000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fe800000000000000000000000000021fe8000000000000000000000000200bbffffffff00000000000000ff00000000ffffff00000000ff000000ff000000ff7465616d5f736c6176655f3000000000766c616e3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000330003f508000000000000000000000000000000c800f800000000000000000000000000000000000000000000000000300053455400000000000000002000000000000000000000000000000000000205000103e500640981000000060000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000fe43ef53f2da1f21f67933ae04add4d9d020e67533607059cade10d3ef7d51e3ac64197b1da5b0cb69865e44b89b932d4eb5d40111e8898b1b5637ddc94b0732a5785a5ca51222589eccaeabfe4a8529f82fe8f2f3054b5d66428fc34f90a999d430efdcb8"], 0x3) 03:56:01 executing program 2: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r3, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000200)='hsr0\x00') exit(0x0) r4 = fanotify_init(0x40, 0x2) r5 = open$dir(&(0x7f0000000080)='./file0\x00', 0x20881, 0x2) msgget$private(0x0, 0x2) fcntl$setsig(r5, 0xa, 0x7) fanotify_mark(r4, 0x8, 0x1, r5, &(0x7f0000000100)='./file0\x00') r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') r7 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r7, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") r8 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) poll(&(0x7f0000000280)=[{r8}], 0x1, 0x0) signalfd(r8, &(0x7f0000000540)={0x40000000000009}, 0xffffffffffffff67) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="2537110b9523145bf78fd24358fa4d58089f39722092414ea5e060e1858bdf6c2beefb55075fc790e1a9bc2d9b69717d20991016430e90c90d273b8a84210b61a8a2daf2089b1b9885990ad4fe2ee87a18", @ANYRES16=r6, @ANYBLOB="f0062bbd7000fddbdf25120100003400090008000100030000000800020004000000080002002d1e000008000200ffff0000080002e904000000080002000900000010000600080001000200000004000200480001002c00020008000300070000004800040002000000080001000600000008000300090000000800d1de1f0000000800030003000000100001003a73797a3200000000180007000c000300020000000000000008000200f70000008206000000"], 0xb8}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) perf_event_open(&(0x7f0000000000)={0x2, 0x3, 0x800000000000012, 0x1, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$join(0x1, &(0x7f00000000c0)={'syz', 0x1}) setsockopt$IP6T_SO_SET_REPLACE(r4, 0x29, 0x40, &(0x7f0000001000)=ANY=[@ANYRESDEC=r5, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYBLOB="0000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000090810a161e873bbe6d9a5042ae1507008b1d5564e825aad9f7fadf1686df5cccfb171f694009799bff176d2bc4c70c0966ebf415ec8d"], @ANYBLOB="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"], 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x2) 03:56:01 executing program 1: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r3, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000200)='hsr0\x00') exit(0x0) r4 = fanotify_init(0x40, 0x2) r5 = open$dir(&(0x7f0000000080)='./file0\x00', 0x20881, 0x2) msgget$private(0x0, 0x2) fcntl$setsig(r5, 0xa, 0x7) fanotify_mark(r4, 0x8, 0x1, r5, &(0x7f0000000100)='./file0\x00') r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') r7 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r7, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") r8 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) poll(&(0x7f0000000280)=[{r8}], 0x1, 0x0) signalfd(r8, &(0x7f0000000540)={0x40000000000009}, 0xffffffffffffff67) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="2537110b9523145bf78fd24358fa4d58089f39722092414ea5e060e1858bdf6c2beefb55075fc790e1a9bc2d9b69717d20991016430e90c90d273b8a84210b61a8a2daf2089b1b9885990ad4fe2ee87a18", @ANYRES16=r6, @ANYBLOB="f0062bbd7000fddbdf25120100003400090008000100030000000800020004000000080002002d1e000008000200ffff0000080002e904000000080002000900000010000600080001000200000004000200480001002c00020008000300070000004800040002000000080001000600000008000300090000000800d1de1f0000000800030003000000100001003a73797a3200000000180007000c000300020000000000000008000200f70000008206000000"], 0xb8}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) perf_event_open(&(0x7f0000000000)={0x2, 0x3, 0x800000000000012, 0x1, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$join(0x1, &(0x7f00000000c0)={'syz', 0x1}) 03:56:01 executing program 0: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r3, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000200)='hsr0\x00') exit(0x0) r4 = fanotify_init(0x40, 0x2) r5 = open$dir(&(0x7f0000000080)='./file0\x00', 0x20881, 0x2) msgget$private(0x0, 0x2) fcntl$setsig(r5, 0xa, 0x7) fanotify_mark(r4, 0x8, 0x1, r5, &(0x7f0000000100)='./file0\x00') r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') r7 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r7, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") r8 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) poll(&(0x7f0000000280)=[{r8}], 0x1, 0x0) signalfd(r8, &(0x7f0000000540)={0x40000000000009}, 0xffffffffffffff67) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="2537110b9523145bf78fd24358fa4d58089f39722092414ea5e060e1858bdf6c2beefb55075fc790e1a9bc2d9b69717d20991016430e90c90d273b8a84210b61a8a2daf2089b1b9885990ad4fe2ee87a18", @ANYRES16=r6, @ANYBLOB="f0062bbd7000fddbdf25120100003400090008000100030000000800020004000000080002002d1e000008000200ffff0000080002e904000000080002000900000010000600080001000200000004000200480001002c00020008000300070000004800040002000000080001000600000008000300090000000800d1de1f0000000800030003000000100001003a73797a3200000000180007000c000300020000000000000008000200f70000008206000000"], 0xb8}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) perf_event_open(&(0x7f0000000000)={0x2, 0x3, 0x800000000000012, 0x1, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$join(0x1, &(0x7f00000000c0)={'syz', 0x1}) setsockopt$IP6T_SO_SET_REPLACE(r4, 0x29, 0x40, &(0x7f0000001000)=ANY=[@ANYRESDEC=r5, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYBLOB="0000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000090810a161e873bbe6d9a5042ae1507008b1d5564e825aad9f7fadf1686df5cccfb171f694009799bff176d2bc4c70c0966ebf415ec8d"], @ANYBLOB="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"], 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x2) 03:56:01 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x24000008, 0x0, 0x0) connect$unix(r2, &(0x7f0000000080)=@abs, 0x6e) 03:56:01 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x24000008, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) connect$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e) 03:56:01 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x24000008, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) connect$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e) 03:56:01 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x24000008, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) connect$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, 0x6e) 03:56:01 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x24000008, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) connect$unix(r2, 0x0, 0x0) 03:56:01 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x24000008, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) connect$unix(r2, 0x0, 0x0) 03:56:04 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:56:04 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = dup(r0) sendto$inet6(r0, 0x0, 0x0, 0x24000008, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) connect$unix(r2, 0x0, 0x0) 03:56:04 executing program 0: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r3, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000200)='hsr0\x00') exit(0x0) r4 = fanotify_init(0x40, 0x2) r5 = open$dir(&(0x7f0000000080)='./file0\x00', 0x20881, 0x2) msgget$private(0x0, 0x2) fcntl$setsig(r5, 0xa, 0x7) fanotify_mark(r4, 0x8, 0x1, r5, &(0x7f0000000100)='./file0\x00') r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') r7 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r7, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") r8 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) poll(&(0x7f0000000280)=[{r8}], 0x1, 0x0) signalfd(r8, &(0x7f0000000540)={0x40000000000009}, 0xffffffffffffff67) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="2537110b9523145bf78fd24358fa4d58089f39722092414ea5e060e1858bdf6c2beefb55075fc790e1a9bc2d9b69717d20991016430e90c90d273b8a84210b61a8a2daf2089b1b9885990ad4fe2ee87a18", @ANYRES16=r6, @ANYBLOB="f0062bbd7000fddbdf25120100003400090008000100030000000800020004000000080002002d1e000008000200ffff0000080002e904000000080002000900000010000600080001000200000004000200480001002c00020008000300070000004800040002000000080001000600000008000300090000000800d1de1f0000000800030003000000100001003a73797a3200000000180007000c000300020000000000000008000200f70000008206000000"], 0xb8}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) perf_event_open(&(0x7f0000000000)={0x2, 0x3, 0x800000000000012, 0x1, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$join(0x1, &(0x7f00000000c0)={'syz', 0x1}) setsockopt$IP6T_SO_SET_REPLACE(r4, 0x29, 0x40, &(0x7f0000001000)=ANY=[@ANYRESDEC=r5, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYBLOB="0000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000090810a161e873bbe6d9a5042ae1507008b1d5564e825aad9f7fadf1686df5cccfb171f694009799bff176d2bc4c70c0966ebf415ec8d"], @ANYBLOB="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"], 0x3) 03:56:04 executing program 3: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r3, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000200)='hsr0\x00') exit(0x0) r4 = fanotify_init(0x40, 0x2) r5 = open$dir(&(0x7f0000000080)='./file0\x00', 0x20881, 0x2) msgget$private(0x0, 0x2) fcntl$setsig(r5, 0xa, 0x7) fanotify_mark(r4, 0x8, 0x1, r5, &(0x7f0000000100)='./file0\x00') r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') r7 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r7, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") r8 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) poll(&(0x7f0000000280)=[{r8}], 0x1, 0x0) signalfd(r8, &(0x7f0000000540)={0x40000000000009}, 0xffffffffffffff67) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="2537110b9523145bf78fd24358fa4d58089f39722092414ea5e060e1858bdf6c2beefb55075fc790e1a9bc2d9b69717d20991016430e90c90d273b8a84210b61a8a2daf2089b1b9885990ad4fe2ee87a18", @ANYRES16=r6, @ANYBLOB="f0062bbd7000fddbdf25120100003400090008000100030000000800020004000000080002002d1e000008000200ffff0000080002e904000000080002000900000010000600080001000200000004000200480001002c00020008000300070000004800040002000000080001000600000008000300090000000800d1de1f0000000800030003000000100001003a73797a3200000000180007000c000300020000000000000008000200f70000008206000000"], 0xb8}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) perf_event_open(&(0x7f0000000000)={0x2, 0x3, 0x800000000000012, 0x1, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$join(0x1, &(0x7f00000000c0)={'syz', 0x1}) 03:56:04 executing program 1: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r3, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000200)='hsr0\x00') exit(0x0) r4 = fanotify_init(0x40, 0x2) r5 = open$dir(&(0x7f0000000080)='./file0\x00', 0x20881, 0x2) msgget$private(0x0, 0x2) fcntl$setsig(r5, 0xa, 0x7) fanotify_mark(r4, 0x8, 0x1, r5, &(0x7f0000000100)='./file0\x00') r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') r7 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r7, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") r8 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) poll(&(0x7f0000000280)=[{r8}], 0x1, 0x0) signalfd(r8, &(0x7f0000000540)={0x40000000000009}, 0xffffffffffffff67) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="2537110b9523145bf78fd24358fa4d58089f39722092414ea5e060e1858bdf6c2beefb55075fc790e1a9bc2d9b69717d20991016430e90c90d273b8a84210b61a8a2daf2089b1b9885990ad4fe2ee87a18", @ANYRES16=r6, @ANYBLOB="f0062bbd7000fddbdf25120100003400090008000100030000000800020004000000080002002d1e000008000200ffff0000080002e904000000080002000900000010000600080001000200000004000200480001002c00020008000300070000004800040002000000080001000600000008000300090000000800d1de1f0000000800030003000000100001003a73797a3200000000180007000c000300020000000000000008000200f70000008206000000"], 0xb8}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) keyctl$join(0x1, &(0x7f00000000c0)={'syz', 0x1}) 03:56:04 executing program 2: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r3, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000200)='hsr0\x00') exit(0x0) r4 = fanotify_init(0x40, 0x2) r5 = open$dir(&(0x7f0000000080)='./file0\x00', 0x20881, 0x2) msgget$private(0x0, 0x2) fcntl$setsig(r5, 0xa, 0x7) fanotify_mark(r4, 0x8, 0x1, r5, &(0x7f0000000100)='./file0\x00') r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') r7 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r7, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") r8 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) poll(&(0x7f0000000280)=[{r8}], 0x1, 0x0) signalfd(r8, &(0x7f0000000540)={0x40000000000009}, 0xffffffffffffff67) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="2537110b9523145bf78fd24358fa4d58089f39722092414ea5e060e1858bdf6c2beefb55075fc790e1a9bc2d9b69717d20991016430e90c90d273b8a84210b61a8a2daf2089b1b9885990ad4fe2ee87a18", @ANYRES16=r6, @ANYBLOB="f0062bbd7000fddbdf25120100003400090008000100030000000800020004000000080002002d1e000008000200ffff0000080002e904000000080002000900000010000600080001000200000004000200480001002c00020008000300070000004800040002000000080001000600000008000300090000000800d1de1f0000000800030003000000100001003a73797a3200000000180007000c000300020000000000000008000200f70000008206000000"], 0xb8}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) perf_event_open(&(0x7f0000000000)={0x2, 0x3, 0x800000000000012, 0x1, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$join(0x1, &(0x7f00000000c0)={'syz', 0x1}) setsockopt$IP6T_SO_SET_REPLACE(r4, 0x29, 0x40, &(0x7f0000001000)=ANY=[@ANYRESDEC=r5, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYBLOB="0000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000090810a161e873bbe6d9a5042ae1507008b1d5564e825aad9f7fadf1686df5cccfb171f694009799bff176d2bc4c70c0966ebf415ec8d"], @ANYBLOB="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"], 0x3) 03:56:04 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r2, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r3 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r3, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r4, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000200)='hsr0\x00') exit(0x0) r5 = fanotify_init(0x40, 0x2) r6 = open$dir(&(0x7f0000000080)='./file0\x00', 0x20881, 0x2) msgget$private(0x0, 0x2) fcntl$setsig(r6, 0xa, 0x7) fanotify_mark(r5, 0x8, 0x1, r6, &(0x7f0000000100)='./file0\x00') r7 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') r8 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r8, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") r9 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) poll(&(0x7f0000000280)=[{r9}], 0x1, 0x0) signalfd(r9, &(0x7f0000000540)={0x40000000000009}, 0xffffffffffffff67) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="2537110b9523145bf78fd24358fa4d58089f39722092414ea5e060e1858bdf6c2beefb55075fc790e1a9bc2d9b69717d20991016430e90c90d273b8a84210b61a8a2daf2089b1b9885990ad4fe2ee87a18", @ANYRES16=r7, @ANYBLOB="f0062bbd7000fddbdf25120100003400090008000100030000000800020004000000080002002d1e000008000200ffff0000080002e904000000080002000900000010000600080001000200000004000200480001002c00020008000300070000004800040002000000080001000600000008000300090000000800d1de1f0000000800030003000000100001003a73797a3200000000180007000c000300020000000000000008000200f70000008206000000"], 0xb8}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) perf_event_open(&(0x7f0000000000)={0x2, 0x3, 0x800000000000012, 0x1, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$join(0x1, &(0x7f00000000c0)={'syz', 0x1}) setsockopt$IP6T_SO_SET_REPLACE(r5, 0x29, 0x40, &(0x7f0000001000)=ANY=[@ANYRESDEC=r6, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYBLOB="0000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000090810a161e873bbe6d9a5042ae1507008b1d5564e825aad9f7fadf1686df5cccfb171f694009799bff176d2bc4c70c0966ebf415ec8d"], @ANYBLOB="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"], 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x2) openat(r6, &(0x7f00000002c0)='./file0\x00', 0x20001, 0x100) r10 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r10, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00\x02', &(0x7f0000000340)=ANY=[@ANYRES64=r1, @ANYRES32=r10, @ANYRESDEC, @ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRESOCT=r10]]}) 03:56:05 executing program 3: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r3, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000200)='hsr0\x00') exit(0x0) r4 = fanotify_init(0x40, 0x2) r5 = open$dir(&(0x7f0000000080)='./file0\x00', 0x20881, 0x2) msgget$private(0x0, 0x2) fcntl$setsig(r5, 0xa, 0x7) fanotify_mark(r4, 0x8, 0x1, r5, &(0x7f0000000100)='./file0\x00') r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') r7 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r7, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") r8 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) poll(&(0x7f0000000280)=[{r8}], 0x1, 0x0) signalfd(r8, &(0x7f0000000540)={0x40000000000009}, 0xffffffffffffff67) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="2537110b9523145bf78fd24358fa4d58089f39722092414ea5e060e1858bdf6c2beefb55075fc790e1a9bc2d9b69717d20991016430e90c90d273b8a84210b61a8a2daf2089b1b9885990ad4fe2ee87a18", @ANYRES16=r6, @ANYBLOB="f0062bbd7000fddbdf25120100003400090008000100030000000800020004000000080002002d1e000008000200ffff0000080002e904000000080002000900000010000600080001000200000004000200480001002c00020008000300070000004800040002000000080001000600000008000300090000000800d1de1f0000000800030003000000100001003a73797a3200000000180007000c000300020000000000000008000200f70000008206000000"], 0xb8}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) perf_event_open(&(0x7f0000000000)={0x2, 0x3, 0x800000000000012, 0x1, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:56:05 executing program 1: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r3, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000200)='hsr0\x00') exit(0x0) r4 = fanotify_init(0x40, 0x2) r5 = open$dir(&(0x7f0000000080)='./file0\x00', 0x20881, 0x2) msgget$private(0x0, 0x2) fcntl$setsig(r5, 0xa, 0x7) fanotify_mark(r4, 0x8, 0x1, r5, &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r6, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") r7 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) poll(&(0x7f0000000280)=[{r7}], 0x1, 0x0) signalfd(r7, &(0x7f0000000540)={0x40000000000009}, 0xffffffffffffff67) keyctl$join(0x1, &(0x7f00000000c0)={'syz', 0x1}) 03:56:05 executing program 0: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r3, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000200)='hsr0\x00') exit(0x0) r4 = fanotify_init(0x40, 0x2) r5 = open$dir(&(0x7f0000000080)='./file0\x00', 0x20881, 0x2) msgget$private(0x0, 0x2) fcntl$setsig(r5, 0xa, 0x7) fanotify_mark(r4, 0x8, 0x1, r5, &(0x7f0000000100)='./file0\x00') r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') r7 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r7, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") r8 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) poll(&(0x7f0000000280)=[{r8}], 0x1, 0x0) signalfd(r8, &(0x7f0000000540)={0x40000000000009}, 0xffffffffffffff67) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="2537110b9523145bf78fd24358fa4d58089f39722092414ea5e060e1858bdf6c2beefb55075fc790e1a9bc2d9b69717d20991016430e90c90d273b8a84210b61a8a2daf2089b1b9885990ad4fe2ee87a18", @ANYRES16=r6, @ANYBLOB="f0062bbd7000fddbdf25120100003400090008000100030000000800020004000000080002002d1e000008000200ffff0000080002e904000000080002000900000010000600080001000200000004000200480001002c00020008000300070000004800040002000000080001000600000008000300090000000800d1de1f0000000800030003000000100001003a73797a3200000000180007000c000300020000000000000008000200f70000008206000000"], 0xb8}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) perf_event_open(&(0x7f0000000000)={0x2, 0x3, 0x800000000000012, 0x1, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$join(0x1, &(0x7f00000000c0)={'syz', 0x1}) 03:56:05 executing program 2: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r3, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000200)='hsr0\x00') exit(0x0) r4 = fanotify_init(0x40, 0x2) r5 = open$dir(&(0x7f0000000080)='./file0\x00', 0x20881, 0x2) msgget$private(0x0, 0x2) fcntl$setsig(r5, 0xa, 0x7) fanotify_mark(r4, 0x8, 0x1, r5, &(0x7f0000000100)='./file0\x00') r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') r7 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r7, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") r8 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) poll(&(0x7f0000000280)=[{r8}], 0x1, 0x0) signalfd(r8, &(0x7f0000000540)={0x40000000000009}, 0xffffffffffffff67) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="2537110b9523145bf78fd24358fa4d58089f39722092414ea5e060e1858bdf6c2beefb55075fc790e1a9bc2d9b69717d20991016430e90c90d273b8a84210b61a8a2daf2089b1b9885990ad4fe2ee87a18", @ANYRES16=r6, @ANYBLOB="f0062bbd7000fddbdf25120100003400090008000100030000000800020004000000080002002d1e000008000200ffff0000080002e904000000080002000900000010000600080001000200000004000200480001002c00020008000300070000004800040002000000080001000600000008000300090000000800d1de1f0000000800030003000000100001003a73797a3200000000180007000c000300020000000000000008000200f70000008206000000"], 0xb8}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) perf_event_open(&(0x7f0000000000)={0x2, 0x3, 0x800000000000012, 0x1, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$join(0x1, &(0x7f00000000c0)={'syz', 0x1}) 03:56:05 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r2, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r3 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r3, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r4, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000200)='hsr0\x00') exit(0x0) r5 = fanotify_init(0x40, 0x2) r6 = open$dir(&(0x7f0000000080)='./file0\x00', 0x20881, 0x2) msgget$private(0x0, 0x2) fcntl$setsig(r6, 0xa, 0x7) fanotify_mark(r5, 0x8, 0x1, r6, &(0x7f0000000100)='./file0\x00') r7 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') r8 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r8, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") r9 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) poll(&(0x7f0000000280)=[{r9}], 0x1, 0x0) signalfd(r9, &(0x7f0000000540)={0x40000000000009}, 0xffffffffffffff67) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="2537110b9523145bf78fd24358fa4d58089f39722092414ea5e060e1858bdf6c2beefb55075fc790e1a9bc2d9b69717d20991016430e90c90d273b8a84210b61a8a2daf2089b1b9885990ad4fe2ee87a18", @ANYRES16=r7, @ANYBLOB="f0062bbd7000fddbdf25120100003400090008000100030000000800020004000000080002002d1e000008000200ffff0000080002e904000000080002000900000010000600080001000200000004000200480001002c00020008000300070000004800040002000000080001000600000008000300090000000800d1de1f0000000800030003000000100001003a73797a3200000000180007000c000300020000000000000008000200f70000008206000000"], 0xb8}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) perf_event_open(&(0x7f0000000000)={0x2, 0x3, 0x800000000000012, 0x1, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$join(0x1, &(0x7f00000000c0)={'syz', 0x1}) setsockopt$IP6T_SO_SET_REPLACE(r5, 0x29, 0x40, &(0x7f0000001000)=ANY=[@ANYRESDEC=r6, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYBLOB="0000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000090810a161e873bbe6d9a5042ae1507008b1d5564e825aad9f7fadf1686df5cccfb171f694009799bff176d2bc4c70c0966ebf415ec8d"], @ANYBLOB="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"], 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x2) openat(r6, &(0x7f00000002c0)='./file0\x00', 0x20001, 0x100) r10 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r10, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00\x02', &(0x7f0000000340)=ANY=[@ANYRES64=r1, @ANYRES32=r10, @ANYRESDEC, @ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRESOCT=r10]]}) 03:56:07 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:56:07 executing program 3: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r3, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000200)='hsr0\x00') exit(0x0) r4 = fanotify_init(0x40, 0x2) r5 = open$dir(&(0x7f0000000080)='./file0\x00', 0x20881, 0x2) msgget$private(0x0, 0x2) fcntl$setsig(r5, 0xa, 0x7) fanotify_mark(r4, 0x8, 0x1, r5, &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r6, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") r7 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) poll(&(0x7f0000000280)=[{r7}], 0x1, 0x0) signalfd(r7, &(0x7f0000000540)={0x40000000000009}, 0xffffffffffffff67) perf_event_open(&(0x7f0000000000)={0x2, 0x3, 0x800000000000012, 0x1, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:56:07 executing program 0: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r3, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000200)='hsr0\x00') exit(0x0) r4 = fanotify_init(0x40, 0x2) r5 = open$dir(&(0x7f0000000080)='./file0\x00', 0x20881, 0x2) msgget$private(0x0, 0x2) fcntl$setsig(r5, 0xa, 0x7) fanotify_mark(r4, 0x8, 0x1, r5, &(0x7f0000000100)='./file0\x00') r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') r7 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r7, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") r8 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) poll(&(0x7f0000000280)=[{r8}], 0x1, 0x0) signalfd(r8, &(0x7f0000000540)={0x40000000000009}, 0xffffffffffffff67) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="2537110b9523145bf78fd24358fa4d58089f39722092414ea5e060e1858bdf6c2beefb55075fc790e1a9bc2d9b69717d20991016430e90c90d273b8a84210b61a8a2daf2089b1b9885990ad4fe2ee87a18", @ANYRES16=r6, @ANYBLOB="f0062bbd7000fddbdf25120100003400090008000100030000000800020004000000080002002d1e000008000200ffff0000080002e904000000080002000900000010000600080001000200000004000200480001002c00020008000300070000004800040002000000080001000600000008000300090000000800d1de1f0000000800030003000000100001003a73797a3200000000180007000c000300020000000000000008000200f70000008206000000"], 0xb8}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) perf_event_open(&(0x7f0000000000)={0x2, 0x3, 0x800000000000012, 0x1, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:56:07 executing program 2: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r3, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000200)='hsr0\x00') exit(0x0) r4 = fanotify_init(0x40, 0x2) r5 = open$dir(&(0x7f0000000080)='./file0\x00', 0x20881, 0x2) msgget$private(0x0, 0x2) fcntl$setsig(r5, 0xa, 0x7) fanotify_mark(r4, 0x8, 0x1, r5, &(0x7f0000000100)='./file0\x00') r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') r7 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r7, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") r8 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) poll(&(0x7f0000000280)=[{r8}], 0x1, 0x0) signalfd(r8, &(0x7f0000000540)={0x40000000000009}, 0xffffffffffffff67) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="2537110b9523145bf78fd24358fa4d58089f39722092414ea5e060e1858bdf6c2beefb55075fc790e1a9bc2d9b69717d20991016430e90c90d273b8a84210b61a8a2daf2089b1b9885990ad4fe2ee87a18", @ANYRES16=r6, @ANYBLOB="f0062bbd7000fddbdf25120100003400090008000100030000000800020004000000080002002d1e000008000200ffff0000080002e904000000080002000900000010000600080001000200000004000200480001002c00020008000300070000004800040002000000080001000600000008000300090000000800d1de1f0000000800030003000000100001003a73797a3200000000180007000c000300020000000000000008000200f70000008206000000"], 0xb8}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) perf_event_open(&(0x7f0000000000)={0x2, 0x3, 0x800000000000012, 0x1, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:56:07 executing program 1: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r3, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000200)='hsr0\x00') exit(0x0) r4 = fanotify_init(0x40, 0x2) r5 = open$dir(&(0x7f0000000080)='./file0\x00', 0x20881, 0x2) msgget$private(0x0, 0x2) fcntl$setsig(r5, 0xa, 0x7) fanotify_mark(r4, 0x8, 0x1, r5, &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r6, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") r7 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) poll(&(0x7f0000000280)=[{r7}], 0x1, 0x0) keyctl$join(0x1, &(0x7f00000000c0)={'syz', 0x1}) 03:56:07 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r2, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r3 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r3, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r4, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000200)='hsr0\x00') exit(0x0) r5 = fanotify_init(0x40, 0x2) r6 = open$dir(&(0x7f0000000080)='./file0\x00', 0x20881, 0x2) msgget$private(0x0, 0x2) fcntl$setsig(r6, 0xa, 0x7) fanotify_mark(r5, 0x8, 0x1, r6, &(0x7f0000000100)='./file0\x00') r7 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') r8 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r8, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") r9 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) poll(&(0x7f0000000280)=[{r9}], 0x1, 0x0) signalfd(r9, &(0x7f0000000540)={0x40000000000009}, 0xffffffffffffff67) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="2537110b9523145bf78fd24358fa4d58089f39722092414ea5e060e1858bdf6c2beefb55075fc790e1a9bc2d9b69717d20991016430e90c90d273b8a84210b61a8a2daf2089b1b9885990ad4fe2ee87a18", @ANYRES16=r7, @ANYBLOB="f0062bbd7000fddbdf25120100003400090008000100030000000800020004000000080002002d1e000008000200ffff0000080002e904000000080002000900000010000600080001000200000004000200480001002c00020008000300070000004800040002000000080001000600000008000300090000000800d1de1f0000000800030003000000100001003a73797a3200000000180007000c000300020000000000000008000200f70000008206000000"], 0xb8}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) perf_event_open(&(0x7f0000000000)={0x2, 0x3, 0x800000000000012, 0x1, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$join(0x1, &(0x7f00000000c0)={'syz', 0x1}) setsockopt$IP6T_SO_SET_REPLACE(r5, 0x29, 0x40, &(0x7f0000001000)=ANY=[@ANYRESDEC=r6, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYBLOB="0000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000090810a161e873bbe6d9a5042ae1507008b1d5564e825aad9f7fadf1686df5cccfb171f694009799bff176d2bc4c70c0966ebf415ec8d"], @ANYBLOB="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"], 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x2) openat(r6, &(0x7f00000002c0)='./file0\x00', 0x20001, 0x100) r10 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r10, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00\x02', &(0x7f0000000340)=ANY=[@ANYRES64=r1, @ANYRES32=r10, @ANYRESDEC, @ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRESOCT=r10]]}) 03:56:08 executing program 0: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r3, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000200)='hsr0\x00') exit(0x0) r4 = fanotify_init(0x40, 0x2) r5 = open$dir(&(0x7f0000000080)='./file0\x00', 0x20881, 0x2) msgget$private(0x0, 0x2) fcntl$setsig(r5, 0xa, 0x7) fanotify_mark(r4, 0x8, 0x1, r5, &(0x7f0000000100)='./file0\x00') r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') r7 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r7, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") r8 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) poll(&(0x7f0000000280)=[{r8}], 0x1, 0x0) signalfd(r8, &(0x7f0000000540)={0x40000000000009}, 0xffffffffffffff67) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="2537110b9523145bf78fd24358fa4d58089f39722092414ea5e060e1858bdf6c2beefb55075fc790e1a9bc2d9b69717d20991016430e90c90d273b8a84210b61a8a2daf2089b1b9885990ad4fe2ee87a18", @ANYRES16=r6, @ANYBLOB="f0062bbd7000fddbdf25120100003400090008000100030000000800020004000000080002002d1e000008000200ffff0000080002e904000000080002000900000010000600080001000200000004000200480001002c00020008000300070000004800040002000000080001000600000008000300090000000800d1de1f0000000800030003000000100001003a73797a3200000000180007000c000300020000000000000008000200f70000008206000000"], 0xb8}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) 03:56:08 executing program 1: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r3, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000200)='hsr0\x00') exit(0x0) r4 = fanotify_init(0x40, 0x2) r5 = open$dir(&(0x7f0000000080)='./file0\x00', 0x20881, 0x2) msgget$private(0x0, 0x2) fcntl$setsig(r5, 0xa, 0x7) fanotify_mark(r4, 0x8, 0x1, r5, &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r6, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) keyctl$join(0x1, &(0x7f00000000c0)={'syz', 0x1}) 03:56:08 executing program 4: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r3, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000200)='hsr0\x00') exit(0x0) r4 = fanotify_init(0x40, 0x2) r5 = open$dir(&(0x7f0000000080)='./file0\x00', 0x20881, 0x2) msgget$private(0x0, 0x2) fcntl$setsig(r5, 0xa, 0x7) fanotify_mark(r4, 0x8, 0x1, r5, &(0x7f0000000100)='./file0\x00') r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') r7 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r7, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") r8 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) poll(&(0x7f0000000280)=[{r8}], 0x1, 0x0) signalfd(r8, &(0x7f0000000540)={0x40000000000009}, 