae5cac441e97d4d20000000fd8f697c8023660f71cd20") syz_execute_func(&(0x7f0000000440)="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") syz_execute_func(&(0x7f0000000380)="43dd25010000006565d934573e67260f128f70eb0000a4c40209472bc4c19514936cf00000a3082e2eb401032145e8a964fe9ffafa3451348fea7810c4020d162d6dffffff00001fb7f7dff51398dc1515dbd3520f28811200b700b6") 21:56:41 executing program 5: r0 = socket$inet(0x2, 0x805, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x2, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r1, 0x5387, &(0x7f0000000040)) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 21:56:41 executing program 2: syz_execute_func(&(0x7f0000000200)="980c2c0f050520d0f807913e3e2ef3420f53de4141e2e91e7979855b660f162f0fc4014ef04680b64f002d00c1c4c31d6f3a7f21fc22ebc48265b8dc2e41812047002b0003e86eba0dfe8c738888a1c40fbbf3470f582ee2ed5d3a0808294003b00b0000000f73d53944d1f466f347adc46291ae8ca0656000000f01cc740f2d96000000c4c20d2bf41d1d440f2b550142c4b33120b15ff3b15ffb110f0fca38048336000000") syz_execute_func(&(0x7f0000000100)="43dd25010000006565d93457664a0f3a602b8ce2a002fe36f3af89f4f8b29816608f161e082c2cf7450f3804e745c6e84ffedd660f5b3cf2c403f968019939345116431c00660f5108d7c14a288112100000") 21:56:42 executing program 0: syz_execute_func(&(0x7f00000002c0)="964a19e9c4a2791dcd1c040f05bf04411100c4a37bf0c55c41e2e9660ff8aa02480057000f33b8c4f4014ea74b264ad80f1e1edee509c421045f4607c421dd5831c4e10bf8c45b64660f3838520a470f898c00000096f04183770f99ea33ed33ed4877f866440ff4697683397fd3fb0000c4227d215106662ad7450f01ee66400f64287c7c440fec3f67dddde8e80f79ceb066b1f72ec362e2899294d8000000000000c2c5c0e3c5c0e31287f613788a0b0b0000c4414e53d2c581601643d9ee0fc60fc6a8f2ae000000f1ebeb628f8f709b6500f236f04283a900800000002626802d08000000bac9c2c8d05d5d1d4b000000c4638d6e8df9ffffff00ffff410f4acefbc4a29993a40f0000010066474eb83aa2f1fbfbe2") syz_execute_func(&(0x7f0000000100)="43dd25010000006565d934573e67260f128f70eb0000c40209472b3e0f0f38b7c8a3082e9f9f010128d7a964fe9f9f3434519f9f450f0191eca9b6b31f4183526ddb44dab90300000013e198dc521a15da4cda0f2881120000b6") 21:56:42 executing program 4: syz_execute_func(&(0x7f0000000100)="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") syz_execute_func(&(0x7f00000003c0)="43dd2521000000b365d93457932bace341f1bb212196b31470a9c541c541000100806a3e00004081eff4373413c4a215d99067c809c809420f706e089bcaca717c81d2c1c22e66654f9744a9a736066d6d973e404c975b66450ff344af042e6d8fc978db6705c442fd2a1d71250000") 21:56:42 executing program 1: syz_execute_func(&(0x7f0000000440)="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") syz_execute_func(&(0x7f0000000200)="43dd25010000006565d934573e67260f128f70eb0000c40209472b3e0f0f38b7c8a3082e9f9f01012145e8a964fe9f9f243451f20f01dc9f450f0191eca9b6b31f4183526ddb13db13e198dc151a15da15da0f2881120000b6") 21:56:42 executing program 5: r0 = socket$inet(0x2, 0x805, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x4) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000000), &(0x7f0000000140)=0x4) 21:56:42 executing program 2: syz_execute_func(&(0x7f0000000240)="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") utimes(0x0, &(0x7f0000000100)={{0x0, 0x81}, {0x8}}) syz_execute_func(&(0x7f0000000080)="43dd2521000000b365d93457932bace341f1bb212196b31470a9c541c5410001410f29ad000000004081eff4373413c4a205af670921a8d9d9caca717c81d2c1c2f466654f44a9a736066d4c975b66450ff344af042e6d440fb478e08fc978db6705c442fd2a1d71250000") 21:56:42 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r3, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r4, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_CREATE(r6, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r6, &(0x7f0000000040), 0x4) fsetxattr$trusted_overlay_origin(r3, &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x2) write$UHID_DESTROY(r6, &(0x7f00000000c0), 0x4) unshare(0x40000000) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r5, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:56:42 executing program 4: 21:56:42 executing program 1: 21:56:42 executing program 0: 21:56:42 executing program 5: 21:56:42 executing program 2: 21:56:42 executing program 5: r0 = socket$inet(0x2, 0x805, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x4, 0x408001) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0x1b) 21:56:42 executing program 1: [ 713.499209][ T9317] hid-generic 0000:0000:0000.0024: unknown main item tag 0x0 21:56:42 executing program 0: [ 713.558153][ T9317] hid-generic 0000:0000:0000.0024: hidraw0: HID v0.00 Device [syz1] on syz1 21:56:42 executing program 2: 21:56:42 executing program 4: 21:56:42 executing program 1: [ 714.082969][T27754] IPVS: ftp: loaded support on port[0] = 21 21:56:43 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r3, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r4, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_CREATE(r6, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r6, &(0x7f0000000040), 0x4) fsetxattr$trusted_overlay_origin(r3, &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x2) write$UHID_DESTROY(r6, &(0x7f00000000c0), 0x4) unshare(0x40000000) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r5, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:56:43 executing program 0: 21:56:43 executing program 5: r0 = socket$inet(0x2, 0x805, 0x0) recvfrom$inet(r0, &(0x7f0000000100)=""/221, 0xdd, 0x61, &(0x7f0000000000)={0x2, 0x4e23, @rand_addr=0x7}, 0x10) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/zero\x00', 0x2000, 0x0) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000a80)) r2 = add_key(&(0x7f0000000040)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000240)="ff3c9fa440de0db1c9a9e9e99ebe0a8d53b412f0b0b0c3f3fc1fb82a146ee3adfcd7fb176e6a054482dd32f36c81fda287baf3dc63cbbe0829a4f9a6f236072eb3b1ad816fbaf3aa8f3f1263067a58aec28d84bae3a3341d05da174fec3ae353af61156dc10e62b174aa78fe06f6287cbae74c72bc42a36b86f2bc584b9beed33d4aaa2b1ad04645eaf198e326212c13f3d842", 0x93, 0xffffffffffffffff) r3 = add_key(&(0x7f0000000300)='big_key\x00', &(0x7f0000000340)={'syz', 0x0}, &(0x7f0000000380)="0580ea24caa0f84997e881b3dfd20ae1cb20b3cc0e948f6fd800311d380a5da174940c95e65dd04392487d724fc67595d62cafec0a18a1cb9cf14e5eaf0beb99689448890e40dc101a9f4f125348499018841e0c8f06eb4b78812330ecf0720997ab762ee72aa1", 0x67, 0xfffffffffffffffe) r4 = add_key$user(&(0x7f0000000400)='user\x00', &(0x7f0000000440)={'syz', 0x2}, &(0x7f0000000480)="a1d3971a0d09e4b99b56b18d4c53dbc3671c69f105f77333b014622a4e8878aa4bfbbb06aa54c13c459bdccb3c09a6c216820899b6a06429331f646c74a20255d8481df4b9bfaff93bf4596ac324f1", 0x4f, 0xfffffffffffffffe) keyctl$dh_compute(0x17, &(0x7f0000000500)={r2, r3, r4}, &(0x7f0000000540)=""/205, 0xcd, &(0x7f0000000780)={&(0x7f0000000640)={'rmd128-generic\x00'}, &(0x7f0000000680)="e17a9cbe05c50d674660d2559a02faaad5ebf1aab19efcba4b968c96c280aa5a76354229a15769dc6c9fde065e63aeae0e99ed4ef23647726f160bb20398270cc3c8b580eeb04dc3745e4567733b2d64ea699f0df3f589df8dcedd1acb5e3f115c75a4232a8b47d17cab22891538aae262d14e950484a50694c75e32d79d71aca6c7427955edf9d88018c8db2160e9eebd9d6759c932768f0398ba312bd5b9c3d2ba296f02013e6ac1dfb68db68c8c8cf1c685f6684447dec1a0fe42cf689570650507194cfc1d9b105bcf4bdd6699fd712963e4f4d582a580f92548393ad94db9d8aa8244395be14337e5e90d565e", 0xef}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000009c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=0x8, 0x0, 0x0, 0x0, &(0x7f0000000800)={0x7, 0x5}, 0x0, 0x0, &(0x7f0000000840)={0x4, 0x10, 0x7ff, 0x3ff}, &(0x7f0000000880)=0x2, 0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)=0xf5}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000a00)=r5, 0x4) 21:56:43 executing program 2: 21:56:43 executing program 4: 21:56:43 executing program 1: 21:56:43 executing program 2: 21:56:43 executing program 1: 21:56:43 executing program 4: 21:56:43 executing program 0: 21:56:43 executing program 5: [ 714.453596][ C1] net_ratelimit: 6 callbacks suppressed [ 714.453606][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 714.465354][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 714.479210][ T9269] hid-generic 0000:0000:0000.0025: unknown main item tag 0x0 21:56:43 executing program 1: [ 714.511578][T27811] IPVS: ftp: loaded support on port[0] = 21 [ 714.523985][ T9269] hid-generic 0000:0000:0000.0025: hidraw0: HID v0.00 Device [syz1] on syz1 [ 714.543554][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 714.549419][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 714.555408][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 714.561227][ C0] protocol 88fb is buggy, dev hsr_slave_1 21:56:43 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r3, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r4, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_CREATE(r6, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r6, &(0x7f0000000040), 0x4) fsetxattr$trusted_overlay_origin(r3, &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x2) write$UHID_DESTROY(r6, &(0x7f00000000c0), 0x4) unshare(0x40000000) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r5, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:56:43 executing program 4: 21:56:43 executing program 2: 21:56:43 executing program 0: 21:56:43 executing program 5: 21:56:43 executing program 1: 21:56:44 executing program 2: 21:56:44 executing program 0: 21:56:44 executing program 1: 21:56:44 executing program 4: 21:56:44 executing program 5: [ 715.173625][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 715.179515][ C0] protocol 88fb is buggy, dev hsr_slave_1 21:56:44 executing program 4: [ 715.256197][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 715.262711][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 715.564262][T27828] IPVS: ftp: loaded support on port[0] = 21 21:56:47 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r3, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r4, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_CREATE(r6, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r6, &(0x7f0000000040), 0x4) fsetxattr$trusted_overlay_origin(r3, &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x2) ioctl$VIDIOC_S_CTRL(r5, 0xc008561c, &(0x7f0000000100)={0x3}) unshare(0x40000000) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r5, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:56:47 executing program 0: 21:56:47 executing program 5: 21:56:47 executing program 1: 21:56:47 executing program 2: 21:56:47 executing program 4: 21:56:47 executing program 5: 21:56:47 executing program 4: syz_execute_func(&(0x7f0000000000)="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") syz_execute_func(&(0x7f0000000300)="43dd25310000006565d934574d0faea529000000472f13900080e800085dfc0ffd0b020000028f097812c8febaba66460f3815d0004d1e41e400aec4a1b5d4d02bc441f9284c1ad25f8d33cac46318788a9ba99699439940dbc72e26473d0f964ba7a7450f2832e15d756600bd") 21:56:47 executing program 1: syz_execute_func(&(0x7f0000000040)="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") syz_execute_func(&(0x7f0000000440)="43dd25310000006565d93457f04783892dee000001470f1bc88fe96090bf00000000a90b0000fc5300e3d60f4346b26443f3f0dd83876b0166f08d191919c401c457f500c28f286896170fc4a1edf2ac2b27000001000003fd007cd32d21c4c2e1dd8e00000000c4c4227d5aae0800000036c137006743d855ff65f344726ec4412972d306c44271aaf3f2e1a50f01da360f0df319ac0f5d0505000000f30fc737c4225506fc0fa7004747426fa19a1c10660f3828cd") 21:56:47 executing program 2: syz_execute_func(&(0x7f0000000480)="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") msgsnd(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="00f1694601000000ac4918"], 0x1, 0x0) syz_execute_func(&(0x7f00000000c0)="43dd25310000006565d93457c4e1f9c5cb73470f761f0f94f66766440fd9e1c4e2d13aaefeefd7ff653e0f212dd5d5fdece1e1a7fd31ffc4a2919224fb90") 21:56:47 executing program 0: syz_execute_func(&(0x7f00000002c0)="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") syz_execute_func(&(0x7f0000000180)="43dd25310000006565d93457460dbdc28a8a263e450fda12f22d2bbd00000207c40cc4fd46a577ee42c30bf045f757080ae79fc428660f102a0954f407e1a6c475a1fc53761700c4815d578d001000000b7800c4427d192fc4416175f620") 21:56:47 executing program 5: syz_execute_func(&(0x7f00000002c0)="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") syz_execute_func(&(0x7f0000000480)="43dd25310000006565d93457460dbdc28a8a263e450fda12f22d2bbd00000207c40cc4fd46a577ee42c30bf045f757080ae79fc428660f102a0954f407e1a6c4a1fc537600440f0f4e3e965d576010ae0000000000c4427d196bc4416175f620") [ 718.844912][T27847] hid-generic 0000:0000:0000.0026: unknown main item tag 0x0 [ 718.853404][T27847] hid-generic 0000:0000:0000.0026: hidraw0: HID v0.00 Device [syz1] on syz1 [ 718.874116][T27877] IPVS: ftp: loaded support on port[0] = 21 21:56:48 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r3, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r4, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_CREATE(r6, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r6, &(0x7f0000000040), 0x4) fsetxattr$trusted_overlay_origin(r3, &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x2) ioctl$VIDIOC_S_CTRL(r5, 0xc008561c, &(0x7f0000000100)={0x3}) unshare(0x40000000) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r5, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:56:48 executing program 5: syz_execute_func(&(0x7f0000000100)="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") syz_execute_func(&(0x7f0000000100)="43dd25310000006565d93457c4c2e19c3bc442f9921c7dfd2f8fe86566470f3803cff30f122d2bbd000037ff56c85ecbb4c2e1a61f10e1a6c4e1c4c64f36fb1009c42333c40179510200660fe8e8cd20") 21:56:48 executing program 4: syz_execute_func(&(0x7f00000002c0)="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") syz_execute_func(&(0x7f0000000100)="43dd25310000006565d93457460dbdc28a8a263e450fda12f22d2bbd00000207c4fdc4c2b18e8f000001008f48188576050042c30bf0b7b71f3722e80f102a0954f407e1a6c4a1fc5376003ae5c4815d578d001000000b7800c4427d192fc4416175f620") 21:56:48 executing program 2: syz_execute_func(&(0x7f0000000580)="96c4217a2df1c4a2791dcd1c040f05bf04411100c4a37bf0c55c41e2e9660ff8aa02480057000f33b8c4f4014ec462fd41bdfa53b94a4b264ad80f30091e1edee509c421045f4607c421dd5831c4c2f1dd7a0a5b64660f3838520a470f898c00000096c4c2550a14653223333333ed33ed4877f866440ff4697683397fd3fb0000c4227d215106662ad7450f01ee66400f64287c7c66f2ab440fec3f67dddde8e80f79cec466b1f72ec3c4e2899294d80000000019c2c44170c22f080b0b0000c4414e53d2c581601643d9ee0fc60fc6a0a8f3f3000000f1ebeb628f8f709b6500f236f04283a900800000002626802d08000000ba49c4d05d5d0f91f3c4638d6e8df9ffffff00ffff410f4acefb110f66474eb83aa2f1fbfbe2") getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x105, &(0x7f0000000040)=ANY=[@ANYBLOB="2bcacbf0778018fd65f09c854c6d4e870e0951b2bf"], 0x0) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000000)="43dd25310000006565d93457c4c2e19c3bc442f9921c7dfd2f8fe8085dfcf30f122d2bbd0000c4c1c2c2e610653e0f01d5c4e3e50ca7fdffffff07660f71cd20") 21:56:48 executing program 0: syz_execute_func(&(0x7f0000000700)="964a19e9c4a2791dcd1c040f05bf04411100c4a37bf0c55c41e2e9660ff8aa02480057000f33b8c4f4014ea74b264ad80f3009491e1edee509c42104745f4607c421dd5831c4e10bf8c45bc4417e162d0a000000470f898c0000009643e884180000c4c15d5f1d32a3333333ed33ed4877f866440ff4697683397fd3fb0000c4227d215106662ad7450f01ee66400f64287c7c440fec3f67dddde8e80f79ceb066b1f72ec362e2899294d8000000000000c2c5c0e3c5c0e31287f61378d88a8a0b0000c421797fb1deb00000c581601643d9ee0f67662e46098aeeefffffa8f2aef3450f91c100f1f30f38f69d642dc371628f8fdea8feefffff6500f236f04283a900800000002626802d08000000bac9c237d05d5d1d4b000000c4638d6e8df9ffffff00c4a9817910dfdf0f4acefbc4a29993a40f0000010066474eb83aa2f1fbfbe2") sendto$unix(0xffffffffffffffff, &(0x7f00000000c0)="d737b993c42811b60252777e07a554", 0xf, 0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000040)="43dd25310000006565d93457c442f9921c7dfd2f8fe83e41debb37000000c4c1c2c2e610c4e15dde15d5b60000c4a3055c2600c4e3e50ca7fdffffff07") 21:56:48 executing program 1: syz_execute_func(&(0x7f0000000480)="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") pwritev(0xffffffffffffffff, &(0x7f00000025c0)=[{&(0x7f0000000100)="10f092531e433d5d682c96ff6b4bf01fa1818e4015c1ce09d77f5c", 0x1b}], 0x1, 0x0) syz_execute_func(&(0x7f0000000080)="43dd25310000006565d93457c4c2e19c3bc4e1256b3fa9920f29a988fe0f43e65ff151dda156dda156000065f305050f38f65513665d99c442333ae1758d0404fdc46228f2ccf4460f0024b0c4c2f923430affffff1cc4c20e59457bc4c22d3986005475750038c4f344d9e50053c442dd04e675c402e5297221") 21:56:48 executing program 5: syz_execute_func(&(0x7f00000002c0)="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") syz_execute_func(&(0x7f0000000100)="43dd25310000006565d93457460dbdc28a8a263e450fda12f22d2bbd00000207c40cc4fd46a577ee42c30bf045f757080ae79fc428660f102a0954f407e1a670a1f95b76083ae5c4815d578d001000000b7800c4427d192fc4416175f64288d4") 21:56:48 executing program 2: syz_execute_func(&(0x7f0000000700)="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") sendto$unix(0xffffffffffffffff, &(0x7f00000000c0)="d737b993c42811b60252777e07a554", 0xf, 0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000040)="43dd25310000006565d93457c4e1f9c5cb73c442f9921c7dfd2f8fe8085dfcf30f122d2bbd0000d9f9653e0f212dd5d5e3e50ca7fd5b4bb755b7b7d90f71cd20") syz_execute_func(&(0x7f0000000040)="43dd25310000006565d93457c442f9921c7dfd2f8fe83e41debb37000000c4c1c2c2e610c4e15dde15d5b60000c4a3055c2600c4e3e50ca7fdffffff07") 21:56:48 executing program 1: syz_execute_func(&(0x7f0000000100)="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") syz_execute_func(&(0x7f0000000240)="43dd2521000000b376d93457932bace341f1bb212196b31470a9c541c541000100806a3e00004081eff43734136f21a8d9d9caca717c81d2c1c22e66654f9744a9a736066d6d973e404c975b664527f344afdd2e6d660f6785000000808fc978db6705c442fd2a1d71250000") 21:56:48 executing program 4: syz_execute_func(&(0x7f00000003c0)="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") pwritev(0xffffffffffffffff, &(0x7f0000001b80)=[{&(0x7f0000000180)="15f8d2c74187034f928189510e33159253c15603dd04f966b922b5d91482979ccaf34592fc18df970000004b0e736b439342b04a1d2b525e5b1dad93d1a85bfaeb952ed33e91e28205b2065ab3a5ce828b334912ee6d97940fcb95426ede898d86f0e915298d7fe7459f198bfdb34e778c5b0c20ea5998336fe42e3d375bc4b131a240e5df34243bf9be", 0x8a}], 0x1, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000240)="6608a3e5fce880da1b60a54326c0de2a6c7766825f", 0x15}], 0x1, 0x0) syz_execute_func(&(0x7f0000000100)="43dd25010100007565d93457476d951912ff826d6d96752666420fe98200000000e92a000000c421481285440000006426440f01fc12d8bfd5") 21:56:48 executing program 0: syz_execute_func(&(0x7f0000000100)="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") bind$inet6(0xffffffffffffffff, &(0x7f0000000140)={0x1c, 0xffffffffffffffff, 0x0, @loopback}, 0x1c) syz_execute_func(&(0x7f00000000c0)="43dd25230000006565d9345736660f3a443af01c55ee38935dfcf30f122d2bbd00003c3cc1c22e2e664f0f38f657fed1a7f0425783c4c4a7f8") 21:56:48 executing program 5: syz_execute_func(&(0x7f0000000140)="980c2c0f050520d0f807913e3e2ef3420f53de4141e2e91e7979855b660f162f0fc4014ef04680b64f002d00c1c4c31d6f3a7f21fc22ebc48265b8dc2e41812047002b0003e86eba0dfe8c738888a1c40fbbf3470f582ee2ed5d3a0808294003b00b0000000f73d53944d1f466f347adc46291ae8ca0656000000f01cc740f2d96000000c4c20d2bf41d1d440f2b550142c4b33120b15ff3b15ffb110f0fca38048336000000") syz_execute_func(&(0x7f0000000080)="43dd2501000000659ed93457664a0f3a602b8ce2a0c401782b56a602f6fefe7c0089f4f8f3470f5eae6594719a08582cf7450f3804e745c6e84ffedd2edf2c56c403f968019939345116868bf2f29fc4660f514ac46201b000000000c14a288112100000") [ 719.547334][T27906] IPVS: ftp: loaded support on port[0] = 21 21:56:48 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r3, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r4, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_CREATE(r6, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r6, &(0x7f0000000040), 0x4) fsetxattr$trusted_overlay_origin(r3, &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x2) ioctl$VIDIOC_S_CTRL(r5, 0xc008561c, &(0x7f0000000100)={0x3}) unshare(0x40000000) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r5, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:56:48 executing program 1: syz_execute_func(&(0x7f0000000400)="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") syz_execute_func(&(0x7f0000000280)="43dd2521000000b365d93457b6efefcc0f148e72afd2b1440f9cbee3c90000a9c541c50001410f69ad000000004081eff437341321a8d9d9caca642e66460f381dc681d2c1c2f466c4670f59b32d7e0000a9a736066d6d975b66450ff344af04c48261dd40d3440fb478e08fc978db6705c442fd2a1d71250000") 21:56:48 executing program 4: syz_execute_func(&(0x7f0000000100)="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") syz_execute_func(&(0x7f0000000080)="43dd2521000000b376d934570f52012bace341f1bb212196b31470a9c541c541000100806a3e00004081eff4373413c4a205af670921a8d9d9caca717c81d2c1c22e66654f9744a9a736066d6d973e404c97c4819d62d866450ff344af042e6d660f6785000000808fc978db6705c442fd2a1d71280000") 21:56:48 executing program 0: 21:56:48 executing program 2: 21:56:48 executing program 5: 21:56:49 executing program 5: 21:56:49 executing program 4: open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x8000000000000a6, 0x9}, 0x2c) sendmsg$xdp(0xffffffffffffffff, 0x0, 0x0) 21:56:49 executing program 1: syz_execute_func(&(0x7f0000000280)="96419cc4a2791dcd0f05bf04411100c4a37bf0c55c41e2e9666bf86402480057000f33b8c4f4014e4e4e5b4b264ad80f30091e1edee509c421045f46c4c48102513a7831c4c1fc29c326467703c42295ba29470f898c00000096eac41ef95e3bf3af440ff4697683397fd3fb0000c49f7d21514306662ad78fa820ce3416f9f30f5904797c7c66f2ab440fec3f67dddda8e80fddf6c6c466f2470f2db6000000002ec3c4e2899294d8000000008fc97812c800000b0bc4414e53d2c581601646d91ec6a815af000000c4e27917b5f6ffffffebebe9628f8f7dc421b7581a654300f2f2f04283a900800000002626802d08000000ba41d805000000005c450f91f3c4638d6e8df9ffffff00c48195588300000000ff0f4acefbf0809e008000007f0fdfb83aa2f1fb3be2") syz_execute_func(&(0x7f00000003c0)="43dd25310000006565d93457f04783892dee000001c4825d2f1cce8fe96090bf00000000a90b0000fc9100e3d60f4346b26443f3f0dd83876b0166f08d191919c401c457f500c28f286896170fc4a1edf2ac2b270000010000c4a355189bd16b912008c5bfe4e4e1dd8e00440d00c4c4227d5aae0800000036c13700c4638d7dad87cae95ff465f344726ec4412972d306c44271aaf3f2e1a55cac5cac0f5d0505000000c403f96056811240ad0fa7004747426fa19a1c10660f3828cd") 21:56:49 executing program 2: 21:56:49 executing program 0: [ 720.231896][ T9268] hid-generic 0000:0000:0000.0027: unknown main item tag 0x0 21:56:49 executing program 0: [ 720.279766][T27955] IPVS: ftp: loaded support on port[0] = 21 [ 720.294020][ T9268] hid-generic 0000:0000:0000.0027: hidraw0: HID v0.00 Device [syz1] on syz1 [ 720.453601][ C0] net_ratelimit: 14 callbacks suppressed [ 720.453610][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 720.459439][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 720.693583][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 720.699459][ C1] protocol 88fb is buggy, dev hsr_slave_1 21:56:49 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r3, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r4, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_CREATE(r6, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r6, &(0x7f0000000040), 0x4) write$UHID_DESTROY(r6, &(0x7f00000000c0), 0x4) ioctl$VIDIOC_S_CTRL(r5, 0xc008561c, &(0x7f0000000100)={0x3}) unshare(0x40000000) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r5, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:56:49 executing program 1: 21:56:49 executing program 2: 21:56:49 executing program 5: 21:56:49 executing program 4: 21:56:49 executing program 0: 21:56:49 executing program 4: 21:56:49 executing program 2: 21:56:49 executing program 1: 21:56:49 executing program 0: 21:56:49 executing program 5: 21:56:50 executing program 1: [ 721.128406][T27848] hid-generic 0000:0000:0000.0028: unknown main item tag 0x0 [ 721.160512][T27986] IPVS: ftp: loaded support on port[0] = 21 [ 721.182364][T27848] hid-generic 0000:0000:0000.0028: hidraw0: HID v0.00 Device [syz1] on syz1 [ 721.423616][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 721.429472][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 721.493570][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 721.499573][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 721.505554][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 721.511395][ C0] protocol 88fb is buggy, dev hsr_slave_1 21:56:50 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r3, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r4, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_CREATE(r6, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r6, &(0x7f0000000040), 0x4) write$UHID_DESTROY(r6, &(0x7f00000000c0), 0x4) ioctl$VIDIOC_S_CTRL(r5, 0xc008561c, &(0x7f0000000100)={0x3}) unshare(0x40000000) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r5, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:56:50 executing program 2: 21:56:50 executing program 5: 21:56:50 executing program 4: 21:56:50 executing program 0: 21:56:50 executing program 1: 21:56:50 executing program 5: 21:56:50 executing program 1: 21:56:50 executing program 0: 21:56:50 executing program 2: 21:56:50 executing program 4: 21:56:51 executing program 5: [ 722.141776][T28019] IPVS: ftp: loaded support on port[0] = 21 [ 722.150651][T27848] hid-generic 0000:0000:0000.0029: unknown main item tag 0x0 [ 722.175893][T27848] hid-generic 0000:0000:0000.0029: hidraw0: HID v0.00 Device [syz1] on syz1 21:56:51 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r3, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r4, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_CREATE(r6, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r6, &(0x7f0000000040), 0x4) write$UHID_DESTROY(r6, &(0x7f00000000c0), 0x4) ioctl$VIDIOC_S_CTRL(r5, 0xc008561c, &(0x7f0000000100)={0x3}) unshare(0x40000000) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r5, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:56:51 executing program 1: 21:56:51 executing program 2: 21:56:51 executing program 4: 21:56:51 executing program 0: 21:56:51 executing program 5: 21:56:51 executing program 4: syz_execute_func(&(0x7f0000000380)="96419cc4a2791dcd0f05bf04411100c4a37bf0c55c41e2e9666bf86402480057000f33b8c4f4014e4e4e5b4b264ad80f30091e1edee509c421045f4607c421dd5831c4e10bf8c42646770364660f3838520a470f898c00000096ea33ed33ed4877f866440ff4697683397fd3fb0000c4227d215106662ad78fa820ce3416f9f30f5904797c7c66f2ab440fec3f67dddda8e8c402759e89f7875dbbf4c466b1f72ec3c4e2899294d80000000019c2c44231ae83cd0000000b0bf042f75e88c4414e53d2c58160160035ee0fc60fc6a8f2ae000000f1ebeb628f8f7d9b6500f236f04283a900800000002626802d08000000ba41d805000000005c450f91f3c4638d6e8df9ffffff0043ffffff0f4acefb11fc0fdfb83aa2f1fb3be2") syz_execute_func(&(0x7f0000000540)="43dd25310000006565d934574d0faea5290000004726dc2f13900080e800085dfcc48279326f0002000002cd6b3815d0004d1e41e400ae6567f390c441f9284c1ad25f8d33cac46318788a9ba99699439940dbc7c4817c5bb100000000a7450f28329898a16af4c4e15d75660058bd") 21:56:51 executing program 1: syz_execute_func(&(0x7f00000005c0)="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") syz_execute_func(&(0x7f0000000080)="43dd25310000006565d93457c4c2e19c3b085dfc37b88282821c41dee0e1a61f0ba69d1ea1ca23cae63acaca014e113e3664f342ac0ca7fdf2430f8103b3d800666fc4a27920b89200000078") syz_execute_func(&(0x7f0000000040)="43dd25310000006565d93457c4c2e19c3bc442f9921c7dfd2f8fe80faeeff30f122d2bbd0000f00fc07094c4e17f104564653e0f01d5c4621596ac13d7f1ef0c") 21:56:51 executing program 5: syz_execute_func(&(0x7f0000000480)="96419cc4a2791dcd1c040f05c4e1705eeac4a37bf0c55c41e2e9660ff8aa0248005784000f0fb8c4f4014e4e4e5b4b264ad80f41ad1e1edee50946c42766410f3833da27c4c22938544798c421dd5831e9e9e10bf8c45b64660f38385a0a470f898c00000096fc26400f00a43902000000dd0465000000004877f866440ff4697683397f5ee7e7fbc421fd72e2faa18d73df0fc4227d21513a06662ad726660f73d30066400f6428c441c173f68b66f2ab440fec3f67dddda8e80fddf665c6425af72ec3c4e2899294d80000000019c10b590b0b00c4d2c58160160035ee0fa8f2ae000000f1ebeb628f8f7d9b6500f236f04283a9008000000066430f78c6000049c45c455a91b7c4638d6e8df9ffff0c2323ffc4e3b16e9003334000a94acefb110fc4e251bcdfb83aa2f1fbfb22c1e2") syz_execute_func(&(0x7f0000000400)="43dd25310000006565d934573e47d9f1e19c3bc442f92c147dc481a252bf5c5000400fd17db277400c7688f0e9c07094c467f0f79cc42a550000104564653e0f01d5c4417dddb367f96618") 21:56:51 executing program 2: syz_execute_func(&(0x7f0000000600)="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") pwritev(0xffffffffffffffff, &(0x7f0000001b80)=[{&(0x7f0000000180)="15f8d2c74187034f928189510e33159253c15603dd04f966b922b5d91482979ccaf34592fc18df9712369c9a4b0e736b439342b04a1d2b525e5b1dad93d1a85bfaeb952ed33e91e28205b2065ab3a5ce828b334912ee6d97940fcb95426ede898d86f0e915298d7fe7459f198bfdb34e778c5b0c20ea5998336fe42e3d375bc4b131a240e5df34243bf9be5e153e", 0x8e}], 0x1, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000240)="6608a3e5fce880da1b60a54326c0de2a6c7766825f44a6bbed8db81e62ac314bdee4f35fdef316f04d", 0x29}], 0x1, 0x0) syz_execute_func(&(0x7f0000000100)="43dd25010100007565d93457476d951912ff826d6d96752666420fe98200000000e92a000000c421481285440000006426440f01fc12d8bfd5") 21:56:51 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f0000000080)=@profile={'stack ', ':\x00'}, 0x8) 21:56:52 executing program 4: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r3, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r4, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_CREATE(r6, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r6, &(0x7f0000000040), 0x4) write$UHID_DESTROY(r6, &(0x7f00000000c0), 0x4) ioctl$VIDIOC_S_CTRL(r5, 0xc008561c, &(0x7f0000000100)={0x3}) unshare(0x40000000) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r5, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) [ 722.956016][T28038] IPVS: ftp: loaded support on port[0] = 21 [ 723.273782][T27848] hid-generic 0000:0000:0000.002A: unknown main item tag 0x0 [ 723.282888][T27848] hid-generic 0000:0000:0000.002A: hidraw0: HID v0.00 Device [syz1] on syz1 [ 723.368529][T28066] IPVS: ftp: loaded support on port[0] = 21 21:56:52 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r3, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r4, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_DESTROY(r6, &(0x7f0000000040), 0x4) fsetxattr$trusted_overlay_origin(r3, &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x2) write$UHID_DESTROY(r6, &(0x7f00000000c0), 0x4) ioctl$VIDIOC_S_CTRL(r5, 0xc008561c, &(0x7f0000000100)={0x3}) unshare(0x40000000) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r5, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:56:52 executing program 2: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r3, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r4, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_CREATE(r6, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r6, &(0x7f0000000040), 0x4) write$UHID_DESTROY(r6, &(0x7f00000000c0), 0x4) ioctl$VIDIOC_S_CTRL(r5, 0xc008561c, &(0x7f0000000100)={0x3}) unshare(0x40000000) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r5, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:56:52 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r3, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r4, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_CREATE(r6, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r6, &(0x7f0000000040), 0x4) fsetxattr$trusted_overlay_origin(r3, &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x2) ioctl$VIDIOC_S_CTRL(r5, 0xc008561c, &(0x7f0000000100)={0x3}) unshare(0x40000000) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r5, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:56:52 executing program 5: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r3, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r4, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_CREATE(r6, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r6, &(0x7f0000000040), 0x4) fsetxattr$trusted_overlay_origin(r3, &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x2) ioctl$VIDIOC_S_CTRL(r5, 0xc008561c, &(0x7f0000000100)={0x3}) unshare(0x40000000) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r5, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:56:52 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r3, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r4, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_CREATE(r6, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r6, &(0x7f0000000040), 0x4) fsetxattr$trusted_overlay_origin(r3, &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x2) ioctl$VIDIOC_S_CTRL(r5, 0xc008561c, &(0x7f0000000100)={0x3}) unshare(0x40000000) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r5, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) [ 723.815531][ T9268] hid-generic 0000:0000:0000.002B: unknown main item tag 0x0 [ 723.824884][T28079] IPVS: ftp: loaded support on port[0] = 21 [ 723.837045][T28081] IPVS: ftp: loaded support on port[0] = 21 [ 723.850373][T28078] IPVS: ftp: loaded support on port[0] = 21 [ 723.885554][ T9268] hid-generic 0000:0000:0000.002B: hidraw0: HID v0.00 Device [syz1] on syz1 [ 723.901764][T28084] IPVS: ftp: loaded support on port[0] = 21 [ 723.939145][T28082] IPVS: ftp: loaded support on port[0] = 21 21:56:53 executing program 4: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r3, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r4, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_CREATE(r6, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r6, &(0x7f0000000040), 0x4) write$UHID_DESTROY(r6, &(0x7f00000000c0), 0x4) ioctl$VIDIOC_S_CTRL(r5, 0xc008561c, &(0x7f0000000100)={0x3}) unshare(0x40000000) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r5, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) [ 724.444585][T27848] hid-generic 0000:0000:0000.002C: unknown main item tag 0x0 [ 724.462330][T27848] hid-generic 0000:0000:0000.002C: hidraw0: HID v0.00 Device [syz1] on syz1 [ 724.531797][T28097] IPVS: ftp: loaded support on port[0] = 21 21:56:53 executing program 4: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r3, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r4, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_CREATE(r6, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r6, &(0x7f0000000040), 0x4) write$UHID_DESTROY(r6, &(0x7f00000000c0), 0x4) ioctl$VIDIOC_S_CTRL(r5, 0xc008561c, &(0x7f0000000100)={0x3}) unshare(0x40000000) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r5, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) [ 725.028573][ T9268] hid-generic 0000:0000:0000.002D: unknown main item tag 0x0 [ 725.049232][ T9268] hid-generic 0000:0000:0000.002D: hidraw0: HID v0.00 Device [syz1] on syz1 [ 725.115400][T28105] IPVS: ftp: loaded support on port[0] = 21 [ 725.573658][ C0] net_ratelimit: 18 callbacks suppressed [ 725.573667][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 725.585293][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 725.653559][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 725.659418][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 725.665351][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 725.671141][ C0] protocol 88fb is buggy, dev hsr_slave_1 21:56:58 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r3, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r4, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_DESTROY(r6, &(0x7f0000000040), 0x4) fsetxattr$trusted_overlay_origin(r3, &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x2) write$UHID_DESTROY(r6, &(0x7f00000000c0), 0x4) ioctl$VIDIOC_S_CTRL(r5, 0xc008561c, &(0x7f0000000100)={0x3}) unshare(0x40000000) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r5, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:56:58 executing program 2: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r3, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r4, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_CREATE(r6, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r6, &(0x7f0000000040), 0x4) write$UHID_DESTROY(r6, &(0x7f00000000c0), 0x4) ioctl$VIDIOC_S_CTRL(r5, 0xc008561c, &(0x7f0000000100)={0x3}) unshare(0x40000000) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r5, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:56:58 executing program 5: syz_execute_func(&(0x7f0000000000)="980c2c0f050520d0f807913e3e2ef3420f53de4141e2e9c441f8173de10000007979855b660f162f0fc4014ef04680b64f002d00c1c4c31d6f3a7f21fc22ebc48265b8dc2e41812047002b0003e86eba9e05fe8c737388a1c40fbbf3470f582ee2ed5d3a0808294003b00b0000000f73d53944d1f466f347adc46291ae8ca0656000000f01cc740f2d96000000c4c20d2bf41d1d440f2b550142c4b33120b15ff3b15ffb110f0fca380483360000c4c36d5f0299") syz_execute_func(&(0x7f0000000440)="43dd25010000006565d93457664a0f3a602bd8c4c2f5bcd001782b56a602fe36f3af89f4f8b29816608f161e660f176159f7450f3804e74567f3470f51f0feddc42269b70d0000002039345116430fc7f6660f5108c4626d01b000000000c174264a288128810000") 21:56:59 executing program 5: syz_execute_func(&(0x7f0000000000)="980c2c0f050520d0f807913e3e2ef3420f53de4141e2e9c441f8173de10000007979855b660f162f0fc4014ef04680b64f002d00c1c4c31d6f3a7f21fc22ebc48265b8dc2e41812047002b0003e86eba9e05fe8c737388a1c40fbbf3470f582ee2ed5d3a0808294003b00b0000000f73d53944d1f466f347adc46291ae8ca0656000000f01cc740f2d96000000c4c20d2bf41d1d440f2b550142c4b33120b15ff3b15ffb110f0fca380483360000c4c36d5f0299") syz_execute_func(&(0x7f0000000240)="43dd25010000006565d93457664a0f3a602b8cb0a0c401782b56a602fe36f3af89f4f8b29816608f161e082c2cf7450f3804e745f618feddc403f968019939345116430fc7f6660f5108c4626d01b000000000c14a288112100000") 21:56:59 executing program 1: syz_execute_func(&(0x7f0000000400)="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") syz_execute_func(&(0x7f0000000380)="43dd2521000000b376d93457932bace341f1bb212196b31470a9c4230d4078002a00806a3e00004081eff4373413c4a205af670921a8d9d9cacac421f175460081d2c1c22e66654f9744a9a736066d6d973e404c975b66650ff344af042e6d660f6785000000808fc978db6705c442fd2a1d71250000") [ 730.335513][T28122] IPVS: ftp: loaded support on port[0] = 21 [ 730.457424][ T17] hid-generic 0000:0000:0000.002E: unknown main item tag 0x0 [ 730.516582][ T17] hid-generic 0000:0000:0000.002E: hidraw0: HID v0.00 Device [syz1] on syz1 21:56:59 executing program 1: syz_execute_func(&(0x7f0000000600)="96c4217a2df1c4a2791dcd1c040f05bf04411100c4a37bf0c55c41e2e98f292091b700000080000f33b882f464bc4e4e4e5bc403757bfcc430091e1edee509c421045fc463ad7a2200d2c4a1ddf3663642c1dbff31c4e10bf831c46864660f3838520a3e66470f383dab7ed9d2dec4c2550a14653223333333ed33ed4877f866440ff469762e660f3806cfd3fb0000c4227d215106c4c34144e0b2450f01ee66400f64287c7c66f2abdec867dddde8e80f79cec466b1f72ec3c4e2899294d80000000019c2c2b0c1c442ed9693af1335030000c4414e53d2c581601643d9ee0fc60fc6a0a8f3f3000000f1ebeb628f8f709b24e100babaf04283a900800000002626802d08000000ba49c4d05d5d0f91f3c0638d6e8df9f7ffef00ffff410f4ace6564f083579463110f66474efbe2") pwritev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000240)="6608a3e5fce880da1b60a54326c0de2a6c", 0x11}], 0x1, 0x0) syz_execute_func(&(0x7f0000000140)="43dd25010100007565d93457476d951912ff826d6d96752666420fe98200000000e92a000000c421481285440000006426440f01fc12d8bfd5") [ 730.564610][T28129] IPVS: ftp: loaded support on port[0] = 21 21:56:59 executing program 5: syz_execute_func(&(0x7f00000003c0)="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") pwritev(0xffffffffffffffff, &(0x7f0000001b80)=[{&(0x7f0000000180)="15f8d2c74187034f928189510e33159253c15603dd04f966b922b5d91482979ccaf34592fc18df970000004b0e736b439342b04a1d2b525e5b1dad93d1a85bfaeb952ed33e91e28205b2065ab3a5ce828b334912ee6d97940fcb95426ede898d86f0e915298d7fe7459f198bfdb34e778c5b0c20ea5998336fe42e3d375bc4b131a240e5df34243bf9", 0x89}], 0x1, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000240)="6608a3e5fce880da1b60a54326c0de2a6c7766825f44a6bbed8db81e62ac314bde", 0x21}], 0x1, 0x0) syz_execute_func(&(0x7f0000000100)="43dd25010100007565d93457476d951912ff826d6d96752666420fe98200000000e92a000000c421481285440000006426440f01fc12d8bfd5") [ 730.853553][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 730.859544][ C0] protocol 88fb is buggy, dev hsr_slave_1 21:57:00 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r3, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r4, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_CREATE(r6, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r6, &(0x7f0000000040), 0x4) write$UHID_DESTROY(r6, &(0x7f00000000c0), 0x4) ioctl$VIDIOC_S_CTRL(r5, 0xc008561c, &(0x7f0000000100)={0x3}) unshare(0x40000000) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r5, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:57:00 executing program 5: syz_execute_func(&(0x7f0000000280)="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") syz_execute_func(&(0x7f00000000c0)="43dd25310000006565d93457f04783892dee000001470f1bc88fe96090bf00000000660f3a14edf95300e3d60f4346b2670f01dcf08d191919c401c457f500c2548f2868752e0ff52cfd030000000fa1edf2ac2b27000001000003fd007cd32d21c4c2e1dd8e00000000c4c4227d5aae0800000036c137006743d855ff65f344726ec4412972d306c44271aaf3f2e1a55cacc423a10f8a03000000008676050502001e101066430fc41200c4225506fc0fa7004747426fa19a1c10660f3828cd") 21:57:00 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r3, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r4, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_DESTROY(r6, &(0x7f0000000040), 0x4) fsetxattr$trusted_overlay_origin(r3, &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x2) write$UHID_DESTROY(r6, &(0x7f00000000c0), 0x4) ioctl$VIDIOC_S_CTRL(r5, 0xc008561c, &(0x7f0000000100)={0x3}) unshare(0x40000000) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r5, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) [ 731.093611][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 731.099567][ C1] protocol 88fb is buggy, dev hsr_slave_1 21:57:00 executing program 5: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r3, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r4, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_CREATE(r6, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r6, &(0x7f0000000040), 0x4) write$UHID_DESTROY(r6, &(0x7f00000000c0), 0x4) ioctl$VIDIOC_S_CTRL(r5, 0xc008561c, &(0x7f0000000100)={0x3}) unshare(0x40000000) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r5, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) [ 731.402083][T28152] IPVS: ftp: loaded support on port[0] = 21 [ 731.488325][ T17] hid-generic 0000:0000:0000.002F: unknown main item tag 0x0 [ 731.508954][ T17] hid-generic 0000:0000:0000.002F: hidraw0: HID v0.00 Device [syz1] on syz1 [ 731.535365][T28157] IPVS: ftp: loaded support on port[0] = 21 [ 731.720154][T28159] IPVS: ftp: loaded support on port[0] = 21 [ 731.825007][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 731.832767][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 731.893608][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 731.899579][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 731.905531][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 731.911353][ C0] protocol 88fb is buggy, dev hsr_slave_1 21:57:01 executing program 4: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r3, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r4, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_CREATE(r6, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r6, &(0x7f0000000040), 0x4) fsetxattr$trusted_overlay_origin(r3, &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x2) ioctl$VIDIOC_S_CTRL(r5, 