0xffffffffffffff67) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="2537110b9523145bf78fd24358fa4d58089f39722092414ea5e060e1858bdf6c2beefb55075fc790e1a9bc2d9b69717d20991016430e90c90d273b8a84210b61a8a2daf2089b1b9885990ad4fe2ee87a18", @ANYRES16=r6, @ANYBLOB="f0062bbd7000fddbdf25120100003400090008000100030000000800020004000000080002002d1e000008000200ffff0000080002e904000000080002000900000010000600080001000200000004000200480001002c00020008000300070000004800040002000000080001000600000008000300090000000800d1de1f0000000800030003000000100001003a73797a3200000000180007000c000300020000000000000008000200f70000008206000000"], 0xb8}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) perf_event_open(&(0x7f0000000000)={0x2, 0x3, 0x800000000000012, 0x1, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$join(0x1, &(0x7f00000000c0)={'syz', 0x1}) setsockopt$IP6T_SO_SET_REPLACE(r4, 0x29, 0x40, &(0x7f0000001000)=ANY=[@ANYRESDEC=r5, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYBLOB="0000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000090810a161e873bbe6d9a5042ae1507008b1d5564e825aad9f7fadf1686df5cccfb171f694009799bff176d2bc4c70c0966ebf415ec8d"], @ANYBLOB="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"], 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x2) openat(r5, &(0x7f00000002c0)='./file0\x00', 0x20001, 0x100) socket$inet_udp(0x2, 0x2, 0x0) 03:56:08 executing program 3: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r3, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000200)='hsr0\x00') exit(0x0) r4 = fanotify_init(0x40, 0x2) r5 = open$dir(&(0x7f0000000080)='./file0\x00', 0x20881, 0x2) msgget$private(0x0, 0x2) fcntl$setsig(r5, 0xa, 0x7) fanotify_mark(r4, 0x8, 0x1, r5, &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r6, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") r7 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) poll(&(0x7f0000000280)=[{r7}], 0x1, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x3, 0x800000000000012, 0x1, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:56:08 executing program 2: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r3, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000200)='hsr0\x00') exit(0x0) r4 = fanotify_init(0x40, 0x2) r5 = open$dir(&(0x7f0000000080)='./file0\x00', 0x20881, 0x2) msgget$private(0x0, 0x2) fcntl$setsig(r5, 0xa, 0x7) fanotify_mark(r4, 0x8, 0x1, r5, &(0x7f0000000100)='./file0\x00') r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') r7 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r7, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") r8 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) poll(&(0x7f0000000280)=[{r8}], 0x1, 0x0) signalfd(r8, &(0x7f0000000540)={0x40000000000009}, 0xffffffffffffff67) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="2537110b9523145bf78fd24358fa4d58089f39722092414ea5e060e1858bdf6c2beefb55075fc790e1a9bc2d9b69717d20991016430e90c90d273b8a84210b61a8a2daf2089b1b9885990ad4fe2ee87a18", @ANYRES16=r6, @ANYBLOB="f0062bbd7000fddbdf25120100003400090008000100030000000800020004000000080002002d1e000008000200ffff0000080002e904000000080002000900000010000600080001000200000004000200480001002c00020008000300070000004800040002000000080001000600000008000300090000000800d1de1f0000000800030003000000100001003a73797a3200000000180007000c000300020000000000000008000200f70000008206000000"], 0xb8}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) 03:56:09 executing program 0: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r3, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000200)='hsr0\x00') exit(0x0) r4 = fanotify_init(0x40, 0x2) r5 = open$dir(&(0x7f0000000080)='./file0\x00', 0x20881, 0x2) msgget$private(0x0, 0x2) fcntl$setsig(r5, 0xa, 0x7) fanotify_mark(r4, 0x8, 0x1, r5, &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r6, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") r7 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) poll(&(0x7f0000000280)=[{r7}], 0x1, 0x0) signalfd(r7, &(0x7f0000000540)={0x40000000000009}, 0xffffffffffffff67) 03:56:10 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:56:10 executing program 1: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r3, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000200)='hsr0\x00') exit(0x0) r4 = fanotify_init(0x40, 0x2) r5 = open$dir(&(0x7f0000000080)='./file0\x00', 0x20881, 0x2) msgget$private(0x0, 0x2) fcntl$setsig(r5, 0xa, 0x7) fanotify_mark(r4, 0x8, 0x1, r5, &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r6, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") keyctl$join(0x1, &(0x7f00000000c0)={'syz', 0x1}) 03:56:10 executing program 4: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r3, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000200)='hsr0\x00') exit(0x0) r4 = fanotify_init(0x40, 0x2) r5 = open$dir(&(0x7f0000000080)='./file0\x00', 0x20881, 0x2) msgget$private(0x0, 0x2) fcntl$setsig(r5, 0xa, 0x7) fanotify_mark(r4, 0x8, 0x1, r5, &(0x7f0000000100)='./file0\x00') r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') r7 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r7, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") r8 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) poll(&(0x7f0000000280)=[{r8}], 0x1, 0x0) signalfd(r8, &(0x7f0000000540)={0x40000000000009}, 0xffffffffffffff67) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="2537110b9523145bf78fd24358fa4d58089f39722092414ea5e060e1858bdf6c2beefb55075fc790e1a9bc2d9b69717d20991016430e90c90d273b8a84210b61a8a2daf2089b1b9885990ad4fe2ee87a18", @ANYRES16=r6, @ANYBLOB="f0062bbd7000fddbdf25120100003400090008000100030000000800020004000000080002002d1e000008000200ffff0000080002e904000000080002000900000010000600080001000200000004000200480001002c00020008000300070000004800040002000000080001000600000008000300090000000800d1de1f0000000800030003000000100001003a73797a3200000000180007000c000300020000000000000008000200f70000008206000000"], 0xb8}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) perf_event_open(&(0x7f0000000000)={0x2, 0x3, 0x800000000000012, 0x1, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$join(0x1, &(0x7f00000000c0)={'syz', 0x1}) setsockopt$IP6T_SO_SET_REPLACE(r4, 0x29, 0x40, &(0x7f0000001000)=ANY=[@ANYRESDEC=r5, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYBLOB="0000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000090810a161e873bbe6d9a5042ae1507008b1d5564e825aad9f7fadf1686df5cccfb171f694009799bff176d2bc4c70c0966ebf415ec8d"], @ANYBLOB="fe88000000000000000000000000010100000000000000000000000000000001000000ffff7fff00ffffffffffffff00ffffffffffffffff000000ff000000ff687773696d300000000000000000000067726574617030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff000008000000000000000000000000005e0ece0040000000000000000000000000000000c80000010000000000000000000000000000000000000000000000003800534554000000000000000000000000000000000000000000ff00000000034000030309000300070008ff7a030000060000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100138020000000000000000000000000000000000000000000000004800647374000000000000000000000000000000000000000000000000000000aea4af470101400002007e65040005000500010005007f0004000100050003007b409cbef2ea6552f200d0020400100028015345434d41524b0000000000000000000000000000000000000000000000010000000300000073797374656d5f753a6f626a6563745f723a646863705f73746174655f743a733000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fe800000000000000000000000000021fe8000000000000000000000000200bbffffffff00000000000000ff00000000ffffff00000000ff000000ff000000ff7465616d5f736c6176655f3000000000766c616e3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000330003f508000000000000000000000000000000c800f800000000000000000000000000000000000000000000000000300053455400000000000000002000000000000000000000000000000000000205000103e500640981000000060000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000fe43ef53f2da1f21f67933ae04add4d9d020e67533607059cade10d3ef7d51e3ac64197b1da5b0cb69865e44b89b932d4eb5d40111e8898b1b5637ddc94b0732a5785a5ca51222589eccaeabfe4a8529f82fe8f2f3054b5d66428fc34f90a999d430efdcb8"], 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x2) openat(r5, &(0x7f00000002c0)='./file0\x00', 0x20001, 0x100) 03:56:10 executing program 2: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r3, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000200)='hsr0\x00') exit(0x0) r4 = fanotify_init(0x40, 0x2) r5 = open$dir(&(0x7f0000000080)='./file0\x00', 0x20881, 0x2) msgget$private(0x0, 0x2) fcntl$setsig(r5, 0xa, 0x7) fanotify_mark(r4, 0x8, 0x1, r5, &(0x7f0000000100)='./file0\x00') r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') r7 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r7, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") r8 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) poll(&(0x7f0000000280)=[{r8}], 0x1, 0x0) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="2537110b9523145bf78fd24358fa4d58089f39722092414ea5e060e1858bdf6c2beefb55075fc790e1a9bc2d9b69717d20991016430e90c90d273b8a84210b61a8a2daf2089b1b9885990ad4fe2ee87a18", @ANYRES16=r6, @ANYBLOB="f0062bbd7000fddbdf25120100003400090008000100030000000800020004000000080002002d1e000008000200ffff0000080002e904000000080002000900000010000600080001000200000004000200480001002c00020008000300070000004800040002000000080001000600000008000300090000000800d1de1f0000000800030003000000100001003a73797a3200000000180007000c000300020000000000000008000200f70000008206000000"], 0xb8}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) 03:56:10 executing program 3: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r3, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000200)='hsr0\x00') exit(0x0) r4 = fanotify_init(0x40, 0x2) r5 = open$dir(&(0x7f0000000080)='./file0\x00', 0x20881, 0x2) msgget$private(0x0, 0x2) fcntl$setsig(r5, 0xa, 0x7) fanotify_mark(r4, 0x8, 0x1, r5, &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r6, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x3, 0x800000000000012, 0x1, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:56:10 executing program 0: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r3, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000200)='hsr0\x00') exit(0x0) r4 = fanotify_init(0x40, 0x2) r5 = open$dir(&(0x7f0000000080)='./file0\x00', 0x20881, 0x2) msgget$private(0x0, 0x2) fcntl$setsig(r5, 0xa, 0x7) fanotify_mark(r4, 0x8, 0x1, r5, &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r6, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") r7 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) signalfd(r7, &(0x7f0000000540)={0x40000000000009}, 0xffffffffffffff67) 03:56:11 executing program 0: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r3, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000200)='hsr0\x00') exit(0x0) r4 = fanotify_init(0x40, 0x2) r5 = open$dir(&(0x7f0000000080)='./file0\x00', 0x20881, 0x2) msgget$private(0x0, 0x2) fcntl$setsig(r5, 0xa, 0x7) fanotify_mark(r4, 0x8, 0x1, r5, &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r6, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") signalfd(0xffffffffffffffff, &(0x7f0000000540)={0x40000000000009}, 0xffffffffffffff67) 03:56:11 executing program 1: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r3, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000200)='hsr0\x00') exit(0x0) r4 = fanotify_init(0x40, 0x2) r5 = open$dir(&(0x7f0000000080)='./file0\x00', 0x20881, 0x2) msgget$private(0x0, 0x2) fcntl$setsig(r5, 0xa, 0x7) fanotify_mark(r4, 0x8, 0x1, r5, &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') socket$inet_udplite(0x2, 0x2, 0x88) keyctl$join(0x1, &(0x7f00000000c0)={'syz', 0x1}) 03:56:11 executing program 4: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r3, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000200)='hsr0\x00') exit(0x0) r4 = fanotify_init(0x40, 0x2) r5 = open$dir(&(0x7f0000000080)='./file0\x00', 0x20881, 0x2) msgget$private(0x0, 0x2) fcntl$setsig(r5, 0xa, 0x7) fanotify_mark(r4, 0x8, 0x1, r5, &(0x7f0000000100)='./file0\x00') r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') r7 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r7, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") r8 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) poll(&(0x7f0000000280)=[{r8}], 0x1, 0x0) signalfd(r8, &(0x7f0000000540)={0x40000000000009}, 0xffffffffffffff67) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="2537110b9523145bf78fd24358fa4d58089f39722092414ea5e060e1858bdf6c2beefb55075fc790e1a9bc2d9b69717d20991016430e90c90d273b8a84210b61a8a2daf2089b1b9885990ad4fe2ee87a18", @ANYRES16=r6, @ANYBLOB="f0062bbd7000fddbdf25120100003400090008000100030000000800020004000000080002002d1e000008000200ffff0000080002e904000000080002000900000010000600080001000200000004000200480001002c00020008000300070000004800040002000000080001000600000008000300090000000800d1de1f0000000800030003000000100001003a73797a3200000000180007000c000300020000000000000008000200f70000008206000000"], 0xb8}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) perf_event_open(&(0x7f0000000000)={0x2, 0x3, 0x800000000000012, 0x1, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$join(0x1, &(0x7f00000000c0)={'syz', 0x1}) setsockopt$IP6T_SO_SET_REPLACE(r4, 0x29, 0x40, &(0x7f0000001000)=ANY=[@ANYRESDEC=r5, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYBLOB="0000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000090810a161e873bbe6d9a5042ae1507008b1d5564e825aad9f7fadf1686df5cccfb171f694009799bff176d2bc4c70c0966ebf415ec8d"], @ANYBLOB="fe88000000000000000000000000010100000000000000000000000000000001000000ffff7fff00ffffffffffffff00ffffffffffffffff000000ff000000ff687773696d300000000000000000000067726574617030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff000008000000000000000000000000005e0ece0040000000000000000000000000000000c80000010000000000000000000000000000000000000000000000003800534554000000000000000000000000000000000000000000ff00000000034000030309000300070008ff7a030000060000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100138020000000000000000000000000000000000000000000000004800647374000000000000000000000000000000000000000000000000000000aea4af470101400002007e65040005000500010005007f0004000100050003007b409cbef2ea6552f200d0020400100028015345434d41524b0000000000000000000000000000000000000000000000010000000300000073797374656d5f753a6f626a6563745f723a646863705f73746174655f743a733000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fe800000000000000000000000000021fe8000000000000000000000000200bbffffffff00000000000000ff00000000ffffff00000000ff000000ff000000ff7465616d5f736c6176655f3000000000766c616e3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000330003f508000000000000000000000000000000c800f800000000000000000000000000000000000000000000000000300053455400000000000000002000000000000000000000000000000000000205000103e500640981000000060000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000fe43ef53f2da1f21f67933ae04add4d9d020e67533607059cade10d3ef7d51e3ac64197b1da5b0cb69865e44b89b932d4eb5d40111e8898b1b5637ddc94b0732a5785a5ca51222589eccaeabfe4a8529f82fe8f2f3054b5d66428fc34f90a999d430efdcb8"], 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x2) 03:56:11 executing program 3: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r3, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000200)='hsr0\x00') exit(0x0) r4 = fanotify_init(0x40, 0x2) r5 = open$dir(&(0x7f0000000080)='./file0\x00', 0x20881, 0x2) msgget$private(0x0, 0x2) fcntl$setsig(r5, 0xa, 0x7) fanotify_mark(r4, 0x8, 0x1, r5, &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r6, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") perf_event_open(&(0x7f0000000000)={0x2, 0x3, 0x800000000000012, 0x1, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:56:11 executing program 2: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r3, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000200)='hsr0\x00') exit(0x0) r4 = fanotify_init(0x40, 0x2) r5 = open$dir(&(0x7f0000000080)='./file0\x00', 0x20881, 0x2) msgget$private(0x0, 0x2) fcntl$setsig(r5, 0xa, 0x7) fanotify_mark(r4, 0x8, 0x1, r5, &(0x7f0000000100)='./file0\x00') r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') r7 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r7, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="2537110b9523145bf78fd24358fa4d58089f39722092414ea5e060e1858bdf6c2beefb55075fc790e1a9bc2d9b69717d20991016430e90c90d273b8a84210b61a8a2daf2089b1b9885990ad4fe2ee87a18", @ANYRES16=r6, @ANYBLOB="f0062bbd7000fddbdf25120100003400090008000100030000000800020004000000080002002d1e000008000200ffff0000080002e904000000080002000900000010000600080001000200000004000200480001002c00020008000300070000004800040002000000080001000600000008000300090000000800d1de1f0000000800030003000000100001003a73797a3200000000180007000c000300020000000000000008000200f70000008206000000"], 0xb8}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) 03:56:12 executing program 1: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r3, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000200)='hsr0\x00') exit(0x0) r4 = fanotify_init(0x40, 0x2) r5 = open$dir(&(0x7f0000000080)='./file0\x00', 0x20881, 0x2) msgget$private(0x0, 0x2) fcntl$setsig(r5, 0xa, 0x7) fanotify_mark(r4, 0x8, 0x1, r5, &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') socket$inet_udplite(0x2, 0x2, 0x88) keyctl$join(0x1, &(0x7f00000000c0)={'syz', 0x1}) 03:56:13 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:56:13 executing program 0: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r3, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000200)='hsr0\x00') exit(0x0) r4 = fanotify_init(0x40, 0x2) r5 = open$dir(&(0x7f0000000080)='./file0\x00', 0x20881, 0x2) msgget$private(0x0, 0x2) fcntl$setsig(r5, 0xa, 0x7) fanotify_mark(r4, 0x8, 0x1, r5, &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') socket$inet_udplite(0x2, 0x2, 0x88) signalfd(0xffffffffffffffff, &(0x7f0000000540)={0x40000000000009}, 0xffffffffffffff67) 03:56:13 executing program 4: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r3, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000200)='hsr0\x00') exit(0x0) r4 = fanotify_init(0x40, 0x2) r5 = open$dir(&(0x7f0000000080)='./file0\x00', 0x20881, 0x2) msgget$private(0x0, 0x2) fcntl$setsig(r5, 0xa, 0x7) fanotify_mark(r4, 0x8, 0x1, r5, &(0x7f0000000100)='./file0\x00') r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') r7 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r7, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") r8 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) poll(&(0x7f0000000280)=[{r8}], 0x1, 0x0) signalfd(r8, &(0x7f0000000540)={0x40000000000009}, 0xffffffffffffff67) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="2537110b9523145bf78fd24358fa4d58089f39722092414ea5e060e1858bdf6c2beefb55075fc790e1a9bc2d9b69717d20991016430e90c90d273b8a84210b61a8a2daf2089b1b9885990ad4fe2ee87a18", @ANYRES16=r6, @ANYBLOB="f0062bbd7000fddbdf25120100003400090008000100030000000800020004000000080002002d1e000008000200ffff0000080002e904000000080002000900000010000600080001000200000004000200480001002c00020008000300070000004800040002000000080001000600000008000300090000000800d1de1f0000000800030003000000100001003a73797a3200000000180007000c000300020000000000000008000200f70000008206000000"], 0xb8}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) perf_event_open(&(0x7f0000000000)={0x2, 0x3, 0x800000000000012, 0x1, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$join(0x1, &(0x7f00000000c0)={'syz', 0x1}) setsockopt$IP6T_SO_SET_REPLACE(r4, 0x29, 0x40, &(0x7f0000001000)=ANY=[@ANYRESDEC=r5, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYBLOB="0000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000090810a161e873bbe6d9a5042ae1507008b1d5564e825aad9f7fadf1686df5cccfb171f694009799bff176d2bc4c70c0966ebf415ec8d"], @ANYBLOB="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"], 0x3) 03:56:13 executing program 3: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r3, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000200)='hsr0\x00') exit(0x0) r4 = fanotify_init(0x40, 0x2) r5 = open$dir(&(0x7f0000000080)='./file0\x00', 0x20881, 0x2) msgget$private(0x0, 0x2) fcntl$setsig(r5, 0xa, 0x7) fanotify_mark(r4, 0x8, 0x1, r5, &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f0000000000)={0x2, 0x3, 0x800000000000012, 0x1, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:56:13 executing program 2: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r3, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000200)='hsr0\x00') exit(0x0) r4 = fanotify_init(0x40, 0x2) r5 = open$dir(&(0x7f0000000080)='./file0\x00', 0x20881, 0x2) msgget$private(0x0, 0x2) fcntl$setsig(r5, 0xa, 0x7) fanotify_mark(r4, 0x8, 0x1, r5, &(0x7f0000000100)='./file0\x00') r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') r7 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r7, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="2537110b9523145bf78fd24358fa4d58089f39722092414ea5e060e1858bdf6c2beefb55075fc790e1a9bc2d9b69717d20991016430e90c90d273b8a84210b61a8a2daf2089b1b9885990ad4fe2ee87a18", @ANYRES16=r6, @ANYBLOB="f0062bbd7000fddbdf25120100003400090008000100030000000800020004000000080002002d1e000008000200ffff0000080002e904000000080002000900000010000600080001000200000004000200480001002c00020008000300070000004800040002000000080001000600000008000300090000000800d1de1f0000000800030003000000100001003a73797a3200000000180007000c000300020000000000000008000200f70000008206000000"], 0xb8}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) 03:56:13 executing program 1: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r3, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000200)='hsr0\x00') exit(0x0) r4 = fanotify_init(0x40, 0x2) r5 = open$dir(&(0x7f0000000080)='./file0\x00', 0x20881, 0x2) msgget$private(0x0, 0x2) fcntl$setsig(r5, 0xa, 0x7) fanotify_mark(r4, 0x8, 0x1, r5, &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') socket$inet_udplite(0x2, 0x2, 0x88) keyctl$join(0x1, &(0x7f00000000c0)={'syz', 0x1}) 03:56:14 executing program 4: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r3, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000200)='hsr0\x00') exit(0x0) r4 = fanotify_init(0x40, 0x2) r5 = open$dir(&(0x7f0000000080)='./file0\x00', 0x20881, 0x2) msgget$private(0x0, 0x2) fcntl$setsig(r5, 0xa, 0x7) fanotify_mark(r4, 0x8, 0x1, r5, &(0x7f0000000100)='./file0\x00') r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') r7 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r7, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") r8 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) poll(&(0x7f0000000280)=[{r8}], 0x1, 0x0) signalfd(r8, &(0x7f0000000540)={0x40000000000009}, 0xffffffffffffff67) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="2537110b9523145bf78fd24358fa4d58089f39722092414ea5e060e1858bdf6c2beefb55075fc790e1a9bc2d9b69717d20991016430e90c90d273b8a84210b61a8a2daf2089b1b9885990ad4fe2ee87a18", @ANYRES16=r6, @ANYBLOB="f0062bbd7000fddbdf25120100003400090008000100030000000800020004000000080002002d1e000008000200ffff0000080002e904000000080002000900000010000600080001000200000004000200480001002c00020008000300070000004800040002000000080001000600000008000300090000000800d1de1f0000000800030003000000100001003a73797a3200000000180007000c000300020000000000000008000200f70000008206000000"], 0xb8}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) perf_event_open(&(0x7f0000000000)={0x2, 0x3, 0x800000000000012, 0x1, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$join(0x1, &(0x7f00000000c0)={'syz', 0x1}) 03:56:14 executing program 2: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r3, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000200)='hsr0\x00') exit(0x0) r4 = fanotify_init(0x40, 0x2) r5 = open$dir(&(0x7f0000000080)='./file0\x00', 0x20881, 0x2) msgget$private(0x0, 0x2) fcntl$setsig(r5, 0xa, 0x7) fanotify_mark(r4, 0x8, 0x1, r5, &(0x7f0000000100)='./file0\x00') r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="2537110b9523145bf78fd24358fa4d58089f39722092414ea5e060e1858bdf6c2beefb55075fc790e1a9bc2d9b69717d20991016430e90c90d273b8a84210b61a8a2daf2089b1b9885990ad4fe2ee87a18", @ANYRES16=r6, @ANYBLOB="f0062bbd7000fddbdf25120100003400090008000100030000000800020004000000080002002d1e000008000200ffff0000080002e904000000080002000900000010000600080001000200000004000200480001002c00020008000300070000004800040002000000080001000600000008000300090000000800d1de1f0000000800030003000000100001003a73797a3200000000180007000c000300020000000000000008000200f70000008206000000"], 0xb8}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) 03:56:14 executing program 1: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r3, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000200)='hsr0\x00') exit(0x0) r4 = fanotify_init(0x40, 0x2) r5 = open$dir(&(0x7f0000000080)='./file0\x00', 0x20881, 0x2) msgget$private(0x0, 0x2) fcntl$setsig(r5, 0xa, 0x7) fanotify_mark(r4, 0x8, 0x1, r5, &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") keyctl$join(0x1, &(0x7f00000000c0)={'syz', 0x1}) 03:56:14 executing program 0: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r3, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000200)='hsr0\x00') exit(0x0) r4 = fanotify_init(0x40, 0x2) r5 = open$dir(&(0x7f0000000080)='./file0\x00', 0x20881, 0x2) msgget$private(0x0, 0x2) fcntl$setsig(r5, 0xa, 0x7) fanotify_mark(r4, 0x8, 0x1, r5, &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') socket$inet_udplite(0x2, 0x2, 0x88) signalfd(0xffffffffffffffff, &(0x7f0000000540)={0x40000000000009}, 0xffffffffffffff67) 03:56:14 executing program 3: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r3, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000200)='hsr0\x00') exit(0x0) r4 = fanotify_init(0x40, 0x2) r5 = open$dir(&(0x7f0000000080)='./file0\x00', 0x20881, 0x2) msgget$private(0x0, 0x2) fcntl$setsig(r5, 0xa, 0x7) fanotify_mark(r4, 0x8, 0x1, r5, &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f0000000000)={0x2, 0x3, 0x800000000000012, 0x1, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:56:15 executing program 4: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r3, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000200)='hsr0\x00') exit(0x0) r4 = fanotify_init(0x40, 0x2) r5 = open$dir(&(0x7f0000000080)='./file0\x00', 0x20881, 0x2) msgget$private(0x0, 0x2) fcntl$setsig(r5, 0xa, 0x7) fanotify_mark(r4, 0x8, 0x1, r5, &(0x7f0000000100)='./file0\x00') r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') r7 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r7, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") r8 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) poll(&(0x7f0000000280)=[{r8}], 0x1, 0x0) signalfd(r8, &(0x7f0000000540)={0x40000000000009}, 0xffffffffffffff67) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="2537110b9523145bf78fd24358fa4d58089f39722092414ea5e060e1858bdf6c2beefb55075fc790e1a9bc2d9b69717d20991016430e90c90d273b8a84210b61a8a2daf2089b1b9885990ad4fe2ee87a18", @ANYRES16=r6, @ANYBLOB="f0062bbd7000fddbdf25120100003400090008000100030000000800020004000000080002002d1e000008000200ffff0000080002e904000000080002000900000010000600080001000200000004000200480001002c00020008000300070000004800040002000000080001000600000008000300090000000800d1de1f0000000800030003000000100001003a73797a3200000000180007000c000300020000000000000008000200f70000008206000000"], 0xb8}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) perf_event_open(&(0x7f0000000000)={0x2, 0x3, 0x800000000000012, 0x1, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:56:16 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:56:16 executing program 1: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r3, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000200)='hsr0\x00') exit(0x0) r4 = fanotify_init(0x40, 0x2) r5 = open$dir(&(0x7f0000000080)='./file0\x00', 0x20881, 0x2) msgget$private(0x0, 0x2) fcntl$setsig(r5, 0xa, 0x7) fanotify_mark(r4, 0x8, 0x1, r5, &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") keyctl$join(0x1, &(0x7f00000000c0)={'syz', 0x1}) 03:56:16 executing program 3: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r3, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000200)='hsr0\x00') exit(0x0) r4 = fanotify_init(0x40, 0x2) r5 = open$dir(&(0x7f0000000080)='./file0\x00', 0x20881, 0x2) msgget$private(0x0, 0x2) fcntl$setsig(r5, 0xa, 0x7) fanotify_mark(r4, 0x8, 0x1, r5, &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f0000000000)={0x2, 0x3, 0x800000000000012, 0x1, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:56:16 executing program 0: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r3, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000200)='hsr0\x00') exit(0x0) r4 = fanotify_init(0x40, 0x2) r5 = open$dir(&(0x7f0000000080)='./file0\x00', 0x20881, 0x2) msgget$private(0x0, 0x2) fcntl$setsig(r5, 0xa, 0x7) fanotify_mark(r4, 0x8, 0x1, r5, &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') socket$inet_udplite(0x2, 0x2, 0x88) signalfd(0xffffffffffffffff, &(0x7f0000000540)={0x40000000000009}, 0xffffffffffffff67) 03:56:16 executing program 2: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r3, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000200)='hsr0\x00') exit(0x0) r4 = fanotify_init(0x40, 0x2) r5 = open$dir(&(0x7f0000000080)='./file0\x00', 0x20881, 0x2) msgget$private(0x0, 0x2) fcntl$setsig(r5, 0xa, 0x7) fanotify_mark(r4, 0x8, 0x1, r5, &(0x7f0000000100)='./file0\x00') r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="2537110b9523145bf78fd24358fa4d58089f39722092414ea5e060e1858bdf6c2beefb55075fc790e1a9bc2d9b69717d20991016430e90c90d273b8a84210b61a8a2daf2089b1b9885990ad4fe2ee87a18", @ANYRES16=r6, @ANYBLOB="f0062bbd7000fddbdf25120100003400090008000100030000000800020004000000080002002d1e000008000200ffff0000080002e904000000080002000900000010000600080001000200000004000200480001002c00020008000300070000004800040002000000080001000600000008000300090000000800d1de1f0000000800030003000000100001003a73797a3200000000180007000c000300020000000000000008000200f70000008206000000"], 0xb8}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) 03:56:16 executing program 4: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r3, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000200)='hsr0\x00') exit(0x0) r4 = fanotify_init(0x40, 0x2) r5 = open$dir(&(0x7f0000000080)='./file0\x00', 0x20881, 0x2) msgget$private(0x0, 0x2) fcntl$setsig(r5, 0xa, 0x7) fanotify_mark(r4, 0x8, 0x1, r5, &(0x7f0000000100)='./file0\x00') r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') r7 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r7, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") r8 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) poll(&(0x7f0000000280)=[{r8}], 0x1, 0x0) signalfd(r8, &(0x7f0000000540)={0x40000000000009}, 0xffffffffffffff67) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="2537110b9523145bf78fd24358fa4d58089f39722092414ea5e060e1858bdf6c2beefb55075fc790e1a9bc2d9b69717d20991016430e90c90d273b8a84210b61a8a2daf2089b1b9885990ad4fe2ee87a18", @ANYRES16=r6, @ANYBLOB="f0062bbd7000fddbdf25120100003400090008000100030000000800020004000000080002002d1e000008000200ffff0000080002e904000000080002000900000010000600080001000200000004000200480001002c00020008000300070000004800040002000000080001000600000008000300090000000800d1de1f0000000800030003000000100001003a73797a3200000000180007000c000300020000000000000008000200f70000008206000000"], 0xb8}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) 03:56:17 executing program 3: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r3, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000200)='hsr0\x00') exit(0x0) r4 = fanotify_init(0x40, 0x2) r5 = open$dir(&(0x7f0000000080)='./file0\x00', 0x20881, 0x2) msgget$private(0x0, 0x2) fcntl$setsig(r5, 0xa, 0x7) fanotify_mark(r4, 0x8, 0x1, r5, &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") perf_event_open(&(0x7f0000000000)={0x2, 0x3, 0x800000000000012, 0x1, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:56:17 executing program 0: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r3, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000200)='hsr0\x00') exit(0x0) r4 = fanotify_init(0x40, 0x2) r5 = open$dir(&(0x7f0000000080)='./file0\x00', 0x20881, 0x2) msgget$private(0x0, 0x2) fcntl$setsig(r5, 0xa, 0x7) fanotify_mark(r4, 0x8, 0x1, r5, &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") signalfd(0xffffffffffffffff, &(0x7f0000000540)={0x40000000000009}, 0xffffffffffffff67) 03:56:17 executing program 2: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r3, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000200)='hsr0\x00') exit(0x0) r4 = fanotify_init(0x40, 0x2) r5 = open$dir(&(0x7f0000000080)='./file0\x00', 0x20881, 0x2) msgget$private(0x0, 0x2) fcntl$setsig(r5, 0xa, 0x7) fanotify_mark(r4, 0x8, 0x1, r5, &(0x7f0000000100)='./file0\x00') r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="2537110b9523145bf78fd24358fa4d58089f39722092414ea5e060e1858bdf6c2beefb55075fc790e1a9bc2d9b69717d20991016430e90c90d273b8a84210b61a8a2daf2089b1b9885990ad4fe2ee87a18", @ANYRES16=r6, @ANYBLOB="f0062bbd7000fddbdf25120100003400090008000100030000000800020004000000080002002d1e000008000200ffff0000080002e904000000080002000900000010000600080001000200000004000200480001002c00020008000300070000004800040002000000080001000600000008000300090000000800d1de1f0000000800030003000000100001003a73797a3200000000180007000c000300020000000000000008000200f70000008206000000"], 0xb8}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) 03:56:17 executing program 4: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r3, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000200)='hsr0\x00') exit(0x0) r4 = fanotify_init(0x40, 0x2) r5 = open$dir(&(0x7f0000000080)='./file0\x00', 0x20881, 0x2) msgget$private(0x0, 0x2) fcntl$setsig(r5, 0xa, 0x7) fanotify_mark(r4, 0x8, 0x1, r5, &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r6, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") r7 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) poll(&(0x7f0000000280)=[{r7}], 0x1, 0x0) signalfd(r7, &(0x7f0000000540)={0x40000000000009}, 0xffffffffffffff67) 03:56:17 executing program 1: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r3, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000200)='hsr0\x00') exit(0x0) r4 = fanotify_init(0x40, 0x2) r5 = open$dir(&(0x7f0000000080)='./file0\x00', 0x20881, 0x2) msgget$private(0x0, 0x2) fcntl$setsig(r5, 0xa, 0x7) fanotify_mark(r4, 0x8, 0x1, r5, &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") keyctl$join(0x1, &(0x7f00000000c0)={'syz', 0x1}) 03:56:18 executing program 3: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r3, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000200)='hsr0\x00') exit(0x0) r4 = fanotify_init(0x40, 0x2) r5 = open$dir(&(0x7f0000000080)='./file0\x00', 0x20881, 0x2) msgget$private(0x0, 0x2) fcntl$setsig(r5, 0xa, 0x7) fanotify_mark(r4, 0x8, 0x1, r5, &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") perf_event_open(&(0x7f0000000000)={0x2, 0x3, 0x800000000000012, 0x1, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:56:19 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:56:19 executing program 2: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r3, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000200)='hsr0\x00') exit(0x0) r4 = fanotify_init(0x40, 0x2) r5 = open$dir(&(0x7f0000000080)='./file0\x00', 0x20881, 0x2) msgget$private(0x0, 0x2) fcntl$setsig(r5, 0xa, 0x7) fanotify_mark(r4, 0x8, 0x1, r5, &(0x7f0000000100)='./file0\x00') r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="2537110b9523145bf78fd24358fa4d58089f39722092414ea5e060e1858bdf6c2beefb55075fc790e1a9bc2d9b69717d20991016430e90c90d273b8a84210b61a8a2daf2089b1b9885990ad4fe2ee87a18", @ANYRES16=r6, @ANYBLOB="f0062bbd7000fddbdf25120100003400090008000100030000000800020004000000080002002d1e000008000200ffff0000080002e904000000080002000900000010000600080001000200000004000200480001002c00020008000300070000004800040002000000080001000600000008000300090000000800d1de1f0000000800030003000000100001003a73797a3200000000180007000c000300020000000000000008000200f70000008206000000"], 0xb8}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) 03:56:19 executing program 0: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r3, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000200)='hsr0\x00') exit(0x0) r4 = fanotify_init(0x40, 0x2) r5 = open$dir(&(0x7f0000000080)='./file0\x00', 0x20881, 0x2) msgget$private(0x0, 0x2) fcntl$setsig(r5, 0xa, 0x7) fanotify_mark(r4, 0x8, 0x1, r5, &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") signalfd(0xffffffffffffffff, &(0x7f0000000540)={0x40000000000009}, 0xffffffffffffff67) 03:56:19 executing program 1: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r3, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000200)='hsr0\x00') exit(0x0) r4 = fanotify_init(0x40, 0x2) r5 = open$dir(&(0x7f0000000080)='./file0\x00', 0x20881, 0x2) msgget$private(0x0, 0x2) fcntl$setsig(r5, 0xa, 0x7) fanotify_mark(r4, 0x8, 0x1, r5, &(0x7f0000000100)='./file0\x00') r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r6, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") keyctl$join(0x1, &(0x7f00000000c0)={'syz', 0x1}) 03:56:19 executing program 4: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r3, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000200)='hsr0\x00') exit(0x0) r4 = fanotify_init(0x40, 0x2) r5 = open$dir(&(0x7f0000000080)='./file0\x00', 0x20881, 0x2) msgget$private(0x0, 0x2) fcntl$setsig(r5, 0xa, 0x7) fanotify_mark(r4, 0x8, 0x1, r5, &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r6, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") r7 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) poll(&(0x7f0000000280)=[{r7}], 0x1, 0x0) 03:56:19 executing program 3: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r3, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000200)='hsr0\x00') exit(0x0) r4 = fanotify_init(0x40, 0x2) r5 = open$dir(&(0x7f0000000080)='./file0\x00', 0x20881, 0x2) msgget$private(0x0, 0x2) fcntl$setsig(r5, 0xa, 0x7) fanotify_mark(r4, 0x8, 0x1, r5, &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") perf_event_open(&(0x7f0000000000)={0x2, 0x3, 0x800000000000012, 0x1, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:56:20 executing program 2: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r3, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000200)='hsr0\x00') exit(0x0) r4 = fanotify_init(0x40, 0x2) r5 = open$dir(&(0x7f0000000080)='./file0\x00', 0x20881, 0x2) msgget$private(0x0, 0x2) fcntl$setsig(r5, 0xa, 0x7) fanotify_mark(r4, 0x8, 0x1, r5, &(0x7f0000000100)='./file0\x00') r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="2537110b9523145bf78fd24358fa4d58089f39722092414ea5e060e1858bdf6c2beefb55075fc790e1a9bc2d9b69717d20991016430e90c90d273b8a84210b61a8a2daf2089b1b9885990ad4fe2ee87a18", @ANYRES16=r6, @ANYBLOB="f0062bbd7000fddbdf25120100003400090008000100030000000800020004000000080002002d1e000008000200ffff0000080002e904000000080002000900000010000600080001000200000004000200480001002c00020008000300070000004800040002000000080001000600000008000300090000000800d1de1f0000000800030003000000100001003a73797a3200000000180007000c000300020000000000000008000200f70000008206000000"], 0xb8}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) 03:56:20 executing program 4: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r3, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000200)='hsr0\x00') exit(0x0) r4 = fanotify_init(0x40, 0x2) r5 = open$dir(&(0x7f0000000080)='./file0\x00', 0x20881, 0x2) msgget$private(0x0, 0x2) fcntl$setsig(r5, 0xa, 0x7) fanotify_mark(r4, 0x8, 0x1, r5, &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r6, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) 03:56:20 executing program 1: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r3, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000200)='hsr0\x00') exit(0x0) fanotify_init(0x40, 0x2) r4 = open$dir(&(0x7f0000000080)='./file0\x00', 0x20881, 0x2) msgget$private(0x0, 0x2) fcntl$setsig(r4, 0xa, 0x7) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") keyctl$join(0x1, &(0x7f00000000c0)={'syz', 0x1}) 03:56:20 executing program 0: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r3, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000200)='hsr0\x00') exit(0x0) r4 = fanotify_init(0x40, 0x2) r5 = open$dir(&(0x7f0000000080)='./file0\x00', 0x20881, 0x2) msgget$private(0x0, 0x2) fcntl$setsig(r5, 0xa, 0x7) fanotify_mark(r4, 0x8, 0x1, r5, &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") signalfd(0xffffffffffffffff, &(0x7f0000000540)={0x40000000000009}, 0xffffffffffffff67) 03:56:20 executing program 3: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r3, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000200)='hsr0\x00') exit(0x0) r4 = fanotify_init(0x40, 0x2) r5 = open$dir(&(0x7f0000000080)='./file0\x00', 0x20881, 0x2) msgget$private(0x0, 0x2) fcntl$setsig(r5, 0xa, 0x7) fanotify_mark(r4, 0x8, 0x1, r5, &(0x7f0000000100)='./file0\x00') r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r6, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") perf_event_open(&(0x7f0000000000)={0x2, 0x3, 0x800000000000012, 0x1, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:56:21 executing program 2: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r3, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000200)='hsr0\x00') exit(0x0) r4 = fanotify_init(0x40, 0x2) r5 = open$dir(&(0x7f0000000080)='./file0\x00', 0x20881, 0x2) msgget$private(0x0, 0x2) fcntl$setsig(r5, 0xa, 0x7) fanotify_mark(r4, 0x8, 0x1, r5, &(0x7f0000000100)='./file0\x00') r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="2537110b9523145bf78fd24358fa4d58089f39722092414ea5e060e1858bdf6c2beefb55075fc790e1a9bc2d9b69717d20991016430e90c90d273b8a84210b61a8a2daf2089b1b9885990ad4fe2ee87a18", @ANYRES16=r6, @ANYBLOB="f0062bbd7000fddbdf25120100003400090008000100030000000800020004000000080002002d1e000008000200ffff0000080002e904000000080002000900000010000600080001000200000004000200480001002c00020008000300070000004800040002000000080001000600000008000300090000000800d1de1f0000000800030003000000100001003a73797a3200000000180007000c000300020000000000000008000200f70000008206000000"], 0xb8}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) 03:56:22 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:56:22 executing program 0: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r3, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000200)='hsr0\x00') exit(0x0) r4 = fanotify_init(0x40, 0x2) r5 = open$dir(&(0x7f0000000080)='./file0\x00', 0x20881, 0x2) msgget$private(0x0, 0x2) fcntl$setsig(r5, 0xa, 0x7) fanotify_mark(r4, 0x8, 0x1, r5, &(0x7f0000000100)='./file0\x00') r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r6, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") signalfd(0xffffffffffffffff, &(0x7f0000000540)={0x40000000000009}, 0xffffffffffffff67) 03:56:22 executing program 4: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r3, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000200)='hsr0\x00') exit(0x0) r4 = fanotify_init(0x40, 0x2) r5 = open$dir(&(0x7f0000000080)='./file0\x00', 0x20881, 0x2) msgget$private(0x0, 0x2) fcntl$setsig(r5, 0xa, 0x7) fanotify_mark(r4, 0x8, 0x1, r5, &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r6, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") 03:56:22 executing program 3: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r3, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000200)='hsr0\x00') exit(0x0) fanotify_init(0x40, 0x2) r4 = open$dir(&(0x7f0000000080)='./file0\x00', 0x20881, 0x2) msgget$private(0x0, 0x2) fcntl$setsig(r4, 0xa, 0x7) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") perf_event_open(&(0x7f0000000000)={0x2, 0x3, 0x800000000000012, 0x1, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:56:22 executing program 1: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r3, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000200)='hsr0\x00') exit(0x0) fanotify_init(0x40, 0x2) open$dir(&(0x7f0000000080)='./file0\x00', 0x20881, 0x2) msgget$private(0x0, 0x2) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") keyctl$join(0x1, &(0x7f00000000c0)={'syz', 0x1}) 03:56:22 executing program 2: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r3, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000200)='hsr0\x00') exit(0x0) r4 = fanotify_init(0x40, 0x2) r5 = open$dir(&(0x7f0000000080)='./file0\x00', 0x20881, 0x2) msgget$private(0x0, 0x2) fcntl$setsig(r5, 0xa, 0x7) fanotify_mark(r4, 0x8, 0x1, r5, &(0x7f0000000100)='./file0\x00') r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r6, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="2537110b9523145bf78fd24358fa4d58089f39722092414ea5e060e1858bdf6c2beefb55075fc790e1a9bc2d9b69717d20991016430e90c90d273b8a84210b61a8a2daf2089b1b9885990ad4fe2ee87a18", @ANYRES16, @ANYBLOB="f0062bbd7000fddbdf25120100003400090008000100030000000800020004000000080002002d1e000008000200ffff0000080002e904000000080002000900000010000600080001000200000004000200480001002c00020008000300070000004800040002000000080001000600000008000300090000000800d1de1f0000000800030003000000100001003a73797a3200000000180007000c000300020000000000000008000200f70000008206000000"], 0xb8}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) 03:56:23 executing program 1: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r3, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000200)='hsr0\x00') exit(0x0) fanotify_init(0x40, 0x2) open$dir(&(0x7f0000000080)='./file0\x00', 0x20881, 0x2) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") keyctl$join(0x1, &(0x7f00000000c0)={'syz', 0x1}) 03:56:23 executing program 3: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r3, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000200)='hsr0\x00') exit(0x0) fanotify_init(0x40, 0x2) open$dir(&(0x7f0000000080)='./file0\x00', 0x20881, 0x2) msgget$private(0x0, 0x2) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") perf_event_open(&(0x7f0000000000)={0x2, 0x3, 0x800000000000012, 0x1, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:56:23 executing program 4: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r3, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000200)='hsr0\x00') exit(0x0) r4 = fanotify_init(0x40, 0x2) r5 = open$dir(&(0x7f0000000080)='./file0\x00', 0x20881, 0x2) msgget$private(0x0, 0x2) fcntl$setsig(r5, 0xa, 0x7) fanotify_mark(r4, 0x8, 0x1, r5, &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') socket$inet_udplite(0x2, 0x2, 0x88) 03:56:23 executing program 2: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r3, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000200)='hsr0\x00') exit(0x0) fanotify_init(0x40, 0x2) r4 = open$dir(&(0x7f0000000080)='./file0\x00', 0x20881, 0x2) msgget$private(0x0, 0x2) fcntl$setsig(r4, 0xa, 0x7) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="2537110b9523145bf78fd24358fa4d58089f39722092414ea5e060e1858bdf6c2beefb55075fc790e1a9bc2d9b69717d20991016430e90c90d273b8a84210b61a8a2daf2089b1b9885990ad4fe2ee87a18", @ANYRES16, @ANYBLOB="f0062bbd7000fddbdf25120100003400090008000100030000000800020004000000080002002d1e000008000200ffff0000080002e904000000080002000900000010000600080001000200000004000200480001002c00020008000300070000004800040002000000080001000600000008000300090000000800d1de1f0000000800030003000000100001003a73797a3200000000180007000c000300020000000000000008000200f70000008206000000"], 0xb8}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) 03:56:23 executing program 0: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r3, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000200)='hsr0\x00') exit(0x0) fanotify_init(0x40, 0x2) r4 = open$dir(&(0x7f0000000080)='./file0\x00', 0x20881, 0x2) msgget$private(0x0, 0x2) fcntl$setsig(r4, 0xa, 0x7) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") signalfd(0xffffffffffffffff, &(0x7f0000000540)={0x40000000000009}, 0xffffffffffffff67) 03:56:24 executing program 1: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r3, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000200)='hsr0\x00') exit(0x0) fanotify_init(0x40, 0x2) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") keyctl$join(0x1, &(0x7f00000000c0)={'syz', 0x1}) 03:56:25 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:56:25 executing program 0: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r3, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000200)='hsr0\x00') exit(0x0) fanotify_init(0x40, 0x2) open$dir(&(0x7f0000000080)='./file0\x00', 0x20881, 0x2) msgget$private(0x0, 0x2) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") signalfd(0xffffffffffffffff, &(0x7f0000000540)={0x40000000000009}, 0xffffffffffffff67) 03:56:25 executing program 4: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r3, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000200)='hsr0\x00') exit(0x0) r4 = fanotify_init(0x40, 0x2) r5 = open$dir(&(0x7f0000000080)='./file0\x00', 0x20881, 0x2) msgget$private(0x0, 0x2) fcntl$setsig(r5, 0xa, 0x7) fanotify_mark(r4, 0x8, 0x1, r5, &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') 03:56:25 executing program 3: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r3, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000200)='hsr0\x00') exit(0x0) fanotify_init(0x40, 0x2) open$dir(&(0x7f0000000080)='./file0\x00', 0x20881, 0x2) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") perf_event_open(&(0x7f0000000000)={0x2, 0x3, 0x800000000000012, 0x1, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:56:25 executing program 2: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r3, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000200)='hsr0\x00') exit(0x0) fanotify_init(0x40, 0x2) open$dir(&(0x7f0000000080)='./file0\x00', 0x20881, 0x2) msgget$private(0x0, 0x2) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="2537110b9523145bf78fd24358fa4d58089f39722092414ea5e060e1858bdf6c2beefb55075fc790e1a9bc2d9b69717d20991016430e90c90d273b8a84210b61a8a2daf2089b1b9885990ad4fe2ee87a18", @ANYRES16, @ANYBLOB="f0062bbd7000fddbdf25120100003400090008000100030000000800020004000000080002002d1e000008000200ffff0000080002e904000000080002000900000010000600080001000200000004000200480001002c00020008000300070000004800040002000000080001000600000008000300090000000800d1de1f0000000800030003000000100001003a73797a3200000000180007000c000300020000000000000008000200f70000008206000000"], 0xb8}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) 03:56:25 executing program 1: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r3, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000200)='hsr0\x00') exit(0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") keyctl$join(0x1, &(0x7f00000000c0)={'syz', 0x1}) 03:56:26 executing program 2: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r3, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000200)='hsr0\x00') exit(0x0) fanotify_init(0x40, 0x2) open$dir(&(0x7f0000000080)='./file0\x00', 0x20881, 0x2) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="2537110b9523145bf78fd24358fa4d58089f39722092414ea5e060e1858bdf6c2beefb55075fc790e1a9bc2d9b69717d20991016430e90c90d273b8a84210b61a8a2daf2089b1b9885990ad4fe2ee87a18", @ANYRES16, @ANYBLOB="f0062bbd7000fddbdf25120100003400090008000100030000000800020004000000080002002d1e000008000200ffff0000080002e904000000080002000900000010000600080001000200000004000200480001002c00020008000300070000004800040002000000080001000600000008000300090000000800d1de1f0000000800030003000000100001003a73797a3200000000180007000c000300020000000000000008000200f70000008206000000"], 0xb8}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) 03:56:26 executing program 0: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r3, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000200)='hsr0\x00') exit(0x0) fanotify_init(0x40, 0x2) open$dir(&(0x7f0000000080)='./file0\x00', 0x20881, 0x2) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") signalfd(0xffffffffffffffff, &(0x7f0000000540)={0x40000000000009}, 0xffffffffffffff67) 03:56:26 executing program 4: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r3, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000200)='hsr0\x00') exit(0x0) r4 = fanotify_init(0x40, 0x2) r5 = open$dir(&(0x7f0000000080)='./file0\x00', 0x20881, 0x2) msgget$private(0x0, 0x2) fcntl$setsig(r5, 0xa, 0x7) fanotify_mark(r4, 0x8, 0x1, r5, &(0x7f0000000100)='./file0\x00') 03:56:26 executing program 1: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r3, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000200)='hsr0\x00') r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") keyctl$join(0x1, &(0x7f00000000c0)={'syz', 0x1}) 03:56:26 executing program 3: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r3, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000200)='hsr0\x00') exit(0x0) fanotify_init(0x40, 0x2) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") perf_event_open(&(0x7f0000000000)={0x2, 0x3, 0x800000000000012, 0x1, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:56:26 executing program 1: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r3, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") keyctl$join(0x1, &(0x7f00000000c0)={'syz', 0x1}) 03:56:29 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:56:29 executing program 1: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") keyctl$join(0x1, &(0x7f00000000c0)={'syz', 0x1}) 03:56:29 executing program 2: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r3, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000200)='hsr0\x00') exit(0x0) fanotify_init(0x40, 0x2) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="2537110b9523145bf78fd24358fa4d58089f39722092414ea5e060e1858bdf6c2beefb55075fc790e1a9bc2d9b69717d20991016430e90c90d273b8a84210b61a8a2daf2089b1b9885990ad4fe2ee87a18", @ANYRES16, @ANYBLOB="f0062bbd7000fddbdf25120100003400090008000100030000000800020004000000080002002d1e000008000200ffff0000080002e904000000080002000900000010000600080001000200000004000200480001002c00020008000300070000004800040002000000080001000600000008000300090000000800d1de1f0000000800030003000000100001003a73797a3200000000180007000c000300020000000000000008000200f70000008206000000"], 0xb8}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) 03:56:29 executing program 4: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r3, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000200)='hsr0\x00') exit(0x0) fanotify_init(0x40, 0x2) r4 = open$dir(&(0x7f0000000080)='./file0\x00', 0x20881, 0x2) msgget$private(0x0, 0x2) fcntl$setsig(r4, 0xa, 0x7) 03:56:29 executing program 0: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r3, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000200)='hsr0\x00') exit(0x0) fanotify_init(0x40, 0x2) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") signalfd(0xffffffffffffffff, &(0x7f0000000540)={0x40000000000009}, 0xffffffffffffff67) 03:56:29 executing program 3: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r3, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000200)='hsr0\x00') exit(0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") perf_event_open(&(0x7f0000000000)={0x2, 0x3, 0x800000000000012, 0x1, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:56:29 executing program 1: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") keyctl$join(0x1, &(0x7f00000000c0)={'syz', 0x1}) 03:56:29 executing program 1: socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r0, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r1 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r1, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") keyctl$join(0x1, &(0x7f00000000c0)={'syz', 0x1}) 03:56:29 executing program 1: socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r0, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r1 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r1, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") keyctl$join(0x1, &(0x7f00000000c0)={'syz', 0x1}) 03:56:29 executing program 1: socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r0, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r1 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r1, 0x3, 0x12, &(0x7f0000000e00)=""/187) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") keyctl$join(0x1, &(0x7f00000000c0)={'syz', 0x1}) 03:56:29 executing program 1: socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r0, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) semget$private(0x0, 0x0, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") keyctl$join(0x1, &(0x7f00000000c0)={'syz', 0x1}) 03:56:29 executing program 1: socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r0, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") keyctl$join(0x1, &(0x7f00000000c0)={'syz', 0x1}) 03:56:32 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:56:32 executing program 1: socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r0, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") keyctl$join(0x1, &(0x7f00000000c0)={'syz', 0x1}) 03:56:32 executing program 0: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r3, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000200)='hsr0\x00') exit(0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") signalfd(0xffffffffffffffff, &(0x7f0000000540)={0x40000000000009}, 0xffffffffffffff67) 03:56:32 executing program 2: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r3, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000200)='hsr0\x00') exit(0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="2537110b9523145bf78fd24358fa4d58089f39722092414ea5e060e1858bdf6c2beefb55075fc790e1a9bc2d9b69717d20991016430e90c90d273b8a84210b61a8a2daf2089b1b9885990ad4fe2ee87a18", @ANYRES16, @ANYBLOB="f0062bbd7000fddbdf25120100003400090008000100030000000800020004000000080002002d1e000008000200ffff0000080002e904000000080002000900000010000600080001000200000004000200480001002c00020008000300070000004800040002000000080001000600000008000300090000000800d1de1f0000000800030003000000100001003a73797a3200000000180007000c000300020000000000000008000200f70000008206000000"], 0xb8}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) 03:56:32 executing program 4: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r3, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000200)='hsr0\x00') exit(0x0) fanotify_init(0x40, 0x2) open$dir(&(0x7f0000000080)='./file0\x00', 0x20881, 0x2) msgget$private(0x0, 0x2) 03:56:32 executing program 3: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r3, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000200)='hsr0\x00') r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") perf_event_open(&(0x7f0000000000)={0x2, 0x3, 0x800000000000012, 0x1, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:56:32 executing program 3: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r3, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") perf_event_open(&(0x7f0000000000)={0x2, 0x3, 0x800000000000012, 0x1, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:56:32 executing program 1: socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r0, 0x40) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") keyctl$join(0x1, &(0x7f00000000c0)={'syz', 0x1}) 03:56:32 executing program 3: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") perf_event_open(&(0x7f0000000000)={0x2, 0x3, 0x800000000000012, 0x1, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:56:32 executing program 1: socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") keyctl$join(0x1, &(0x7f00000000c0)={'syz', 0x1}) 03:56:32 executing program 1: socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") keyctl$join(0x1, &(0x7f00000000c0)={'syz', 0x1}) 03:56:32 executing program 3: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") perf_event_open(&(0x7f0000000000)={0x2, 0x3, 0x800000000000012, 0x1, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:56:35 executing program 3: socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r0, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r1 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r1, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") perf_event_open(&(0x7f0000000000)={0x2, 0x3, 0x800000000000012, 0x1, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:56:35 executing program 1: socket(0x10, 0x3, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") keyctl$join(0x1, &(0x7f00000000c0)={'syz', 0x1}) 03:56:35 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a9", 0x3a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:56:35 executing program 4: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r3, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000200)='hsr0\x00') exit(0x0) fanotify_init(0x40, 0x2) open$dir(&(0x7f0000000080)='./file0\x00', 0x20881, 0x2) 03:56:35 executing program 0: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r3, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000200)='hsr0\x00') r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") signalfd(0xffffffffffffffff, &(0x7f0000000540)={0x40000000000009}, 0xffffffffffffff67) 03:56:35 executing program 2: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r3, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000200)='hsr0\x00') r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="2537110b9523145bf78fd24358fa4d58089f39722092414ea5e060e1858bdf6c2beefb55075fc790e1a9bc2d9b69717d20991016430e90c90d273b8a84210b61a8a2daf2089b1b9885990ad4fe2ee87a18", @ANYRES16, @ANYBLOB="f0062bbd7000fddbdf25120100003400090008000100030000000800020004000000080002002d1e000008000200ffff0000080002e904000000080002000900000010000600080001000200000004000200480001002c00020008000300070000004800040002000000080001000600000008000300090000000800d1de1f0000000800030003000000100001003a73797a3200000000180007000c000300020000000000000008000200f70000008206000000"], 0xb8}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) 03:56:35 executing program 0: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r3, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") signalfd(0xffffffffffffffff, &(0x7f0000000540)={0x40000000000009}, 0xffffffffffffff67) 03:56:35 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") keyctl$join(0x1, &(0x7f00000000c0)={'syz', 0x1}) 03:56:35 executing program 3: socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r0, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r1 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r1, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") perf_event_open(&(0x7f0000000000)={0x2, 0x3, 0x800000000000012, 0x1, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:56:35 executing program 2: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r3, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="2537110b9523145bf78fd24358fa4d58089f39722092414ea5e060e1858bdf6c2beefb55075fc790e1a9bc2d9b69717d20991016430e90c90d273b8a84210b61a8a2daf2089b1b9885990ad4fe2ee87a18", @ANYRES16, @ANYBLOB="f0062bbd7000fddbdf25120100003400090008000100030000000800020004000000080002002d1e000008000200ffff0000080002e904000000080002000900000010000600080001000200000004000200480001002c00020008000300070000004800040002000000080001000600000008000300090000000800d1de1f0000000800030003000000100001003a73797a3200000000180007000c000300020000000000000008000200f70000008206000000"], 0xb8}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) 03:56:35 executing program 0: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") signalfd(0xffffffffffffffff, &(0x7f0000000540)={0x40000000000009}, 0xffffffffffffff67) 03:56:35 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") keyctl$join(0x1, &(0x7f00000000c0)={'syz', 0x1}) 03:56:35 executing program 3: socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r0, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r1 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r1, 0x3, 0x12, &(0x7f0000000e00)=""/187) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") perf_event_open(&(0x7f0000000000)={0x2, 0x3, 0x800000000000012, 0x1, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:56:35 executing program 2: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="2537110b9523145bf78fd24358fa4d58089f39722092414ea5e060e1858bdf6c2beefb55075fc790e1a9bc2d9b69717d20991016430e90c90d273b8a84210b61a8a2daf2089b1b9885990ad4fe2ee87a18", @ANYRES16, @ANYBLOB="f0062bbd7000fddbdf25120100003400090008000100030000000800020004000000080002002d1e000008000200ffff0000080002e904000000080002000900000010000600080001000200000004000200480001002c00020008000300070000004800040002000000080001000600000008000300090000000800d1de1f0000000800030003000000100001003a73797a3200000000180007000c000300020000000000000008000200f70000008206000000"], 0xb8}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) 03:56:38 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a9", 0x3a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:56:38 executing program 0: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") signalfd(0xffffffffffffffff, &(0x7f0000000540)={0x40000000000009}, 0xffffffffffffff67) 03:56:38 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") keyctl$join(0x1, &(0x7f00000000c0)={'syz', 0x1}) 03:56:38 executing program 3: socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r0, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) semget$private(0x0, 0x0, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") perf_event_open(&(0x7f0000000000)={0x2, 0x3, 0x800000000000012, 0x1, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:56:38 executing program 2: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="2537110b9523145bf78fd24358fa4d58089f39722092414ea5e060e1858bdf6c2beefb55075fc790e1a9bc2d9b69717d20991016430e90c90d273b8a84210b61a8a2daf2089b1b9885990ad4fe2ee87a18", @ANYRES16, @ANYBLOB="f0062bbd7000fddbdf25120100003400090008000100030000000800020004000000080002002d1e000008000200ffff0000080002e904000000080002000900000010000600080001000200000004000200480001002c00020008000300070000004800040002000000080001000600000008000300090000000800d1de1f0000000800030003000000100001003a73797a3200000000180007000c000300020000000000000008000200f70000008206000000"], 0xb8}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) 03:56:38 executing program 4: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r3, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000200)='hsr0\x00') exit(0x0) fanotify_init(0x40, 0x2) 03:56:38 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") keyctl$join(0x1, &(0x7f00000000c0)={'syz', 0x1}) 03:56:38 executing program 0: socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r0, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r1 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r1, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") signalfd(0xffffffffffffffff, &(0x7f0000000540)={0x40000000000009}, 0xffffffffffffff67) 03:56:38 executing program 3: socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r0, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") perf_event_open(&(0x7f0000000000)={0x2, 0x3, 0x800000000000012, 0x1, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:56:38 executing program 2: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="2537110b9523145bf78fd24358fa4d58089f39722092414ea5e060e1858bdf6c2beefb55075fc790e1a9bc2d9b69717d20991016430e90c90d273b8a84210b61a8a2daf2089b1b9885990ad4fe2ee87a18", @ANYRES16, @ANYBLOB="f0062bbd7000fddbdf25120100003400090008000100030000000800020004000000080002002d1e000008000200ffff0000080002e904000000080002000900000010000600080001000200000004000200480001002c00020008000300070000004800040002000000080001000600000008000300090000000800d1de1f0000000800030003000000100001003a73797a3200000000180007000c000300020000000000000008000200f70000008206000000"], 0xb8}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) 03:56:38 executing program 0: socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r0, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r1 