0xc008561c, &(0x7f0000000100)={0x3}) unshare(0x40000000) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r5, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) [ 733.213165][T28164] IPVS: ftp: loaded support on port[0] = 21 21:57:05 executing program 4: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r3, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r4, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_CREATE(r6, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r6, &(0x7f0000000040), 0x4) fsetxattr$trusted_overlay_origin(r3, &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x2) ioctl$VIDIOC_S_CTRL(r5, 0xc008561c, &(0x7f0000000100)={0x3}) unshare(0x40000000) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r5, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) [ 736.752744][T28170] IPVS: ftp: loaded support on port[0] = 21 21:57:06 executing program 2: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r3, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r4, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_CREATE(r6, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r6, &(0x7f0000000040), 0x4) write$UHID_DESTROY(r6, &(0x7f00000000c0), 0x4) ioctl$VIDIOC_S_CTRL(r5, 0xc008561c, &(0x7f0000000100)={0x3}) unshare(0x40000000) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r5, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:57:06 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r3, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r4, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_DESTROY(r6, &(0x7f0000000040), 0x4) fsetxattr$trusted_overlay_origin(r3, &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x2) write$UHID_DESTROY(r6, &(0x7f00000000c0), 0x4) ioctl$VIDIOC_S_CTRL(r5, 0xc008561c, &(0x7f0000000100)={0x3}) unshare(0x40000000) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r5, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) [ 737.093558][ C0] net_ratelimit: 8 callbacks suppressed [ 737.093568][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 737.105020][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 737.234439][T28176] IPVS: ftp: loaded support on port[0] = 21 21:57:06 executing program 4: syz_execute_func(&(0x7f0000000480)="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") bind(0xffffffffffffffff, &(0x7f00000002c0)=@in6={0x1c, 0xffffffffffffffff, 0x0, @remote, 0x400}, 0x1c) syz_execute_func(&(0x7f0000000240)="43dd25310000006565d93457c4c2e19c3bc442f9921c7dfd2f8fe8660f380b3d00000000f30f122d2bbd0000c4c1c2c2e610653e0f01d5c4e3e50ca7fdffffff0776c20f71ed20") [ 737.334716][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 737.340735][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 737.400455][T28178] IPVS: ftp: loaded support on port[0] = 21 [ 737.413562][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 737.419388][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 737.425304][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 737.425364][ C0] protocol 88fb is buggy, dev hsr_slave_1 21:57:06 executing program 4: 21:57:06 executing program 4: 21:57:06 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r3, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r4, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000040), 0x4) fsetxattr$trusted_overlay_origin(r3, &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x2) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f00000000c0), 0x4) ioctl$VIDIOC_S_CTRL(r5, 0xc008561c, &(0x7f0000000100)={0x3}) unshare(0x40000000) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r5, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:57:07 executing program 0: 21:57:07 executing program 4: 21:57:07 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r3, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r4, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_DESTROY(r6, &(0x7f0000000040), 0x4) fsetxattr$trusted_overlay_origin(r3, &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x2) write$UHID_DESTROY(r6, &(0x7f00000000c0), 0x4) ioctl$VIDIOC_S_CTRL(r5, 0xc008561c, &(0x7f0000000100)={0x3}) unshare(0x40000000) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r5, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) [ 738.053614][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 738.059475][ C0] protocol 88fb is buggy, dev hsr_slave_1 21:57:07 executing program 5: 21:57:07 executing program 4: 21:57:07 executing program 2: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r3, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r4, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_CREATE(r6, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r6, &(0x7f0000000040), 0x4) write$UHID_DESTROY(r6, &(0x7f00000000c0), 0x4) ioctl$VIDIOC_S_CTRL(r5, 0xc008561c, &(0x7f0000000100)={0x3}) unshare(0x40000000) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r5, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) 21:57:07 executing program 0: [ 738.243944][T28197] IPVS: ftp: loaded support on port[0] = 21 21:57:07 executing program 5: 21:57:07 executing program 4: 21:57:07 executing program 0: [ 738.526002][T28213] IPVS: ftp: loaded support on port[0] = 21 21:57:07 executing program 5: [ 738.569014][T28217] IPVS: ftp: loaded support on port[0] = 21 [ 738.596490][T27179] hid-generic 0000:0000:0000.0030: unknown main item tag 0x0 [ 738.642796][T27179] hid-generic 0000:0000:0000.0030: hidraw0: HID v0.00 Device [syz1] on syz1 21:57:10 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r3, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r4, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000040), 0x4) fsetxattr$trusted_overlay_origin(r3, &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x2) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f00000000c0), 0x4) ioctl$VIDIOC_S_CTRL(r5, 0xc008561c, &(0x7f0000000100)={0x3}) unshare(0x40000000) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r5, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:57:10 executing program 0: 21:57:10 executing program 4: 21:57:10 executing program 5: 21:57:10 executing program 2: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r3, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r4, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_CREATE(r6, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r6, &(0x7f0000000040), 0x4) write$UHID_DESTROY(r6, &(0x7f00000000c0), 0x4) ioctl$VIDIOC_S_CTRL(r5, 0xc008561c, &(0x7f0000000100)={0x3}) unshare(0x40000000) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r5, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) 21:57:10 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r3, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r4, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_DESTROY(r6, &(0x7f0000000040), 0x4) fsetxattr$trusted_overlay_origin(r3, &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x2) write$UHID_DESTROY(r6, &(0x7f00000000c0), 0x4) ioctl$VIDIOC_S_CTRL(r5, 0xc008561c, &(0x7f0000000100)={0x3}) unshare(0x40000000) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r5, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:57:10 executing program 5: 21:57:10 executing program 0: 21:57:10 executing program 4: [ 741.284624][T27847] hid-generic 0000:0000:0000.0031: unknown main item tag 0x0 [ 741.293174][T27847] hid-generic 0000:0000:0000.0031: hidraw0: HID v0.00 Device [syz1] on syz1 [ 741.350885][T28245] IPVS: ftp: loaded support on port[0] = 21 [ 741.406049][T28248] IPVS: ftp: loaded support on port[0] = 21 21:57:10 executing program 5: 21:57:10 executing program 4: socket$inet6_udp(0x1c, 0x2, 0x0) syz_execute_func(&(0x7f0000000000)="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") syz_execute_func(&(0x7f00000003c0)="43dd25310000006565d934574d0faea529000000472fdd133c0080e800005dfc0ffd0b020000028f097812c8470f6f9ba0418ae41e1e6567532bc438660f6fd1d14c1ad25f358de8e8c46318788a07a99699439940dbc72e26473d0f964ba7a7450f28321898a16af4c4e15d8f68d8a3915422ff75f800bd") 21:57:10 executing program 0: syz_execute_func(&(0x7f0000000200)="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") syz_execute_func(&(0x7f0000000180)="43dd25310000006565d934574d0faea529000000472fdd133c0080e800005dfc0ffd0b020000028f097812c8470f6f79a041e400ae656753cd2bc4c40f6fd3284c1ad25f8d33cac46318788a07a99699439940dbc72e26473d0f964ba7a7450f28321898a16af4c4e15d00bd") [ 741.539104][T28250] IPVS: ftp: loaded support on port[0] = 21 21:57:14 executing program 5: syz_execute_func(&(0x7f00000002c0)="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") syz_execute_func(&(0x7f0000000400)="43dd25310000006565d93457460dbdc28a8a263e450fda12f22d2bbd00000207c40cc4fd46a542c30bf045f757080ae79fc428660f102ac4c1fa2a457be1a6c4a1fc5376003ae5c4815d578d001000000b7800c4427d192fc4416175f660ce7e") 21:57:14 executing program 4: syz_execute_func(&(0x7f0000000100)="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") syz_execute_func(&(0x7f0000000080)="43dd25310000006565d93457c4e35902fcf7f3450f8f5c000000660f380b3d00000000f30f122d2bbd0000c4c1c2c2e610f30f10930000000076c20f71ed20") 21:57:14 executing program 0: syz_execute_func(&(0x7f0000000700)="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") syz_execute_func(&(0x7f0000000380)="43dd25310000006565d934574d0faea529000000472fdd133c0080e800005dfc0ffd0b020000028f097812c8470f6f79a041e400440f51bb488900006567532bc4284c1ad25f8d33cac46318788a07a99699439940dbc72e26473d0f964ba7a7450f28321898a16af4c4e15d8f68d8a3915422ff75f800bd") 21:57:14 executing program 1: syz_execute_func(&(0x7f0000000000)="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") syz_execute_func(&(0x7f0000000300)="43dd25310000006565d934574d0faea529000000472fdd133c0080e800005dfc0ffd0b020000028f097812c8470f6f79a041e400aec4417f12382bc4660f6fd3284c1ad25f8d33cac46318788a07a99699439940dbc72e26473d0f964ba7a7450f28321898a16af4c4e15d8f68d8a3915422ff75f800bd") 21:57:14 executing program 2: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r3, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r4, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_CREATE(r6, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r6, &(0x7f0000000040), 0x4) write$UHID_DESTROY(r6, &(0x7f00000000c0), 0x4) ioctl$VIDIOC_S_CTRL(r5, 0xc008561c, &(0x7f0000000100)={0x3}) unshare(0x40000000) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r5, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) 21:57:14 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r3, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r4, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000040), 0x4) fsetxattr$trusted_overlay_origin(r3, &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x2) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f00000000c0), 0x4) ioctl$VIDIOC_S_CTRL(r5, 0xc008561c, &(0x7f0000000100)={0x3}) unshare(0x40000000) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r5, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:57:14 executing program 1: r0 = socket$unix(0x1, 0x5, 0x0) sendmmsg(r0, &(0x7f0000001ec0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 21:57:14 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000003c0)={@initdev, 0x0, 0x2}, 0x0) 21:57:14 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockname$netlink(r0, 0x0, &(0x7f0000001680)) 21:57:14 executing program 5: r0 = socket$inet6(0xa, 0x80002, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @remote}, 0x1c) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_int(r1, 0x6, 0x4000000000013, &(0x7f0000000180), 0x4) sendto$unix(r1, &(0x7f0000000040), 0xfd1b, 0x0, 0x0, 0x0) sendto$inet6(r0, &(0x7f00000009c0)="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", 0x534, 0xc001, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000940)="3ce95c98b66a9cdea42aca63276ef1eca3f038047504ba09072b9792bbe041c012d015e0f9cdf7aa7a4d18766deff9a2735edc11437a10c0e9f265c48e7033f01161d5ca1babf5738b4c3df116d964712d2c577d1181a2a242ab4ada0b6cd45c1f36c27a7453575b33cdd7300a74dd585eab465795dccddd26", 0x79, 0x400c000, 0x0, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x1, &(0x7f0000000000), 0x4) 21:57:14 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x1ffffffffffffe, 0x31, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0xa, 0x3, 0x10) setsockopt$netlink_NETLINK_RX_RING(r1, 0x29, 0x6, &(0x7f0000000ff0)={0x1c2}, 0x1c2) 21:57:14 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@mcast2}, 0x0) [ 745.627565][T28294] IPVS: ftp: loaded support on port[0] = 21 [ 745.653546][ C1] net_ratelimit: 12 callbacks suppressed [ 745.653555][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 745.666091][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 745.734883][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 745.741969][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 745.750051][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 745.757203][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 745.774590][T27179] hid-generic 0000:0000:0000.0032: unknown main item tag 0x0 21:57:14 executing program 1: [ 745.784216][T28287] IPVS: ftp: loaded support on port[0] = 21 [ 745.802254][T27179] hid-generic 0000:0000:0000.0032: hidraw0: HID v0.00 Device [syz1] on syz1 21:57:15 executing program 1: 21:57:15 executing program 0: 21:57:15 executing program 4: 21:57:15 executing program 2: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r3, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r4, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_CREATE(r6, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r6, &(0x7f0000000040), 0x4) write$UHID_DESTROY(r6, &(0x7f00000000c0), 0x4) ioctl$VIDIOC_S_CTRL(r5, 0xc008561c, &(0x7f0000000100)={0x3}) unshare(0x40000000) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r5, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:57:15 executing program 5: 21:57:15 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r3, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r4, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r5 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_CREATE(r5, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r5, &(0x7f0000000040), 0x4) fsetxattr$trusted_overlay_origin(r3, &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x2) write$UHID_DESTROY(r5, &(0x7f00000000c0), 0x4) ioctl$VIDIOC_S_CTRL(0xffffffffffffffff, 0xc008561c, &(0x7f0000000100)={0x3}) unshare(0x40000000) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:57:15 executing program 1: [ 746.373564][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 746.379850][ C0] protocol 88fb is buggy, dev hsr_slave_1 21:57:15 executing program 0: syz_execute_func(&(0x7f0000000140)="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") msgsnd(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="ef9e69468385233eac7fff"], 0x1, 0x0) syz_execute_func(&(0x7f00000000c0)="43dd25310000006565d93457c4e1f9c5cb73470f761f0f94f66766440fd9e1c4e2d13aaefeefd7ff653e0f212dd5d5fdece1e1a7fd31ffc4a2919224fb90") [ 746.465342][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 746.471523][ C0] protocol 88fb is buggy, dev hsr_slave_1 21:57:15 executing program 4: sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)="1b", 0x1}], 0x1}, 0x0) syz_execute_func(&(0x7f0000000100)="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") syz_execute_func(&(0x7f0000000240)="43dd25310000006565d93457c4c2e19c3bc442f9921c7dfd2f8fe8660f380b3d00000000f30f122d2bbd0000c4c1c2c2e610653e0f01d5c4e3e50ca7fdffffff0776c20f71ed20") 21:57:15 executing program 5: syz_execute_func(&(0x7f0000000200)="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") syz_execute_func(&(0x7f0000000180)="43dd25310000006565d934574d0faea529000000472fdd133c0080e800005dfc0ffd0b020000028f097812c8470f6f79a041e400ae6567532bc4660f6fd3284c1ad25f8d33cac46318788a07a99699439940dbc72e26473d0f964ba7a7450f28321898a16af4c4e15d8f68d8a3915422ff75f800bd") [ 746.513272][T28330] IPVS: ftp: loaded support on port[0] = 21 [ 746.667858][T28333] IPVS: ftp: loaded support on port[0] = 21 21:57:15 executing program 0: syz_execute_func(&(0x7f0000000140)="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") msgsnd(0x0, &(0x7f0000000100)=ANY=[@ANYPTR, @ANYRESDEC], 0x2, 0x0) syz_execute_func(&(0x7f00000000c0)="43dd25310000006565d93457c4e1f9c5cb73470f761f0f94f66766440fd9e1c4e2d13aaefeefd7ff653e0f212dd5d5fdece1e1fd31ffc4a2919224fb90") 21:57:15 executing program 4: syz_execute_func(0x0) syz_execute_func(&(0x7f0000000040)="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") dup(0xffffffffffffff9c) syz_execute_func(&(0x7f0000000380)="43dd25310000006565d93457c4c2e19c3b4dfcc4617d5a73226d9b78e6b37531312bbd000010c44951c4a3ad7d790000bdffffc481fc11e366470f38227601") mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x410, 0xffffffffffffffff, 0x0) 21:57:15 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r3, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r4, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_CREATE(r6, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r6, &(0x7f0000000040), 0x4) write$UHID_DESTROY(r6, &(0x7f00000000c0), 0x4) ioctl$VIDIOC_S_CTRL(r5, 0xc008561c, &(0x7f0000000100)={0x3}) unshare(0x40000000) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r5, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) 21:57:15 executing program 5: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r3, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r4, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_CREATE(r6, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r6, &(0x7f0000000040), 0x4) write$UHID_DESTROY(r6, &(0x7f00000000c0), 0x4) ioctl$VIDIOC_S_CTRL(r5, 0xc008561c, &(0x7f0000000100)={0x3}) unshare(0x40000000) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r5, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) 21:57:16 executing program 4: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r3, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r4, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_CREATE(r6, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r6, &(0x7f0000000040), 0x4) write$UHID_DESTROY(r6, &(0x7f00000000c0), 0x4) ioctl$VIDIOC_S_CTRL(r5, 0xc008561c, &(0x7f0000000100)={0x3}) unshare(0x40000000) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r5, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) [ 747.248641][T28362] IPVS: ftp: loaded support on port[0] = 21 21:57:16 executing program 2: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r3, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r4, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_CREATE(r6, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r6, &(0x7f0000000040), 0x4) write$UHID_DESTROY(r6, &(0x7f00000000c0), 0x4) ioctl$VIDIOC_S_CTRL(r5, 0xc008561c, &(0x7f0000000100)={0x3}) unshare(0x40000000) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r5, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) [ 747.357761][T28366] IPVS: ftp: loaded support on port[0] = 21 [ 747.681012][T27179] hid-generic 0000:0000:0000.0033: unknown main item tag 0x0 [ 747.707250][T27179] hid-generic 0000:0000:0000.0033: hidraw0: HID v0.00 Device [syz1] on syz1 [ 747.758120][T28376] IPVS: ftp: loaded support on port[0] = 21 [ 747.915041][T28364] IPVS: ftp: loaded support on port[0] = 21 21:57:18 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r3, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r4, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r5 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_CREATE(r5, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r5, &(0x7f0000000040), 0x4) fsetxattr$trusted_overlay_origin(r3, &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x2) write$UHID_DESTROY(r5, &(0x7f00000000c0), 0x4) ioctl$VIDIOC_S_CTRL(0xffffffffffffffff, 0xc008561c, &(0x7f0000000100)={0x3}) unshare(0x40000000) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:57:18 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r3, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r4, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_CREATE(r6, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r6, &(0x7f0000000040), 0x4) write$UHID_DESTROY(r6, &(0x7f00000000c0), 0x4) ioctl$VIDIOC_S_CTRL(r5, 0xc008561c, &(0x7f0000000100)={0x3}) unshare(0x40000000) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r5, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) 21:57:18 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r3, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r4, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_CREATE(r6, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r6, &(0x7f0000000040), 0x4) write$UHID_DESTROY(r6, &(0x7f00000000c0), 0x4) ioctl$VIDIOC_S_CTRL(r5, 0xc008561c, &(0x7f0000000100)={0x3}) unshare(0x40000000) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r5, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) 21:57:18 executing program 5: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r3, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r4, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_CREATE(r6, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r6, &(0x7f0000000040), 0x4) write$UHID_DESTROY(r6, &(0x7f00000000c0), 0x4) ioctl$VIDIOC_S_CTRL(r5, 0xc008561c, &(0x7f0000000100)={0x3}) unshare(0x40000000) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r5, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:57:18 executing program 2: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r3, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r4, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_CREATE(r6, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r6, &(0x7f0000000040), 0x4) write$UHID_DESTROY(r6, &(0x7f00000000c0), 0x4) ioctl$VIDIOC_S_CTRL(r5, 0xc008561c, &(0x7f0000000100)={0x3}) unshare(0x40000000) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r5, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:57:18 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0xffffffffffffffff) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x14, 0x10, 0x701, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) 21:57:19 executing program 4: mknod(&(0x7f0000000180)='./file0\x00', 0x1ffb, 0x0) open$dir(&(0x7f0000000000)='./file0\x00', 0x441, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = getpid() fcntl$setown(r0, 0x6, r1) [ 749.954394][T28108] hid-generic 0000:0000:0000.0034: unknown main item tag 0x0 [ 749.990463][T28403] IPVS: ftp: loaded support on port[0] = 21 [ 750.016144][T28401] IPVS: ftp: loaded support on port[0] = 21 [ 750.023071][T28108] hid-generic 0000:0000:0000.0034: hidraw0: HID v0.00 Device [syz1] on syz1 [ 750.170253][T28402] IPVS: ftp: loaded support on port[0] = 21 21:57:19 executing program 4: semget(0x2, 0x4, 0x691) [ 750.249954][T28407] IPVS: ftp: loaded support on port[0] = 21 [ 750.319331][T28411] IPVS: ftp: loaded support on port[0] = 21 21:57:19 executing program 4: r0 = open$dir(&(0x7f0000001240)='./file0\x00', 0x40000400000002c2, 0x0) ftruncate(r0, 0x0) 21:57:19 executing program 4: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000140)={0x2, &(0x7f0000000000)=[{0x2000000000040}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000003040), 0x4000000000003c4, 0x0) 21:57:20 executing program 4: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000140)={0x2, &(0x7f0000000000)=[{0x2000000000040}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000003040), 0x4000000000003c4, 0x0) 21:57:21 executing program 4: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000140)={0x2, &(0x7f0000000000)=[{0x2000000000040}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000003040), 0x4000000000003c4, 0x0) 21:57:25 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r3, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r4, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r5 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_CREATE(r5, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r5, &(0x7f0000000040), 0x4) fsetxattr$trusted_overlay_origin(r3, &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x2) write$UHID_DESTROY(r5, &(0x7f00000000c0), 0x4) ioctl$VIDIOC_S_CTRL(0xffffffffffffffff, 0xc008561c, &(0x7f0000000100)={0x3}) unshare(0x40000000) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:57:25 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r3, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r4, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_CREATE(r6, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r6, &(0x7f0000000040), 0x4) write$UHID_DESTROY(r6, &(0x7f00000000c0), 0x4) ioctl$VIDIOC_S_CTRL(r5, 0xc008561c, &(0x7f0000000100)={0x3}) unshare(0x40000000) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r5, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) [ 756.853629][ C0] net_ratelimit: 22 callbacks suppressed [ 756.853639][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 756.865300][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 756.871235][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 756.877203][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 756.902272][T28446] IPVS: ftp: loaded support on port[0] = 21 [ 756.919768][T28447] IPVS: ftp: loaded support on port[0] = 21 21:57:26 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000180)=ANY=[], 0xfffffc70) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'sha512\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) splice(r1, 0x0, r4, 0x0, 0x20000000003, 0x0) vmsplice(r2, &(0x7f0000000180)=[{&(0x7f0000000040)="ca", 0x1}], 0x1, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") 21:57:26 executing program 4: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000140)={0x2, &(0x7f0000000000)=[{0x2000000000040}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000003040), 0x4000000000003c4, 0x0) 21:57:26 executing program 2: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r3, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r4, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_CREATE(r6, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r6, &(0x7f0000000040), 0x4) write$UHID_DESTROY(r6, &(0x7f00000000c0), 0x4) ioctl$VIDIOC_S_CTRL(r5, 0xc008561c, &(0x7f0000000100)={0x3}) unshare(0x40000000) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r5, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:57:26 executing program 5: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000140)={0x2, &(0x7f0000000000)=[{0x2000000000040}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000003040), 0x4000000000003c4, 0x0) [ 757.218690][T27179] hid-generic 0000:0000:0000.0035: unknown main item tag 0x0 [ 757.260697][T28462] IPVS: ftp: loaded support on port[0] = 21 [ 757.275845][T27179] hid-generic 0000:0000:0000.0035: hidraw0: HID v0.00 Device [syz1] on syz1 21:57:26 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r3, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_CREATE(r6, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r6, &(0x7f0000000040), 0x4) fsetxattr$trusted_overlay_origin(r3, &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x2) write$UHID_DESTROY(r6, &(0x7f00000000c0), 0x4) ioctl$VIDIOC_S_CTRL(r5, 0xc008561c, &(0x7f0000000100)={0x3}) unshare(0x40000000) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r5, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:57:26 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x9) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000080)="580000001400192340834b80040d8c5602067fffffff810000005d6d0000a87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff0900008006f5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 21:57:26 executing program 2: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r3, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r4, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_CREATE(r6, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r6, &(0x7f0000000040), 0x4) write$UHID_DESTROY(r6, &(0x7f00000000c0), 0x4) ioctl$VIDIOC_S_CTRL(r5, 0xc008561c, &(0x7f0000000100)={0x3}) unshare(0x40000000) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r5, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) [ 757.758916][T27179] hid-generic 0000:0000:0000.0036: unknown main item tag 0x0 [ 757.785899][T27179] hid-generic 0000:0000:0000.0036: hidraw0: HID v0.00 Device [syz1] on syz1 [ 757.793356][T28474] IPVS: ftp: loaded support on port[0] = 21 21:57:26 executing program 1: syz_execute_func(&(0x7f0000000180)="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") syz_execute_func(&(0x7f0000000100)="43dd25310000006565d93457460dbdc28a8a263e450fda12f22d2bbd00000207c40cc4fd46a577ee42c30bf045f757080ae79fc428660fb3b3c4226d067cef0054f407e1a6c4a1fc5376003ae5c4815d008ddb10006735357800c4427d192fc4416175f620") 21:57:26 executing program 5: syz_execute_func(&(0x7f0000000280)="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") syz_execute_func(&(0x7f0000000100)="43dd25010000006565d93457664a0f3a602b8c42dfb900000000c401782b56a602fe36f3afc4c3ad0b2d8303433af9f8b29816608f161ec4c221dfe9f7450f3804e7458fc84087f102faddc403f9682a9939345116430fc7f6660f5108f041f616c14a288112100000") [ 757.893622][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 757.899529][ C0] protocol 88fb is buggy, dev hsr_slave_1 21:57:27 executing program 4: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000003040), 0x4000000000003c4, 0x0) 21:57:27 executing program 0: syz_execute_func(&(0x7f0000000180)="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") syz_execute_func(&(0x7f0000000080)="43dd25310000006565d93457460dbdc28a8a263e450fda12f22d2bbd00000207c40cc4fd46a577ee42c30bf045f757080ae79fc428660fb3b37e54f407e1a6c4a1fc5376003ae5c4815d578d001000000b7800c4427d192fc4416175f620") 21:57:27 executing program 1: syz_execute_func(&(0x7f0000000280)="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") sendmsg(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000100)="32a2199003497272af9cc543c3d3", 0xe}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000140)="3522f206d3c1439bf418d6f6e1caa664326b5f3c528547722e5122c324d99e3a7b", 0x21}], 0x1}, 0x0) syz_execute_func(&(0x7f0000000000)="43dd25010100006565d93457c4e1782fe4c462a10182030000004673fec1fd8e48bdd9468a9061e3cbf7c9f436a8e1778d0000000f71c0c44215169739") [ 758.133548][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 758.139530][ C1] protocol 88fb is buggy, dev hsr_slave_1 21:57:27 executing program 5: syz_execute_func(&(0x7f0000000180)="96419cc4a2791dcd1c040f05bf04411100c4a37bf0c55c41e2e9660ff8aa02480057000f33b8c4f4014ec4017b110830091e1edee52636f3a621045f4607c421dd5831c4e10bf8c4af64660f3838520a470f898c00000096863347dbd563b6d3fada066477f866440ff4697683397fd3fb0000c4227d215106662ad726660f73d30066400f64287c7c66f2ab67dddda8e80fddf6c6e446b1f72ec3c4e2899294d80000000019c2c2b0c1030a0000c4414e53d2c58160160035ee0fc60fc6a8f2ae000000f1ebeb628f8f7d9b6500f2366766410f3a1517022626802d08000000ba5c450f91f328c4e3638d6e8df9fffffc00fc00410f4acefba70fc4e251bcdfb83aa2f1fbfbe2") syz_execute_func(&(0x7f0000000100)="43dd25310000006565d93457460dbdc28a8a263e450fda12dac50207c4d107d4d403c10f7a05bc77ee4ac30bf045f757a70a819ff8c4c4660f102ac4e14173fb56c4a1fc5376003ae5c421fc289b0f000000c4427d192f360f64050a80000020") [ 758.213874][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 758.219741][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 758.301439][T28487] IPVS: ftp: loaded support on port[0] = 21 21:57:27 executing program 1: pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000400)="b0256e872e70977fa81e2bdd8cf3fe477ef07f7a894efbfffed073", 0x1b}], 0x1, 0x0) syz_execute_func(&(0x7f0000000100)="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") syz_execute_func(&(0x7f0000000380)="43dd25310000006565d93457c4c2e19c3bc442f9921c7dfd2f8fe8660f380b3d000000004df30f122d2bbd000000c1c2c2e666f30f38f68e1ca30000c442f91e5502c4e3e50ca7fdffffff0776c20f71ed20") 21:57:27 executing program 0: syz_execute_func(&(0x7f0000000000)="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") syz_execute_func(&(0x7f0000000140)="43dd25310000006565d934574d0faea529000000472fdd133c0080e800005dfc0ffd0b020000028f097812c8470f6f79a041e400ae6567532bc4660f6fd378784c1ad25f8d33cac46318788a07a99699439940dbc7c44221b7460ca7450f28321898a16af4c4e15d8f68d8a3915422ff75f865460fc6c109") 21:57:27 executing program 5: syz_execute_func(&(0x7f0000000280)="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") sendmsg(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000100)="32a2199003497272af9c", 0xa}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000140)="3522f206d3c1439bf418d6f6e1caa664326b5f3c528547722e5122c324d99e3a7b", 0x21}], 0x1}, 0x0) syz_execute_func(&(0x7f0000000000)="43dd25010100006565d93457c4e1782fe4c462a10182030000004673fec1fd8e48bdd9468a9061e3cbf7c9f436a8e1778d0000000f71c0c44215169739") 21:57:29 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r3, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_CREATE(r6, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r6, &(0x7f0000000040), 0x4) fsetxattr$trusted_overlay_origin(r3, &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x2) write$UHID_DESTROY(r6, &(0x7f00000000c0), 0x4) ioctl$VIDIOC_S_CTRL(r5, 0xc008561c, &(0x7f0000000100)={0x3}) unshare(0x40000000) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r5, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:57:29 executing program 0: syz_execute_func(&(0x7f00000004c0)="96419cc4a2791dcd1c040f05bf04411100c4a37bf0c55c41e2e9660ff8aa02480057000f33b8c4f4014e4e4e5b4b264ad80f30091e1edee509c421045f4607c421dd5831c4e10bf8c45b64660f3838520a470f898c00000096ea33ed33ed4877f866440ff4697683397fd3fb0000c4227d215106662ad726660f73d30066400f64287c7c66f2ab440fec3f67dddda8e80fddf6c6c466b1f72ec3c4e2899294d80000000019c2c2b0c10b0b0000c4414e53d2c58160160035ee0fc60fc6a8f2ae000000f1ebeb628f8f7d9b6500f236f04283a900800000002626802d08000000ba49c45c450f91f3c4638d6e8df9ffffff00ffff410f4acefb110fc4e251bcdfb83aa2f1fbfbe2") select(0x0, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x1000, 0x0, 0x1}, 0x0) syz_execute_func(&(0x7f0000000080)="43dd25310000006565d93457460dbdc28a8a263e450fda12f22d2bbd00000207c40cc4fd46a577ee42c30bf045f757080ae79fc428660fb3b32a0954f407e1a6c4a1fc5376003ae5c4815d578d001000000b7800c4427d192fc4416175f620") 21:57:29 executing program 1: syz_execute_func(&(0x7f0000000100)="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") syz_execute_func(&(0x7f0000000080)="43dd25310000006565d93457460dbdc28a8a263e450fda12f22d2bbd00000207c40cc4fd46a577ee42c30bf045f757080ae79fc428660fb3b32a0954f407e1a6c4a1fc5376003ae5c4815d578d001000000b7800c4427d192fc4416175f620") 21:57:29 executing program 5: syz_execute_func(&(0x7f0000000000)="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") syz_execute_func(&(0x7f0000000180)="43dd25310000006565d934574d0faea529000000472fdd133c0080e8000055fc0ffd0b020000028f097812c8470f6f79a041e400ae6553660f6e49cf660f6fd3284c1ad25f8d33cac463d7013807a99699439940dbc72e26473d0f964ba7a7450f28321898a16af4c4e15d8f68d8a3915422ff75f800bd") 21:57:29 executing program 2: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r3, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r4, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_CREATE(r6, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r6, &(0x7f0000000040), 0x4) write$UHID_DESTROY(r6, &(0x7f00000000c0), 0x4) ioctl$VIDIOC_S_CTRL(r5, 0xc008561c, &(0x7f0000000100)={0x3}) unshare(0x40000000) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r5, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:57:29 executing program 4: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000003040), 0x4000000000003c4, 0x0) 21:57:29 executing program 0: pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000400)="b0256e872e70977fa81e2bdd8cf3fe477ef07f7a894efbfffed0733dbd771d13cd814a", 0x23}], 0x1, 0x0) syz_execute_func(&(0x7f0000000100)="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") syz_execute_func(&(0x7f0000000380)="43dd25310000006565d93457c4c2e19c3bc442f9921c7dfd2f8fe8660f380b3d000000004df30f122d2bbd000000c1c2c2e666f30f38f68e1ca30000c442f91e5502c4e3e50ca7fdffffff0776c20f71ed20") 21:57:29 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair(0x8, 0x6, 0x6, &(0x7f00000000c0)={0xffffffffffffffff}) syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') setsockopt$IP_VS_SO_SET_ADDDEST(r1, 0x0, 0x487, &(0x7f0000000180)={{0x27, @rand_addr=0x1ff, 0x4e23, 0x0, 'ovf\x00', 0x8, 0x2, 0x75}, {@broadcast, 0x4e23, 0x4, 0x2bf3e3f2, 0x1, 0x4000000000000000}}, 0x44) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)=ANY=[@ANYBLOB="000f28bd7000fcdbdf25018000000000000009410000004c0018000007ff73797a310000000000000000000000000000004dc4b99c2f99523cb7e50400000000000000000000030000000051cf0000000000000000000000000000000000000000000000000000000000000008"], 0x1}, 0x1, 0x0, 0x0, 0x84}, 0x800) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={0x0, {0x2, 0x4e21}, {0x2, 0x0, @multicast1}, {0x2, 0xfffffffffffffffd, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x29d, 0x0, 0x0, 0x0, 0xfffffffffffffffe}) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000080)={'gretap0\x00', {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}}) 21:57:29 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000180)=0xffffffff) [ 760.476200][T26782] hid-generic 0000:0000:0000.0037: unknown main item tag 0x0 [ 760.518651][T26782] hid-generic 0000:0000:0000.0037: hidraw0: HID v0.00 Device [syz1] on syz1 [ 760.552477][ T3128] hid-generic 0000:0000:0000.0038: unknown main item tag 0x0 [ 760.583299][ T3128] hid-generic 0000:0000:0000.0038: hidraw1: HID v0.00 Device [syz1] on syz1 21:57:29 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='veth1\x00', 0x10) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000013, &(0x7f0000000180), 0x4) sendto$unix(r0, &(0x7f0000000040), 0xfd1b, 0x0, 0x0, 0x0) connect(r0, &(0x7f00000001c0)=@nl=@unspec, 0x80) [ 760.626896][T28547] IPVS: ftp: loaded support on port[0] = 21 [ 760.666976][T28555] IPVS: ftp: loaded support on port[0] = 21 21:57:29 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'sha224\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000002c0), 0xffffffffffffff94, 0x0, 0x0, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x0, 0x0, 0x0) close(r2) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") 21:57:29 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket(0x80000000000000a, 0x2, 0x0) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[0xfeffffff], [], @loopback}}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 21:57:30 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r3, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_CREATE(r6, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r6, &(0x7f0000000040), 0x4) fsetxattr$trusted_overlay_origin(r3, &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x2) write$UHID_DESTROY(r6, &(0x7f00000000c0), 0x4) ioctl$VIDIOC_S_CTRL(r5, 0xc008561c, &(0x7f0000000100)={0x3}) unshare(0x40000000) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r5, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:57:30 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='veth1\x00', 0x10) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000013, &(0x7f0000000180), 0x4) sendto(r0, &(0x7f0000000100)="148f17e8a5720dc63e7bed1622abfbf98ae8dc7964d76550ecf9497a6c032cccb0b4a44296f5cbb1318c9bb030df5f6935d614927efbba0d630c45077f9c9187737d", 0x42, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000040)=""/41, 0x29) sendto$unix(r0, &(0x7f0000000040), 0xfd1b, 0x0, 0x0, 0x0) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x68, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4109, 0x0, {0x4c, 0x18, {0x0, @media='eth\x00'}}}}, 0x68}}, 0x0) connect(r0, &(0x7f00000001c0)=@nl=@unspec, 0x80) 21:57:30 executing program 4: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000003040), 0x4000000000003c4, 0x0) 21:57:30 executing program 1: syz_execute_func(&(0x7f0000000480)="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") syz_execute_func(&(0x7f0000000000)="43dd25310000006565d934571ac2d9921c7dfd2d8fe8660f380b3d10000000f240e01bbdc4c1d2c254d687a0a7a8d421c37da00700000001ed54430feeeb0776c211cd11cdf30f1f40008b52de") [ 761.612840][ T3128] hid-generic 0000:0000:0000.0039: unknown main item tag 0x0 [ 761.630660][ T3128] hid-generic 0000:0000:0000.0039: hidraw0: HID v0.00 Device [syz1] on syz1 [ 761.727798][T28593] IPVS: ftp: loaded support on port[0] = 21 [ 762.053633][ C0] net_ratelimit: 8 callbacks suppressed [ 762.053648][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 762.059338][ C0] protocol 88fb is buggy, dev hsr_slave_1 21:57:32 executing program 2: openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r0 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f000095bffc), 0x4) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r1, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r2, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r3, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r5 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_CREATE(r5, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r5, &(0x7f0000000040), 0x4) write$UHID_DESTROY(r5, &(0x7f00000000c0), 0x4) ioctl$VIDIOC_S_CTRL(r4, 0xc008561c, &(0x7f0000000100)={0x3}) unshare(0x40000000) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r4, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:57:32 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='veth1\x00', 0x10) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000013, &(0x7f0000000180), 0x4) sendto(r0, &(0x7f0000000100)="148f17e8a5720dc63e7bed1622abfbf98ae8dc7964d76550ecf9497a6c032cccb0b4a44296f5cbb1318c9bb030df5f6935d614927efbba0d630c45077f9c9187737d", 0x42, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000040)=""/41, 0x29) sendto$unix(r0, &(0x7f0000000040), 0xfd1b, 0x0, 0x0, 0x0) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x68, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4109, 0x0, {0x4c, 0x18, {0x0, @media='eth\x00'}}}}, 0x68}}, 0x0) connect(r0, &(0x7f00000001c0)=@nl=@unspec, 0x80) 21:57:32 executing program 1: writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)="9446cc696fd585c81ffd4f7761b591cd3b", 0x11}], 0x1) syz_execute_func(&(0x7f00000004c0)="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") sendmsg(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)=@in6={0x1c, 0xffffffffffffffff, 0x0, @loopback}, 0x1c, 0x0}, 0x0) syz_execute_func(&(0x7f0000000080)="43dd25310000006565d93457c442f9921c7dfd2f17e80fee12e674742eec17f3af7d5a73228f097892312d2bbd000010c4192d1e9f9fff6afb73c4c4c9a90f8d") setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x50, &(0x7f0000000480)={0x0, {{0x2, 0xffffffffffffffff}}}, 0x90) 21:57:32 executing program 5: writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f00000000c0)="9446cc696fd585c81ffd4f7761b591cd3bffbf39bf", 0x15}], 0x1) syz_execute_func(&(0x7f00000004c0)="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") syz_execute_func(&(0x7f0000000080)="43dd25310000006565d93457c442f9921c7dfd2f17e80fee12e674742eec17f3af7d5a73228f097892312d2bbd000010c4192d1e9f9fff6afb73c4c4c9a90f8d") setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x50, &(0x7f0000000480)={0x0, {{0x2, 0xffffffffffffffff}}}, 0x90) 21:57:32 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r3, 0x0, &(0x7f0000000000)) getpeername(r4, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_CREATE(r6, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r6, &(0x7f0000000040), 0x4) fsetxattr$trusted_overlay_origin(r3, &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x2) write$UHID_DESTROY(r6, &(0x7f00000000c0), 