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r1, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") signalfd(0xffffffffffffffff, &(0x7f0000000540)={0x40000000000009}, 0xffffffffffffff67) 03:56:38 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") keyctl$join(0x1, &(0x7f00000000c0)={'syz', 0x1}) 03:56:41 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a9", 0x3a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:56:41 executing program 3: socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r0, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") perf_event_open(&(0x7f0000000000)={0x2, 0x3, 0x800000000000012, 0x1, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:56:41 executing program 2: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="2537110b9523145bf78fd24358fa4d58089f39722092414ea5e060e1858bdf6c2beefb55075fc790e1a9bc2d9b69717d20991016430e90c90d273b8a84210b61a8a2daf2089b1b9885990ad4fe2ee87a18", @ANYRES16, @ANYBLOB="f0062bbd7000fddbdf25120100003400090008000100030000000800020004000000080002002d1e000008000200ffff0000080002e904000000080002000900000010000600080001000200000004000200480001002c00020008000300070000004800040002000000080001000600000008000300090000000800d1de1f0000000800030003000000100001003a73797a3200000000180007000c000300020000000000000008000200f70000008206000000"], 0xb8}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) 03:56:41 executing program 0: socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r0, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r1 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r1, 0x3, 0x12, &(0x7f0000000e00)=""/187) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") signalfd(0xffffffffffffffff, &(0x7f0000000540)={0x40000000000009}, 0xffffffffffffff67) 03:56:41 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") keyctl$join(0x1, &(0x7f00000000c0)={'syz', 0x1}) 03:56:41 executing program 4: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r3, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000200)='hsr0\x00') fanotify_init(0x40, 0x2) 03:56:41 executing program 3: socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r0, 0x40) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") perf_event_open(&(0x7f0000000000)={0x2, 0x3, 0x800000000000012, 0x1, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:56:41 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") keyctl$join(0x1, &(0x7f00000000c0)={'syz', 0x1}) 03:56:41 executing program 2: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="2537110b9523145bf78fd24358fa4d58089f39722092414ea5e060e1858bdf6c2beefb55075fc790e1a9bc2d9b69717d20991016430e90c90d273b8a84210b61a8a2daf2089b1b9885990ad4fe2ee87a18", @ANYRES16, @ANYBLOB="f0062bbd7000fddbdf25120100003400090008000100030000000800020004000000080002002d1e000008000200ffff0000080002e904000000080002000900000010000600080001000200000004000200480001002c00020008000300070000004800040002000000080001000600000008000300090000000800d1de1f0000000800030003000000100001003a73797a3200000000180007000c000300020000000000000008000200f70000008206000000"], 0xb8}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) 03:56:41 executing program 0: socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r0, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) semget$private(0x0, 0x0, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") signalfd(0xffffffffffffffff, &(0x7f0000000540)={0x40000000000009}, 0xffffffffffffff67) 03:56:41 executing program 4: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r3, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) fanotify_init(0x40, 0x2) 03:56:41 executing program 3: socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") perf_event_open(&(0x7f0000000000)={0x2, 0x3, 0x800000000000012, 0x1, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:56:44 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb9", 0x57}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:56:44 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) keyctl$join(0x1, &(0x7f00000000c0)={'syz', 0x1}) 03:56:44 executing program 2: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="2537110b9523145bf78fd24358fa4d58089f39722092414ea5e060e1858bdf6c2beefb55075fc790e1a9bc2d9b69717d20991016430e90c90d273b8a84210b61a8a2daf2089b1b9885990ad4fe2ee87a18", @ANYRES16, @ANYBLOB="f0062bbd7000fddbdf25120100003400090008000100030000000800020004000000080002002d1e000008000200ffff0000080002e904000000080002000900000010000600080001000200000004000200480001002c00020008000300070000004800040002000000080001000600000008000300090000000800d1de1f0000000800030003000000100001003a73797a3200000000180007000c000300020000000000000008000200f70000008206000000"], 0xb8}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) 03:56:44 executing program 0: socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r0, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") signalfd(0xffffffffffffffff, &(0x7f0000000540)={0x40000000000009}, 0xffffffffffffff67) 03:56:44 executing program 4: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') fanotify_init(0x40, 0x2) 03:56:44 executing program 3: socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") perf_event_open(&(0x7f0000000000)={0x2, 0x3, 0x800000000000012, 0x1, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:56:44 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) keyctl$join(0x1, &(0x7f00000000c0)={'syz', 0x1}) 03:56:44 executing program 4: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) fanotify_init(0x40, 0x2) 03:56:44 executing program 3: socket(0x10, 0x3, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") perf_event_open(&(0x7f0000000000)={0x2, 0x3, 0x800000000000012, 0x1, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:56:44 executing program 0: socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r0, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") signalfd(0xffffffffffffffff, &(0x7f0000000540)={0x40000000000009}, 0xffffffffffffff67) 03:56:44 executing program 2: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="2537110b9523145bf78fd24358fa4d58089f39722092414ea5e060e1858bdf6c2beefb55075fc790e1a9bc2d9b69717d20991016430e90c90d273b8a84210b61a8a2daf2089b1b9885990ad4fe2ee87a18", @ANYRES16, @ANYBLOB="f0062bbd7000fddbdf25120100003400090008000100030000000800020004000000080002002d1e000008000200ffff0000080002e904000000080002000900000010000600080001000200000004000200480001002c00020008000300070000004800040002000000080001000600000008000300090000000800d1de1f0000000800030003000000100001003a73797a3200000000180007000c000300020000000000000008000200f70000008206000000"], 0xb8}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) 03:56:44 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) keyctl$join(0x1, &(0x7f00000000c0)={'syz', 0x1}) 03:56:47 executing program 0: socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r0, 0x40) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") signalfd(0xffffffffffffffff, &(0x7f0000000540)={0x40000000000009}, 0xffffffffffffff67) 03:56:47 executing program 4: socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r0, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r1 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r1, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fanotify_init(0x40, 0x2) 03:56:47 executing program 2: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) semget$private(0x0, 0x0, 0x1) sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="2537110b9523145bf78fd24358fa4d58089f39722092414ea5e060e1858bdf6c2beefb55075fc790e1a9bc2d9b69717d20991016430e90c90d273b8a84210b61a8a2daf2089b1b9885990ad4fe2ee87a18", @ANYRES16, @ANYBLOB="f0062bbd7000fddbdf25120100003400090008000100030000000800020004000000080002002d1e000008000200ffff0000080002e904000000080002000900000010000600080001000200000004000200480001002c00020008000300070000004800040002000000080001000600000008000300090000000800d1de1f0000000800030003000000100001003a73797a3200000000180007000c000300020000000000000008000200f70000008206000000"], 0xb8}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) 03:56:47 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb9", 0x57}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:56:47 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") perf_event_open(&(0x7f0000000000)={0x2, 0x3, 0x800000000000012, 0x1, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:56:47 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)) keyctl$join(0x1, &(0x7f00000000c0)={'syz', 0x1}) 03:56:47 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)) keyctl$join(0x1, &(0x7f00000000c0)={'syz', 0x1}) 03:56:47 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") perf_event_open(&(0x7f0000000000)={0x2, 0x3, 0x800000000000012, 0x1, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:56:47 executing program 2: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="2537110b9523145bf78fd24358fa4d58089f39722092414ea5e060e1858bdf6c2beefb55075fc790e1a9bc2d9b69717d20991016430e90c90d273b8a84210b61a8a2daf2089b1b9885990ad4fe2ee87a18", @ANYRES16, @ANYBLOB="f0062bbd7000fddbdf25120100003400090008000100030000000800020004000000080002002d1e000008000200ffff0000080002e904000000080002000900000010000600080001000200000004000200480001002c00020008000300070000004800040002000000080001000600000008000300090000000800d1de1f0000000800030003000000100001003a73797a3200000000180007000c000300020000000000000008000200f70000008206000000"], 0xb8}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) 03:56:47 executing program 0: socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") signalfd(0xffffffffffffffff, &(0x7f0000000540)={0x40000000000009}, 0xffffffffffffff67) 03:56:47 executing program 4: socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r0, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r1 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r1, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fanotify_init(0x40, 0x2) 03:56:47 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)) keyctl$join(0x1, &(0x7f00000000c0)={'syz', 0x1}) 03:56:47 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") perf_event_open(&(0x7f0000000000)={0x2, 0x3, 0x800000000000012, 0x1, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:56:47 executing program 0: socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") signalfd(0xffffffffffffffff, &(0x7f0000000540)={0x40000000000009}, 0xffffffffffffff67) 03:56:47 executing program 2: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="2537110b9523145bf78fd24358fa4d58089f39722092414ea5e060e1858bdf6c2beefb55075fc790e1a9bc2d9b69717d20991016430e90c90d273b8a84210b61a8a2daf2089b1b9885990ad4fe2ee87a18", @ANYRES16, @ANYBLOB="f0062bbd7000fddbdf25120100003400090008000100030000000800020004000000080002002d1e000008000200ffff0000080002e904000000080002000900000010000600080001000200000004000200480001002c00020008000300070000004800040002000000080001000600000008000300090000000800d1de1f0000000800030003000000100001003a73797a3200000000180007000c000300020000000000000008000200f70000008206000000"], 0xb8}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) 03:56:50 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb9", 0x57}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:56:50 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="11dca50d5e0b") keyctl$join(0x1, &(0x7f00000000c0)={'syz', 0x1}) 03:56:50 executing program 4: socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r0, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r1 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r1, 0x3, 0x12, &(0x7f0000000e00)=""/187) fanotify_init(0x40, 0x2) 03:56:50 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") perf_event_open(&(0x7f0000000000)={0x2, 0x3, 0x800000000000012, 0x1, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:56:50 executing program 0: socket(0x10, 0x3, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") signalfd(0xffffffffffffffff, &(0x7f0000000540)={0x40000000000009}, 0xffffffffffffff67) 03:56:50 executing program 2: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="2537110b9523145bf78fd24358fa4d58089f39722092414ea5e060e1858bdf6c2beefb55075fc790e1a9bc2d9b69717d20991016430e90c90d273b8a84210b61a8a2daf2089b1b9885990ad4fe2ee87a18", @ANYRES16, @ANYBLOB="f0062bbd7000fddbdf25120100003400090008000100030000000800020004000000080002002d1e000008000200ffff0000080002e904000000080002000900000010000600080001000200000004000200480001002c00020008000300070000004800040002000000080001000600000008000300090000000800d1de1f0000000800030003000000100001003a73797a3200000000180007000c000300020000000000000008000200f70000008206000000"], 0xb8}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) 03:56:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") signalfd(0xffffffffffffffff, &(0x7f0000000540)={0x40000000000009}, 0xffffffffffffff67) 03:56:50 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") perf_event_open(&(0x7f0000000000)={0x2, 0x3, 0x800000000000012, 0x1, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:56:50 executing program 4: socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r0, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) semget$private(0x0, 0x0, 0x1) fanotify_init(0x40, 0x2) 03:56:50 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="11dca50d5e0b") keyctl$join(0x1, &(0x7f00000000c0)={'syz', 0x1}) 03:56:50 executing program 2: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="2537110b9523145bf78fd24358fa4d58089f39722092414ea5e060e1858bdf6c2beefb55075fc790e1a9bc2d9b69717d20991016430e90c90d273b8a84210b61a8a2daf2089b1b9885990ad4fe2ee87a18", @ANYRES16, @ANYBLOB="f0062bbd7000fddbdf25120100003400090008000100030000000800020004000000080002002d1e000008000200ffff0000080002e904000000080002000900000010000600080001000200000004000200480001002c00020008000300070000004800040002000000080001000600000008000300090000000800d1de1f0000000800030003000000100001003a73797a3200000000180007000c000300020000000000000008000200f70000008206000000"], 0xb8}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) 03:56:50 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") perf_event_open(&(0x7f0000000000)={0x2, 0x3, 0x800000000000012, 0x1, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:56:53 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b", 0x66}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:56:53 executing program 4: socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r0, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) fanotify_init(0x40, 0x2) 03:56:53 executing program 2: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="2537110b9523145bf78fd24358fa4d58089f39722092414ea5e060e1858bdf6c2beefb55075fc790e1a9bc2d9b69717d20991016430e90c90d273b8a84210b61a8a2daf2089b1b9885990ad4fe2ee87a18", @ANYRES16, @ANYBLOB="f0062bbd7000fddbdf25120100003400090008000100030000000800020004000000080002002d1e000008000200ffff0000080002e904000000080002000900000010000600080001000200000004000200480001002c00020008000300070000004800040002000000080001000600000008000300090000000800d1de1f0000000800030003000000100001003a73797a3200000000180007000c000300020000000000000008000200f70000008206000000"], 0xb8}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) 03:56:53 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="11dca50d5e0b") keyctl$join(0x1, &(0x7f00000000c0)={'syz', 0x1}) 03:56:53 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") signalfd(0xffffffffffffffff, &(0x7f0000000540)={0x40000000000009}, 0xffffffffffffff67) 03:56:53 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") perf_event_open(&(0x7f0000000000)={0x2, 0x3, 0x800000000000012, 0x1, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:56:53 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47b") keyctl$join(0x1, &(0x7f00000000c0)={'syz', 0x1}) 03:56:53 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") signalfd(0xffffffffffffffff, &(0x7f0000000540)={0x40000000000009}, 0xffffffffffffff67) 03:56:53 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x3, 0x800000000000012, 0x1, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:56:53 executing program 2: r0 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="2537110b9523145bf78fd24358fa4d58089f39722092414ea5e060e1858bdf6c2beefb55075fc790e1a9bc2d9b69717d20991016430e90c90d273b8a84210b61a8a2daf2089b1b9885990ad4fe2ee87a18", @ANYRES16, @ANYBLOB="f0062bbd7000fddbdf25120100003400090008000100030000000800020004000000080002002d1e000008000200ffff0000080002e904000000080002000900000010000600080001000200000004000200480001002c00020008000300070000004800040002000000080001000600000008000300090000000800d1de1f0000000800030003000000100001003a73797a3200000000180007000c000300020000000000000008000200f70000008206000000"], 0xb8}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) 03:56:53 executing program 4: socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r0, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) fanotify_init(0x40, 0x2) 03:56:53 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47b") keyctl$join(0x1, &(0x7f00000000c0)={'syz', 0x1}) 03:56:56 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b", 0x66}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:56:56 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") signalfd(0xffffffffffffffff, &(0x7f0000000540)={0x40000000000009}, 0xffffffffffffff67) 03:56:56 executing program 2: sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="2537110b9523145bf78fd24358fa4d58089f39722092414ea5e060e1858bdf6c2beefb55075fc790e1a9bc2d9b69717d20991016430e90c90d273b8a84210b61a8a2daf2089b1b9885990ad4fe2ee87a18", @ANYRES16, @ANYBLOB="f0062bbd7000fddbdf25120100003400090008000100030000000800020004000000080002002d1e000008000200ffff0000080002e904000000080002000900000010000600080001000200000004000200480001002c00020008000300070000004800040002000000080001000600000008000300090000000800d1de1f0000000800030003000000100001003a73797a3200000000180007000c000300020000000000000008000200f70000008206000000"], 0xb8}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) 03:56:56 executing program 4: socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r0, 0x40) fanotify_init(0x40, 0x2) 03:56:56 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x3, 0x800000000000012, 0x1, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:56:56 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47b") keyctl$join(0x1, &(0x7f00000000c0)={'syz', 0x1}) 03:56:56 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf0") keyctl$join(0x1, &(0x7f00000000c0)={'syz', 0x1}) 03:56:56 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x3, 0x800000000000012, 0x1, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:56:56 executing program 2: sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="2537110b9523145bf78fd24358fa4d58089f39722092414ea5e060e1858bdf6c2beefb55075fc790e1a9bc2d9b69717d20991016430e90c90d273b8a84210b61a8a2daf2089b1b9885990ad4fe2ee87a18", @ANYRES16, @ANYBLOB="f0062bbd7000fddbdf25120100003400090008000100030000000800020004000000080002002d1e000008000200ffff0000080002e904000000080002000900000010000600080001000200000004000200480001002c00020008000300070000004800040002000000080001000600000008000300090000000800d1de1f0000000800030003000000100001003a73797a3200000000180007000c000300020000000000000008000200f70000008206000000"], 0xb8}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) 03:56:56 executing program 4: socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fanotify_init(0x40, 0x2) 03:56:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") signalfd(0xffffffffffffffff, &(0x7f0000000540)={0x40000000000009}, 0xffffffffffffff67) 03:56:56 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf0") keyctl$join(0x1, &(0x7f00000000c0)={'syz', 0x1}) 03:56:59 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b", 0x66}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:56:59 executing program 2: sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="2537110b9523145bf78fd24358fa4d58089f39722092414ea5e060e1858bdf6c2beefb55075fc790e1a9bc2d9b69717d20991016430e90c90d273b8a84210b61a8a2daf2089b1b9885990ad4fe2ee87a18", @ANYRES16, @ANYBLOB="f0062bbd7000fddbdf25120100003400090008000100030000000800020004000000080002002d1e000008000200ffff0000080002e904000000080002000900000010000600080001000200000004000200480001002c00020008000300070000004800040002000000080001000600000008000300090000000800d1de1f0000000800030003000000100001003a73797a3200000000180007000c000300020000000000000008000200f70000008206000000"], 0xb8}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) 03:56:59 executing program 4: socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) fanotify_init(0x40, 0x2) 03:56:59 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)) perf_event_open(&(0x7f0000000000)={0x2, 0x3, 0x800000000000012, 0x1, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:56:59 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf0") keyctl$join(0x1, &(0x7f00000000c0)={'syz', 0x1}) 03:56:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") signalfd(0xffffffffffffffff, &(0x7f0000000540)={0x40000000000009}, 0xffffffffffffff67) 03:56:59 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") keyctl$join(0x1, 0x0) 03:56:59 executing program 4: socket(0x10, 0x3, 0x0) fanotify_init(0x40, 0x2) 03:56:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") signalfd(0xffffffffffffffff, &(0x7f0000000540)={0x40000000000009}, 0xffffffffffffff67) 03:56:59 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)) perf_event_open(&(0x7f0000000000)={0x2, 0x3, 0x800000000000012, 0x1, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:56:59 executing program 2: r0 = socket(0x0, 0x3, 0x0) sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="2537110b9523145bf78fd24358fa4d58089f39722092414ea5e060e1858bdf6c2beefb55075fc790e1a9bc2d9b69717d20991016430e90c90d273b8a84210b61a8a2daf2089b1b9885990ad4fe2ee87a18", @ANYRES16, @ANYBLOB="f0062bbd7000fddbdf25120100003400090008000100030000000800020004000000080002002d1e000008000200ffff0000080002e904000000080002000900000010000600080001000200000004000200480001002c00020008000300070000004800040002000000080001000600000008000300090000000800d1de1f0000000800030003000000100001003a73797a3200000000180007000c000300020000000000000008000200f70000008206000000"], 0xb8}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) 03:56:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000540)={0x40000000000009}, 0xffffffffffffff67) 03:57:02 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:57:02 executing program 4: fanotify_init(0x40, 0x2) 03:57:02 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") keyctl$join(0x1, 0x0) 03:57:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000540)={0x40000000000009}, 0xffffffffffffff67) 03:57:02 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)) perf_event_open(&(0x7f0000000000)={0x2, 0x3, 0x800000000000012, 0x1, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:57:02 executing program 2: r0 = socket(0x0, 0x3, 0x0) sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="2537110b9523145bf78fd24358fa4d58089f39722092414ea5e060e1858bdf6c2beefb55075fc790e1a9bc2d9b69717d20991016430e90c90d273b8a84210b61a8a2daf2089b1b9885990ad4fe2ee87a18", @ANYRES16, @ANYBLOB="f0062bbd7000fddbdf25120100003400090008000100030000000800020004000000080002002d1e000008000200ffff0000080002e904000000080002000900000010000600080001000200000004000200480001002c00020008000300070000004800040002000000080001000600000008000300090000000800d1de1f0000000800030003000000100001003a73797a3200000000180007000c000300020000000000000008000200f70000008206000000"], 0xb8}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) 03:57:02 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="11dca50d5e0b") perf_event_open(&(0x7f0000000000)={0x2, 0x3, 0x800000000000012, 0x1, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:57:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000540)={0x40000000000009}, 0xffffffffffffff67) 03:57:02 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") keyctl$join(0x1, 0x0) 03:57:02 executing program 4: fanotify_init(0x0, 0x2) 03:57:02 executing program 2: r0 = socket(0x0, 0x3, 0x0) sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="2537110b9523145bf78fd24358fa4d58089f39722092414ea5e060e1858bdf6c2beefb55075fc790e1a9bc2d9b69717d20991016430e90c90d273b8a84210b61a8a2daf2089b1b9885990ad4fe2ee87a18", @ANYRES16, @ANYBLOB="f0062bbd7000fddbdf25120100003400090008000100030000000800020004000000080002002d1e000008000200ffff0000080002e904000000080002000900000010000600080001000200000004000200480001002c00020008000300070000004800040002000000080001000600000008000300090000000800d1de1f0000000800030003000000100001003a73797a3200000000180007000c000300020000000000000008000200f70000008206000000"], 0xb8}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) 03:57:02 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="11dca50d5e0b") perf_event_open(&(0x7f0000000000)={0x2, 0x3, 0x800000000000012, 0x1, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:57:05 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:57:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)) signalfd(0xffffffffffffffff, &(0x7f0000000540)={0x40000000000009}, 0xffffffffffffff67) 03:57:05 executing program 4: fanotify_init(0x0, 0x2) 03:57:05 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="11dca50d5e0b") perf_event_open(&(0x7f0000000000)={0x2, 0x3, 0x800000000000012, 0x1, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:57:05 executing program 1: r0 = socket(0x10, 0x3, 0x0) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r2, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r3 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r3, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r4, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000200)='hsr0\x00') exit(0x0) r5 = fanotify_init(0x40, 0x2) r6 = open$dir(&(0x7f0000000080)='./file0\x00', 0x20881, 0x2) msgget$private(0x0, 0x2) fcntl$setsig(r6, 0xa, 0x7) fanotify_mark(r5, 0x8, 0x1, r6, &(0x7f0000000100)='./file0\x00') r7 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') r8 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r8, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") r9 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) poll(&(0x7f0000000280)=[{r9}], 0x1, 0x0) signalfd(r9, &(0x7f0000000540)={0x40000000000009}, 0xffffffffffffff67) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="2537110b9523145bf78fd24358fa4d58089f39722092414ea5e060e1858bdf6c2beefb55075fc790e1a9bc2d9b69717d20991016430e90c90d273b8a84210b61a8a2daf2089b1b9885990ad4fe2ee87a18", @ANYRES16=r7, @ANYBLOB="f0062bbd7000fddbdf25120100003400090008000100030000000800020004000000080002002d1e000008000200ffff0000080002e904000000080002000900000010000600080001000200000004000200480001002c00020008000300070000004800040002000000080001000600000008000300090000000800d1de1f0000000800030003000000100001003a73797a3200000000180007000c000300020000000000000008000200f70000008206000000"], 0xb8}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) perf_event_open(&(0x7f0000000000)={0x2, 0x3, 0x800000000000012, 0x1, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$join(0x1, &(0x7f00000000c0)={'syz', 0x1}) setsockopt$IP6T_SO_SET_REPLACE(r5, 0x29, 0x40, &(0x7f0000001000)=ANY=[@ANYRESDEC=r6, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYBLOB="0000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000090810a161e873bbe6d9a5042ae1507008b1d5564e825aad9f7fadf1686df5cccfb171f694009799bff176d2bc4c70c0966ebf415ec8d"], @ANYBLOB="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"], 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x2) openat(r6, &(0x7f00000002c0)='./file0\x00', 0x20001, 0x100) r10 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r10, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00\x02', &(0x7f0000000340)=ANY=[@ANYRES64=r1, @ANYRES32=r10, @ANYRESDEC, @ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRESOCT=r10]]}) 03:57:05 executing program 2: r0 = socket(0x10, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="2537110b9523145bf78fd24358fa4d58089f39722092414ea5e060e1858bdf6c2beefb55075fc790e1a9bc2d9b69717d20991016430e90c90d273b8a84210b61a8a2daf2089b1b9885990ad4fe2ee87a18", @ANYRES16, @ANYBLOB="f0062bbd7000fddbdf25120100003400090008000100030000000800020004000000080002002d1e000008000200ffff0000080002e904000000080002000900000010000600080001000200000004000200480001002c00020008000300070000004800040002000000080001000600000008000300090000000800d1de1f0000000800030003000000100001003a73797a3200000000180007000c000300020000000000000008000200f70000008206000000"], 0xb8}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) 03:57:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)) signalfd(0xffffffffffffffff, &(0x7f0000000540)={0x40000000000009}, 0xffffffffffffff67) 03:57:05 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47b") perf_event_open(&(0x7f0000000000)={0x2, 0x3, 0x800000000000012, 0x1, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:57:05 executing program 2: r0 = socket(0x10, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="2537110b9523145bf78fd24358fa4d58089f39722092414ea5e060e1858bdf6c2beefb55075fc790e1a9bc2d9b69717d20991016430e90c90d273b8a84210b61a8a2daf2089b1b9885990ad4fe2ee87a18", @ANYRES16, @ANYBLOB="f0062bbd7000fddbdf25120100003400090008000100030000000800020004000000080002002d1e000008000200ffff0000080002e904000000080002000900000010000600080001000200000004000200480001002c00020008000300070000004800040002000000080001000600000008000300090000000800d1de1f0000000800030003000000100001003a73797a3200000000180007000c000300020000000000000008000200f70000008206000000"], 0xb8}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) 03:57:05 executing program 4: fanotify_init(0x0, 0x2) 03:57:06 executing program 2: r0 = socket(0x10, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="2537110b9523145bf78fd24358fa4d58089f39722092414ea5e060e1858bdf6c2beefb55075fc790e1a9bc2d9b69717d20991016430e90c90d273b8a84210b61a8a2daf2089b1b9885990ad4fe2ee87a18", @ANYRES16, @ANYBLOB="f0062bbd7000fddbdf25120100003400090008000100030000000800020004000000080002002d1e000008000200ffff0000080002e904000000080002000900000010000600080001000200000004000200480001002c00020008000300070000004800040002000000080001000600000008000300090000000800d1de1f0000000800030003000000100001003a73797a3200000000180007000c000300020000000000000008000200f70000008206000000"], 0xb8}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) 03:57:06 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47b") perf_event_open(&(0x7f0000000000)={0x2, 0x3, 0x800000000000012, 0x1, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:57:08 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:57:08 executing program 4: fanotify_init(0x40, 0x0) 03:57:08 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47b") perf_event_open(&(0x7f0000000000)={0x2, 0x3, 0x800000000000012, 0x1, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:57:08 executing program 2: r0 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="2537110b9523145bf78fd24358fa4d58089f39722092414ea5e060e1858bdf6c2beefb55075fc790e1a9bc2d9b69717d20991016430e90c90d273b8a84210b61a8a2daf2089b1b9885990ad4fe2ee87a18", @ANYRES16, @ANYBLOB="f0062bbd7000fddbdf25120100003400090008000100030000000800020004000000080002002d1e000008000200ffff0000080002e904000000080002000900000010000600080001000200000004000200480001002c00020008000300070000004800040002000000080001000600000008000300090000000800d1de1f0000000800030003000000100001003a73797a3200000000180007000c000300020000000000000008000200f70000008206000000"], 0xb8}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) 03:57:08 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)) signalfd(0xffffffffffffffff, &(0x7f0000000540)={0x40000000000009}, 0xffffffffffffff67) 03:57:08 executing program 1: r0 = socket(0x10, 0x3, 0x0) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r2, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r3 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r3, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r4, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000200)='hsr0\x00') exit(0x0) r5 = fanotify_init(0x40, 0x2) r6 = open$dir(&(0x7f0000000080)='./file0\x00', 0x20881, 0x2) msgget$private(0x0, 0x2) fcntl$setsig(r6, 0xa, 0x7) fanotify_mark(r5, 0x8, 0x1, r6, &(0x7f0000000100)='./file0\x00') r7 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') r8 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r8, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") r9 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) poll(&(0x7f0000000280)=[{r9}], 0x1, 0x0) signalfd(r9, &(0x7f0000000540)={0x40000000000009}, 0xffffffffffffff67) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="2537110b9523145bf78fd24358fa4d58089f39722092414ea5e060e1858bdf6c2beefb55075fc790e1a9bc2d9b69717d20991016430e90c90d273b8a84210b61a8a2daf2089b1b9885990ad4fe2ee87a18", @ANYRES16=r7, @ANYBLOB="f0062bbd7000fddbdf25120100003400090008000100030000000800020004000000080002002d1e000008000200ffff0000080002e904000000080002000900000010000600080001000200000004000200480001002c00020008000300070000004800040002000000080001000600000008000300090000000800d1de1f0000000800030003000000100001003a73797a3200000000180007000c000300020000000000000008000200f70000008206000000"], 0xb8}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) perf_event_open(&(0x7f0000000000)={0x2, 0x3, 0x800000000000012, 0x1, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$join(0x1, &(0x7f00000000c0)={'syz', 0x1}) setsockopt$IP6T_SO_SET_REPLACE(r5, 0x29, 0x40, &(0x7f0000001000)=ANY=[@ANYRESDEC=r6, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYBLOB="0000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000090810a161e873bbe6d9a5042ae1507008b1d5564e825aad9f7fadf1686df5cccfb171f694009799bff176d2bc4c70c0966ebf415ec8d"], @ANYBLOB="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"], 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x2) openat(r6, &(0x7f00000002c0)='./file0\x00', 0x20001, 0x100) r10 