0x4) ioctl$VIDIOC_S_CTRL(r5, 0xc008561c, &(0x7f0000000100)={0x3}) unshare(0x40000000) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r5, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:57:32 executing program 4: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000140)={0x2, &(0x7f0000000000)=[{0x2000000000040}, {0x6}]}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000003040), 0x4000000000003c4, 0x0) 21:57:33 executing program 5: syz_execute_func(&(0x7f0000000100)="964198c4a2791dcd1c040f05bf04411100c4a37bf0c55c41e2e9660ff8aa02480057000f33b8c4f401030e0e017b110830091e1edee52636f3a621045f4607c421e65831c4e10bf8c4af64660f3838520a470f898c00000096863347dbd563b6d3fada066477f866440ff4697683397fd3fb0000c4227d215106662ad726660f73d30066400f64287c7c66f2ab67dddda8e80fddf6c6e446b1f72ec3c4e2899294d80000000019c2c2b0c1030a0000c4414e53d2c58160160035ee0fc60fc6a8f2ae000000f1ebeb628f8f7d9b6500f2366766410f3a1517022626802d08000000ba5c450f91f328c4e3638d6e8df9fffffc00fc00410f4acefba70fc4e251bcdfb83aa2f1fbfbe2") syz_execute_func(&(0x7f0000000080)="43dd25310000006565d93457460dbdc28a8a263e450fda12f22d2bbd00000207c41455d4d403c10f7a05bc77ee4ac30bf045f757a70a819ff8c4c4660f102ac4e14173fb56c4a1fc5376003ae5c421fc289b0f000000c4427d192f360f64050a80000020") 21:57:33 executing program 4: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000140)={0x2, &(0x7f0000000000)=[{0x2000000000040}, {0x6}]}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000003040), 0x4000000000003c4, 0x0) [ 764.020673][T26782] hid-generic 0000:0000:0000.003A: unknown main item tag 0x0 21:57:33 executing program 1: writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000100)="9446cc696fd585c81ffd4f7761b591", 0xf}], 0x1) syz_execute_func(&(0x7f00000004c0)="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") syz_execute_func(&(0x7f0000000080)="43dd25310000006565d93457c442f9921c7dfd2f17e80fee12e674742eec17f3af7d5a73228f097892312d2bbd000010c4192d1e9f9fff73c4c4c9a90f8d") setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x50, &(0x7f0000000480)={0x0, {{0x2, 0xffffffffffffffff}}}, 0x90) [ 764.080494][T26782] hid-generic 0000:0000:0000.003A: hidraw0: HID v0.00 Device [syz1] on syz1 [ 764.105522][T28618] IPVS: ftp: loaded support on port[0] = 21 [ 764.133608][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 764.139489][ C0] protocol 88fb is buggy, dev hsr_slave_1 21:57:33 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='veth1\x00', 0x10) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000013, &(0x7f0000000180), 0x4) sendto(r0, &(0x7f0000000100)="148f17e8a5720dc63e7bed1622abfbf98ae8dc7964d76550ecf9497a6c032cccb0b4a44296f5cbb1318c9bb030df5f6935d614927efbba0d630c45077f9c9187737d", 0x42, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000040)=""/41, 0x29) sendto$unix(r0, &(0x7f0000000040), 0xfd1b, 0x0, 0x0, 0x0) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x68, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4109, 0x0, {0x4c, 0x18, {0x0, @media='eth\x00'}}}}, 0x68}}, 0x0) connect(r0, &(0x7f00000001c0)=@nl=@unspec, 0x80) 21:57:33 executing program 5: syz_execute_func(&(0x7f0000000180)="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") syz_execute_func(&(0x7f00000002c0)="43dd25310000006565d93457460dbdc28a8a263e450fda12f22c2bd05d0018e918e9c41455d4d403c17a05bc77ee4ac345f757a70a819ff8c4c4660f102ac4e14173fb56c4a1fc537600bd65c421fc289b0f000000c4427d192f360f64050a8000750020") [ 764.263917][ T3128] hid-generic 0000:0000:0000.003B: unknown main item tag 0x0 [ 764.290869][ T3128] hid-generic 0000:0000:0000.003B: hidraw0: HID v0.00 Device [syz1] on syz1 21:57:33 executing program 4: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000140)={0x2, &(0x7f0000000000)=[{0x2000000000040}, {0x6}]}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000003040), 0x4000000000003c4, 0x0) [ 764.321701][T28632] IPVS: ftp: loaded support on port[0] = 21 [ 764.373568][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 764.379471][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 764.453620][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 764.459536][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 764.465640][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 764.471478][ C0] protocol 88fb is buggy, dev hsr_slave_1 21:57:33 executing program 5: writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f00000000c0)="9446cc696fd585c81ffd4f77", 0xc}], 0x1) syz_execute_func(&(0x7f00000004c0)="96c4217a2df1c4a2791dcd1c040f05bf04411100c4a37bf0c55c41e2e9660ff8aa02480057000f33b8c4f4014e4e4e5bd2d330091e1edee509c421045fc463ad7a2200d2c421dd5831c4e10bf8c45b64660f3838520a470f898c00000096c4c2550a14653223333333ed33ed4877f866440ff469762e660f3806cfd3fb0000c4227d215106c4c34144e0b2450f01ee66400f64287c7c66f2abdec867dddde8e80f79cec466b1f72ec3c4e2899294d80000000019c2c2b0c10b0b0000c4414e53d2c581601643d9ee0fc60fc6a0a8f3f3000000f1ebeb628f8f709b6500f236f04283a900800000002626802d08000000ba49c4d05d5d0f91f3c4638d6e8df9ffffff00ffff410f4acefb110f66474eb83aa2f1fbfbe2") syz_execute_func(&(0x7f0000000080)="43dd25310000006565d93457c442f9921c7dfd2f17e80fee12e674742eec17f3af7d5a73228f097892312d2bbd000010c4192d1e9f9fff6afb73c4c4c9a90f8d") setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x50, &(0x7f0000000480)={0x0, {{0x2, 0xffffffffffffffff}}}, 0x90) 21:57:33 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000280)=0x4, 0x4) r1 = socket$packet(0x11, 0xa, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff038}, {0x80000006}]}, 0x10) socket$caif_seqpacket(0x25, 0x5, 0x0) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000066, 0x0) 21:57:33 executing program 4: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000140)={0x2, &(0x7f0000000000)=[{0x2000000000040}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000003040), 0x4000000000003c4, 0x0) 21:57:33 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r3, 0x0, &(0x7f0000000000)) getpeername(r4, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_CREATE(r6, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r6, &(0x7f0000000040), 0x4) fsetxattr$trusted_overlay_origin(r3, &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x2) write$UHID_DESTROY(r6, &(0x7f00000000c0), 0x4) ioctl$VIDIOC_S_CTRL(r5, 0xc008561c, &(0x7f0000000100)={0x3}) unshare(0x40000000) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r5, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:57:33 executing program 2: openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r0 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f000095bffc), 0x4) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r1, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r2, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r3, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r5 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_CREATE(r5, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r5, &(0x7f0000000040), 0x4) write$UHID_DESTROY(r5, &(0x7f00000000c0), 0x4) ioctl$VIDIOC_S_CTRL(r4, 0xc008561c, &(0x7f0000000100)={0x3}) unshare(0x40000000) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r4, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:57:33 executing program 0: syz_execute_func(&(0x7f0000000100)="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") syz_execute_func(&(0x7f00000002c0)="43dd25310000006565d93457c4c2e19c3bc442f9921c7ffd2f8fe8660f380b3d000000004df30f122d2bbd000000c1c2c2e6adbcfd3ec4425bf91e55025502e50ca7fdffffc423097bc41544d9fd0f71ed20") 21:57:34 executing program 0: syz_execute_func(&(0x7f0000000000)="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") syz_execute_func(&(0x7f0000000140)="43dd25310000006565d9345773c2d9921c7dfd2de8660f380b3d10000000f240e01bbdc4c1d2c21bdee644e644c421c37da00700000001d5c4219b5a360776c2e9d10202cdf30f1f40008b52de") 21:57:34 executing program 5: syz_execute_func(&(0x7f00000004c0)="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") syz_execute_func(&(0x7f0000000140)="43dd25310000006565d93457c442f9921c7dfd2f17e80fee12e674742eec177d5af2400fd0028f097892312d2bbd000010c4192d1e9f9fff6afb73c4c4c9a90f8d") setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x50, &(0x7f0000000480)={0x0, {{0x2, 0xffffffffffffffff}}}, 0x90) [ 765.057078][ T3128] hid-generic 0000:0000:0000.003C: unknown main item tag 0x0 [ 765.107736][ T3128] hid-generic 0000:0000:0000.003C: hidraw0: HID v0.00 Device [syz1] on syz1 [ 765.122035][T28675] IPVS: ftp: loaded support on port[0] = 21 21:57:34 executing program 0: syz_execute_func(&(0x7f00000002c0)="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") syz_execute_func(&(0x7f0000000080)="43dd25310000006565d93457460dbdc28a8a263e450fda12f22d2bbd00000207c40cc4cfcfa542c30bf045f757080ae79fc4102ac4c1fa2a457be1a6c4a1fc5376003ae5c4815d578d001000000b7800c4427d192fc4416175f660ce7e") 21:57:34 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000280)=0x4, 0x4) r1 = socket$packet(0x11, 0xa, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff038}, {0x80000006}]}, 0x10) socket$caif_seqpacket(0x25, 0x5, 0x0) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000066, 0x0) 21:57:34 executing program 5: syz_execute_func(&(0x7f0000000340)="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") syz_execute_func(&(0x7f0000000000)="43dd25310000006565d93457c442a1ab9d9989999966410feaec66450f134d7dc4a2452c7500104a0fe3f421f421696dc461f9d7cd42b2673e672667400ff155058f4948015500c401fa2c491d66440f38012af30f5afe08e3dee3de0fc482c1700bc402f1926c520e") 21:57:34 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000140)={0x2, &(0x7f0000000000)=[{0x2000000000040}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000003040), 0x4000000000003c4, 0x0) 21:57:34 executing program 0: syz_execute_func(&(0x7f0000000340)="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") msgsnd(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="01f8029774c4210000004e"], 0x1, 0x0) msgsnd(0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="030000000000000002e87725d93c31aac0"], 0x1, 0x0) syz_execute_func(&(0x7f0000000000)="43dd25310000006565d93457c4c2e19c3bc442f9921c7dfd2f8fe8085dfcf30f122d2bbd0000c4c1c2c2e610653e0f01d5c4e3e50ca7fdffffff07660f71cd20") 21:57:34 executing program 5: syz_execute_func(&(0x7f0000001480)="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") writev(0xffffffffffffffff, &(0x7f0000001440)=[{&(0x7f0000000100)="ef85e4b7e32e0f74632a4c82e2cf11285d", 0x11}], 0x1) syz_execute_func(&(0x7f0000000080)="43dd25310000006565d93457460dbdc28a8a263e450fda12f22d2bbd00000207c41455d4d403c10f7a05bc77ee4ac30bf045f757a70a819ff8c4c4660f102ac4e14173fb56c4a1fc5376003ae5c421fc289b0f000000c4427d192f360f64050a80000020") 21:57:34 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r3, 0x0, &(0x7f0000000000)) getpeername(r4, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_CREATE(r6, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r6, &(0x7f0000000040), 0x4) fsetxattr$trusted_overlay_origin(r3, &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x2) write$UHID_DESTROY(r6, &(0x7f00000000c0), 0x4) ioctl$VIDIOC_S_CTRL(r5, 0xc008561c, &(0x7f0000000100)={0x3}) unshare(0x40000000) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r5, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) [ 765.697596][T28672] IPVS: ftp: loaded support on port[0] = 21 21:57:34 executing program 0: syz_execute_func(&(0x7f0000001480)="96419cc4a2791dcd1c040f05bf04411100c4a37bf0c55c41e2e9660ff8aa02480057000f33b8c4f4014ec4017b110830091e1edee52636f3a621045f4607c421dd5831c4e10bf8c4af64660f3838520a470f898c00000096863347dbd563b6d3fada066477f866440ff4697683397fd3fb0000c4227d215106662ad726660f73d30066400f64287c7c66f2ab67dddda8e80fddf6c6e446b1f72ec3c4e2899294d80000000019c2c2b0c1030a0000c4414e53d2c58160160035ee0fc60fc6a8f2ae000000f1ebeb628f8f7d9b6500f2366766410f3a1517022626802d08000000ba5c450f91f328c4e3638d6e8df9fffffc00fc00410f4acefba70fc4e251bcdfb83aa2f1fbfbe2") writev(0xffffffffffffffff, &(0x7f0000001440)=[{&(0x7f0000000100)="ef85e4b7e32e0f74632a4c82e2cf11285df88da48b3a12bd0799c9", 0x1b}], 0x1) syz_execute_func(&(0x7f0000000080)="43dd25310000006565d93457460dbdc28a8a263e450fda12f22d2bbd00000207c41455d4d403c10f7a05bc77ee4ac30bf045f757a70a819ff8c4c4660f102ac4e14173fb56c4a1fc5376003ae5c421fc289b0f000000c4427d192f360f64050a80000020") [ 765.958829][ T3128] hid-generic 0000:0000:0000.003D: unknown main item tag 0x0 [ 765.996816][ T3128] hid-generic 0000:0000:0000.003D: hidraw0: HID v0.00 Device [syz1] on syz1 [ 766.030751][T28713] IPVS: ftp: loaded support on port[0] = 21 21:57:35 executing program 2: openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r0 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f000095bffc), 0x4) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r1, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r2, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r3, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r5 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_CREATE(r5, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r5, &(0x7f0000000040), 0x4) write$UHID_DESTROY(r5, &(0x7f00000000c0), 0x4) ioctl$VIDIOC_S_CTRL(r4, 0xc008561c, &(0x7f0000000100)={0x3}) unshare(0x40000000) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r4, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:57:35 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000280)=0x4, 0x4) r1 = socket$packet(0x11, 0xa, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff038}, {0x80000006}]}, 0x10) socket$caif_seqpacket(0x25, 0x5, 0x0) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000066, 0x0) 21:57:35 executing program 5: truncate(&(0x7f00000000c0)='./file0/file0\x00', 0x0) syz_execute_func(&(0x7f00000004c0)="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") syz_execute_func(&(0x7f0000000080)="43dd25310000006565d93457c442f9921c7dfd2f17e80fee12e674742eec17f3af7d5a73228f097892312d2bbd000010c4192d1e9f9fff6afb73c4c4c9a90f8d") setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x50, &(0x7f0000000480)={0x0, {{0x2, 0xffffffffffffffff}}}, 0x90) 21:57:35 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000140)={0x2, &(0x7f0000000000)=[{0x2000000000040}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000003040), 0x4000000000003c4, 0x0) 21:57:35 executing program 0: syz_execute_func(&(0x7f0000000200)="980c2c0f050520d0f807913e3e2ef3420f53de4141e2e91e7979855b660f162f0fc4014ef04680b64f002d00c1c4c31d6f3a7f21fc22ebc48265b8dc2e41812047002b0003e86eba0dfe8c738888a1c40fbbf3470f582ee2ed5d3a0808294003b00b0000000f73d53944d1f466f347adc46291ae8ca0656000000f01cc740f2d96000000c4c20d2bf41d1d440f2b550142c4b33120b15ff3b15ffb110f0fca38048336000000") syz_execute_func(&(0x7f0000000140)="43dd25010100007565d93457476d951912ff826d6d96752666420fe98200000000e92a000000c421481285440000006426440f01fc12d8bfd5") 21:57:35 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000180)={'filter\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) 21:57:35 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000140)={0x2, &(0x7f0000000000)=[{0x2000000000040}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000003040), 0x4000000000003c4, 0x0) 21:57:35 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000100), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r4, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_CREATE(r6, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r6, &(0x7f0000000040), 0x4) fsetxattr$trusted_overlay_origin(r3, &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x2) write$UHID_DESTROY(r6, &(0x7f00000000c0), 0x4) ioctl$VIDIOC_S_CTRL(r5, 0xc008561c, &(0x7f0000000100)={0x3}) unshare(0x40000000) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r5, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:57:35 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) close(r0) syz_genetlink_get_family_id$tipc(0xffffffffffffffff) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x14, 0x10, 0x701, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x100000001, 0x4) [ 766.681793][T28735] IPVS: ftp: loaded support on port[0] = 21 21:57:35 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000140)={0x2, &(0x7f0000000000)=[{0x2000000000040}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000003040), 0x4000000000003c4, 0x0) 21:57:35 executing program 0: syz_emit_ethernet(0x2e, &(0x7f0000000080)={@local, @link_local, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0xf401, 0x0, @remote={0xac, 0x223}, @local, {[@ssrr={0x89, 0x3}]}}, @igmp={0x0, 0x0, 0x0, @broadcast}}}}}, 0x0) 21:57:35 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000280)=0x4, 0x4) r1 = socket$packet(0x11, 0xa, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff038}, {0x80000006}]}, 0x10) socket$caif_seqpacket(0x25, 0x5, 0x0) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000066, 0x0) [ 766.886014][ T3128] hid-generic 0000:0000:0000.003E: unknown main item tag 0x0 [ 766.919880][T28757] IPVS: ftp: loaded support on port[0] = 21 [ 766.936524][ T3128] hid-generic 0000:0000:0000.003E: hidraw0: HID v0.00 Device [syz1] on syz1 21:57:36 executing program 2: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r3, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r4, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_CREATE(r6, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r6, &(0x7f0000000040), 0x4) write$UHID_DESTROY(r6, &(0x7f00000000c0), 0x4) ioctl$VIDIOC_S_CTRL(r5, 0xc008561c, &(0x7f0000000100)={0x3}) unshare(0x40000000) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) [ 767.173569][ C0] net_ratelimit: 14 callbacks suppressed [ 767.173578][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 767.185445][ C0] protocol 88fb is buggy, dev hsr_slave_1 21:57:36 executing program 5: syz_execute_func(&(0x7f00000002c0)="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") syz_execute_func(&(0x7f0000000400)="43dd25310000006565d93457460dbdc28a8a263e450fda12f22d2bbd00000207c41455d4d403c10f7a05bc77ee4ac336f083020045f757a70a819ff8c4c4660f102ac4e14173fb56f2410f5d98000000213ae5c421fc289b0f000000c4427d192f360f64050a80000020") 21:57:36 executing program 4: socketpair$unix(0x1, 0x5, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000140)={0x2, &(0x7f0000000000)=[{0x2000000000040}, {0x6}]}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000003040), 0x4000000000003c4, 0x0) 21:57:36 executing program 0: syz_execute_func(&(0x7f0000000200)="980c2c0f050520d0f807913e3e2ef3420f53de4141e2e91e7979855b660f162f0fc4014ef04680b64f002d00c1c4c31d6f3a7f21fc22ebc48265b8dc2e41812047002b0003e86eba0dfe8c738888a1c40fbbf3470f582ee2ed5d3a0808294003b00b0000000f73d53944d1f466f347adc46291ae8ca0656000000f01cc740f2d96000000c4c20d2bf41d1d440f2b550142c4b33120b15ff3b15ffb110f0fca38048336000000") pwritev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000240)="6608a3e5fce880da1b60a54326c0de2a6c", 0x11}], 0x1, 0x0) syz_execute_func(&(0x7f0000000140)="43dd25010100007565d93457476d951912ff826d6d96752666420fe98200000000e92a000000c421481285440000006426440f01fc12d8bfd5") [ 767.253761][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 767.259747][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 767.265692][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 767.271522][ C0] protocol 88fb is buggy, dev hsr_slave_1 21:57:36 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000280)=0x4, 0x4) r1 = socket$packet(0x11, 0xa, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff038}, {0x80000006}]}, 0x10) socket$caif_seqpacket(0x25, 0x5, 0x0) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000066, 0x0) 21:57:36 executing program 5: syz_execute_func(&(0x7f0000000340)="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") msgsnd(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="01f8029774c4210000004e"], 0x1, 0x0) msgsnd(0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="030000000000000002"], 0x1, 0x0) syz_execute_func(&(0x7f0000000000)="43dd25310000006565d93457c4c2e19c3bc442f9921c7dfd2f8fe8085dfcf30f122d2bbd0000c4c1c2c2e610653e0f01d5c4e3e50ca7fdffffff07660f71cd20") 21:57:36 executing program 0: r0 = socket(0x11, 0x4000000000080002, 0x0) sendmmsg(r0, &(0x7f0000000100)=[{{&(0x7f0000000040)=@isdn={0x22, 0x0, 0x80000001}, 0x80, 0x0}}, {{&(0x7f0000000040)=@nfc={0x27, 0x9}, 0x80, 0x0}}], 0x2, 0x0) [ 767.474825][T27848] hid-generic 0000:0000:0000.003F: unknown main item tag 0x0 [ 767.532811][T27848] hid-generic 0000:0000:0000.003F: hidraw0: HID v0.00 Device [syz1] on syz1 [ 767.574809][T28788] IPVS: ftp: loaded support on port[0] = 21 21:57:36 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000100), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r4, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_CREATE(r6, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r6, &(0x7f0000000040), 0x4) fsetxattr$trusted_overlay_origin(r3, &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x2) write$UHID_DESTROY(r6, &(0x7f00000000c0), 0x4) ioctl$VIDIOC_S_CTRL(r5, 0xc008561c, &(0x7f0000000100)={0x3}) unshare(0x40000000) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r5, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:57:36 executing program 4: socketpair$unix(0x1, 0x5, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000140)={0x2, &(0x7f0000000000)=[{0x2000000000040}, {0x6}]}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000003040), 0x4000000000003c4, 0x0) 21:57:36 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYRES32], 0x4) write$nbd(r0, &(0x7f0000000200), 0x10) 21:57:36 executing program 4: socketpair$unix(0x1, 0x5, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000140)={0x2, &(0x7f0000000000)=[{0x2000000000040}, {0x6}]}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000003040), 0x4000000000003c4, 0x0) 21:57:36 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000280)=0x4, 0x4) r1 = socket$packet(0x11, 