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r10, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00\x02', &(0x7f0000000340)=ANY=[@ANYRES64=r1, @ANYRES32=r10, @ANYRESDEC, @ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRESOCT=r10]]}) 03:57:08 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="11dca50d5e0b") signalfd(0xffffffffffffffff, &(0x7f0000000540)={0x40000000000009}, 0xffffffffffffff67) 03:57:08 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 03:57:08 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf0") perf_event_open(&(0x7f0000000000)={0x2, 0x3, 0x800000000000012, 0x1, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:57:09 executing program 2: r0 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="2537110b9523145bf78fd24358fa4d58089f39722092414ea5e060e1858bdf6c2beefb55075fc790e1a9bc2d9b69717d20991016430e90c90d273b8a84210b61a8a2daf2089b1b9885990ad4fe2ee87a18", @ANYRES16, @ANYBLOB="f0062bbd7000fddbdf25120100003400090008000100030000000800020004000000080002002d1e000008000200ffff0000080002e904000000080002000900000010000600080001000200000004000200480001002c00020008000300070000004800040002000000080001000600000008000300090000000800d1de1f0000000800030003000000100001003a73797a3200000000180007000c000300020000000000000008000200f70000008206000000"], 0xb8}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) 03:57:09 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="11dca50d5e0b") signalfd(0xffffffffffffffff, &(0x7f0000000540)={0x40000000000009}, 0xffffffffffffff67) 03:57:09 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000000100)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 03:57:11 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe5420", 0x71}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:57:11 executing program 2: r0 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="2537110b9523145bf78fd24358fa4d58089f39722092414ea5e060e1858bdf6c2beefb55075fc790e1a9bc2d9b69717d20991016430e90c90d273b8a84210b61a8a2daf2089b1b9885990ad4fe2ee87a18", @ANYRES16, @ANYBLOB="f0062bbd7000fddbdf25120100003400090008000100030000000800020004000000080002002d1e000008000200ffff0000080002e904000000080002000900000010000600080001000200000004000200480001002c00020008000300070000004800040002000000080001000600000008000300090000000800d1de1f0000000800030003000000100001003a73797a3200000000180007000c000300020000000000000008000200f70000008206000000"], 0xb8}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) 03:57:11 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf0") perf_event_open(&(0x7f0000000000)={0x2, 0x3, 0x800000000000012, 0x1, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:57:11 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="11dca50d5e0b") signalfd(0xffffffffffffffff, &(0x7f0000000540)={0x40000000000009}, 0xffffffffffffff67) 03:57:11 executing program 4: r0 = timerfd_create(0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timerfd_gettime(r0, &(0x7f0000000080)) 03:57:11 executing program 1: r0 = socket(0x10, 0x3, 0x0) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r2, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r3 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r3, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r4, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000200)='hsr0\x00') exit(0x0) r5 = fanotify_init(0x40, 0x2) r6 = open$dir(&(0x7f0000000080)='./file0\x00', 0x20881, 0x2) msgget$private(0x0, 0x2) fcntl$setsig(r6, 0xa, 0x7) fanotify_mark(r5, 0x8, 0x1, r6, &(0x7f0000000100)='./file0\x00') r7 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') r8 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r8, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") r9 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) poll(&(0x7f0000000280)=[{r9}], 0x1, 0x0) signalfd(r9, &(0x7f0000000540)={0x40000000000009}, 0xffffffffffffff67) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="2537110b9523145bf78fd24358fa4d58089f39722092414ea5e060e1858bdf6c2beefb55075fc790e1a9bc2d9b69717d20991016430e90c90d273b8a84210b61a8a2daf2089b1b9885990ad4fe2ee87a18", @ANYRES16=r7, @ANYBLOB="f0062bbd7000fddbdf25120100003400090008000100030000000800020004000000080002002d1e000008000200ffff0000080002e904000000080002000900000010000600080001000200000004000200480001002c00020008000300070000004800040002000000080001000600000008000300090000000800d1de1f0000000800030003000000100001003a73797a3200000000180007000c000300020000000000000008000200f70000008206000000"], 0xb8}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) perf_event_open(&(0x7f0000000000)={0x2, 0x3, 0x800000000000012, 0x1, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$join(0x1, &(0x7f00000000c0)={'syz', 0x1}) setsockopt$IP6T_SO_SET_REPLACE(r5, 0x29, 0x40, &(0x7f0000001000)=ANY=[@ANYRESDEC=r6, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYBLOB="0000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000090810a161e873bbe6d9a5042ae1507008b1d5564e825aad9f7fadf1686df5cccfb171f694009799bff176d2bc4c70c0966ebf415ec8d"], @ANYBLOB="fe88000000000000000000000000010100000000000000000000000000000001000000ffff7fff00ffffffffffffff00ffffffffffffffff000000ff000000ff687773696d300000000000000000000067726574617030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff000008000000000000000000000000005e0ece0040000000000000000000000000000000c80000010000000000000000000000000000000000000000000000003800534554000000000000000000000000000000000000000000ff00000000034000030309000300070008ff7a030000060000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100138020000000000000000000000000000000000000000000000004800647374000000000000000000000000000000000000000000000000000000aea4af470101400002007e65040005000500010005007f0004000100050003007b409cbef2ea6552f200d0020400100028015345434d41524b0000000000000000000000000000000000000000000000010000000300000073797374656d5f753a6f626a6563745f723a646863705f73746174655f743a733000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fe800000000000000000000000000021fe8000000000000000000000000200bbffffffff00000000000000ff00000000ffffff00000000ff000000ff000000ff7465616d5f736c6176655f3000000000766c616e3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000330003f508000000000000000000000000000000c800f800000000000000000000000000000000000000000000000000300053455400000000000000002000000000000000000000000000000000000205000103e500640981000000060000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000fe43ef53f2da1f21f67933ae04add4d9d020e67533607059cade10d3ef7d51e3ac64197b1da5b0cb69865e44b89b932d4eb5d40111e8898b1b5637ddc94b0732a5785a5ca51222589eccaeabfe4a8529f82fe8f2f3054b5d66428fc34f90a999d430efdcb8"], 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x2) openat(r6, &(0x7f00000002c0)='./file0\x00', 0x20001, 0x100) r10 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r10, 0x89f0, &(0x7f00000001c0)={'bridge0\x00\x00\x00\x00\x00\x00\x00\x00\x02', &(0x7f0000000340)=ANY=[@ANYRES64=r1, @ANYRES32=r10, @ANYRESDEC, @ANYPTR64=&(0x7f0000000000)=ANY=[@ANYRESOCT=r10]]}) 03:57:12 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf0") perf_event_open(&(0x7f0000000000)={0x2, 0x3, 0x800000000000012, 0x1, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:57:12 executing program 2: r0 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_NEW_DEST(r0, 0x0, 0x40000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="2537110b9523145bf78fd24358fa4d58089f39722092414ea5e060e1858bdf6c2beefb55075fc790e1a9bc2d9b69717d20991016430e90c90d273b8a84210b61a8a2daf2089b1b9885990ad4fe2ee87a18", @ANYRES16, @ANYBLOB="f0062bbd7000fddbdf25120100003400090008000100030000000800020004000000080002002d1e000008000200ffff0000080002e904000000080002000900000010000600080001000200000004000200480001002c00020008000300070000004800040002000000080001000600000008000300090000000800d1de1f0000000800030003000000100001003a73797a3200000000180007000c000300020000000000000008000200f70000008206000000"], 0xb8}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) 03:57:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47b") signalfd(0xffffffffffffffff, &(0x7f0000000540)={0x40000000000009}, 0xffffffffffffff67) 03:57:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47b") signalfd(0xffffffffffffffff, &(0x7f0000000540)={0x40000000000009}, 0xffffffffffffff67) 03:57:12 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:57:12 executing program 2: r0 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_NEW_DEST(r0, 0x0, 0x40000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="2537110b9523145bf78fd24358fa4d58089f39722092414ea5e060e1858bdf6c2beefb55075fc790e1a9bc2d9b69717d20991016430e90c90d273b8a84210b61a8a2daf2089b1b9885990ad4fe2ee87a18", @ANYRES16, @ANYBLOB="f0062bbd7000fddbdf25120100003400090008000100030000000800020004000000080002002d1e000008000200ffff0000080002e904000000080002000900000010000600080001000200000004000200480001002c00020008000300070000004800040002000000080001000600000008000300090000000800d1de1f0000000800030003000000100001003a73797a3200000000180007000c000300020000000000000008000200f70000008206000000"], 0xb8}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) 03:57:15 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe5420", 0x71}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:57:15 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @broadcast}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x2af) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000040)=':', 0x1, 0x4008000, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff}) dup2(r1, r0) 03:57:15 executing program 2: r0 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_NEW_DEST(r0, 0x0, 0x40000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="2537110b9523145bf78fd24358fa4d58089f39722092414ea5e060e1858bdf6c2beefb55075fc790e1a9bc2d9b69717d20991016430e90c90d273b8a84210b61a8a2daf2089b1b9885990ad4fe2ee87a18", @ANYRES16, @ANYBLOB="f0062bbd7000fddbdf25120100003400090008000100030000000800020004000000080002002d1e000008000200ffff0000080002e904000000080002000900000010000600080001000200000004000200480001002c00020008000300070000004800040002000000080001000600000008000300090000000800d1de1f0000000800030003000000100001003a73797a3200000000180007000c000300020000000000000008000200f70000008206000000"], 0xb8}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) 03:57:15 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:57:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47b") signalfd(0xffffffffffffffff, &(0x7f0000000540)={0x40000000000009}, 0xffffffffffffff67) 03:57:15 executing program 1: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r3, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000200)='hsr0\x00') exit(0x0) r4 = fanotify_init(0x40, 0x2) r5 = open$dir(&(0x7f0000000080)='./file0\x00', 0x20881, 0x2) msgget$private(0x0, 0x2) fcntl$setsig(r5, 0xa, 0x7) fanotify_mark(r4, 0x8, 0x1, r5, &(0x7f0000000100)='./file0\x00') r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') r7 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r7, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") r8 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) poll(&(0x7f0000000280)=[{r8}], 0x1, 0x0) signalfd(r8, &(0x7f0000000540)={0x40000000000009}, 0xffffffffffffff67) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="2537110b9523145bf78fd24358fa4d58089f39722092414ea5e060e1858bdf6c2beefb55075fc790e1a9bc2d9b69717d20991016430e90c90d273b8a84210b61a8a2daf2089b1b9885990ad4fe2ee87a18", @ANYRES16=r6, @ANYBLOB="f0062bbd7000fddbdf25120100003400090008000100030000000800020004000000080002002d1e000008000200ffff0000080002e904000000080002000900000010000600080001000200000004000200480001002c00020008000300070000004800040002000000080001000600000008000300090000000800d1de1f0000000800030003000000100001003a73797a3200000000180007000c000300020000000000000008000200f70000008206000000"], 0xb8}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) perf_event_open(&(0x7f0000000000)={0x2, 0x3, 0x800000000000012, 0x1, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$join(0x1, &(0x7f00000000c0)={'syz', 0x1}) setsockopt$IP6T_SO_SET_REPLACE(r4, 0x29, 0x40, &(0x7f0000001000)=ANY=[@ANYRESDEC=r5, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYBLOB="0000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000090810a161e873bbe6d9a5042ae1507008b1d5564e825aad9f7fadf1686df5cccfb171f694009799bff176d2bc4c70c0966ebf415ec8d"], @ANYBLOB="fe88000000000000000000000000010100000000000000000000000000000001000000ffff7fff00ffffffffffffff00ffffffffffffffff000000ff000000ff687773696d300000000000000000000067726574617030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff000008000000000000000000000000005e0ece0040000000000000000000000000000000c80000010000000000000000000000000000000000000000000000003800534554000000000000000000000000000000000000000000ff00000000034000030309000300070008ff7a030000060000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100138020000000000000000000000000000000000000000000000004800647374000000000000000000000000000000000000000000000000000000aea4af470101400002007e65040005000500010005007f0004000100050003007b409cbef2ea6552f200d0020400100028015345434d41524b0000000000000000000000000000000000000000000000010000000300000073797374656d5f753a6f626a6563745f723a646863705f73746174655f743a733000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fe800000000000000000000000000021fe8000000000000000000000000200bbffffffff00000000000000ff00000000ffffff00000000ff000000ff000000ff7465616d5f736c6176655f3000000000766c616e3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000330003f508000000000000000000000000000000c800f800000000000000000000000000000000000000000000000000300053455400000000000000002000000000000000000000000000000000000205000103e500640981000000060000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000fe43ef53f2da1f21f67933ae04add4d9d020e67533607059cade10d3ef7d51e3ac64197b1da5b0cb69865e44b89b932d4eb5d40111e8898b1b5637ddc94b0732a5785a5ca51222589eccaeabfe4a8529f82fe8f2f3054b5d66428fc34f90a999d430efdcb8"], 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x2) openat(r5, &(0x7f00000002c0)='./file0\x00', 0x20001, 0x100) socket$inet_udp(0x2, 0x2, 0x0) 03:57:15 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:57:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf0") signalfd(0xffffffffffffffff, &(0x7f0000000540)={0x40000000000009}, 0xffffffffffffff67) [ 2138.543789][T16047] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 03:57:15 executing program 2: r0 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x3}, 0x1, 0x0, 0x0, 0x800}, 0x40000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="2537110b9523145bf78fd24358fa4d58089f39722092414ea5e060e1858bdf6c2beefb55075fc790e1a9bc2d9b69717d20991016430e90c90d273b8a84210b61a8a2daf2089b1b9885990ad4fe2ee87a18", @ANYRES16, @ANYBLOB="f0062bbd7000fddbdf25120100003400090008000100030000000800020004000000080002002d1e000008000200ffff0000080002e904000000080002000900000010000600080001000200000004000200480001002c00020008000300070000004800040002000000080001000600000008000300090000000800d1de1f0000000800030003000000100001003a73797a3200000000180007000c000300020000000000000008000200f70000008206000000"], 0xb8}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) 03:57:15 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") perf_event_open(&(0x7f0000000000)={0x0, 0x3, 0x800000000000012, 0x1, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:57:15 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @broadcast}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x2af) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000040)=':', 0x1, 0x4008000, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff}) dup2(r1, r0) 03:57:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf0") signalfd(0xffffffffffffffff, &(0x7f0000000540)={0x40000000000009}, 0xffffffffffffff67) 03:57:18 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe5420", 0x71}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:57:18 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") perf_event_open(&(0x7f0000000000)={0x0, 0x3, 0x0, 0x1, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:57:18 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf0") signalfd(0xffffffffffffffff, &(0x7f0000000540)={0x40000000000009}, 0xffffffffffffff67) 03:57:18 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @broadcast}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x2af) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000040)=':', 0x1, 0x4008000, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff}) dup2(r1, r0) 03:57:18 executing program 2: r0 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x800}, 0x40000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="2537110b9523145bf78fd24358fa4d58089f39722092414ea5e060e1858bdf6c2beefb55075fc790e1a9bc2d9b69717d20991016430e90c90d273b8a84210b61a8a2daf2089b1b9885990ad4fe2ee87a18", @ANYRES16, @ANYBLOB="f0062bbd7000fddbdf25120100003400090008000100030000000800020004000000080002002d1e000008000200ffff0000080002e904000000080002000900000010000600080001000200000004000200480001002c00020008000300070000004800040002000000080001000600000008000300090000000800d1de1f0000000800030003000000100001003a73797a3200000000180007000c000300020000000000000008000200f70000008206000000"], 0xb8}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) 03:57:18 executing program 1: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r3, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000200)='hsr0\x00') exit(0x0) r4 = fanotify_init(0x40, 0x2) r5 = open$dir(&(0x7f0000000080)='./file0\x00', 0x20881, 0x2) msgget$private(0x0, 0x2) fcntl$setsig(r5, 0xa, 0x7) fanotify_mark(r4, 0x8, 0x1, r5, &(0x7f0000000100)='./file0\x00') r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') r7 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r7, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") r8 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) poll(&(0x7f0000000280)=[{r8}], 0x1, 0x0) signalfd(r8, &(0x7f0000000540)={0x40000000000009}, 0xffffffffffffff67) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="2537110b9523145bf78fd24358fa4d58089f39722092414ea5e060e1858bdf6c2beefb55075fc790e1a9bc2d9b69717d20991016430e90c90d273b8a84210b61a8a2daf2089b1b9885990ad4fe2ee87a18", @ANYRES16=r6, @ANYBLOB="f0062bbd7000fddbdf25120100003400090008000100030000000800020004000000080002002d1e000008000200ffff0000080002e904000000080002000900000010000600080001000200000004000200480001002c00020008000300070000004800040002000000080001000600000008000300090000000800d1de1f0000000800030003000000100001003a73797a3200000000180007000c000300020000000000000008000200f70000008206000000"], 0xb8}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) perf_event_open(&(0x7f0000000000)={0x2, 0x3, 0x800000000000012, 0x1, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$join(0x1, &(0x7f00000000c0)={'syz', 0x1}) setsockopt$IP6T_SO_SET_REPLACE(r4, 0x29, 0x40, &(0x7f0000001000)=ANY=[@ANYRESDEC=r5, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYBLOB="0000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000090810a161e873bbe6d9a5042ae1507008b1d5564e825aad9f7fadf1686df5cccfb171f694009799bff176d2bc4c70c0966ebf415ec8d"], @ANYBLOB="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"], 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x2) openat(r5, &(0x7f00000002c0)='./file0\x00', 0x20001, 0x100) 03:57:18 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") perf_event_open(&(0x7f0000000000)={0x0, 0x3, 0x0, 0x0, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:57:18 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") signalfd(0xffffffffffffffff, 0x0, 0x0) 03:57:18 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @broadcast}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x2af) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000040)=':', 0x1, 0x4008000, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff}) dup2(r1, r0) 03:57:18 executing program 2: r0 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x800}, 0x40000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="2537110b9523145bf78fd24358fa4d58089f39722092414ea5e060e1858bdf6c2beefb55075fc790e1a9bc2d9b69717d20991016430e90c90d273b8a84210b61a8a2daf2089b1b9885990ad4fe2ee87a18", @ANYRES16, @ANYBLOB="f0062bbd7000fddbdf25120100003400090008000100030000000800020004000000080002002d1e000008000200ffff0000080002e904000000080002000900000010000600080001000200000004000200480001002c00020008000300070000004800040002000000080001000600000008000300090000000800d1de1f0000000800030003000000100001003a73797a3200000000180007000c000300020000000000000008000200f70000008206000000"], 0xb8}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) 03:57:18 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") perf_event_open(&(0x7f0000000000)={0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:57:18 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @broadcast}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x2af) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000040)=':', 0x1, 0x4008000, 0x0, 0x0) dup2(0xffffffffffffffff, r0) 03:57:21 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa", 0x73}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:57:21 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x15, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x8}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251}, 0x48) 03:57:21 executing program 2: r0 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x800}, 0x40000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="2537110b9523145bf78fd24358fa4d58089f39722092414ea5e060e1858bdf6c2beefb55075fc790e1a9bc2d9b69717d20991016430e90c90d273b8a84210b61a8a2daf2089b1b9885990ad4fe2ee87a18", @ANYRES16, @ANYBLOB="f0062bbd7000fddbdf25120100003400090008000100030000000800020004000000080002002d1e000008000200ffff0000080002e904000000080002000900000010000600080001000200000004000200480001002c00020008000300070000004800040002000000080001000600000008000300090000000800d1de1f0000000800030003000000100001003a73797a3200000000180007000c000300020000000000000008000200f70000008206000000"], 0xb8}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) 03:57:21 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") perf_event_open(&(0x7f0000000000)={0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:57:21 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @broadcast}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x2af) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000040)=':', 0x1, 0x4008000, 0x0, 0x0) dup2(0xffffffffffffffff, r0) 03:57:21 executing program 1: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r3, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000200)='hsr0\x00') exit(0x0) r4 = fanotify_init(0x40, 0x2) r5 = open$dir(&(0x7f0000000080)='./file0\x00', 0x20881, 0x2) msgget$private(0x0, 0x2) fcntl$setsig(r5, 0xa, 0x7) fanotify_mark(r4, 0x8, 0x1, r5, &(0x7f0000000100)='./file0\x00') r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') r7 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r7, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") r8 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) poll(&(0x7f0000000280)=[{r8}], 0x1, 0x0) signalfd(r8, &(0x7f0000000540)={0x40000000000009}, 0xffffffffffffff67) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="2537110b9523145bf78fd24358fa4d58089f39722092414ea5e060e1858bdf6c2beefb55075fc790e1a9bc2d9b69717d20991016430e90c90d273b8a84210b61a8a2daf2089b1b9885990ad4fe2ee87a18", @ANYRES16=r6, @ANYBLOB="f0062bbd7000fddbdf25120100003400090008000100030000000800020004000000080002002d1e000008000200ffff0000080002e904000000080002000900000010000600080001000200000004000200480001002c00020008000300070000004800040002000000080001000600000008000300090000000800d1de1f0000000800030003000000100001003a73797a3200000000180007000c000300020000000000000008000200f70000008206000000"], 0xb8}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) perf_event_open(&(0x7f0000000000)={0x2, 0x3, 0x800000000000012, 0x1, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$join(0x1, &(0x7f00000000c0)={'syz', 0x1}) setsockopt$IP6T_SO_SET_REPLACE(r4, 0x29, 0x40, &(0x7f0000001000)=ANY=[@ANYRESDEC=r5, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYBLOB="0000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000090810a161e873bbe6d9a5042ae1507008b1d5564e825aad9f7fadf1686df5cccfb171f694009799bff176d2bc4c70c0966ebf415ec8d"], @ANYBLOB="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"], 0x3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x2) 03:57:21 executing program 0: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x2000002) fallocate(r2, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000040)={0xff00, r3, 0x0, 0x0, 0xf}) sendfile(r0, r1, 0x0, 0x10000) 03:57:21 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") perf_event_open(&(0x7f0000000000)={0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:57:21 executing program 2: r0 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x1, 0x0, 0x0, 0x800}, 0x40000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="2537110b9523145bf78fd24358fa4d58089f39722092414ea5e060e1858bdf6c2beefb55075fc790e1a9bc2d9b69717d20991016430e90c90d273b8a84210b61a8a2daf2089b1b9885990ad4fe2ee87a18", @ANYRES16, @ANYBLOB="f0062bbd7000fddbdf25120100003400090008000100030000000800020004000000080002002d1e000008000200ffff0000080002e904000000080002000900000010000600080001000200000004000200480001002c00020008000300070000004800040002000000080001000600000008000300090000000800d1de1f0000000800030003000000100001003a73797a3200000000180007000c000300020000000000000008000200f70000008206000000"], 0xb8}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) 03:57:21 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @broadcast}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x2af) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000040)=':', 0x1, 0x4008000, 0x0, 0x0) dup2(0xffffffffffffffff, r0) 03:57:21 executing program 2: r0 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)}, 0x40000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="2537110b9523145bf78fd24358fa4d58089f39722092414ea5e060e1858bdf6c2beefb55075fc790e1a9bc2d9b69717d20991016430e90c90d273b8a84210b61a8a2daf2089b1b9885990ad4fe2ee87a18", @ANYRES16, @ANYBLOB="f0062bbd7000fddbdf25120100003400090008000100030000000800020004000000080002002d1e000008000200ffff0000080002e904000000080002000900000010000600080001000200000004000200480001002c00020008000300070000004800040002000000080001000600000008000300090000000800d1de1f0000000800030003000000100001003a73797a3200000000180007000c000300020000000000000008000200f70000008206000000"], 0xb8}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) [ 2144.794186][ T26] audit: type=1800 audit(2000001441.300:313): pid=16134 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17457 res=0 03:57:21 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") perf_event_open(&(0x7f0000000000)={0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2144.881024][ T26] audit: type=1804 audit(2000001441.330:314): pid=16134 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir632706297/syzkaller.hYyTFP/966/file0" dev="sda1" ino=17457 res=1 [ 2144.951179][ T26] audit: type=1804 audit(2000001441.340:315): pid=16134 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir632706297/syzkaller.hYyTFP/966/file0" dev="sda1" ino=17457 res=1 [ 2144.985303][ T26] audit: type=1804 audit(2000001441.420:316): pid=16146 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir632706297/syzkaller.hYyTFP/966/file0" dev="sda1" ino=17457 res=1 03:57:24 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa", 0x73}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:57:24 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @broadcast}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x2af) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) pipe(&(0x7f0000000440)={0xffffffffffffffff}) dup2(r1, r0) 03:57:24 executing program 2: r0 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="2537110b9523145bf78fd24358fa4d58089f39722092414ea5e060e1858bdf6c2beefb55075fc790e1a9bc2d9b69717d20991016430e90c90d273b8a84210b61a8a2daf2089b1b9885990ad4fe2ee87a18", @ANYRES16, @ANYBLOB="f0062bbd7000fddbdf25120100003400090008000100030000000800020004000000080002002d1e000008000200ffff0000080002e904000000080002000900000010000600080001000200000004000200480001002c00020008000300070000004800040002000000080001000600000008000300090000000800d1de1f0000000800030003000000100001003a73797a3200000000180007000c000300020000000000000008000200f70000008206000000"], 0xb8}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) 03:57:24 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") perf_event_open(&(0x7f0000000000)={0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:57:24 executing program 0: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x2000002) fallocate(r2, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000040)={0xff00, r3, 0x0, 0x0, 0xf}) sendfile(r0, r1, 0x0, 0x10000) 03:57:24 executing program 1: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r3, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000200)='hsr0\x00') exit(0x0) r4 = fanotify_init(0x40, 0x2) r5 = open$dir(&(0x7f0000000080)='./file0\x00', 0x20881, 0x2) msgget$private(0x0, 0x2) fcntl$setsig(r5, 0xa, 0x7) fanotify_mark(r4, 0x8, 0x1, r5, &(0x7f0000000100)='./file0\x00') r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') r7 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r7, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") r8 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) poll(&(0x7f0000000280)=[{r8}], 0x1, 0x0) signalfd(r8, &(0x7f0000000540)={0x40000000000009}, 0xffffffffffffff67) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="2537110b9523145bf78fd24358fa4d58089f39722092414ea5e060e1858bdf6c2beefb55075fc790e1a9bc2d9b69717d20991016430e90c90d273b8a84210b61a8a2daf2089b1b9885990ad4fe2ee87a18", @ANYRES16=r6, @ANYBLOB="f0062bbd7000fddbdf25120100003400090008000100030000000800020004000000080002002d1e000008000200ffff0000080002e904000000080002000900000010000600080001000200000004000200480001002c00020008000300070000004800040002000000080001000600000008000300090000000800d1de1f0000000800030003000000100001003a73797a3200000000180007000c000300020000000000000008000200f70000008206000000"], 0xb8}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) perf_event_open(&(0x7f0000000000)={0x2, 0x3, 0x800000000000012, 0x1, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$join(0x1, &(0x7f00000000c0)={'syz', 0x1}) setsockopt$IP6T_SO_SET_REPLACE(r4, 0x29, 0x40, &(0x7f0000001000)=ANY=[@ANYRESDEC=r5, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYBLOB="0000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000090810a161e873bbe6d9a5042ae1507008b1d5564e825aad9f7fadf1686df5cccfb171f694009799bff176d2bc4c70c0966ebf415ec8d"], @ANYBLOB="fe88000000000000000000000000010100000000000000000000000000000001000000ffff7fff00ffffffffffffff00ffffffffffffffff000000ff000000ff687773696d300000000000000000000067726574617030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff000008000000000000000000000000005e0ece0040000000000000000000000000000000c80000010000000000000000000000000000000000000000000000003800534554000000000000000000000000000000000000000000ff00000000034000030309000300070008ff7a030000060000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100138020000000000000000000000000000000000000000000000004800647374000000000000000000000000000000000000000000000000000000aea4af470101400002007e65040005000500010005007f0004000100050003007b409cbef2ea6552f200d0020400100028015345434d41524b0000000000000000000000000000000000000000000000010000000300000073797374656d5f753a6f626a6563745f723a646863705f73746174655f743a733000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fe800000000000000000000000000021fe8000000000000000000000000200bbffffffff00000000000000ff00000000ffffff00000000ff000000ff000000ff7465616d5f736c6176655f3000000000766c616e3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000330003f508000000000000000000000000000000c800f800000000000000000000000000000000000000000000000000300053455400000000000000002000000000000000000000000000000000000205000103e500640981000000060000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000fe43ef53f2da1f21f67933ae04add4d9d020e67533607059cade10d3ef7d51e3ac64197b1da5b0cb69865e44b89b932d4eb5d40111e8898b1b5637ddc94b0732a5785a5ca51222589eccaeabfe4a8529f82fe8f2f3054b5d66428fc34f90a999d430efdcb8"], 0x3) 03:57:24 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") perf_event_open(&(0x7f0000000000)={0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:57:24 executing program 2: r0 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="2537110b9523145bf78fd24358fa4d58089f39722092414ea5e060e1858bdf6c2beefb55075fc790e1a9bc2d9b69717d20991016430e90c90d273b8a84210b61a8a2daf2089b1b9885990ad4fe2ee87a18", @ANYRES16, @ANYBLOB="f0062bbd7000fddbdf25120100003400090008000100030000000800020004000000080002002d1e000008000200ffff0000080002e904000000080002000900000010000600080001000200000004000200480001002c00020008000300070000004800040002000000080001000600000008000300090000000800d1de1f0000000800030003000000100001003a73797a3200000000180007000c000300020000000000000008000200f70000008206000000"], 0xb8}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) [ 2147.760264][ T26] audit: type=1800 audit(2000001444.260:317): pid=16162 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17671 res=0 03:57:24 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @broadcast}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x2af) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) pipe(&(0x7f0000000440)={0xffffffffffffffff}) dup2(r1, r0) [ 2147.825407][ T26] audit: type=1804 audit(2000001444.310:318): pid=16162 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir632706297/syzkaller.hYyTFP/967/file0" dev="sda1" ino=17671 res=1 03:57:24 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") perf_event_open(&(0x7f0000000000)={0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:57:24 executing program 2: r0 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="2537110b9523145bf78fd24358fa4d58089f39722092414ea5e060e1858bdf6c2beefb55075fc790e1a9bc2d9b69717d20991016430e90c90d273b8a84210b61a8a2daf2089b1b9885990ad4fe2ee87a18", @ANYRES16, @ANYBLOB="f0062bbd7000fddbdf25120100003400090008000100030000000800020004000000080002002d1e000008000200ffff0000080002e904000000080002000900000010000600080001000200000004000200480001002c00020008000300070000004800040002000000080001000600000008000300090000000800d1de1f0000000800030003000000100001003a73797a3200000000180007000c000300020000000000000008000200f70000008206000000"], 0xb8}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) 03:57:24 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @broadcast}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x2af) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) pipe(&(0x7f0000000440)={0xffffffffffffffff}) dup2(r1, r0) [ 2147.907438][ T26] audit: type=1804 audit(2000001444.380:319): pid=16162 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir632706297/syzkaller.hYyTFP/967/file0" dev="sda1" ino=17671 res=1 03:57:27 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa", 0x73}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:57:27 executing program 0: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x2000002) fallocate(r2, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000040)={0xff00, r3, 0x0, 0x0, 0xf}) sendfile(r0, r1, 0x0, 0x10000) 03:57:27 executing program 2: r0 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="2537110b9523145bf78fd24358fa4d58089f39722092414ea5e060e1858bdf6c2beefb55075fc790e1a9bc2d9b69717d20991016430e90c90d273b8a84210b61a8a2daf2089b1b9885990ad4fe2ee87a18", @ANYRES16, @ANYBLOB="f0062bbd7000fddbdf25120100003400090008000100030000000800020004000000080002002d1e000008000200ffff0000080002e904000000080002000900000010000600080001000200000004000200480001002c00020008000300070000004800040002000000080001000600000008000300090000000800d1de1f0000000800030003000000100001003a73797a3200000000180007000c000300020000000000000008000200f70000008206000000"], 0xb8}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) 03:57:27 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") perf_event_open(&(0x7f0000000000)={0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:57:27 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @broadcast}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x2af) sendto$inet(r0, &(0x7f0000000040)=':', 0x1, 0x4008000, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff}) dup2(r1, r0) 03:57:27 executing program 1: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r3, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000200)='hsr0\x00') exit(0x0) r4 = fanotify_init(0x40, 0x2) r5 = open$dir(&(0x7f0000000080)='./file0\x00', 0x20881, 0x2) msgget$private(0x0, 0x2) fcntl$setsig(r5, 0xa, 0x7) fanotify_mark(r4, 0x8, 0x1, r5, &(0x7f0000000100)='./file0\x00') r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') r7 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r7, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") r8 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) poll(&(0x7f0000000280)=[{r8}], 0x1, 0x0) signalfd(r8, &(0x7f0000000540)={0x40000000000009}, 0xffffffffffffff67) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="2537110b9523145bf78fd24358fa4d58089f39722092414ea5e060e1858bdf6c2beefb55075fc790e1a9bc2d9b69717d20991016430e90c90d273b8a84210b61a8a2daf2089b1b9885990ad4fe2ee87a18", @ANYRES16=r6, @ANYBLOB="f0062bbd7000fddbdf25120100003400090008000100030000000800020004000000080002002d1e000008000200ffff0000080002e904000000080002000900000010000600080001000200000004000200480001002c00020008000300070000004800040002000000080001000600000008000300090000000800d1de1f0000000800030003000000100001003a73797a3200000000180007000c000300020000000000000008000200f70000008206000000"], 0xb8}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) perf_event_open(&(0x7f0000000000)={0x2, 0x3, 0x800000000000012, 0x1, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$join(0x1, &(0x7f00000000c0)={'syz', 0x1}) 03:57:27 executing program 2: r0 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x0, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="2537110b9523145bf78fd24358fa4d58089f39722092414ea5e060e1858bdf6c2beefb55075fc790e1a9bc2d9b69717d20991016430e90c90d273b8a84210b61a8a2daf2089b1b9885990ad4fe2ee87a18", @ANYRES16, @ANYBLOB="f0062bbd7000fddbdf25120100003400090008000100030000000800020004000000080002002d1e000008000200ffff0000080002e904000000080002000900000010000600080001000200000004000200480001002c00020008000300070000004800040002000000080001000600000008000300090000000800d1de1f0000000800030003000000100001003a73797a3200000000180007000c000300020000000000000008000200f70000008206000000"], 0xb8}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) [ 2150.821575][ T26] audit: type=1800 audit(2000001447.320:320): pid=16191 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17681 res=0 03:57:27 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @broadcast}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x2af) sendto$inet(r0, &(0x7f0000000040)=':', 0x1, 0x4008000, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff}) dup2(r1, r0) 03:57:27 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") perf_event_open(&(0x7f0000000000)={0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2150.881523][ T26] audit: type=1804 audit(2000001447.380:321): pid=16191 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir632706297/syzkaller.hYyTFP/968/file0" dev="sda1" ino=17681 res=1 [ 2150.935612][ T26] audit: type=1804 audit(2000001447.440:322): pid=16191 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir632706297/syzkaller.hYyTFP/968/file0" dev="sda1" ino=17681 res=1 03:57:27 executing program 2: r0 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x0, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="2537110b9523145bf78fd24358fa4d58089f39722092414ea5e060e1858bdf6c2beefb55075fc790e1a9bc2d9b69717d20991016430e90c90d273b8a84210b61a8a2daf2089b1b9885990ad4fe2ee87a18", @ANYRES16, @ANYBLOB="f0062bbd7000fddbdf25120100003400090008000100030000000800020004000000080002002d1e000008000200ffff0000080002e904000000080002000900000010000600080001000200000004000200480001002c00020008000300070000004800040002000000080001000600000008000300090000000800d1de1f0000000800030003000000100001003a73797a3200000000180007000c000300020000000000000008000200f70000008206000000"], 0xb8}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) 03:57:27 executing program 0: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x2000002) fallocate(r2, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000040)={0xff00, r3, 0x0, 0x0, 0xf}) sendfile(r0, r1, 0x0, 0x10000) 03:57:27 executing program 3: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f000018efdc)="240000005a001f0214f9f407000904fcffffff1010000400feffffff0800000000000000", 0x24) [ 2151.090735][ T26] audit: type=1800 audit(2000001447.590:323): pid=16216 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17681 res=0 [ 2151.153981][ T26] audit: type=1804 audit(2000001447.660:324): pid=16216 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir632706297/syzkaller.hYyTFP/969/file0" dev="sda1" ino=17681 res=1 [ 2151.179065][ T26] audit: type=1804 audit(2000001447.660:325): pid=16216 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir632706297/syzkaller.hYyTFP/969/file0" dev="sda1" ino=17681 res=1 03:57:30 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a", 0x74}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:57:30 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @broadcast}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x2af) sendto$inet(r0, &(0x7f0000000040)=':', 0x1, 0x4008000, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff}) dup2(r1, r0) 03:57:30 executing program 2: r0 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x0, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="2537110b9523145bf78fd24358fa4d58089f39722092414ea5e060e1858bdf6c2beefb55075fc790e1a9bc2d9b69717d20991016430e90c90d273b8a84210b61a8a2daf2089b1b9885990ad4fe2ee87a18", @ANYRES16, @ANYBLOB="f0062bbd7000fddbdf25120100003400090008000100030000000800020004000000080002002d1e000008000200ffff0000080002e904000000080002000900000010000600080001000200000004000200480001002c00020008000300070000004800040002000000080001000600000008000300090000000800d1de1f0000000800030003000000100001003a73797a3200000000180007000c000300020000000000000008000200f70000008206000000"], 0xb8}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) 03:57:30 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f0000000140)='./file0\x00', 0x0) listxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 03:57:30 executing program 0: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x2000002) fallocate(r2, 0x0, 0x0, 0x110001) sendfile(r0, r1, 0x0, 0x10000) 03:57:30 executing program 1: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r3, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000200)='hsr0\x00') exit(0x0) r4 = fanotify_init(0x40, 0x2) r5 = open$dir(&(0x7f0000000080)='./file0\x00', 0x20881, 0x2) msgget$private(0x0, 0x2) fcntl$setsig(r5, 0xa, 0x7) fanotify_mark(r4, 0x8, 0x1, r5, &(0x7f0000000100)='./file0\x00') r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') r7 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r7, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") r8 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) poll(&(0x7f0000000280)=[{r8}], 0x1, 0x0) signalfd(r8, &(0x7f0000000540)={0x40000000000009}, 0xffffffffffffff67) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="2537110b9523145bf78fd24358fa4d58089f39722092414ea5e060e1858bdf6c2beefb55075fc790e1a9bc2d9b69717d20991016430e90c90d273b8a84210b61a8a2daf2089b1b9885990ad4fe2ee87a18", @ANYRES16=r6, @ANYBLOB="f0062bbd7000fddbdf25120100003400090008000100030000000800020004000000080002002d1e000008000200ffff0000080002e904000000080002000900000010000600080001000200000004000200480001002c00020008000300070000004800040002000000080001000600000008000300090000000800d1de1f0000000800030003000000100001003a73797a3200000000180007000c000300020000000000000008000200f70000008206000000"], 0xb8}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) perf_event_open(&(0x7f0000000000)={0x2, 0x3, 0x800000000000012, 0x1, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:57:30 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000040)=':', 0x1, 0x4008000, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff}) dup2(r1, r0) [ 2153.896068][ T26] audit: type=1800 audit(2000001450.400:326): pid=16227 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17701 res=0 03:57:30 executing program 2: r0 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, 0x0) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="2537110b9523145bf78fd24358fa4d58089f39722092414ea5e060e1858bdf6c2beefb55075fc790e1a9bc2d9b69717d20991016430e90c90d273b8a84210b61a8a2daf2089b1b9885990ad4fe2ee87a18", @ANYRES16, @ANYBLOB="f0062bbd7000fddbdf25120100003400090008000100030000000800020004000000080002002d1e000008000200ffff0000080002e904000000080002000900000010000600080001000200000004000200480001002c00020008000300070000004800040002000000080001000600000008000300090000000800d1de1f0000000800030003000000100001003a73797a3200000000180007000c000300020000000000000008000200f70000008206000000"], 0xb8}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) 03:57:30 executing program 0: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x2000002) fallocate(r2, 0x0, 0x0, 0x110001) sendfile(r0, r1, 0x0, 0x10000) [ 2153.967151][ T26] audit: type=1804 audit(2000001450.400:327): pid=16227 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir632706297/syzkaller.hYyTFP/970/file0" dev="sda1" ino=17701 res=1 03:57:30 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x6) [ 2154.007642][ T26] audit: type=1804 audit(2000001450.410:328): pid=16227 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir632706297/syzkaller.hYyTFP/970/file0" dev="sda1" ino=17701 res=1 03:57:30 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000040)=':', 0x1, 0x4008000, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff}) dup2(r1, r0) 03:57:30 executing program 2: r0 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, 0x0) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="2537110b9523145bf78fd24358fa4d58089f39722092414ea5e060e1858bdf6c2beefb55075fc790e1a9bc2d9b69717d20991016430e90c90d273b8a84210b61a8a2daf2089b1b9885990ad4fe2ee87a18", @ANYRES16, @ANYBLOB="f0062bbd7000fddbdf25120100003400090008000100030000000800020004000000080002002d1e000008000200ffff0000080002e904000000080002000900000010000600080001000200000004000200480001002c00020008000300070000004800040002000000080001000600000008000300090000000800d1de1f0000000800030003000000100001003a73797a3200000000180007000c000300020000000000000008000200f70000008206000000"], 0xb8}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) [ 2154.078745][ T26] audit: type=1800 audit(2000001450.580:329): pid=16246 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17704 res=0 03:57:33 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a", 0x74}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:57:33 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000040)=':', 0x1, 0x4008000, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff}) dup2(r1, r0) 03:57:33 executing program 0: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x2000002) fallocate(r2, 0x0, 0x0, 0x110001) sendfile(r0, r1, 0x0, 0x10000) 03:57:33 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x6) 03:57:33 executing program 2: r0 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, 0x0) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="2537110b9523145bf78fd24358fa4d58089f39722092414ea5e060e1858bdf6c2beefb55075fc790e1a9bc2d9b69717d20991016430e90c90d273b8a84210b61a8a2daf2089b1b9885990ad4fe2ee87a18", @ANYRES16, @ANYBLOB="f0062bbd7000fddbdf25120100003400090008000100030000000800020004000000080002002d1e000008000200ffff0000080002e904000000080002000900000010000600080001000200000004000200480001002c00020008000300070000004800040002000000080001000600000008000300090000000800d1de1f0000000800030003000000100001003a73797a3200000000180007000c000300020000000000000008000200f70000008206000000"], 0xb8}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) 03:57:33 executing program 1: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r3, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000200)='hsr0\x00') exit(0x0) r4 = fanotify_init(0x40, 0x2) r5 = open$dir(&(0x7f0000000080)='./file0\x00', 0x20881, 0x2) msgget$private(0x0, 0x2) fcntl$setsig(r5, 0xa, 0x7) fanotify_mark(r4, 0x8, 0x1, r5, &(0x7f0000000100)='./file0\x00') r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') r7 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r7, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") r8 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) poll(&(0x7f0000000280)=[{r8}], 0x1, 0x0) signalfd(r8, &(0x7f0000000540)={0x40000000000009}, 0xffffffffffffff67) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="2537110b9523145bf78fd24358fa4d58089f39722092414ea5e060e1858bdf6c2beefb55075fc790e1a9bc2d9b69717d20991016430e90c90d273b8a84210b61a8a2daf2089b1b9885990ad4fe2ee87a18", @ANYRES16=r6, @ANYBLOB="f0062bbd7000fddbdf25120100003400090008000100030000000800020004000000080002002d1e000008000200ffff0000080002e904000000080002000900000010000600080001000200000004000200480001002c00020008000300070000004800040002000000080001000600000008000300090000000800d1de1f0000000800030003000000100001003a73797a3200000000180007000c000300020000000000000008000200f70000008206000000"], 0xb8}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) 03:57:33 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x2af) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000040)=':', 0x1, 0x4008000, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff}) dup2(r1, r0) [ 2156.982028][ T26] kauditd_printk_skb: 2 callbacks suppressed [ 2156.982040][ T26] audit: type=1800 audit(2000001453.480:332): pid=16268 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17717 res=0 03:57:33 executing program 2: r0 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="2537110b9523145bf78fd24358fa4d58089f39722092414ea5e060e1858bdf6c2beefb55075fc790e1a9bc2d9b69717d20991016430e90c90d273b8a84210b61a8a2daf2089b1b9885990ad4fe2ee87a18", @ANYRES16, @ANYBLOB="f0062bbd7000fddbdf25120100003400090008000100030000000800020004000000080002002d1e000008000200ffff0000080002e904000000080002000900000010000600080001000200000004000200480001002c00020008000300070000004800040002000000080001000600000008000300090000000800d1de1f0000000800030003000000100001003a73797a3200000000180007000c000300020000000000000008000200f70000008206000000"], 0xb8}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) 03:57:33 executing program 0: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x2000002) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000040)={0xff00, r3, 0x0, 0x0, 0xf}) sendfile(r0, r1, 0x0, 0x10000) 03:57:33 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x6) [ 2157.105212][ T26] audit: type=1804 audit(2000001453.500:333): pid=16268 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir632706297/syzkaller.hYyTFP/972/file0" dev="sda1" ino=17717 res=1 03:57:33 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x2af) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000040)=':', 0x1, 0x4008000, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff}) dup2(r1, r0) 03:57:33 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x6) [ 2157.205610][ T26] audit: type=1804 audit(2000001453.500:334): pid=16268 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir632706297/syzkaller.hYyTFP/972/file0" dev="sda1" ino=17717 res=1 [ 2157.253944][ T26] audit: type=1800 audit(2000001453.660:335): pid=16283 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17720 res=0 [ 2157.313526][ T26] audit: type=1804 audit(2000001453.670:336): pid=16283 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir632706297/syzkaller.hYyTFP/973/file0" dev="sda1" ino=17720 res=1 [ 2157.338299][ T26] audit: type=1804 audit(2000001453.700:337): pid=16283 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir632706297/syzkaller.hYyTFP/973/file0" dev="sda1" ino=17720 res=1 03:57:36 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a", 0x74}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:57:36 executing program 2: r0 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="2537110b9523145bf78fd24358fa4d58089f39722092414ea5e060e1858bdf6c2beefb55075fc790e1a9bc2d9b69717d20991016430e90c90d273b8a84210b61a8a2daf2089b1b9885990ad4fe2ee87a18", @ANYRES16, @ANYBLOB="f0062bbd7000fddbdf25120100003400090008000100030000000800020004000000080002002d1e000008000200ffff0000080002e904000000080002000900000010000600080001000200000004000200480001002c00020008000300070000004800040002000000080001000600000008000300090000000800d1de1f0000000800030003000000100001003a73797a3200000000180007000c000300020000000000000008000200f70000008206000000"], 0xb8}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) 03:57:36 executing program 0: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x2000002) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000040)={0xff00, r3, 0x0, 0x0, 0xf}) sendfile(r0, r1, 0x0, 0x10000) 03:57:36 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x2af) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000040)=':', 0x1, 0x4008000, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff}) dup2(r1, r0) 03:57:36 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x6) 03:57:36 executing program 1: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r3, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000200)='hsr0\x00') exit(0x0) r4 = fanotify_init(0x40, 0x2) r5 = open$dir(&(0x7f0000000080)='./file0\x00', 0x20881, 0x2) msgget$private(0x0, 0x2) fcntl$setsig(r5, 0xa, 0x7) fanotify_mark(r4, 0x8, 0x1, r5, &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r6, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") r7 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) poll(&(0x7f0000000280)=[{r7}], 0x1, 0x0) signalfd(r7, &(0x7f0000000540)={0x40000000000009}, 0xffffffffffffff67) 03:57:36 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x6) 03:57:36 executing program 4: bind$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x4e20, @broadcast}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x2af) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000040)=':', 0x1, 0x4008000, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff}) dup2(r0, 0xffffffffffffffff) [ 2160.100759][ T26] audit: type=1800 audit(2000001456.600:338): pid=16306 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17737 res=0 03:57:36 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x6) 03:57:36 executing program 2: r0 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="2537110b9523145bf78fd24358fa4d58089f39722092414ea5e060e1858bdf6c2beefb55075fc790e1a9bc2d9b69717d20991016430e90c90d273b8a84210b61a8a2daf2089b1b9885990ad4fe2ee87a18", @ANYRES16, @ANYBLOB="f0062bbd7000fddbdf25120100003400090008000100030000000800020004000000080002002d1e000008000200ffff0000080002e904000000080002000900000010000600080001000200000004000200480001002c00020008000300070000004800040002000000080001000600000008000300090000000800d1de1f0000000800030003000000100001003a73797a3200000000180007000c000300020000000000000008000200f70000008206000000"], 0xb8}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) [ 2160.162792][ T26] audit: type=1804 audit(2000001456.640:339): pid=16306 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir632706297/syzkaller.hYyTFP/974/file0" dev="sda1" ino=17737 res=1 03:57:36 executing program 0: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x2000002) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000040)={0xff00, r3, 0x0, 0x0, 0xf}) sendfile(r0, r1, 0x0, 0x10000) 03:57:36 executing program 2: r0 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="11dca50d5e0b") sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="2537110b9523145bf78fd24358fa4d58089f39722092414ea5e060e1858bdf6c2beefb55075fc790e1a9bc2d9b69717d20991016430e90c90d273b8a84210b61a8a2daf2089b1b9885990ad4fe2ee87a18", @ANYRES16, @ANYBLOB="f0062bbd7000fddbdf25120100003400090008000100030000000800020004000000080002002d1e000008000200ffff0000080002e904000000080002000900000010000600080001000200000004000200480001002c00020008000300070000004800040002000000080001000600000008000300090000000800d1de1f0000000800030003000000100001003a73797a3200000000180007000c000300020000000000000008000200f70000008206000000"], 0xb8}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) [ 2160.237272][ T26] audit: type=1804 audit(2000001456.660:340): pid=16306 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir632706297/syzkaller.hYyTFP/974/file0" dev="sda1" ino=17737 res=1 [ 2160.326139][ T26] audit: type=1800 audit(2000001456.810:341): pid=16324 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17722 res=0 03:57:39 executing program 2: r0 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="11dca50d5e0b") sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="2537110b9523145bf78fd24358fa4d58089f39722092414ea5e060e1858bdf6c2beefb55075fc790e1a9bc2d9b69717d20991016430e90c90d273b8a84210b61a8a2daf2089b1b9885990ad4fe2ee87a18", @ANYRES16, @ANYBLOB="f0062bbd7000fddbdf25120100003400090008000100030000000800020004000000080002002d1e000008000200ffff0000080002e904000000080002000900000010000600080001000200000004000200480001002c00020008000300070000004800040002000000080001000600000008000300090000000800d1de1f0000000800030003000000100001003a73797a3200000000180007000c000300020000000000000008000200f70000008206000000"], 0xb8}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) 03:57:39 executing program 4: bind$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x4e20, @broadcast}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x2af) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000040)=':', 0x1, 0x4008000, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff}) dup2(r0, 0xffffffffffffffff) 03:57:39 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a", 0x74}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:57:39 executing program 1: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r3, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000200)='hsr0\x00') exit(0x0) r4 = fanotify_init(0x40, 0x2) r5 = open$dir(&(0x7f0000000080)='./file0\x00', 0x20881, 0x2) msgget$private(0x0, 0x2) fcntl$setsig(r5, 0xa, 0x7) fanotify_mark(r4, 0x8, 0x1, r5, &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r6, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") r7 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) poll(&(0x7f0000000280)=[{r7}], 0x1, 0x0) 03:57:39 executing program 3: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x6) 03:57:39 executing program 0: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000040)={0xff00, r3, 0x0, 0x0, 0xf}) sendfile(r0, r1, 0x0, 0x10000) [ 2163.100171][ T26] kauditd_printk_skb: 2 callbacks suppressed [ 2163.100183][ T26] audit: type=1800 audit(2000001459.600:344): pid=16335 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17745 res=0 03:57:39 executing program 0: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000040)={0xff00, r3, 0x0, 0x0, 0xf}) sendfile(r0, r1, 0x0, 0x10000) 03:57:39 executing program 2: r0 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="11dca50d5e0b") sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="2537110b9523145bf78fd24358fa4d58089f39722092414ea5e060e1858bdf6c2beefb55075fc790e1a9bc2d9b69717d20991016430e90c90d273b8a84210b61a8a2daf2089b1b9885990ad4fe2ee87a18", @ANYRES16, @ANYBLOB="f0062bbd7000fddbdf25120100003400090008000100030000000800020004000000080002002d1e000008000200ffff0000080002e904000000080002000900000010000600080001000200000004000200480001002c00020008000300070000004800040002000000080001000600000008000300090000000800d1de1f0000000800030003000000100001003a73797a3200000000180007000c000300020000000000000008000200f70000008206000000"], 0xb8}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) 03:57:39 executing program 3: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x6) 03:57:39 executing program 4: bind$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x4e20, @broadcast}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x2af) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000040)=':', 0x1, 0x4008000, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff}) dup2(r0, 0xffffffffffffffff) [ 2163.168571][ T26] audit: type=1804 audit(2000001459.640:345): pid=16335 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir632706297/syzkaller.hYyTFP/976/file0" dev="sda1" ino=17745 res=1 [ 2163.217386][ T26] audit: type=1804 audit(2000001459.650:346): pid=16335 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir632706297/syzkaller.hYyTFP/976/file0" dev="sda1" ino=17745 res=1 03:57:39 executing program 3: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x6) 03:57:39 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x4e20, @broadcast}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x2af) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000040)=':', 0x1, 0x4008000, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff}) dup2(r1, r0) [ 2163.284316][ T26] audit: type=1800 audit(2000001459.770:347): pid=16348 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17745 res=0 [ 2163.305801][ T26] audit: type=1804 audit(2000001459.780:348): pid=16348 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir632706297/syzkaller.hYyTFP/977/file0" dev="sda1" ino=17745 res=1 03:57:39 executing program 0: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000040)={0xff00, r3, 0x0, 0x0, 0xf}) sendfile(r0, r1, 0x0, 0x10000) 03:57:39 executing program 2: r0 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47b") sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="2537110b9523145bf78fd24358fa4d58089f39722092414ea5e060e1858bdf6c2beefb55075fc790e1a9bc2d9b69717d20991016430e90c90d273b8a84210b61a8a2daf2089b1b9885990ad4fe2ee87a18", @ANYRES16, @ANYBLOB="f0062bbd7000fddbdf25120100003400090008000100030000000800020004000000080002002d1e000008000200ffff0000080002e904000000080002000900000010000600080001000200000004000200480001002c00020008000300070000004800040002000000080001000600000008000300090000000800d1de1f0000000800030003000000100001003a73797a3200000000180007000c000300020000000000000008000200f70000008206000000"], 0xb8}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) [ 2163.366942][ T26] audit: type=1804 audit(2000001459.820:349): pid=16348 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir632706297/syzkaller.hYyTFP/977/file0" dev="sda1" ino=17745 res=1 [ 2163.441539][ T26] audit: type=1800 audit(2000001459.940:350): pid=16362 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17738 res=0 [ 2163.506672][ T26] audit: type=1804 audit(2000001459.940:351): pid=16362 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir632706297/syzkaller.hYyTFP/978/file0" dev="sda1" ino=17738 res=1 [ 2163.545033][ T26] audit: type=1804 audit(2000001459.950:352): pid=16362 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir632706297/syzkaller.hYyTFP/978/file0" dev="sda1" ino=17738 res=1 03:57:42 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a", 0x74}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:57:42 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x6) 03:57:42 executing program 0: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(r2, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000040)={0xff00, 0xffffffffffffffff, 0x0, 0x0, 0xf}) sendfile(r0, r1, 0x0, 0x10000) 03:57:42 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x4e20, @broadcast}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x2af) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000040)=':', 0x1, 0x4008000, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff}) dup2(r1, r0) 03:57:42 executing program 2: r0 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47b") sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="2537110b9523145bf78fd24358fa4d58089f39722092414ea5e060e1858bdf6c2beefb55075fc790e1a9bc2d9b69717d20991016430e90c90d273b8a84210b61a8a2daf2089b1b9885990ad4fe2ee87a18", @ANYRES16, @ANYBLOB="f0062bbd7000fddbdf25120100003400090008000100030000000800020004000000080002002d1e000008000200ffff0000080002e904000000080002000900000010000600080001000200000004000200480001002c00020008000300070000004800040002000000080001000600000008000300090000000800d1de1f0000000800030003000000100001003a73797a3200000000180007000c000300020000000000000008000200f70000008206000000"], 0xb8}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) 03:57:42 executing program 1: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r3, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000200)='hsr0\x00') exit(0x0) r4 = fanotify_init(0x40, 0x2) r5 = open$dir(&(0x7f0000000080)='./file0\x00', 0x20881, 0x2) msgget$private(0x0, 0x2) fcntl$setsig(r5, 0xa, 0x7) fanotify_mark(r4, 0x8, 0x1, r5, &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r6, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) 03:57:42 executing program 0: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(r2, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000040)={0xff00, 0xffffffffffffffff, 0x0, 0x0, 0xf}) sendfile(r0, r1, 0x0, 0x10000) [ 2166.136314][ T26] audit: type=1800 audit(2000001462.640:353): pid=16372 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16625 res=0 03:57:42 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x6) 03:57:42 executing program 2: r0 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47b") sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="2537110b9523145bf78fd24358fa4d58089f39722092414ea5e060e1858bdf6c2beefb55075fc790e1a9bc2d9b69717d20991016430e90c90d273b8a84210b61a8a2daf2089b1b9885990ad4fe2ee87a18", @ANYRES16, @ANYBLOB="f0062bbd7000fddbdf25120100003400090008000100030000000800020004000000080002002d1e000008000200ffff0000080002e904000000080002000900000010000600080001000200000004000200480001002c00020008000300070000004800040002000000080001000600000008000300090000000800d1de1f0000000800030003000000100001003a73797a3200000000180007000c000300020000000000000008000200f70000008206000000"], 0xb8}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) 03:57:42 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x4e20, @broadcast}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x2af) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000040)=':', 0x1, 0x4008000, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff}) dup2(r1, r0) 03:57:42 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x6) 03:57:42 executing program 2: r0 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf0") sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="2537110b9523145bf78fd24358fa4d58089f39722092414ea5e060e1858bdf6c2beefb55075fc790e1a9bc2d9b69717d20991016430e90c90d273b8a84210b61a8a2daf2089b1b9885990ad4fe2ee87a18", @ANYRES16, @ANYBLOB="f0062bbd7000fddbdf25120100003400090008000100030000000800020004000000080002002d1e000008000200ffff0000080002e904000000080002000900000010000600080001000200000004000200480001002c00020008000300070000004800040002000000080001000600000008000300090000000800d1de1f0000000800030003000000100001003a73797a3200000000180007000c000300020000000000000008000200f70000008206000000"], 0xb8}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) 03:57:45 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a", 0x74}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:57:45 executing program 0: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(r2, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000040)={0xff00, 0xffffffffffffffff, 0x0, 0x0, 0xf}) sendfile(r0, r1, 0x0, 0x10000) 03:57:45 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x2af) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000040)=':', 