0xa, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff038}, {0x80000006}]}, 0x10) socket$caif_seqpacket(0x25, 0x5, 0x0) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000066, 0x0) 21:57:37 executing program 5: r0 = socket$inet6(0xa, 0x802, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x8000008800, &(0x7f0000000000)={0xa, 0x200000000004e20, 0x0, @mcast1}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 21:57:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) close(r1) close(r2) pipe(&(0x7f0000000100)) vmsplice(r2, &(0x7f00000017c0)=[{&(0x7f00000001c0)='P', 0x1}], 0x1, 0x0) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) write$binfmt_misc(r2, &(0x7f0000000180)=ANY=[], 0xffffffaf) splice(r1, 0x0, r3, 0x0, 0x1000000000006d55, 0x0) 21:57:37 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000140)={0x2, &(0x7f0000000000)=[{0x2000000000040}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000003040), 0x4000000000003c4, 0x0) 21:57:37 executing program 2: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r3, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r4, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_CREATE(r6, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r6, &(0x7f0000000040), 0x4) write$UHID_DESTROY(r6, &(0x7f00000000c0), 0x4) ioctl$VIDIOC_S_CTRL(r5, 0xc008561c, &(0x7f0000000100)={0x3}) unshare(0x40000000) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:57:37 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000280)=0x4, 0x4) r1 = socket$packet(0x11, 0xa, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff038}, {0x80000006}]}, 0x10) socket$caif_seqpacket(0x25, 0x5, 0x0) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000066, 0x0) [ 768.293680][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 768.299632][ C0] protocol 88fb is buggy, dev hsr_slave_1 21:57:37 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000180)=ANY=[], 0xfffffc70) r2 = socket$alg(0x26, 0x5, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000080)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f0000000340)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x140208}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x14, 0x0, 0x1, 0x0, 0x25dfdbfe}, 0x14}}, 0x0) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'sha512\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) 21:57:37 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000280)=0x4, 0x4) r1 = socket$packet(0x11, 0xa, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff038}, {0x80000006}]}, 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000066, 0x0) [ 768.543579][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 768.549447][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 768.574565][ T3128] hid-generic 0000:0000:0000.0040: unknown main item tag 0x0 [ 768.598066][ T3128] hid-generic 0000:0000:0000.0040: hidraw0: HID v0.00 Device [syz1] on syz1 [ 768.607020][T28835] IPVS: ftp: loaded support on port[0] = 21 [ 768.699839][T28809] IPVS: ftp: loaded support on port[0] = 21 21:57:39 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000100), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r4, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_CREATE(r6, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r6, &(0x7f0000000040), 0x4) fsetxattr$trusted_overlay_origin(r3, &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x2) write$UHID_DESTROY(r6, &(0x7f00000000c0), 0x4) ioctl$VIDIOC_S_CTRL(r5, 0xc008561c, &(0x7f0000000100)={0x3}) unshare(0x40000000) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r5, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:57:39 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000280)=0x4, 0x4) socket$packet(0x11, 0xa, 0x300) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000066, 0x0) 21:57:39 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000140)={0x2, &(0x7f0000000000)=[{0x2000000000040}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000003040), 0x4000000000003c4, 0x0) 21:57:39 executing program 0: r0 = socket$inet(0x10, 0x3, 0xc) ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000240)="24000000020307031dfffd946ff20c0020200a0009000200021d8568021baba20400ff7e", 0x24}], 0x1}, 0x0) 21:57:39 executing program 2: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r3, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r4, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_CREATE(r6, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r6, &(0x7f0000000040), 0x4) write$UHID_DESTROY(r6, &(0x7f00000000c0), 0x4) ioctl$VIDIOC_S_CTRL(r5, 0xc008561c, &(0x7f0000000100)={0x3}) unshare(0x40000000) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:57:39 executing program 5: writev(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f00000000c0)="78d11d55960d3f27c14b2a", 0xb}], 0x1) syz_execute_func(&(0x7f00000004c0)="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") syz_execute_func(&(0x7f0000000080)="43dd25310000006565d93457c442f9921c7dfd2f17e80fee12e674742eec17f3af7d5a73228f097892312d2bbd000010c4192d1e9f9fff73c4c4c9a90f8d") setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x50, &(0x7f0000000480)={0x0, {{0x2, 0xffffffffffffffff}}}, 0xfffffe3d) 21:57:39 executing program 0: syz_execute_func(&(0x7f0000000340)="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") syz_execute_func(&(0x7f00000002c0)="43dd25310000006565d93457c4c2e19c3b470f971a085dfcf30f122d2bbd0000c4c1c2c2e610653e0f01f5c4e3e50ca7fdffffff07660f61cdd700a4be") 21:57:39 executing program 5: syz_execute_func(&(0x7f0000000500)="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") syz_execute_func(&(0x7f0000000240)="43dd25310000006565d934570faeb34fd30000c4e3556e49135b085dfc40720c0f12a42d2bfd00000000c1c2c2c4e1b45526e4e4d1a7fd5783c4c4621946a6790f3f000000cdbb") [ 770.730578][T28859] IPVS: ftp: loaded support on port[0] = 21 21:57:39 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000280)=0x4, 0x4) socket$packet(0x11, 0xa, 0x300) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000066, 0x0) [ 770.858012][T28107] hid-generic 0000:0000:0000.0041: unknown main item tag 0x0 21:57:39 executing program 0: syz_execute_func(&(0x7f0000000340)="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") msgsnd(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="a0f8029774a7fea85cea0e"], 0x1, 0x0) syz_execute_func(&(0x7f0000000000)="43dd25310000006565d93457c4c2e19c3bc442f9921c7dfd2f8fe8085dfcf30f122d2bbd0000c4c1c2c2e610653e0f01d5c4e3e50ca7fdffffff07660f71cd20") [ 770.900469][T28107] hid-generic 0000:0000:0000.0041: hidraw0: HID v0.00 Device [syz1] on syz1 [ 770.905970][T28870] IPVS: ftp: loaded support on port[0] = 21 21:57:40 executing program 5: syz_execute_func(&(0x7f00000004c0)="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") syz_execute_func(&(0x7f00000001c0)="43dd25310000006565d93457c442f9921c7dfd2f17e80fee12e674742eec17c423796192c2b74320cdaf5a73228f097892312d2bbd000010c4192d1e9f9fff73c4c9a90f8d") 21:57:40 executing program 0: syz_execute_func(&(0x7f0000000480)="96c4217a2df1c4a2791dcd1c040f05bf04411100c4a37bf0c55c41e2e92e0f138fd5f3142c00570f33b8c4f4014e46c059ff32660f5f0cfa30091e1edee509c421045f9466470f3a17bb34bb86df2e21dd5831c4e10bf2f241d9fbc40d64660f3838520a470f898c00000096c4c2550a14653223333333ed33ed4877f866440ff469764383a7fa880000ffd3fb0000c4227d215106662ad7450f01ee66400f64287c7c66f2ab440fec3f67dddde8e80f79cec466b1f72ec3c4e2899294d80000000019c2c2b0c10b0b0000c4414e53d2c581601643d9ee66c0c284a0a8f3f3000000f1ebeb628f8f709b6500f236f04283a900800000002626802d08000000ba49c4d05d5d0f91f3c4638d6e8df9ffffff00ffff410f4acefb110ff3ddc7b83aa2f1fbfbe2") sendmsg(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="e25eb1af3562a3b0a4c0e90d57f817b074", 0x11}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="34029f60206098c13493c01476be0880eb94792900553d9bebf781d5638810143c506540c17040818da5bb0c9d4d51109fa63a", 0x33}], 0x1}, 0x0) syz_execute_func(&(0x7f0000000140)="43dd25310000006565d93457c4c2e19c3bc442f9921c7dfd2f8fe8085dfcf30f122d2bbd0000c4e17f104564653e0f01d5c4417dddb367f96618660f71cd20") 21:57:40 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockname$netlink(r3, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r4, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_CREATE(r6, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r6, &(0x7f0000000040), 0x4) fsetxattr$trusted_overlay_origin(r3, &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x2) write$UHID_DESTROY(r6, &(0x7f00000000c0), 0x4) ioctl$VIDIOC_S_CTRL(r5, 0xc008561c, &(0x7f0000000100)={0x3}) unshare(0x40000000) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r5, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:57:40 executing program 5: mknod(&(0x7f00000000c0)='./file0\x00', 0x800100008000, 0x4028ae) open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) 21:57:40 executing program 0: semget(0x1, 0x6, 0x0) 21:57:40 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000280)=0x4, 0x4) socket$packet(0x11, 0xa, 0x300) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000066, 0x0) [ 771.759767][T28902] IPVS: ftp: loaded support on port[0] = 21 21:57:42 executing program 2: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r3, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r4, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_CREATE(r6, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r6, &(0x7f0000000040), 0x4) write$UHID_DESTROY(r6, &(0x7f00000000c0), 0x4) ioctl$VIDIOC_S_CTRL(r5, 0xc008561c, &(0x7f0000000100)={0x3}) unshare(0x40000000) ioctl$VIDIOC_S_JPEGCOMP(r5, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:57:42 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockname$netlink(r3, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r4, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_CREATE(r6, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r6, &(0x7f0000000040), 0x4) fsetxattr$trusted_overlay_origin(r3, &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x2) write$UHID_DESTROY(r6, &(0x7f00000000c0), 0x4) ioctl$VIDIOC_S_CTRL(r5, 0xc008561c, &(0x7f0000000100)={0x3}) unshare(0x40000000) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r5, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:57:42 executing program 0: r0 = semget(0x1, 0x0, 0x0) semctl$IPC_SET(r0, 0x0, 0x1, &(0x7f0000000080)) 21:57:42 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000140)={0x2, &(0x7f0000000000)=[{0x2000000000040}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000003040), 0x4000000000003c4, 0x0) 21:57:42 executing program 5: symlink(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='./file0\x00') chroot(&(0x7f0000000740)='./file0\x00') 21:57:42 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000280)=0x4, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff038}, {0x80000006}]}, 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000066, 0x0) 21:57:42 executing program 0: r0 = semget(0x1, 0x0, 0x0) semctl$IPC_SET(r0, 0x0, 0x1, &(0x7f0000000080)) 21:57:42 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000000380)=[{0x0, 0x1d2}], 0x1) [ 773.799815][T27848] hid-generic 0000:0000:0000.0042: unknown main item tag 0x0 [ 773.836776][T27848] hid-generic 0000:0000:0000.0042: hidraw0: HID v0.00 Device [syz1] on syz1 [ 773.884433][T28929] IPVS: ftp: loaded support on port[0] = 21 21:57:42 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000280)=0x4, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff038}, {0x80000006}]}, 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000066, 0x0) 21:57:43 executing program 0: r0 = semget(0x1, 0x0, 0x0) semctl$IPC_SET(r0, 0x0, 0x1, &(0x7f0000000080)) [ 773.939124][T28926] IPVS: ftp: loaded support on port[0] = 21 21:57:43 executing program 5: madvise(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x5) munlock(&(0x7f0000ffe000/0x1000)=nil, 0x1000) r0 = open$dir(&(0x7f0000000180)='./file0\x00', 0x40000400008002be, 0x0) chown(&(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0) pwritev(r0, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x1002f}], 0x1, 0x0) writev(r0, &(0x7f0000000040), 0x1) preadv(r0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/37, 0x25}], 0x1, 0x0) ftruncate(0xffffffffffffffff, 0x0) 21:57:43 executing program 0: r0 = semget(0x1, 0x0, 0x0) semctl$IPC_SET(r0, 0x0, 0x1, &(0x7f0000000080)) 21:57:43 executing program 2: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r3, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r4, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_CREATE(r6, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r6, &(0x7f0000000040), 0x4) write$UHID_DESTROY(r6, &(0x7f00000000c0), 0x4) ioctl$VIDIOC_S_CTRL(r5, 0xc008561c, &(0x7f0000000100)={0x3}) unshare(0x40000000) ioctl$VIDIOC_S_JPEGCOMP(r5, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:57:43 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11f2a5055e0bcfe47bf070") r1 = socket$inet(0x2, 0x8000a, 0x17) close(r1) 21:57:43 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockname$netlink(r3, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r4, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_CREATE(r6, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r6, &(0x7f0000000040), 0x4) fsetxattr$trusted_overlay_origin(r3, &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x2) write$UHID_DESTROY(r6, &(0x7f00000000c0), 0x4) ioctl$VIDIOC_S_CTRL(r5, 0xc008561c, &(0x7f0000000100)={0x3}) unshare(0x40000000) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r5, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:57:43 executing program 0: semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000080)) 21:57:43 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000280)=0x4, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff038}, {0x80000006}]}, 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000066, 0x0) 21:57:43 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, 0x0, 0x0) sendmmsg(r0, &(0x7f0000003040), 0x4000000000003c4, 0x0) 21:57:43 executing program 0: semctl$IPC_SET(0x0, 0x0, 0x1, 0x0) [ 774.773579][ C1] net_ratelimit: 16 callbacks suppressed [ 774.773588][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 774.785169][ C1] protocol 88fb is buggy, dev hsr_slave_1 21:57:43 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(r0, 0x0, 0x22, 0x0, &(0x7f0000000200)) [ 774.813945][T28107] hid-generic 0000:0000:0000.0043: unknown main item tag 0x0 [ 774.853555][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 774.859766][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 774.864169][T28972] IPVS: ftp: loaded support on port[0] = 21 [ 774.865741][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 774.877458][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 774.908816][T28107] hid-generic 0000:0000:0000.0043: hidraw0: HID v0.00 Device [syz1] on syz1 21:57:44 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) r1 = socket$packet(0x11, 0xa, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff038}, {0x80000006}]}, 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000066, 0x0) 21:57:44 executing program 0: semctl$IPC_SET(0x0, 0x0, 0x1, 0x0) [ 775.015116][T28975] IPVS: ftp: loaded support on port[0] = 21 21:57:44 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) write(r0, &(0x7f0000000340)="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", 0xfc) 21:57:44 executing program 0: semctl$IPC_SET(0x0, 0x0, 0x1, 0x0) [ 775.322434][T28991] netlink: 176 bytes leftover after parsing attributes in process `syz-executor.5'. 21:57:44 executing program 2: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r3, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r4, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_CREATE(r6, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r6, &(0x7f0000000040), 0x4) write$UHID_DESTROY(r6, &(0x7f00000000c0), 0x4) ioctl$VIDIOC_S_CTRL(r5, 0xc008561c, &(0x7f0000000100)={0x3}) unshare(0x40000000) ioctl$VIDIOC_S_JPEGCOMP(r5, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:57:44 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") setsockopt$inet_mreq(r0, 0x0, 0x23, &(0x7f0000000040)={@multicast2, @loopback}, 0x8) 21:57:44 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) r1 = socket$packet(0x11, 0xa, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff038}, {0x80000006}]}, 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000066, 0x0) 21:57:44 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r3, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r4, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_CREATE(r6, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r6, &(0x7f0000000040), 0x4) fsetxattr$trusted_overlay_origin(r3, &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x2) write$UHID_DESTROY(r6, &(0x7f00000000c0), 0x4) ioctl$VIDIOC_S_CTRL(r5, 0xc008561c, &(0x7f0000000100)={0x3}) unshare(0x40000000) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r5, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:57:44 executing program 5: poll(&(0x7f0000000180)=[{}], 0x2000000000000022, 0x80) 21:57:44 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, 0x0, 0x0) sendmmsg(r0, &(0x7f0000003040), 0x4000000000003c4, 0x0) 21:57:44 executing program 0: mknod(&(0x7f0000000080)='./bus\x00', 0x100000805c, 0x0) r0 = open(&(0x7f00000000c0)='./bus\x00', 0xd, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000040)="e463ddfff9e5d7ecf29c13631a2ffbe9", 0x10}], 0x1) 21:57:44 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) r1 = socket$packet(0x11, 0xa, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff038}, {0x80000006}]}, 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000066, 0x0) [ 775.838328][T28107] hid-generic 0000:0000:0000.0044: unknown main item tag 0x0 [ 775.861526][ T9269] hid-generic 0000:0000:0000.0045: unknown main item tag 0x0 [ 775.874715][T28107] hid-generic 0000:0000:0000.0044: hidraw0: HID v0.00 Device [syz1] on syz1 21:57:44 executing program 5: syz_execute_func(&(0x7f0000000140)="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") syz_execute_func(&(0x7f0000000300)="43dd25310000006565d93457460dbdc2e98a263e450fda12f22d2bbd00000207c40cc4fd46a542c30bf045f757080ae79fc428660f102ac4c1fa2a457b8fa9c89426c4a1fc5376003ae1c4815d578d001000000b7800430f5c19c4416175f660ce7e") [ 775.889324][ T9269] hid-generic 0000:0000:0000.0045: hidraw1: HID v0.00 Device [syz1] on syz1 [ 775.924597][T29021] IPVS: ftp: loaded support on port[0] = 21 [ 775.930897][T29020] IPVS: ftp: loaded support on port[0] = 21 21:57:45 executing program 0: setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0x40, &(0x7f00000000c0)='chd\x00', 0x4) syz_execute_func(&(0x7f0000000480)="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") syz_execute_func(&(0x7f0000000440)="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") syz_execute_func(&(0x7f00000004c0)="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") setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x51, &(0x7f0000000100)={0x7ff, {{0x1c, 0xffffffffffffffff, 0x0, @rand_addr="0b4c63658a92b4cad4c03d1514ff8410"}}}, 0x88) syz_execute_func(&(0x7f0000000080)="43dd25310000006565d93457c442f9921c7dfd2f17e80fee12e674742eec17f3af7d5a73228f097892312d2bbd000010c4192d1e9f9fff6afb73c4c4c9a90f8d") setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x50, &(0x7f0000000480)={0x0, {{0x2, 0xffffffffffffffff}}}, 0x90) 21:57:45 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000280)=0x4, 0x4) r1 = socket$packet(0x11, 0xa, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff038}, {0x80000006}]}, 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000066, 0x0) 21:57:45 executing program 5: setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0x40, &(0x7f00000000c0)='chd\x00', 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000000100), 0x10) syz_execute_func(&(0x7f0000000480)="96c4217a2df1c4a2791dcd1c040f05bf04411100c4a37bf0c55c41e2e92e0f138fd5f3142c00570f33b8c4f4014e46c059ff32660f5f0cfa30091e1edee509c421045f9466470f3a17bb34bb86df2e21dd5831c4e10bf2f241d9fbc40d64660f3838520a470f898c00000096c4c2550a14653223333333ed33ed4877f866440ff469764383a7fa880000ffd3fb0000c4227d215106662ad7450f01ee66400f64287c7c66f2ab440fec3f67dddde8e80f79cec466b1f72ec3c4e2899294d80000000019c2c2b0c10b0b0000c4414e53d2c581601643d9ee66c0c284a0a8f3f3000000f1ebeb628f8f709b6500f236f04283a900800000002626802d08000000ba49c4d05d5d0f91f3c4638d6e8df9ffffff00ffff410f4acefb110ff3ddc7b83aa2f1fbfbe2") syz_execute_func(&(0x7f0000000440)="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") syz_execute_func(&(0x7f00000004c0)="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") syz_execute_func(&(0x7f0000000080)="43dd25310000006565d93457c442f9921c7dfd2f17e80fee12e674742eec17f3af7d5a73228f097892312d2bbd000010c4192d1e9f9fff6afb73c4c4c9a90f8d") setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x50, &(0x7f0000000480)={0x0, {{0x2, 0xffffffffffffffff}}}, 0x90) 21:57:45 executing program 2: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r3, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r4, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_CREATE(r6, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r6, &(0x7f0000000040), 0x4) write$UHID_DESTROY(r6, &(0x7f00000000c0), 0x4) ioctl$VIDIOC_S_CTRL(r5, 0xc008561c, &(0x7f0000000100)={0x3}) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r5, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:57:45 executing program 0: syz_execute_func(&(0x7f00000002c0)="96419cc4a2791dcd1c040f05bf04411100c4a37bf0c55c41e2e9660ff8aa02480057000f33b8c4f4014ec4017b110830091e1edee52636f3a621045f4607c421dd5831c4e10bf8c4af64660f3838520a470f898c00000096863347dbd563b6d3fada066477f866440ff4697683397fd3fb0000c4227d215106662ad726660f73d30066400f64287c7c66f2ab67dddda8e80fddf6c6e446b1f72ec3c4e2899294d80000000019c2c2b0c1030a0000c4414e53d2c58160160035ee0fc60fc6a8f2ae000000f1ebeb628f8f7d9b6500f2366766410f3a1517022626802d08000000ba5c450f91f328c4e3638d6e8df9fffffc00fc00410f4acefba70fc4e251bcdfb83aa2f1fbfbe2") syz_execute_func(&(0x7f0000000500)="43dd25310000006565d934574329e3c3c33e450fda12f22d2bbd00000207c40cc4c4616e52d86c3342c342c345f757080ae79fc428660f102ac4c1fa2a457bc4a1fc5376003ae53e42d9e42a7800c4427d192f66420fd3d660ce7e") 21:57:45 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000280)=0x4, 0x4) r1 = socket$packet(0x11, 0xa, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff038}, {0x80000006}]}, 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000066, 0x0) [ 776.613632][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 776.619496][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 776.853554][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 776.859390][ C1] protocol 88fb is buggy, dev hsr_slave_1 21:57:47 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r3, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r4, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_CREATE(r6, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r6, &(0x7f0000000040), 0x4) fsetxattr$trusted_overlay_origin(r3, &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x2) write$UHID_DESTROY(r6, &(0x7f00000000c0), 0x4) ioctl$VIDIOC_S_CTRL(r5, 0xc008561c, &(0x7f0000000100)={0x3}) unshare(0x40000000) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r5, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:57:47 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, 0x0, 0x0) sendmmsg(r0, &(0x7f0000003040), 0x4000000000003c4, 0x0) 21:57:47 executing program 5: syz_execute_func(&(0x7f0000000480)="96c4217a2df1c4a2791dcd1c040f05bf04411100c4a37bf0c55c41e2e92e0f138fd5f3142c00570f33b8c4f4014e46c059ff32660f5f0cfa30091e1edee509c421045f9466470f3a17bb34bb86df2e21dd5831c4e10bf2f241d9fbc40d64660f3838520a470f898c00000096c4c2550a14653223333333ed33ed4877f866440ff469764383a7fa880000ffd3fb0000c4227d215106662ad7450f01ee66400f64287c7c66f2ab440fec3f67dddde8e80f79cec466b1f72ec3c4e2899294d80000000019c2c2b0c10b0b0000c4414e53d2c581601643d9ee66c0c284a0a8f3f3000000f1ebeb628f8f709b6500f236f04283a900800000002626802d08000000ba49c4d05d5d0f91f3c4638d6e8df9ffffff00ffff410f4acefb110ff3ddc7b83aa2f1fbfbe2") sendmsg(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="e25eb1af3562a3b0a4c0e90d57f817", 0xf}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="34029f60206098c13493c01476be0880eb94792900553d9bebf781d5638810143c506540c17040818d", 0x29}], 0x1}, 0x0) syz_execute_func(&(0x7f0000000140)="43dd25310000006565d93457c4c2e19c3bc442f9921c7dfd2f8fe8085dfcf30f122d2bbd0000c4e17f104564653e0f01d5c4417dddb367f96618660f71cd20") 21:57:47 executing program 0: syz_execute_func(&(0x7f0000000cc0)="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") syz_execute_func(&(0x7f0000000100)="43dd25310000006565d9345745e400c4019cc6ca00dd14b965ee0fc70e3aacd70000df6bd9c4e27922ce8f8f22791c89e2000067f341d9d0043b2ef346ae660f383f02ff2647e4058d") 21:57:47 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000280)=0x4, 0x4) r1 = socket$packet(0x11, 0xa, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff038}, {0x80000006}]}, 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000066, 0x0) 21:57:47 executing program 2: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r3, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r4, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_CREATE(r6, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r6, &(0x7f0000000040), 0x4) write$UHID_DESTROY(r6, &(0x7f00000000c0), 0x4) ioctl$VIDIOC_S_CTRL(r5, 0xc008561c, &(0x7f0000000100)={0x3}) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r5, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:57:47 executing program 0: r0 = socket$inet6(0xa, 0x80002, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 21:57:47 executing program 1: bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, &(0x7f0000000280)=0x4, 0x4) r0 = socket$packet(0x11, 0xa, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff038}, {0x80000006}]}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x400000000000066, 0x0) 21:57:47 executing program 5: r0 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r0, 0x107, 0xf, &(0x7f0000000000)="a2e6fa9a", 0x4) bind(r0, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="0803000061ed58c9010000000000000000000000000000000000000800000000000000cf25dffce01f5afbf71500cb35dde19fee95b2bfd01255ce87c03d6ecce30032e4e7b951c8143257c1361d4657992a17c989f0b85218bb1544764cd66428858d941a7ba75a4caae96b6594f7765f50ba41bf16eed635c47c74bf3d7a983797cf9eba55b472b4a2609a2725b2e3b5ce23820f4c6157847930a6ff0b0ece72ef432dae2fb6003d2b"], 0xaa) [ 778.927559][T27848] hid-generic 0000:0000:0000.0046: unknown main item tag 0x0 [ 778.970470][T27848] hid-generic 0000:0000:0000.0046: hidraw0: HID v0.00 Device [syz1] on syz1 21:57:48 executing program 2: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r3, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r4, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_CREATE(r6, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r6, &(0x7f0000000040), 0x4) write$UHID_DESTROY(r6, &(0x7f00000000c0), 0x4) ioctl$VIDIOC_S_CTRL(r5, 0xc008561c, &(0x7f0000000100)={0x3}) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r5, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) [ 779.099057][T29078] IPVS: ftp: loaded support on port[0] = 21 21:57:48 executing program 0: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{0x0}], 0x1}, 0x0) r0 = socket(0x10, 0x80002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) writev(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 21:57:48 executing program 5: r0 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r0, 0x107, 0xf, &(0x7f0000000000)="a2e6fa9a", 0x4) bind(r0, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="0803000061ed58c9010000000000000000000000000000000000000800000000000000cf25dffce01f5afbf71500cb35dde19fee95b2bfd01255ce87c03d6ecce30032e4e7b951c8143257c1361d4657992a17c989f0b85218bb1544764cd66428858d941a7ba75a4caae96b6594f7765f50ba41bf16eed635c47c74bf3d7a983797cf9eba55b472b4a2609a2725b2e3b5ce23820f4c6157847930a6ff0b0ece72ef432dae2fb6003d2b"], 0xaa) [ 779.942715][T10056] bridge0: port 3(gretap0) entered disabled state [ 779.964819][T10056] device gretap0 left promiscuous mode [ 779.970394][T10056] bridge0: port 3(gretap0) entered disabled state [ 780.275894][T10056] IPVS: stopping backup sync thread 11072 ... [ 780.695386][T10056] device bridge_slave_1 left promiscuous mode [ 780.701756][T10056] bridge0: port 2(bridge_slave_1) entered disabled state [ 780.764791][T10056] device bridge_slave_0 left promiscuous mode [ 780.771290][T10056] bridge0: port 1(bridge_slave_0) entered disabled state [ 783.260154][T10056] device hsr_slave_1 left promiscuous mode [ 783.327843][T10056] device hsr_slave_0 left promiscuous mode [ 783.380854][T10056] team0 (unregistering): Port device team_slave_1 removed [ 783.394185][T10056] team0 (unregistering): Port device team_slave_0 removed [ 783.406795][T10056] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 783.474526][T10056] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 783.565622][T10056] bond0 (unregistering): Released all slaves 21:57:53 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r3, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r4, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_CREATE(r6, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r6, &(0x7f0000000040), 0x4) fsetxattr$trusted_overlay_origin(r3, &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x2) write$UHID_DESTROY(r6, &(0x7f00000000c0), 0x4) ioctl$VIDIOC_S_CTRL(r5, 0xc008561c, &(0x7f0000000100)={0x3}) unshare(0x40000000) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r5, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:57:53 executing program 1: bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, &(0x7f0000000280)=0x4, 0x4) r0 = socket$packet(0x11, 0xa, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff038}, {0x80000006}]}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x400000000000066, 0x0) 21:57:53 executing program 2: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r3, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r4, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_CREATE(r6, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r6, &(0x7f0000000040), 0x4) write$UHID_DESTROY(r6, &(0x7f00000000c0), 0x4) unshare(0x40000000) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r5, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:57:53 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e80001dd0000040d000600ea1100000005000000", 0x29}], 0x1) 21:57:53 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000140)={0x0, 0x0}, 0x8) sendmmsg(r0, &(0x7f0000003040), 0x4000000000003c4, 0x0) 21:57:53 executing program 0: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x31, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000012c0), 0x0) [ 784.333918][T29115] netlink: 'syz-executor.5': attribute type 6 has an invalid length. 21:57:53 executing program 0: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)=[{0x0}], 0x1}, 0x0) r0 = socket(0x10, 0x80002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") writev(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 21:57:53 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x22, 0x0, 0x0) 21:57:53 executing program 1: bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, &(0x7f0000000280)=0x4, 0x4) r0 = socket$packet(0x11, 0xa, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff038}, {0x80000006}]}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x400000000000066, 0x0) [ 784.576707][T29107] hid-generic 0000:0000:0000.0047: unknown main item tag 0x0 [ 784.594543][T29121] IPVS: ftp: loaded support on port[0] = 21 [ 784.603353][T29107] hid-generic 0000:0000:0000.0047: hidraw0: HID v0.00 Device [syz1] on syz1 21:57:53 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x22, 0x0, 0x0) [ 784.644892][T29133] IPVS: ftp: loaded support on port[0] = 21 21:57:53 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000280)=0x4, 0x4) r1 = socket$packet(0x11, 0xa, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff038}, {0x80000006}]}, 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000066, 0x0) 21:57:53 executing program 5: socketpair$unix(0x1, 0x400000000003, 0x0, &(0x7f00001f0ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000000000), 0x4924924924925b3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x7, 0x0, 0x0) sendmmsg$unix(r0, &(0x7f00000041c0)=[{&(0x7f0000001500)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000003780)=[{&(0x7f00000036c0)="e3f18f37ab2dc7e886e298a829c84f8aff58e74833d903246eabbcbccd7d19152589e97d4e8e2c248502bdd88db18f2d7747b56d1aaf1248a2846586d497be84f749927c77ab0abc4bac60fda106ead5f0e07863d539cc1fd980766f6b8f9097e57b74e40377e036f73e26276f0d92a6a48c51c33723189932e1550a40209d1d1b43763feab524fc2bde49bceb2ee115f3ddbd02", 0x94}], 0x1, 0x0, 0x0, 0x4000}, {&(0x7f0000003800)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003940)=[{&(0x7f0000003880)="06a850e64b850b81d4174979f8ef48a85b52efefd70b28cda476cdc9f0d54dc6f162eb3656027fd0b3006a90e7e53d6a2d0c7f296048840f474f92b51a33bcab619ff918cebc87a2b62155c361589bef95cea7e4f1430802a324c71272c36044d1b2b9b63c881dcb6e79d5742a1000a90818ea13c3bcf9711e0659c4e91dbbb1a554909e9d64d9dc44d415ee1aa60b4a098dea142af79ff9f524b83ff517a5", 0x9f}], 0x1, 0x0, 0x0, 0x1}], 0x2, 0x200440c0) [ 784.933637][ C0] net_ratelimit: 6 callbacks suppressed [ 784.933646][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 784.939370][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 785.173637][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 785.179534][ C1] protocol 88fb is buggy, dev hsr_slave_1 21:57:54 executing program 2: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r3, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r4, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_CREATE(r6, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r6, &(0x7f0000000040), 0x4) write$UHID_DESTROY(r6, &(0x7f00000000c0), 0x4) unshare(0x40000000) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r5, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:57:54 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000280)=0x4, 0x4) r1 = socket$packet(0x11, 0xa, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff038}, {0x80000006}]}, 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000066, 0x0) 21:57:54 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000140)={0x0, 0x0}, 0x8) sendmmsg(r0, &(0x7f0000003040), 0x4000000000003c4, 0x0) 21:57:54 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) r0 = socket$inet6(0xa, 0x4000000080002, 0x0) connect$inet6(r0, &(0x7f0000005d00)={0xa, 0x0, 0x0, @mcast1, 0x6}, 0x1c) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x1, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x0, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40001ab, 0x0) 21:57:54 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r3, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r5 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_CREATE(r5, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r5, &(0x7f0000000040), 0x4) fsetxattr$trusted_overlay_origin(r3, &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x2) write$UHID_DESTROY(r5, &(0x7f00000000c0), 0x4) ioctl$VIDIOC_S_CTRL(r4, 0xc008561c, &(0x7f0000000100)={0x3}) unshare(0x40000000) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r4, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:57:54 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000280)=0x4, 0x4) r1 = socket$packet(0x11, 0xa, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff038}, {0x80000006}]}, 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000066, 0x0) [ 785.552012][ T2991] hid-generic 0000:0000:0000.0048: unknown main item tag 0x0 [ 785.565680][ T2991] hid-generic 0000:0000:0000.0048: hidraw0: HID v0.00 Device [syz1] on syz1 21:57:54 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x800000004e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x4e22}, 0x1c) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB], 0x1}}, 0x8000) close(r0) [ 785.611834][T29170] IPVS: ftp: loaded support on port[0] = 21 [ 785.659615][T29167] IPVS: ftp: loaded support on port[0] = 21 [ 785.766101][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 21:57:54 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000280)=0x4, 0x4) r1 = socket$packet(0x11, 0xa, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff038}, {0x80000006}]}, 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000066, 0x0) [ 785.835992][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 21:57:54 executing program 0: syz_emit_ethernet(0x2a, &(0x7f0000000000)={@local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x4, 0x0, @rand_addr, @multicast1}, @icmp=@address_reply={0x8}}}}}, 0x0) 21:57:54 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) sendmmsg$sock(r0, &(0x7f0000004500)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[@txtime={{0x18, 0x1, 0x2}}], 0x18}}], 0x1, 0x0) [ 785.893541][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 785.899520][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 785.973620][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 785.979612][ C0] protocol 88fb is buggy, dev hsr_slave_1 21:57:55 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000280)=0x4, 0x4) r1 = socket$packet(0x11, 0xa, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff038}, {0x80000006}]}, 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000066, 0x0) 21:57:55 executing program 0: 21:57:55 executing program 2: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r3, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r4, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_CREATE(r6, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r6, &(0x7f0000000040), 0x4) write$UHID_DESTROY(r6, &(0x7f00000000c0), 0x4) unshare(0x40000000) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r5, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:57:55 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r3, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r5 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_CREATE(r5, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r5, &(0x7f0000000040), 0x4) fsetxattr$trusted_overlay_origin(r3, &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x2) write$UHID_DESTROY(r5, &(0x7f00000000c0), 0x4) ioctl$VIDIOC_S_CTRL(r4, 0xc008561c, &(0x7f0000000100)={0x3}) unshare(0x40000000) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r4, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:57:55 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000140)={0x0, 0x0}, 0x8) sendmmsg(r0, &(0x7f0000003040), 0x4000000000003c4, 0x0) 21:57:55 executing program 5: 21:57:55 executing program 0: 21:57:55 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000280)=0x4, 0x4) r1 = socket$packet(0x11, 0xa, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff038}, {0x80000006}]}, 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000066, 0x0) 21:57:55 executing program 5: 21:57:55 executing program 5: 21:57:55 executing program 0: [ 786.750345][ T3128] hid-generic 0000:0000:0000.0049: unknown main item tag 0x0 21:57:55 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, &(0x7f0000000280)=0x4, 0x4) r1 = socket$packet(0x11, 0xa, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff038}, {0x80000006}]}, 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000066, 0x0) [ 786.792290][ T3128] hid-generic 0000:0000:0000.0049: hidraw0: HID v0.00 Device [syz1] on syz1 21:57:56 executing program 5: 21:57:56 executing program 0: [ 787.133778][T29201] IPVS: ftp: loaded support on port[0] = 21 [ 787.339828][T29203] IPVS: ftp: loaded support on port[0] = 21 21:57:56 executing program 2: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r3, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r4, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_CREATE(r6, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r6, &(0x7f0000000040), 0x4) ioctl$VIDIOC_S_CTRL(r5, 0xc008561c, &(0x7f0000000100)={0x3}) unshare(0x40000000) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r5, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) [ 787.749260][ T5] hid-generic 0000:0000:0000.004A: unknown main item tag 0x0 [ 787.764348][ T5] hid-generic 0000:0000:0000.004A: hidraw0: HID v0.00 Device [syz1] on syz1 [ 787.769561][T29242] IPVS: ftp: loaded support on port[0] = 21 21:57:58 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r3, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r5 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_CREATE(r5, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r5, &(0x7f0000000040), 0x4) fsetxattr$trusted_overlay_origin(r3, &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x2) write$UHID_DESTROY(r5, &(0x7f00000000c0), 0x4) ioctl$VIDIOC_S_CTRL(r4, 0xc008561c, &(0x7f0000000100)={0x3}) unshare(0x40000000) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r4, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:57:58 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, &(0x7f0000000280)=0x4, 0x4) r1 = socket$packet(0x11, 0xa, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff038}, {0x80000006}]}, 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000066, 0x0) 21:57:58 executing program 0: 21:57:58 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000000)=[{0x2000000000040}]}, 0x8) sendmmsg(r0, &(0x7f0000003040), 0x4000000000003c4, 0x0) 21:57:58 executing program 5: 21:57:58 executing program 2: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r3, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r4, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_CREATE(r6, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r6, &(0x7f0000000040), 0x4) ioctl$VIDIOC_S_CTRL(r5, 0xc008561c, &(0x7f0000000100)={0x3}) unshare(0x40000000) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r5, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:57:58 executing program 0: 21:57:58 executing program 5: 21:57:58 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, &(0x7f0000000280)=0x4, 0x4) r1 = socket$packet(0x11, 0xa, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff038}, {0x80000006}]}, 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000066, 0x0) [ 789.748766][T29256] IPVS: ftp: loaded support on port[0] = 21 [ 789.798457][ T3128] hid-generic 0000:0000:0000.004B: unknown main item tag 0x0 [ 789.823027][ T3128] hid-generic 0000:0000:0000.004B: hidraw0: HID v0.00 Device [syz1] on syz1 21:57:58 executing program 5: 21:57:58 executing program 0: [ 789.883300][T29107] hid-generic 0000:0000:0000.004C: unknown main item tag 0x0 [ 790.009332][T29107] hid-generic 0000:0000:0000.004C: hidraw0: HID v0.00 Device [syz1] on syz1 21:57:59 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f0000000280)=0x4, 0x4) r1 = socket$packet(0x11, 0xa, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff038}, {0x80000006}]}, 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000066, 0x0) [ 790.063521][ C0] net_ratelimit: 6 callbacks suppressed [ 790.063529][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 790.074981][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 790.133678][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 790.139543][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 790.429627][T29257] IPVS: ftp: loaded support on port[0] = 21 21:57:59 