0x1, 0x4008000, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff}) dup2(r1, r0) 03:57:45 executing program 2: r0 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf0") sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="2537110b9523145bf78fd24358fa4d58089f39722092414ea5e060e1858bdf6c2beefb55075fc790e1a9bc2d9b69717d20991016430e90c90d273b8a84210b61a8a2daf2089b1b9885990ad4fe2ee87a18", @ANYRES16, @ANYBLOB="f0062bbd7000fddbdf25120100003400090008000100030000000800020004000000080002002d1e000008000200ffff0000080002e904000000080002000900000010000600080001000200000004000200480001002c00020008000300070000004800040002000000080001000600000008000300090000000800d1de1f0000000800030003000000100001003a73797a3200000000180007000c000300020000000000000008000200f70000008206000000"], 0xb8}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) 03:57:45 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x6) 03:57:45 executing program 1: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r3, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000200)='hsr0\x00') exit(0x0) r4 = fanotify_init(0x40, 0x2) r5 = open$dir(&(0x7f0000000080)='./file0\x00', 0x20881, 0x2) msgget$private(0x0, 0x2) fcntl$setsig(r5, 0xa, 0x7) fanotify_mark(r4, 0x8, 0x1, r5, &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r6, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") 03:57:45 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x6) [ 2169.227959][ T26] kauditd_printk_skb: 3 callbacks suppressed [ 2169.227971][ T26] audit: type=1800 audit(2000001465.730:357): pid=16413 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16834 res=0 03:57:45 executing program 2: r0 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf0") sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="2537110b9523145bf78fd24358fa4d58089f39722092414ea5e060e1858bdf6c2beefb55075fc790e1a9bc2d9b69717d20991016430e90c90d273b8a84210b61a8a2daf2089b1b9885990ad4fe2ee87a18", @ANYRES16, @ANYBLOB="f0062bbd7000fddbdf25120100003400090008000100030000000800020004000000080002002d1e000008000200ffff0000080002e904000000080002000900000010000600080001000200000004000200480001002c00020008000300070000004800040002000000080001000600000008000300090000000800d1de1f0000000800030003000000100001003a73797a3200000000180007000c000300020000000000000008000200f70000008206000000"], 0xb8}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) 03:57:45 executing program 0: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0xff00, r2, 0x0, 0x0, 0xf}) sendfile(r0, r1, 0x0, 0x10000) 03:57:45 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x2af) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000040)=':', 0x1, 0x4008000, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff}) dup2(r1, r0) [ 2169.278351][ T26] audit: type=1804 audit(2000001465.760:358): pid=16413 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir632706297/syzkaller.hYyTFP/981/file0" dev="sda1" ino=16834 res=1 03:57:45 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x6) 03:57:45 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x2af) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000040)=':', 0x1, 0x4008000, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff}) dup2(r1, r0) [ 2169.382071][ T26] audit: type=1800 audit(2000001465.880:359): pid=16428 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17025 res=0 [ 2169.436833][ T26] audit: type=1804 audit(2000001465.910:360): pid=16428 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir632706297/syzkaller.hYyTFP/982/file0" dev="sda1" ino=17025 res=1 [ 2169.509195][ T26] audit: type=1804 audit(2000001465.910:361): pid=16428 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir632706297/syzkaller.hYyTFP/982/file0" dev="sda1" ino=17025 res=1 03:57:48 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a", 0x74}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:57:48 executing program 0: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0xff00, r2, 0x0, 0x0, 0xf}) sendfile(r0, r1, 0x0, 0x10000) 03:57:48 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x6) 03:57:48 executing program 2: r0 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="2537110b9523145bf78fd24358fa4d58089f39722092414ea5e060e1858bdf6c2beefb55075fc790e1a9bc2d9b69717d20991016430e90c90d273b8a84210b61a8a2daf2089b1b9885990ad4fe2ee87a18", @ANYRES16, @ANYBLOB="f0062bbd7000fddbdf25120100003400090008000100030000000800020004000000080002002d1e000008000200ffff0000080002e904000000080002000900000010000600080001000200000004000200480001002c00020008000300070000004800040002000000080001000600000008000300090000000800d1de1f0000000800030003000000100001003a73797a3200000000180007000c000300020000000000000008000200f70000008206000000"], 0xb8}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) 03:57:48 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @broadcast}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x2af) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000040)=':', 0x1, 0x4008000, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff}) dup2(r1, r0) 03:57:48 executing program 1: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r3, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000200)='hsr0\x00') exit(0x0) r4 = fanotify_init(0x40, 0x2) r5 = open$dir(&(0x7f0000000080)='./file0\x00', 0x20881, 0x2) msgget$private(0x0, 0x2) fcntl$setsig(r5, 0xa, 0x7) fanotify_mark(r4, 0x8, 0x1, r5, &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') socket$inet_udplite(0x2, 0x2, 0x88) 03:57:48 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x6) 03:57:48 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @broadcast}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x2af) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000040)=':', 0x1, 0x4008000, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff}) dup2(r1, r0) [ 2172.304827][ T26] audit: type=1800 audit(2000001468.810:362): pid=16449 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17137 res=0 03:57:48 executing program 2: r0 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="2537110b9523145bf78fd24358fa4d58089f39722092414ea5e060e1858bdf6c2beefb55075fc790e1a9bc2d9b69717d20991016430e90c90d273b8a84210b61a8a2daf2089b1b9885990ad4fe2ee87a18", @ANYRES16, @ANYBLOB="f0062bbd7000fddbdf25120100003400090008000100030000000800020004000000080002002d1e000008000200ffff0000080002e904000000080002000900000010000600080001000200000004000200480001002c00020008000300070000004800040002000000080001000600000008000300090000000800d1de1f0000000800030003000000100001003a73797a3200000000180007000c000300020000000000000008000200f70000008206000000"], 0xb8}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) 03:57:48 executing program 0: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0xff00, r2, 0x0, 0x0, 0xf}) sendfile(r0, r1, 0x0, 0x10000) 03:57:48 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x6) 03:57:48 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @broadcast}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x2af) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000040)=':', 0x1, 0x4008000, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff}) dup2(r1, r0) [ 2172.418584][ T26] audit: type=1804 audit(2000001468.840:363): pid=16449 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir632706297/syzkaller.hYyTFP/983/file0" dev="sda1" ino=17137 res=1 03:57:49 executing program 2: r0 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="2537110b9523145bf78fd24358fa4d58089f39722092414ea5e060e1858bdf6c2beefb55075fc790e1a9bc2d9b69717d20991016430e90c90d273b8a84210b61a8a2daf2089b1b9885990ad4fe2ee87a18", @ANYRES16, @ANYBLOB="f0062bbd7000fddbdf25120100003400090008000100030000000800020004000000080002002d1e000008000200ffff0000080002e904000000080002000900000010000600080001000200000004000200480001002c00020008000300070000004800040002000000080001000600000008000300090000000800d1de1f0000000800030003000000100001003a73797a3200000000180007000c000300020000000000000008000200f70000008206000000"], 0xb8}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) [ 2172.487357][ T26] audit: type=1804 audit(2000001468.840:364): pid=16449 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir632706297/syzkaller.hYyTFP/983/file0" dev="sda1" ino=17137 res=1 [ 2172.590360][ T26] audit: type=1800 audit(2000001468.980:365): pid=16465 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17202 res=0 [ 2172.619012][ T26] audit: type=1804 audit(2000001468.990:366): pid=16465 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir632706297/syzkaller.hYyTFP/984/file0" dev="sda1" ino=17202 res=1 03:57:51 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a", 0x74}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:57:51 executing program 0: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x2000002) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xff00, r2, 0x0, 0x0, 0xf}) sendfile(r0, 0xffffffffffffffff, 0x0, 0x10000) 03:57:51 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x6) 03:57:51 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @broadcast}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x2af) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000040)=':', 0x1, 0x4008000, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff}) dup2(r1, r0) 03:57:51 executing program 2: r0 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") sendmsg$TIPC_NL_MON_GET(r0, 0x0, 0x40800) 03:57:51 executing program 1: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r3, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000200)='hsr0\x00') exit(0x0) r4 = fanotify_init(0x40, 0x2) r5 = open$dir(&(0x7f0000000080)='./file0\x00', 0x20881, 0x2) msgget$private(0x0, 0x2) fcntl$setsig(r5, 0xa, 0x7) fanotify_mark(r4, 0x8, 0x1, r5, &(0x7f0000000100)='./file0\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='TIPCv2\x00') 03:57:51 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @broadcast}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x2af) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000040)=':', 0x1, 0x4008000, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff}) dup2(r1, r0) 03:57:51 executing program 2: r0 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") sendmsg$TIPC_NL_MON_GET(r0, 0x0, 0x40800) 03:57:51 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x6) [ 2175.359839][ T26] kauditd_printk_skb: 1 callbacks suppressed [ 2175.359850][ T26] audit: type=1800 audit(2000001471.860:368): pid=16483 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17377 res=0 03:57:51 executing program 0: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x2000002) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xff00, r2, 0x0, 0x0, 0xf}) sendfile(r0, 0xffffffffffffffff, 0x0, 0x10000) 03:57:52 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @broadcast}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x2af) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000040)=':', 0x1, 0x4008000, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff}) dup2(r1, r0) 03:57:52 executing program 2: r0 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") sendmsg$TIPC_NL_MON_GET(r0, 0x0, 0x40800) [ 2175.558029][ T26] audit: type=1800 audit(2000001472.060:369): pid=16503 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17121 res=0 03:57:54 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a", 0x74}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:57:54 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x6) 03:57:54 executing program 2: r0 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="2537110b9523145bf78fd24358fa4d58089f39722092414ea5e060e1858bdf6c2beefb55075fc790e1a9bc2d9b69717d20991016430e90c90d273b8a84210b61a8a2daf2089b1b9885990ad4fe2ee87a18", @ANYRES16, @ANYBLOB="f0062bbd7000fddbdf25120100003400090008000100030000000800020004000000080002002d1e000008000200ffff0000080002e904000000080002000900000010000600080001000200000004000200480001002c00020008000300070000004800040002000000080001000600000008000300090000000800d1de1f0000000800030003000000100001003a73797a3200000000180007000c000300020000000000000008000200f70000008206000000"], 0x3}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) 03:57:54 executing program 0: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x2000002) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xff00, r2, 0x0, 0x0, 0xf}) sendfile(r0, 0xffffffffffffffff, 0x0, 0x10000) 03:57:54 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @broadcast}, 0x10) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f0000d4effc)=0x1, 0x2af) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000040)=':', 0x1, 0x4008000, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff}) dup2(r1, r0) 03:57:54 executing program 1: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r3, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000200)='hsr0\x00') exit(0x0) r4 = fanotify_init(0x40, 0x2) r5 = open$dir(&(0x7f0000000080)='./file0\x00', 0x20881, 0x2) msgget$private(0x0, 0x2) fcntl$setsig(r5, 0xa, 0x7) fanotify_mark(r4, 0x8, 0x1, r5, &(0x7f0000000100)='./file0\x00') 03:57:54 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0b") sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x6) 03:57:55 executing program 2: r0 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="2537110b9523145bf78fd24358fa4d58089f39722092414ea5e060e1858bdf6c2beefb55075fc790e1a9bc2d9b69717d20991016430e90c90d273b8a84210b61a8a2daf2089b1b9885990ad4fe2ee87a18", @ANYRES16, @ANYBLOB="f0062bbd7000fddbdf25120100003400090008000100030000000800020004000000080002002d1e000008000200ffff0000080002e904000000080002000900000010000600080001000200000004000200480001002c00020008000300070000004800040002000000080001000600000008000300090000000800d1de1f0000000800030003000000100001003a73797a3200000000180007000c000300020000000000000008000200f70000008206000000"], 0x3}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) [ 2178.444983][ T26] audit: type=1800 audit(2000001474.950:370): pid=16523 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17617 res=0 03:57:55 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @broadcast}, 0x10) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f0000d4effc)=0x1, 0x2af) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000040)=':', 0x1, 0x4008000, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff}) dup2(r1, r0) 03:57:55 executing program 0: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x2000002) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xff00, r2, 0x0, 0x0, 0xf}) sendfile(0xffffffffffffffff, r0, 0x0, 0x10000) 03:57:55 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0b") sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x6) 03:57:55 executing program 2: r0 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="2537110b9523145bf78fd24358fa4d58089f39722092414ea5e060e1858bdf6c2beefb55075fc790e1a9bc2d9b69717d20991016430e90c90d273b8a84210b61a8a2daf2089b1b9885990ad4fe2ee87a18", @ANYRES16, @ANYBLOB="f0062bbd7000fddbdf25120100003400090008000100030000000800020004000000080002002d1e000008000200ffff0000080002e904000000080002000900000010000600080001000200000004000200480001002c00020008000300070000004800040002000000080001000600000008000300090000000800d1de1f0000000800030003000000100001003a73797a3200000000180007000c000300020000000000000008000200f70000008206000000"], 0x3}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) 03:57:58 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a", 0x74}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:57:58 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @broadcast}, 0x10) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f0000d4effc)=0x1, 0x2af) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000040)=':', 0x1, 0x4008000, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff}) dup2(r1, r0) 03:57:58 executing program 0: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x2000002) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xff00, r2, 0x0, 0x0, 0xf}) sendfile(0xffffffffffffffff, r0, 0x0, 0x10000) 03:57:58 executing program 2: r0 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={&(0x7f0000000300), 0xc, &(0x7f00000004c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="2537110b9523145bf78fd24358fa4d58089f39722092414ea5e060e1858bdf6c2beefb55075fc790e1a9bc2d9b69717d20991016430e90c90d273b8a84210b61a8a2daf2089b1b9885990ad4fe2ee87a18", @ANYRES16, @ANYBLOB="f0062bbd7000fddbdf25120100003400090008000100030000000800020004000000080002002d1e000008000200ffff0000080002e904000000080002000900000010000600080001000200000004000200480001002c00020008000300070000004800040002000000080001000600000008000300090000000800d1de1f0000000800030003000000100001003a73797a3200000000180007000c000300020000000000000008000200f70000008206000000"], 0xb8}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) 03:57:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0b") sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x6) 03:57:58 executing program 1: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r3, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000200)='hsr0\x00') exit(0x0) fanotify_init(0x40, 0x2) r4 = open$dir(&(0x7f0000000080)='./file0\x00', 0x20881, 0x2) msgget$private(0x0, 0x2) fcntl$setsig(r4, 0xa, 0x7) 03:57:58 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a", 0x74}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:57:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47b") sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x6) 03:57:58 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @broadcast}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000040)=':', 0x1, 0x4008000, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff}) dup2(r1, r0) 03:57:58 executing program 2: r0 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={&(0x7f0000000300), 0xc, &(0x7f00000004c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="2537110b9523145bf78fd24358fa4d58089f39722092414ea5e060e1858bdf6c2beefb55075fc790e1a9bc2d9b69717d20991016430e90c90d273b8a84210b61a8a2daf2089b1b9885990ad4fe2ee87a18", @ANYRES16, @ANYBLOB="f0062bbd7000fddbdf25120100003400090008000100030000000800020004000000080002002d1e000008000200ffff0000080002e904000000080002000900000010000600080001000200000004000200480001002c00020008000300070000004800040002000000080001000600000008000300090000000800d1de1f0000000800030003000000100001003a73797a3200000000180007000c000300020000000000000008000200f70000008206000000"], 0xb8}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) 03:57:58 executing program 0: r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x2000002) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xff00, r2, 0x0, 0x0, 0xf}) sendfile(0xffffffffffffffff, r0, 0x0, 0x10000) 03:57:58 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a", 0x74}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:57:58 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @broadcast}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000040)=':', 0x1, 0x4008000, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff}) dup2(r1, r0) 03:57:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47b") sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x6) 03:57:58 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a", 0x74}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:57:58 executing program 2: r0 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={&(0x7f0000000300), 0xc, &(0x7f00000004c0)={&(0x7f0000000ec0)=ANY=[@ANYBLOB="2537110b9523145bf78fd24358fa4d58089f39722092414ea5e060e1858bdf6c2beefb55075fc790e1a9bc2d9b69717d20991016430e90c90d273b8a84210b61a8a2daf2089b1b9885990ad4fe2ee87a18", @ANYRES16, @ANYBLOB="f0062bbd7000fddbdf25120100003400090008000100030000000800020004000000080002002d1e000008000200ffff0000080002e904000000080002000900000010000600080001000200000004000200480001002c00020008000300070000004800040002000000080001000600000008000300090000000800d1de1f0000000800030003000000100001003a73797a3200000000180007000c000300020000000000000008000200f70000008206000000"], 0xb8}, 0x1, 0x0, 0x0, 0x40000}, 0x40800) 03:57:58 executing program 0: r0 = open(0x0, 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x2000002) fallocate(r2, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000040)={0xff00, r3, 0x0, 0x0, 0xf}) sendfile(r0, r1, 0x0, 0x10000) 03:57:58 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @broadcast}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000040)=':', 0x1, 0x4008000, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff}) dup2(r1, r0) 03:57:58 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a", 0x74}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:57:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47b") sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x6) 03:57:58 executing program 2: r0 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40000}, 0x40800) 03:57:58 executing program 1: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r3, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000200)='hsr0\x00') exit(0x0) fanotify_init(0x40, 0x2) open$dir(&(0x7f0000000080)='./file0\x00', 0x20881, 0x2) msgget$private(0x0, 0x2) 03:57:58 executing program 0: r0 = open(0x0, 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x2000002) fallocate(r2, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000040)={0xff00, r3, 0x0, 0x0, 0xf}) sendfile(r0, r1, 0x0, 0x10000) 03:57:58 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a", 0x74}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:57:58 executing program 2: r0 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40000}, 0x40800) 03:57:58 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @broadcast}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc), 0x2af) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000040)=':', 0x1, 0x4008000, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff}) dup2(r1, r0) 03:57:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf0") sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x6) 03:57:59 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a", 0x74}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:57:59 executing program 0: r0 = open(0x0, 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x2000002) fallocate(r2, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000040)={0xff00, r3, 0x0, 0x0, 0xf}) sendfile(r0, r1, 0x0, 0x10000) 03:57:59 executing program 2: r0 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40000}, 0x40800) 03:57:59 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @broadcast}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc), 0x2af) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000040)=':', 0x1, 0x4008000, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff}) dup2(r1, r0) 03:57:59 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf0") sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x6) 03:57:59 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @broadcast}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc), 0x2af) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000040)=':', 0x1, 0x4008000, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff}) dup2(r1, r0) 03:57:59 executing program 1: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r3, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000200)='hsr0\x00') exit(0x0) fanotify_init(0x40, 0x2) open$dir(&(0x7f0000000080)='./file0\x00', 0x20881, 0x2) 03:57:59 executing program 0: r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x2000002) fallocate(r2, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000040)={0xff00, r3, 0x0, 0x0, 0xf}) sendfile(r0, r1, 0x0, 0x10000) 03:57:59 executing program 2: r0 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0), 0x1, 0x0, 0x0, 0x40000}, 0x40800) 03:57:59 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf0") sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x6) 03:57:59 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @broadcast}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x2af) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000040)=':', 0x1, 0x4008000, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff}) dup2(r1, r0) 03:57:59 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @broadcast}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x2af) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000040)=':', 0x1, 0x4008000, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff}) dup2(r1, r0) 03:58:02 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a", 0x74}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:58:02 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") sched_setaffinity(0x0, 0x0, 0x0) 03:58:02 executing program 2: r0 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)}, 0x40800) 03:58:02 executing program 0: r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x2000002) fallocate(r2, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000040)={0xff00, r3, 0x0, 0x0, 0xf}) sendfile(r0, r1, 0x0, 0x10000) 03:58:02 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @broadcast}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x2af) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000040)=':', 0x1, 0x4008000, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff}) dup2(r1, r0) 03:58:02 executing program 1: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r3, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000200)='hsr0\x00') exit(0x0) fanotify_init(0x40, 0x2) 03:58:02 executing program 2: r0 = socket(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)}, 0x0) 03:58:02 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") sched_setaffinity(0x0, 0x0, 0x0) 03:58:02 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @broadcast}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x2af) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000040)=':', 0x1, 0x4008000, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff}) dup2(r1, r0) 03:58:02 executing program 0: r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x2000002) fallocate(r2, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000040)={0xff00, r3, 0x0, 0x0, 0xf}) sendfile(r0, r1, 0x0, 0x10000) 03:58:02 executing program 2: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x2000002) fallocate(r2, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000040)={0xff00, r3, 0x0, 0x0, 0xf}) syz_open_dev$ndb(0x0, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000) 03:58:02 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @broadcast}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x2af) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000040)=':', 0x1, 0x4008000, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff}) dup2(r1, r0) [ 2185.871947][ T26] audit: type=1800 audit(2000001482.370:371): pid=16696 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=17791 res=0 [ 2185.938252][ T26] audit: type=1804 audit(2000001482.370:372): pid=16696 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir446979030/syzkaller.MsPlP9/904/file0" dev="sda1" ino=17791 res=1 [ 2185.982932][ T26] audit: type=1804 audit(2000001482.370:373): pid=16696 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir446979030/syzkaller.MsPlP9/904/file0" dev="sda1" ino=17791 res=1 [ 2186.015301][ T26] audit: type=1800 audit(2000001482.440:374): pid=16696 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="file0" dev="sda1" ino=17791 res=0 03:58:05 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a", 0x74}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:58:05 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") sched_setaffinity(0x0, 0x0, 0x0) 03:58:05 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @broadcast}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x2af) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000040)=':', 0x1, 0x4008000, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff}) dup2(r1, r0) 03:58:05 executing program 0: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x2000002) fallocate(r2, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000040)={0xff00, r3, 0x0, 0x0, 0xf}) sendfile(r0, r1, 0x0, 0x10000) 03:58:05 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x16c, 0x244) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f0000002340)=""/4096, 0xde93}], 0x1, &(0x7f0000000200)=""/20, 0x148}, 0x0) write$binfmt_elf64(r0, &(0x7f0000000500)=ANY=[], 0xffffffdf) 03:58:05 executing program 1: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r3, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000200)='hsr0\x00') exit(0x0) 03:58:05 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @broadcast}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x2af) sendto$inet(r0, 0x0, 0x0, 0x20000000, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000040)=':', 0x1, 0x4008000, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff}) dup2(r1, r0) 03:58:05 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)) [ 2188.728737][ T26] audit: type=1800 audit(2000001485.230:375): pid=16713 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17761 res=0 03:58:05 executing program 0: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x2000002) fallocate(r2, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000040)={0xff00, r3, 0x0, 0x0, 0xf}) sendfile(r0, r1, 0x0, 0x10000) 03:58:05 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @broadcast}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x2af) sendto$inet(r0, 0x0, 0x0, 0x20000000, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000040)=':', 0x1, 0x4008000, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff}) dup2(r1, r0) 03:58:05 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)) 03:58:05 executing program 0: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x2000002) fallocate(r2, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000040)={0xff00, r3, 0x0, 0x0, 0xf}) sendfile(r0, r1, 0x0, 0x10000) [ 2188.864497][ T26] audit: type=1800 audit(2000001485.370:376): pid=16727 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17812 res=0 [ 2188.976769][ T26] audit: type=1800 audit(2000001485.480:377): pid=16735 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17810 res=0 03:58:08 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a", 0x74}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:58:08 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)) 03:58:08 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @broadcast}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x2af) sendto$inet(r0, 0x0, 0x0, 0x20000000, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000040)=':', 0x1, 0x4008000, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff}) dup2(r1, r0) 03:58:08 executing program 0: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x2000002) fallocate(r2, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000040)={0xff00, r3, 0x0, 0x0, 0xf}) sendfile(r0, r1, 0x0, 0x10000) 03:58:08 executing program 1: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r3, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000200)='hsr0\x00') 03:58:08 executing program 2: semctl$IPC_INFO(0x0, 0x0, 0x3, &(0x7f0000000040)=""/122) 03:58:08 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = getpgrp(0x0) wait4(r1, 0x0, 0x0, 0x0) [ 2191.799736][ T26] audit: type=1800 audit(2000001488.300:378): pid=16750 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17836 res=0 03:58:08 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @broadcast}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x2af) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000040)=':', 0x1, 0x4008000, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff}) dup2(r1, r0) 03:58:08 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)={[{@dmode={'dmode'}}]}) 03:58:08 executing program 1: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f0000000480)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="240000008eca5aa66c3563effc5c615748f66c1d401766c0c250be35287508", @ANYRES16=r3, @ANYBLOB="08042bbd7000fedbdf25050000000800060003206efbd6000600aa0000001ffd01ef0dff056dccc9b43df665943c4f1cec1560664d34c96c24351b11104bad37d23d7947c0541670d36820e8078a8ed8b0321d335e8f78a380caf6d1fe3d1934dcf9fc7e73dc1020ff1d50b1b4cffdbeba58914fbd5252183e176cebd9124c6100"/140], 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x40000) [ 2191.851372][ T26] audit: type=1804 audit(2000001488.320:379): pid=16750 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir632706297/syzkaller.hYyTFP/1000/file0" dev="sda1" ino=17836 res=1 03:58:08 executing program 0: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x2000002) fallocate(r2, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000040)={0xff00, r3, 0x0, 0x0, 0xf}) sendfile(r0, r1, 0x0, 0x10000) [ 2191.900700][ T26] audit: type=1804 audit(2000001488.320:380): pid=16750 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir632706297/syzkaller.hYyTFP/1000/file0" dev="sda1" ino=17836 res=1 03:58:08 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @broadcast}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x2af) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000040)=':', 0x1, 0x4008000, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff}) dup2(r1, r0) [ 2192.011435][ T26] audit: type=1800 audit(2000001488.510:381): pid=16765 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17804 res=0 [ 2192.100552][ T26] audit: type=1804 audit(2000001488.550:382): pid=16765 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir632706297/syzkaller.hYyTFP/1001/file0" dev="sda1" ino=17804 res=1 [ 2192.130974][T16766] ISOFS: Unable to identify CD-ROM format. [ 2192.142135][ T26] audit: type=1804 audit(2000001488.550:383): pid=16765 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir632706297/syzkaller.hYyTFP/1001/file0" dev="sda1" ino=17804 res=1 [ 2192.226084][T16766] ISOFS: Unable to identify CD-ROM format. 