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(0xffffffffffffffff, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r3, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r5 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_CREATE(r5, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r5, &(0x7f0000000040), 0x4) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x2) write$UHID_DESTROY(r5, &(0x7f00000000c0), 0x4) ioctl$VIDIOC_S_CTRL(r4, 0xc008561c, &(0x7f0000000100)={0x3}) unshare(0x40000000) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r4, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:57:59 executing program 5: 21:57:59 executing program 0: 21:57:59 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f0000000280)=0x4, 0x4) r1 = socket$packet(0x11, 0xa, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff038}, {0x80000006}]}, 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000066, 0x0) 21:57:59 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000000)=[{0x2000000000040}]}, 0x8) sendmmsg(r0, &(0x7f0000003040), 0x4000000000003c4, 0x0) 21:57:59 executing program 2: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r3, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r4, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_CREATE(r6, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r6, &(0x7f0000000040), 0x4) ioctl$VIDIOC_S_CTRL(r5, 0xc008561c, &(0x7f0000000100)={0x3}) unshare(0x40000000) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r5, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:57:59 executing program 5: 21:57:59 executing program 0: 21:57:59 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f0000000280)=0x4, 0x4) r1 = socket$packet(0x11, 0xa, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff038}, {0x80000006}]}, 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000066, 0x0) [ 790.920437][T29107] hid-generic 0000:0000:0000.004D: unknown main item tag 0x0 [ 790.955020][T29107] hid-generic 0000:0000:0000.004D: hidraw0: HID v0.00 Device [syz1] on syz1 [ 790.982370][T29303] IPVS: ftp: loaded support on port[0] = 21 21:58:00 executing program 0: 21:58:00 executing program 5: [ 791.036213][T29301] IPVS: ftp: loaded support on port[0] = 21 21:58:00 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, 0x0, 0x0) r1 = socket$packet(0x11, 0xa, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff038}, {0x80000006}]}, 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000066, 0x0) [ 791.173605][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 791.179547][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 791.413604][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 791.419475][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 791.493541][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 791.499393][ C0] protocol 88fb is buggy, dev hsr_slave_1 21:58:00 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(0xffffffffffffffff, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r3, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r5 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_CREATE(r5, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r5, &(0x7f0000000040), 0x4) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x2) write$UHID_DESTROY(r5, &(0x7f00000000c0), 0x4) ioctl$VIDIOC_S_CTRL(r4, 0xc008561c, &(0x7f0000000100)={0x3}) unshare(0x40000000) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r4, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:58:00 executing program 5: 21:58:00 executing program 0: 21:58:00 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, 0x0, 0x0) r1 = socket$packet(0x11, 0xa, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff038}, {0x80000006}]}, 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000066, 0x0) 21:58:00 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000000)=[{0x2000000000040}]}, 0x8) sendmmsg(r0, &(0x7f0000003040), 0x4000000000003c4, 0x0) [ 791.943235][T29330] IPVS: ftp: loaded support on port[0] = 21 21:58:03 executing program 5: 21:58:03 executing program 0: 21:58:03 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, 0x0, 0x0) r1 = socket$packet(0x11, 0xa, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff038}, {0x80000006}]}, 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000066, 0x0) 21:58:03 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000140)={0x2, &(0x7f0000000000)=[{0x2000000000040}, {}]}, 0x10) sendmmsg(r0, &(0x7f0000003040), 0x4000000000003c4, 0x0) 21:58:03 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(0xffffffffffffffff, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r3, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r5 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_CREATE(r5, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r5, &(0x7f0000000040), 0x4) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x2) write$UHID_DESTROY(r5, &(0x7f00000000c0), 0x4) ioctl$VIDIOC_S_CTRL(r4, 0xc008561c, &(0x7f0000000100)={0x3}) unshare(0x40000000) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r4, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:58:03 executing program 2: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r3, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r4, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_DESTROY(r6, &(0x7f0000000040), 0x4) write$UHID_DESTROY(r6, &(0x7f00000000c0), 0x4) ioctl$VIDIOC_S_CTRL(r5, 0xc008561c, &(0x7f0000000100)={0x3}) unshare(0x40000000) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r5, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:58:03 executing program 0: perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c64, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x5) 21:58:03 executing program 5: inotify_init1(0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c64, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, 0x0) [ 794.200959][T29347] IPVS: ftp: loaded support on port[0] = 21 21:58:03 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000280), 0x4) r1 = socket$packet(0x11, 0xa, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff038}, {0x80000006}]}, 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000066, 0x0) 21:58:03 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x2, 0x0) write$FUSE_CREATE_OPEN(r0, &(0x7f0000000100)={0xa0, 0x0, 0x0, {{0x2}}}, 0xa0) [ 794.373350][T29356] IPVS: ftp: loaded support on port[0] = 21 21:58:03 executing program 5: mq_open(&(0x7f0000000000)='..[@\x00', 0x0, 0x0, 0x0) 21:58:03 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000280), 0x4) r1 = socket$packet(0x11, 0xa, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff038}, {0x80000006}]}, 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000066, 0x0) 21:58:03 executing program 5: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x4000001, 0x182) prctl$PR_GET_TIMERSLACK(0x1e) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ftruncate(r1, 0x321) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, 0x0, 0x2000005) socket(0x0, 0x0, 0x0) dup2(r1, r0) 21:58:03 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x5c65, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rt_sigaction(0x26, &(0x7f0000000180)={0x0, {}, 0x0, 0x0}, &(0x7f0000000240)={0x0, {}, 0x0, &(0x7f0000000200)="660ffbdfc4c3c10f3f008fc8788f71a70fc4c2f5b76c83008fe95001dac4e2f1406da0c4c3a95e6507f0c4e2e1964e00c4c17d2fa00c000000c4c131d36f8e"}, 0x8, &(0x7f0000000280)) 21:58:03 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000280), 0x4) r1 = socket$packet(0x11, 0xa, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff038}, {0x80000006}]}, 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000066, 0x0) 21:58:04 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000140)={0x2, &(0x7f0000000000)=[{0x2000000000040}, {}]}, 0x10) sendmmsg(r0, &(0x7f0000003040), 0x4000000000003c4, 0x0) 21:58:04 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r3, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r4, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_CREATE(r6, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) write$UHID_DESTROY(r6, &(0x7f0000000040), 0x4) fsetxattr$trusted_overlay_origin(r3, &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x2) write$UHID_DESTROY(r6, &(0x7f00000000c0), 0x4) ioctl$VIDIOC_S_CTRL(r5, 0xc008561c, &(0x7f0000000100)={0x3}) unshare(0x40000000) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r5, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:58:04 executing program 0: syz_execute_func(&(0x7f0000000600)="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") msgsnd(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="fb"], 0x1, 0x0) syz_execute_func(&(0x7f0000000000)="43dd25310000006565d93457c4c2e19c3bc442f9921c7dfd2f8fe8085dfcf30f122d2bbd0000c4c1c2c2e610653e0f01d5c4e1a95571ab660f71cd20") 21:58:04 executing program 2: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) r1 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000095bffc), 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4040, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000080)={0x0, 0x9, "691a03586303c17621"}, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000000100), 0x0) getsockname$netlink(r3, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpeername(r4, &(0x7f00000002c0)=@nfc_llcp, &(0x7f0000000340)=0x80) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uhid\x00', 0x40010020a, 0x0) write$UHID_DESTROY(r6, &(0x7f0000000040), 0x4) write$UHID_DESTROY(r6, &(0x7f00000000c0), 0x4) ioctl$VIDIOC_S_CTRL(r5, 0xc008561c, &(0x7f0000000100)={0x3}) unshare(0x40000000) syz_emit_ethernet(0x32, &(0x7f0000000080)={@remote, @empty, [{[{}]}], {@ipv4={0x800, {{0x5, 0x6, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r5, 0x408c563e, &(0x7f0000000200)={0x1000, 0x3, 0xf, "dacc84451d61db3daabc85e157d1e9a4317f04802c9ad559f73521bd4e86dda6ce0f5cd834c2a1c522f8b29803e272bdea6cfa5a63060d15975de815", 0x2b, "2ad08765bcb1953f3a70b58287577034dc4d327244bf6ed8c426955e9c4b5bc7e6b3d690a5a0720606fde379bb09669ebc39036dd81eec345a27e8eb", 0x20}) ioctl$BLKPG(r0, 0x1269, &(0x7f00000000c0)={0x1, 0x7, 0x5c, &(0x7f0000000040)="b6e0e58fcad90875ee17962c218cdc74d53ec8a927624d80ca214ff4358ce0d27ee443c32df581058d5a18d81fbf9b57df1089254dd76f6dbfa86fd9c4150c37a79b1408976a69ab1edc733f80652b89d7d474a7212968dd333eefe8"}) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1, 0x1b071, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) mremap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000000000/0x3000)=nil) 21:58:04 executing program 5: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x4000001, 0x182) prctl$PR_GET_TIMERSLACK(0x1e) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ftruncate(r1, 0x321) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, 0x0, 0x2000005) socket(0x0, 0x0, 0x0) dup2(r1, r0) 21:58:04 executing program 0: syz_execute_func(&(0x7f0000000480)="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") sendmsg(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="e25eb1af3562a3b0a4c0e90d57f817", 0xf}], 0x1}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="34029f60206098c13493c0", 0xb}], 0x1}, 0x0) syz_execute_func(&(0x7f0000000140)="43dd25310000006565d93457c4c2e19c3bc442f9921c7dfd2f8fe8085dfcf30f122d2bbd0000c4e17f104564653e0f01d5c4417dddb367f96618660f71cd20") 21:58:04 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000280)=0x4, 0x4) r1 = socket$packet(0x11, 0x0, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff038}, {0x80000006}]}, 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000066, 0x0) [ 795.330158][T29395] IPVS: ftp: loaded support on port[0] = 21 [ 795.333648][ C0] net_ratelimit: 10 callbacks suppressed [ 795.333657][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 795.347680][ C0] protocol 88fb is buggy, dev hsr_slave_1 21:58:04 executing program 0: syz_execute_func(&(0x7f0000000600)="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") syz_execute_func(&(0x7f0000000080)="43dd25310000006565d93457c4c2e19c7bc442f9921c7dfd2f8fe8c4025945d4e5127d2d913dbd3dbd661a0f3807df3aa0b3d5a61109d6f41bb2438382a0ff0ec46129e3d0cd3ef233446c11") syz_execute_func(&(0x7f0000000040)="43dd25210000006565d93457c4e3f12145b233945dc7fcfc0f125c2d2dbd00003c3cc1c22e6036661f3829e4d1a7fd5783c4f2a7fc") msgsnd(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='}'], 0x1, 0x0) syz_execute_func(&(0x7f0000000000)="43dd25310000006565d93457c4c2e19c3bc442f9921c7dfd2f8fe8085dfcf30f122d2bbd0000c4c1c2c2e610653e0f01d5c4e3e50ca7fdffffff07660f71cd20") [ 795.478799][T29406] IPVS: ftp: loaded support on port[0] = 21 [ 795.583637][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 795.589610][ C1] protocol 88fb is buggy, dev hsr_slave_1 21:58:04 executing program 5: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x4000001, 0x182) prctl$PR_GET_TIMERSLACK(0x1e) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ftruncate(r1, 0x321) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, 0x0, 0x2000005) socket(0x0, 0x0, 0x0) dup2(r1, r0) [ 795.653600][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 795.659457][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 795.659569][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 795.671103][ C0] protocol 88fb is buggy, dev hsr_slave_1 21:58:04 executing program 0: syz_execute_func(&(0x7f0000000200)="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") syz_execute_func(&(0x7f0000000180)="43dd25310000006565d9345740ddeac4e1256b61a92e3666400f3a40bf11db4f750ae65fc4c17e12b70d00000099665d99c442cd3ae1758d0404fdc46228f2ccf4b9a6b9a6c8c4c2f923430affffff1cc4c4a1ad6799a4000000457bc4410f51525e000000500000f5f20fd6e7530f81cc000000c402e5297221") 21:58:04 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000280)=0x4, 0x4) r1 = socket$packet(0x11, 0x0, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff038}, {0x80000006}]}, 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000066, 0x0) 21:58:04 executing program 0: syz_execute_func(&(0x7f0000000600)="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") syz_execute_func(&(0x7f0000000040)="43dd25210000006565d93457c4e3f12145b233945dc7fcfc0f125c2d2dbd00003c3cc1c22e6036661f3829e4d1a7fd5783c4f2a7fc") syz_execute_func(&(0x7f0000000000)="43dd25310000006565d93457c4c2e19c3bc442f9921c7dfd2f8fe8085dfcf30f122d2bbd0000c4c1c2c2e610653e0f01d5c4e1a95571ab660f71cd20") 21:58:05 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000140)={0x2, &(0x7f0000000000)=[{0x2000000000040}, {}]}, 0x10) sendmmsg(r0, &(0x7f0000003040), 0x4000000000003c4, 0x0) [ 796.345604][T10056] ================================================================== [ 796.354153][T10056] BUG: KASAN: slab-out-of-bounds in tcp_sk_exit+0x20d/0x240 [ 796.361472][T10056] Read of size 8 at addr ffff888065da5858 by task kworker/u4:5/10056 [ 796.369569][T10056] [ 796.371924][T10056] CPU: 0 PID: 10056 Comm: kworker/u4:5 Not tainted 5.2.0-rc1+ #7 [ 796.379653][T10056] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 796.389809][T10056] Workqueue: netns cleanup_net [ 796.394602][T10056] Call Trace: [ 796.397936][T10056] dump_stack+0x172/0x1f0 [ 796.402288][T10056] ? tcp_sk_exit+0x20d/0x240 [ 796.406909][T10056] print_address_description.cold+0x7c/0x20d [ 796.412913][T10056] ? tcp_sk_exit+0x20d/0x240 [ 796.417548][T10056] ? tcp_sk_exit+0x20d/0x240 [ 796.422183][T10056] __kasan_report.cold+0x1b/0x40 [ 796.427162][T10056] ? __sanitizer_cov_trace_const_cmp4+0x10/0x20 [ 796.433427][T10056] ? tcp_sk_exit+0x20d/0x240 [ 796.438045][T10056] kasan_report+0x12/0x20 [ 796.442445][T10056] __asan_report_load8_noabort+0x14/0x20 [ 796.448082][T10056] tcp_sk_exit+0x20d/0x240 [ 796.452495][T10056] ? tcp_sk_exit_batch+0xa0/0xa0 [ 796.457524][T10056] ops_exit_list.isra.0+0xaa/0x150 [ 796.462653][T10056] cleanup_net+0x3fb/0x960 [ 796.467070][T10056] ? netns_install+0x1d0/0x1d0 [ 796.471846][T10056] process_one_work+0x989/0x1790 [ 796.476786][T10056] ? pwq_dec_nr_in_flight+0x320/0x320 [ 796.482155][T10056] ? lock_acquire+0x16f/0x3f0 [ 796.486858][T10056] worker_thread+0x98/0xe40 [ 796.491422][T10056] ? trace_hardirqs_on+0x67/0x220 [ 796.496472][T10056] kthread+0x354/0x420 [ 796.500549][T10056] ? process_one_work+0x1790/0x1790 [ 796.505761][T10056] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 796.512003][T10056] ret_from_fork+0x24/0x30 [ 796.516422][T10056] [ 796.518775][T10056] Allocated by task 29021: [ 796.523199][T10056] save_stack+0x23/0x90 [ 796.527366][T10056] __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 796.532995][T10056] kasan_slab_alloc+0xf/0x20 [ 796.537605][T10056] kmem_cache_alloc+0x11a/0x6f0 [ 796.542472][T10056] sk_prot_alloc+0x67/0x2e0 [ 796.546986][T10056] sk_alloc+0x39/0xf70 [ 796.551067][T10056] inet_create+0x36a/0xe00 [ 796.555486][T10056] __sock_create+0x3d8/0x730 [ 796.560076][T10056] sock_create_kern+0x3b/0x50 [ 796.564803][T10056] inet_ctl_sock_create+0x9d/0x1f0 [ 796.569935][T10056] tcp_sk_init+0x11b/0x12d0 [ 796.574536][T10056] ops_init+0xb3/0x410 [ 796.578615][T10056] setup_net+0x2d3/0x740 [ 796.583579][T10056] copy_net_ns+0x1df/0x340 [ 796.589587][T10056] create_new_namespaces+0x400/0x7b0 [ 796.594876][T10056] unshare_nsproxy_namespaces+0xc2/0x200 [ 796.600512][T10056] ksys_unshare+0x440/0x980 [ 796.605033][T10056] __ia32_sys_unshare+0x30/0x40 [ 796.609880][T10056] do_fast_syscall_32+0x27b/0xd7d [ 796.614916][T10056] entry_SYSENTER_compat+0x70/0x7f [ 796.620110][T10056] [ 796.622447][T10056] Freed by task 10056: [ 796.626532][T10056] save_stack+0x23/0x90 [ 796.630691][T10056] __kasan_slab_free+0x102/0x150 [ 796.635669][T10056] kasan_slab_free+0xe/0x10 [ 796.640197][T10056] kmem_cache_free+0x86/0x260 [ 796.644873][T10056] __sk_destruct+0x4bc/0x6e0 [ 796.649569][T10056] sk_destruct+0x7b/0x90 [ 796.653836][T10056] __sk_free+0xce/0x300 [ 796.657999][T10056] sk_free+0x42/0x50 [ 796.661903][T10056] sk_common_release+0x21c/0x330 [ 796.666835][T10056] raw_close+0x22/0x30 [ 796.670897][T10056] inet_release+0xff/0x1e0 [ 796.675312][T10056] __sock_release+0x1f4/0x2a0 [ 796.679998][T10056] sock_release+0x18/0x20 [ 796.685312][T10056] tcp_sk_exit+0x185/0x240 [ 796.693044][T10056] ops_exit_list.isra.0+0xaa/0x150 [ 796.698167][T10056] cleanup_net+0x3fb/0x960 [ 796.702669][T10056] process_one_work+0x989/0x1790 [ 796.707632][T10056] worker_thread+0x98/0xe40 [ 796.712395][T10056] kthread+0x354/0x420 [ 796.716474][T10056] ret_from_fork+0x24/0x30 [ 796.720878][T10056] [ 796.723250][T10056] The buggy address belongs to the object at ffff888065da5280 [ 796.723250][T10056] which belongs to the cache RAW(49:syz2) of size 1352 [ 796.737596][T10056] The buggy address is located 144 bytes to the right of [ 796.737596][T10056] 1352-byte region [ffff888065da5280, ffff888065da57c8) [ 796.751474][T10056] The buggy address belongs to the page: [ 796.757109][T10056] page:ffffea0001976900 refcount:1 mapcount:0 mapping:ffff88808f5bdc00 index:0x0 compound_mapcount: 0 [ 796.768060][T10056] flags: 0x1fffc0000010200(slab|head) [ 796.773453][T10056] raw: 01fffc0000010200 ffffea000278af88 ffffea0002355808 ffff88808f5bdc00 [ 796.782556][T10056] raw: 0000000000000000 ffff888065da4080 0000000100000005 ffff888099d2d400 [ 796.792806][T10056] page dumped because: kasan: bad access detected [ 796.799222][T10056] page->mem_cgroup:ffff888099d2d400 [ 796.804413][T10056] [ 796.806875][T10056] Memory state around the buggy address: [ 796.812539][T10056] ffff888065da5700: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 796.822232][T10056] ffff888065da5780: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 796.831547][T10056] >ffff888065da5800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 796.839637][T10056] ^ [ 796.846796][T10056] ffff888065da5880: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 796.854858][T10056] ffff888065da5900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 796.862913][T10056] ================================================================== [ 796.870961][T10056] Disabling lock debugging due to kernel taint [ 796.880197][T10056] Kernel panic - not syncing: panic_on_warn set ... [ 796.886839][T10056] CPU: 0 PID: 10056 Comm: kworker/u4:5 Tainted: G B 5.2.0-rc1+ #7 [ 796.895955][T10056] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 796.906035][T10056] Workqueue: netns cleanup_net [ 796.910800][T10056] Call Trace: [ 796.914122][T10056] dump_stack+0x172/0x1f0 [ 796.918458][T10056] panic+0x2cb/0x744 [ 796.922374][T10056] ? __warn_printk+0xf3/0xf3 [ 796.928217][T10056] ? tcp_sk_exit+0x20d/0x240 [ 796.932812][T10056] ? preempt_schedule+0x4b/0x60 [ 796.937670][T10056] ? ___preempt_schedule+0x16/0x18 [ 796.942899][T10056] ? trace_hardirqs_on+0x5e/0x220 [ 796.947935][T10056] ? tcp_sk_exit+0x20d/0x240 [ 796.952713][T10056] end_report+0x47/0x4f [ 796.956879][T10056] ? tcp_sk_exit+0x20d/0x240 [ 796.961488][T10056] __kasan_report.cold+0xe/0x40 [ 796.966333][T10056] ? __sanitizer_cov_trace_const_cmp4+0x10/0x20 [ 796.972999][T10056] ? tcp_sk_exit+0x20d/0x240 [ 796.977584][T10056] kasan_report+0x12/0x20 [ 796.981903][T10056] __asan_report_load8_noabort+0x14/0x20 [ 796.987530][T10056] tcp_sk_exit+0x20d/0x240 [ 796.991940][T10056] ? tcp_sk_exit_batch+0xa0/0xa0 [ 796.996872][T10056] ops_exit_list.isra.0+0xaa/0x150 [ 797.001980][T10056] cleanup_net+0x3fb/0x960 [ 797.006395][T10056] ? netns_install+0x1d0/0x1d0 [ 797.011173][T10056] process_one_work+0x989/0x1790 [ 797.016112][T10056] ? pwq_dec_nr_in_flight+0x320/0x320 [ 797.021482][T10056] ? lock_acquire+0x16f/0x3f0 [ 797.026191][T10056] worker_thread+0x98/0xe40 [ 797.030692][T10056] ? trace_hardirqs_on+0x67/0x220 [ 797.035713][T10056] kthread+0x354/0x420 [ 797.039779][T10056] ? process_one_work+0x1790/0x1790 [ 797.044984][T10056] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 797.051230][T10056] ret_from_fork+0x24/0x30 [ 797.056858][T10056] Kernel Offset: disabled [ 797.061280][T10056] Rebooting in 86400 seconds..