03:58:11 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a", 0x74}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:58:11 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = getpgrp(0x0) wait4(r1, 0x0, 0x0, 0x0) 03:58:11 executing program 0: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x2000002) fallocate(r2, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000040)={0xff00, r3, 0x0, 0x0, 0xf}) sendfile(r0, r1, 0x0, 0x10000) 03:58:11 executing program 1: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') 03:58:11 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @broadcast}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x2af) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000040)=':', 0x1, 0x4008000, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff}) dup2(r1, r0) 03:58:11 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000)='iso9660\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)={[{@dmode={'dmode'}}]}) [ 2194.862230][ T26] audit: type=1800 audit(2000001491.360:384): pid=16786 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17847 res=0 03:58:11 executing program 1: r0 = socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r1, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r2 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r2, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) fcntl$addseals(r0, 0x409, 0x1) 03:58:11 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = getpgrp(0x0) wait4(r1, 0x0, 0x0, 0x0) 03:58:11 executing program 0: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r3 = creat(0x0, 0x0) fallocate(r3, 0x0, 0x0, 0x2000002) fallocate(r2, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000040)={0xff00, r3, 0x0, 0x0, 0xf}) sendfile(r0, r1, 0x0, 0x10000) 03:58:11 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @broadcast}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x2af) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000040)=':', 0x1, 0x4008000, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff}) dup2(r1, r0) [ 2194.948225][ T26] audit: type=1804 audit(2000001491.400:385): pid=16786 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir632706297/syzkaller.hYyTFP/1002/file0" dev="sda1" ino=17847 res=1 [ 2194.994207][T16792] ISOFS: Unable to identify CD-ROM format. [ 2195.049674][ T26] audit: type=1804 audit(2000001491.400:386): pid=16786 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir632706297/syzkaller.hYyTFP/1002/file0" dev="sda1" ino=17847 res=1 03:58:11 executing program 1: socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r0, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r1 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r1, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, 0x0) [ 2195.083199][ T26] audit: type=1800 audit(2000001491.580:387): pid=16806 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17846 res=0 03:58:11 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = getpgrp(0x0) wait4(r1, 0x0, 0x0, 0x0) 03:58:14 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a", 0x74}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:58:14 executing program 0: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r3 = creat(0x0, 0x0) fallocate(r3, 0x0, 0x0, 0x2000002) fallocate(r2, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000040)={0xff00, r3, 0x0, 0x0, 0xf}) sendfile(r0, r1, 0x0, 0x10000) 03:58:14 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @broadcast}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x2af) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000040)=':', 0x1, 0x4008000, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff}) dup2(r1, r0) 03:58:14 executing program 1: socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r0, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r1 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r1, 0x3, 0x12, &(0x7f0000000e00)=""/187) clone(0x7ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 03:58:14 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) getsockopt$inet6_int(r0, 0x29, 0x18, 0x0, &(0x7f0000000100)=0xa4ffffff) 03:58:14 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") wait4(0x0, 0x0, 0x0, 0x0) 03:58:14 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @broadcast}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x2af) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000040)=':', 0x1, 0x4008000, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff}) dup2(r1, r0) [ 2197.968949][ T26] kauditd_printk_skb: 1 callbacks suppressed [ 2197.968960][ T26] audit: type=1800 audit(2000001494.470:389): pid=16830 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17869 res=0 03:58:14 executing program 1: socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r0, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) r1 = semget$private(0x0, 0x0, 0x1) semctl$SEM_STAT(r1, 0x3, 0x12, &(0x7f0000000e00)=""/187) 03:58:14 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") wait4(0x0, 0x0, 0x0, 0x0) 03:58:14 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) syz_open_dev$evdev(0x0, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x6000000000000000, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000638977fbac141414e9", 0x0, 0x100}, 0x28) 03:58:14 executing program 0: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r3 = creat(0x0, 0x0) fallocate(r3, 0x0, 0x0, 0x2000002) fallocate(r2, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000040)={0xff00, r3, 0x0, 0x0, 0xf}) sendfile(r0, r1, 0x0, 0x10000) [ 2198.036487][ T26] audit: type=1804 audit(2000001494.510:390): pid=16830 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir632706297/syzkaller.hYyTFP/1004/file0" dev="sda1" ino=17869 res=1 03:58:14 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") wait4(0x0, 0x0, 0x0, 0x0) [ 2198.208735][ T26] audit: type=1800 audit(2000001494.710:391): pid=16848 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17802 res=0 [ 2198.274557][ T26] audit: type=1804 audit(2000001494.710:392): pid=16848 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir632706297/syzkaller.hYyTFP/1005/file0" dev="sda1" ino=17802 res=1 03:58:17 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a", 0x74}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:58:17 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @broadcast}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x2af) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x4008000, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff}) dup2(r1, r0) 03:58:17 executing program 1: socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r0, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) semget$private(0x0, 0x0, 0x1) 03:58:17 executing program 0: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(r2, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000040)={0xff00, r3, 0x0, 0x0, 0xf}) sendfile(r0, r1, 0x0, 0x10000) 03:58:17 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = getpgrp(0x0) wait4(r0, 0x0, 0x0, 0x0) 03:58:17 executing program 3: clone(0x802102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r1 = gettid() select(0xf4, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x14) ptrace$cont(0x18, r1, 0x0, 0x0) 03:58:17 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @broadcast}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x2af) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x4008000, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff}) dup2(r1, r0) [ 2201.039385][ T26] audit: type=1800 audit(2000001497.540:393): pid=16867 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16737 res=0 03:58:17 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = getpgrp(0x0) wait4(r0, 0x0, 0x0, 0x0) 03:58:17 executing program 1: socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r0, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000005c0)) 03:58:17 executing program 0: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(r2, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000040)={0xff00, r3, 0x0, 0x0, 0xf}) sendfile(r0, r1, 0x0, 0x10000) [ 2201.114737][ T26] audit: type=1804 audit(2000001497.570:394): pid=16867 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir632706297/syzkaller.hYyTFP/1006/file0" dev="sda1" ino=16737 res=1 03:58:17 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @broadcast}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x2af) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x4008000, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff}) dup2(r1, r0) 03:58:17 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = getpgrp(0x0) wait4(r0, 0x0, 0x0, 0x0) [ 2201.181171][ T26] audit: type=1804 audit(2000001497.590:395): pid=16867 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir632706297/syzkaller.hYyTFP/1006/file0" dev="sda1" ino=16737 res=1 [ 2201.254041][ T26] audit: type=1800 audit(2000001497.730:396): pid=16885 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16772 res=0 [ 2201.293036][ T26] audit: type=1804 audit(2000001497.730:397): pid=16885 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir632706297/syzkaller.hYyTFP/1007/file0" dev="sda1" ino=16772 res=1 [ 2201.364679][ T26] audit: type=1804 audit(2000001497.780:398): pid=16885 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir632706297/syzkaller.hYyTFP/1007/file0" dev="sda1" ino=16772 res=1 03:58:20 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a", 0x74}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:58:20 executing program 0: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x2000002) fallocate(r2, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000040)={0xff00, r3, 0x0, 0x0, 0xf}) sendfile(r0, r1, 0x0, 0x10000) 03:58:20 executing program 1: socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r0, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 03:58:20 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @broadcast}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x2af) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000040), 0x0, 0x4008000, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff}) dup2(r1, r0) 03:58:20 executing program 2: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r0 = getpgrp(0x0) wait4(r0, 0x0, 0x0, 0x0) 03:58:20 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x0, 0x0) ioctl(r1, 0x0, &(0x7f00000003c0)="01000000000000001801000004000000e5232f0800d859832f7fb4abde7563dc9ce272f6d794d8441c7d464d2ad422a61a028c6f8c43dd8546d1d3ebcc17b6bbf4248a2b1e4034dfd3360cff678710aec630b9f32bd33431353b110a30fd6a582dc7fd403fc6b4961265f0d1048ba68e8b") socket$netlink(0x10, 0x3, 0x1) syz_genetlink_get_family_id$tipc2(&(0x7f0000000b00)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10}, 0xc, 0x0}, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000640)={0xcc, 0x0, 0x400, 0x0, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x38, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x400}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_ADDR={0x8}]}, @TIPC_NLA_LINK={0x10, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_MTU={0x8}]}]}, @TIPC_NLA_BEARER={0x30, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x401}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}]}]}, @TIPC_NLA_LINK={0x34, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xda}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x4}]}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_ADDR={0x8}]}]}, 0xcc}, 0x1, 0x0, 0x0, 0x4000000}, 0x880) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x1) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600), 0x4) sendto$inet(r0, &(0x7f0000000100)="0c59f340f8e96d648462f0f21cd69795236654447c0e62692b7858359a578b641b50a4090702a20d15e235e3f11bf1fe038c2b379c7b08716ca27eb79699c4ecc3aee0a75181d7cd7cc73d4406e28f888a2567354e974da377e04bc7461cb00d79efeac46cee2c2a6a8454", 0x6b, 0x20000011, 0x0, 0x0) 03:58:20 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @broadcast}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x2af) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000040), 0x0, 0x4008000, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff}) dup2(r1, r0) [ 2204.130978][ T26] audit: type=1800 audit(2000001500.630:399): pid=16907 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17025 res=0 03:58:20 executing program 1: socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchmod(r0, 0x40) 03:58:20 executing program 2: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r0 = getpgrp(0x0) wait4(r0, 0x0, 0x0, 0x0) 03:58:20 executing program 0: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x0) fallocate(r2, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000040)={0xff00, r3, 0x0, 0x0, 0xf}) sendfile(r0, r1, 0x0, 0x10000) [ 2204.188811][ T26] audit: type=1804 audit(2000001500.660:400): pid=16907 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir632706297/syzkaller.hYyTFP/1008/file0" dev="sda1" ino=17025 res=1 03:58:20 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=@newqdisc={0x24, 0x24, 0x507, 0x0, 0x0, {0x0, r2, {}, {0x0, 0xffff}}}, 0x24}}, 0x0) [ 2204.237905][ T26] audit: type=1804 audit(2000001500.670:401): pid=16907 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir632706297/syzkaller.hYyTFP/1008/file0" dev="sda1" ino=17025 res=1 03:58:20 executing program 2: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r0 = getpgrp(0x0) wait4(r0, 0x0, 0x0, 0x0) [ 2204.363972][ T26] audit: type=1800 audit(2000001500.790:402): pid=16922 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16642 res=0 [ 2204.396942][ T26] audit: type=1804 audit(2000001500.800:403): pid=16922 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir632706297/syzkaller.hYyTFP/1009/file0" dev="sda1" ino=16642 res=1 [ 2204.422105][ T26] audit: type=1804 audit(2000001500.820:404): pid=16922 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir632706297/syzkaller.hYyTFP/1009/file0" dev="sda1" ino=16642 res=1 03:58:23 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a", 0x74}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:58:23 executing program 1: socket(0x10, 0x3, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) fchmod(0xffffffffffffffff, 0x40) 03:58:23 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @broadcast}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x2af) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000040), 0x0, 0x4008000, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff}) dup2(r1, r0) 03:58:23 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="90000000", @ANYRES16=0x0, @ANYBLOB="000429bd7000fddbdf250100000058000100080004004e220000080009004e00000008000b007369700008000800010100000800060073656400080001000a000000080009004a0000000800090050000000ff164df51ea0769d0c0006006e6f6e65000000000c0002fc070006000900000008000500010000000800050022524007000000080005001fc2e7b653324542a85a539c1c6329edbde15465dde33d8dde"], 0x90}}, 0x8080) 03:58:23 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r0 = getpgrp(0x0) wait4(r0, 0x0, 0x0, 0x0) 03:58:23 executing program 0: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x0) fallocate(r2, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000040)={0xff00, r3, 0x0, 0x0, 0xf}) sendfile(r0, r1, 0x0, 0x10000) 03:58:23 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r0 = getpgrp(0x0) wait4(r0, 0x0, 0x0, 0x0) 03:58:23 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @broadcast}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x2af) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000040)=':', 0x1, 0x0, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff}) dup2(r1, r0) [ 2207.159255][ T26] audit: type=1800 audit(2000001503.660:405): pid=16941 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17297 res=0 03:58:23 executing program 1: socket(0x10, 0x3, 0x0) fchmod(0xffffffffffffffff, 0x40) 03:58:23 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="90000000", @ANYRES16=0x0, @ANYBLOB="000429bd7000fddbdf250100000058000100080004004e220000080009004e00000008000b007369700008000800010100000800060073656400080001000a000000080009004a0000000800090050000000ff164df51ea0769d0c0006006e6f6e65000000000c0002fc070006000900000008000500010000000800050022524007000000080005001fc2e7b653324542a85a539c1c6329edbde15465dde33d8dde"], 0x90}}, 0x8080) 03:58:23 executing program 0: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x0) fallocate(r2, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000040)={0xff00, r3, 0x0, 0x0, 0xf}) sendfile(r0, r1, 0x0, 0x10000) [ 2207.237830][ T26] audit: type=1804 audit(2000001503.690:406): pid=16941 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir632706297/syzkaller.hYyTFP/1010/file0" dev="sda1" ino=17297 res=1 03:58:23 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="90000000", @ANYRES16=0x0, @ANYBLOB="000429bd7000fddbdf250100000058000100080004004e220000080009004e00000008000b007369700008000800010100000800060073656400080001000a000000080009004a0000000800090050000000ff164df51ea0769d0c0006006e6f6e65000000000c0002fc070006000900000008000500010000000800050022524007000000080005001fc2e7b653324542a85a539c1c6329edbde15465dde33d8dde"], 0x90}}, 0x8080) [ 2207.353596][ T26] audit: type=1804 audit(2000001503.720:407): pid=16941 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir632706297/syzkaller.hYyTFP/1010/file0" dev="sda1" ino=17297 res=1 [ 2207.437817][ T26] audit: type=1800 audit(2000001503.930:408): pid=16964 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17169 res=0 03:58:26 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a", 0x74}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:58:26 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r0 = getpgrp(0x0) wait4(r0, 0x0, 0x0, 0x0) 03:58:26 executing program 1: fchmod(0xffffffffffffffff, 0x40) 03:58:26 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @broadcast}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x2af) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000040)=':', 0x1, 0x0, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff}) dup2(r1, r0) 03:58:26 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="90000000", @ANYRES16=0x0, @ANYBLOB="000429bd7000fddbdf250100000058000100080004004e220000080009004e00000008000b007369700008000800010100000800060073656400080001000a000000080009004a0000000800090050000000ff164df51ea0769d0c0006006e6f6e65000000000c0002fc070006000900000008000500010000000800050022524007000000080005001fc2e7b653324542a85a539c1c6329edbde15465dde33d8dde"], 0x90}}, 0x8080) 03:58:26 executing program 0: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000040)={0xff00, r3, 0x0, 0x0, 0xf}) sendfile(r0, r1, 0x0, 0x10000) 03:58:26 executing program 1: fchmod(0xffffffffffffffff, 0x0) [ 2210.245436][ T26] kauditd_printk_skb: 2 callbacks suppressed [ 2210.245447][ T26] audit: type=1800 audit(2000001506.750:411): pid=16972 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17345 res=0 03:58:26 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = getpgrp(0x0) wait4(r1, 0x0, 0x0, 0x0) 03:58:26 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @broadcast}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x2af) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000040)=':', 0x1, 0x0, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff}) dup2(r1, r0) 03:58:26 executing program 3: sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="90000000", @ANYRES16=0x0, @ANYBLOB="000429bd7000fddbdf250100000058000100080004004e220000080009004e00000008000b007369700008000800010100000800060073656400080001000a000000080009004a0000000800090050000000ff164df51ea0769d0c0006006e6f6e65000000000c0002fc070006000900000008000500010000000800050022524007000000080005001fc2e7b653324542a85a539c1c6329edbde15465dde33d8dde"], 0x90}}, 0x8080) [ 2210.304715][ T26] audit: type=1804 audit(2000001506.790:412): pid=16972 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir632706297/syzkaller.hYyTFP/1012/file0" dev="sda1" ino=17345 res=1 03:58:26 executing program 0: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000040)={0xff00, r3, 0x0, 0x0, 0xf}) sendfile(r0, r1, 0x0, 0x10000) 03:58:26 executing program 1: syz_emit_ethernet(0x3e, &(0x7f0000000180)=ANY=[@ANYBLOB="0180c28800000180c200000086dd60b40900000804008000000000000000000000000000000f4659a9355f23d632"], 0x0) [ 2210.421671][ T26] audit: type=1804 audit(2000001506.800:413): pid=16972 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir632706297/syzkaller.hYyTFP/1012/file0" dev="sda1" ino=17345 res=1 [ 2210.511683][ T26] audit: type=1800 audit(2000001506.990:414): pid=16992 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17246 res=0 [ 2210.535273][ T26] audit: type=1804 audit(2000001507.000:415): pid=16992 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir632706297/syzkaller.hYyTFP/1013/file0" dev="sda1" ino=17246 res=1 [ 2210.562917][ T26] audit: type=1804 audit(2000001507.030:416): pid=16992 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir632706297/syzkaller.hYyTFP/1013/file0" dev="sda1" ino=17246 res=1 03:58:29 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a", 0x74}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:58:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = getpgrp(0x0) wait4(r1, 0x0, 0x0, 0x0) 03:58:29 executing program 3: sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="90000000", @ANYRES16=0x0, @ANYBLOB="000429bd7000fddbdf250100000058000100080004004e220000080009004e00000008000b007369700008000800010100000800060073656400080001000a000000080009004a0000000800090050000000ff164df51ea0769d0c0006006e6f6e65000000000c0002fc070006000900000008000500010000000800050022524007000000080005001fc2e7b653324542a85a539c1c6329edbde15465dde33d8dde"], 0x90}}, 0x8080) 03:58:29 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @broadcast}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x2af) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000040)=':', 0x1, 0x4008000, 0x0, 0x0) pipe(0x0) dup2(0xffffffffffffffff, r0) 03:58:29 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000000)={0x6, 0x4, 0x7ffe, 0x3f, 0x0, 0xffffffffffffffff, 0x0, [0x2400000018cf63, 0xe00000f, 0x0, 0x6000000, 0x0, 0x0, 0x34000, 0x0, 0x0, 0xc00200, 0x0, 0x0, 0x32000, 0xf]}, 0x3c) 03:58:29 executing program 0: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x2000002) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000040)={0xff00, r3, 0x0, 0x0, 0xf}) sendfile(r0, r1, 0x0, 0x10000) 03:58:29 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @broadcast}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x2af) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000040)=':', 0x1, 0x4008000, 0x0, 0x0) pipe(0x0) dup2(0xffffffffffffffff, r0) 03:58:29 executing program 3: sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="90000000", @ANYRES16=0x0, @ANYBLOB="000429bd7000fddbdf250100000058000100080004004e220000080009004e00000008000b007369700008000800010100000800060073656400080001000a000000080009004a0000000800090050000000ff164df51ea0769d0c0006006e6f6e65000000000c0002fc070006000900000008000500010000000800050022524007000000080005001fc2e7b653324542a85a539c1c6329edbde15465dde33d8dde"], 0x90}}, 0x8080) 03:58:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = getpgrp(0x0) wait4(r1, 0x0, 0x0, 0x0) [ 2213.336056][ T26] audit: type=1800 audit(2000001509.840:417): pid=17007 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17634 res=0 [ 2213.394981][ T26] audit: type=1804 audit(2000001509.880:418): pid=17012 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir632706297/syzkaller.hYyTFP/1014/file0" dev="sda1" ino=17634 res=1 03:58:29 executing program 0: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x2000002) fallocate(r2, 0x0, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000040)={0xff00, r3, 0x0, 0x0, 0xf}) sendfile(r0, r1, 0x0, 0x10000) 03:58:30 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="90000000", @ANYRES16=0x0, @ANYBLOB="000429bd7000fddbdf250100000058000100080004004e220000080009004e00000008000b007369700008000800010100000800060073656400080001000a000000080009004a0000000800090050000000ff164df51ea0769d0c0006006e6f6e65000000000c0002fc070006000900000008000500010000000800050022524007000000080005001fc2e7b653324542a85a539c1c6329edbde15465dde33d8dde"], 0x90}}, 0x8080) 03:58:30 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @broadcast}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x2af) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000040)=':', 0x1, 0x4008000, 0x0, 0x0) pipe(0x0) dup2(0xffffffffffffffff, r0) [ 2213.503428][ T26] audit: type=1804 audit(2000001509.890:419): pid=17007 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir632706297/syzkaller.hYyTFP/1014/file0" dev="sda1" ino=17634 res=1 [ 2213.590035][ T26] audit: type=1800 audit(2000001510.050:420): pid=17024 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16849 res=0 03:58:32 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a", 0x74}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:58:32 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000000)={0x6, 0x4, 0x7ffe, 0x3f, 0x0, 0xffffffffffffffff, 0x0, [0x2400000018cf63, 0xe00000f, 0x0, 0x6000000, 0x0, 0x0, 0x34000, 0x0, 0x0, 0xc00200, 0x0, 0x0, 0x32000, 0xf]}, 0x3c) 03:58:32 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = getpgrp(0x0) wait4(r1, 0x0, 0x0, 0x0) 03:58:32 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="90000000", @ANYRES16=0x0, @ANYBLOB="000429bd7000fddbdf250100000058000100080004004e220000080009004e00000008000b007369700008000800010100000800060073656400080001000a000000080009004a0000000800090050000000ff164df51ea0769d0c0006006e6f6e65000000000c0002fc070006000900000008000500010000000800050022524007000000080005001fc2e7b653324542a85a539c1c6329edbde15465dde33d8dde"], 0x90}}, 0x8080) 03:58:32 executing program 0: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x2000002) fallocate(r2, 0x0, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000040)={0xff00, r3, 0x0, 0x0, 0xf}) sendfile(r0, r1, 0x0, 0x10000) 03:58:32 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @broadcast}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x2af) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000040)=':', 0x1, 0x4008000, 0x0, 0x0) pipe(&(0x7f0000000440)) dup2(0xffffffffffffffff, r0) [ 2216.369086][ T26] kauditd_printk_skb: 2 callbacks suppressed [ 2216.369098][ T26] audit: type=1800 audit(2000001512.870:423): pid=17038 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17291 res=0 03:58:32 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = getpgrp(0x0) wait4(r1, 0x0, 0x0, 0x0) 03:58:32 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="90000000", @ANYRES16=0x0, @ANYBLOB="000429bd7000fddbdf250100000058000100080004004e220000080009004e00000008000b007369700008000800010100000800060073656400080001000a000000080009004a0000000800090050000000ff164df51ea0769d0c0006006e6f6e65000000000c0002fc070006000900000008000500010000000800050022524007000000080005001fc2e7b653324542a85a539c1c6329edbde15465dde33d8dde"], 0x90}}, 0x8080) 03:58:32 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @broadcast}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x2af) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000040)=':', 0x1, 0x4008000, 0x0, 0x0) pipe(&(0x7f0000000440)) dup2(0xffffffffffffffff, r0) 03:58:33 executing program 0: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x2000002) fallocate(r2, 0x0, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000040)={0xff00, r3, 0x0, 0x0, 0xf}) sendfile(r0, r1, 0x0, 0x10000) [ 2216.429589][ T26] audit: type=1804 audit(2000001512.920:424): pid=17045 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir632706297/syzkaller.hYyTFP/1016/file0" dev="sda1" ino=17291 res=1 03:58:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = getpgrp(0x0) wait4(r1, 0x0, 0x0, 0x0) [ 2216.493382][ T26] audit: type=1804 audit(2000001512.930:425): pid=17038 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir632706297/syzkaller.hYyTFP/1016/file0" dev="sda1" ino=17291 res=1 03:58:33 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @broadcast}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x2af) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000040)=':', 0x1, 0x4008000, 0x0, 0x0) pipe(&(0x7f0000000440)) dup2(0xffffffffffffffff, r0) [ 2216.598404][ T26] audit: type=1800 audit(2000001513.100:426): pid=17060 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17286 res=0 [ 2216.660311][ T26] audit: type=1804 audit(2000001513.100:427): pid=17060 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir632706297/syzkaller.hYyTFP/1017/file0" dev="sda1" ino=17286 res=1 [ 2216.687521][ T26] audit: type=1804 audit(2000001513.100:428): pid=17060 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir632706297/syzkaller.hYyTFP/1017/file0" dev="sda1" ino=17286 res=1 03:58:35 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a", 0x74}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:58:35 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) r1 = getpgrp(0x0) wait4(r1, 0x0, 0x0, 0x0) 03:58:35 executing program 0: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x2000002) fallocate(r2, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0xff00, r3, 0x0, 0x0, 0xf}) sendfile(r0, r1, 0x0, 0x10000) 03:58:35 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000000)={0x6, 0x4, 0x7ffe, 0x3f, 0x0, 0xffffffffffffffff, 0x0, [0x2400000018cf63, 0xe00000f, 0x0, 0x6000000, 0x0, 0x0, 0x34000, 0x0, 0x0, 0xc00200, 0x0, 0x0, 0x32000, 0xf]}, 0x3c) 03:58:35 executing program 3: socket$netlink(0x10, 0x3, 0xa) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="90000000", @ANYRES16=0x0, @ANYBLOB="000429bd7000fddbdf250100000058000100080004004e220000080009004e00000008000b007369700008000800010100000800060073656400080001000a000000080009004a0000000800090050000000ff164df51ea0769d0c0006006e6f6e65000000000c0002fc070006000900000008000500010000000800050022524007000000080005001fc2e7b653324542a85a539c1c6329edbde15465dde33d8dde"], 0x90}}, 0x8080) 03:58:35 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @broadcast}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x2af) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000040)=':', 0x1, 0x4008000, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff}) dup2(r1, 0xffffffffffffffff) [ 2219.389167][ T26] audit: type=1800 audit(2000001515.890:429): pid=17067 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17875 res=0 03:58:35 executing program 3: socket$netlink(0x10, 0x3, 0xa) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="90000000", @ANYRES16=0x0, @ANYBLOB="000429bd7000fddbdf250100000058000100080004004e220000080009004e00000008000b007369700008000800010100000800060073656400080001000a000000080009004a0000000800090050000000ff164df51ea0769d0c0006006e6f6e65000000000c0002fc070006000900000008000500010000000800050022524007000000080005001fc2e7b653324542a85a539c1c6329edbde15465dde33d8dde"], 0x90}}, 0x8080) 03:58:36 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @broadcast}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x2af) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000040)=':', 0x1, 0x4008000, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff}) dup2(r1, 0xffffffffffffffff) 03:58:36 executing program 0: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x2000002) fallocate(r2, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0xff00, r3, 0x0, 0x0, 0xf}) sendfile(r0, r1, 0x0, 0x10000) [ 2219.455601][ T26] audit: type=1804 audit(2000001515.900:430): pid=17067 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir632706297/syzkaller.hYyTFP/1018/file0" dev="sda1" ino=17875 res=1 03:58:36 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) r1 = getpgrp(0x0) wait4(r1, 0x0, 0x0, 0x0) 03:58:36 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000000)={0x6, 0x4, 0x7ffe, 0x3f, 0x0, 0xffffffffffffffff, 0x0, [0x2400000018cf63, 0xe00000f, 0x0, 0x6000000, 0x0, 0x0, 0x34000, 0x0, 0x0, 0xc00200, 0x0, 0x0, 0x32000, 0xf]}, 0x3c) 03:58:36 executing program 3: socket$netlink(0x10, 0x3, 0xa) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="90000000", @ANYRES16=0x0, @ANYBLOB="000429bd7000fddbdf250100000058000100080004004e220000080009004e00000008000b007369700008000800010100000800060073656400080001000a000000080009004a0000000800090050000000ff164df51ea0769d0c0006006e6f6e65000000000c0002fc070006000900000008000500010000000800050022524007000000080005001fc2e7b653324542a85a539c1c6329edbde15465dde33d8dde"], 0x90}}, 0x8080) [ 2219.564984][ T26] audit: type=1804 audit(2000001515.910:431): pid=17067 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir632706297/syzkaller.hYyTFP/1018/file0" dev="sda1" ino=17875 res=1 [ 2219.649427][ T26] audit: type=1800 audit(2000001516.120:432): pid=17091 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16520 res=0 03:58:38 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a", 0x74}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:58:38 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) r1 = getpgrp(0x0) wait4(r1, 0x0, 0x0, 0x0) 03:58:38 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @broadcast}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x2af) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000040)=':', 0x1, 0x4008000, 0x0, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff}) dup2(r1, 0xffffffffffffffff) 03:58:38 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$IPVS_CMD_NEW_SERVICE(r0, 0x0, 0x8080) 03:58:38 executing program 0: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x2000002) fallocate(r2, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0xff00, r3, 0x0, 0x0, 0xf}) sendfile(r0, r1, 0x0, 0x10000) 03:58:38 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000000)={0x6, 0x4, 0x7ffe, 0x3f, 0x0, 0xffffffffffffffff, 0x0, [0x2400000018cf63, 0xe00000f, 0x0, 0x6000000, 0x0, 0x0, 0x34000, 0x0, 0x0, 0xc00200, 0x0, 0x0, 0x32000, 0xf]}, 0x3c) 03:58:39 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$IPVS_CMD_NEW_SERVICE(r0, 0x0, 0x8080) [ 2222.490091][ T26] kauditd_printk_skb: 2 callbacks suppressed [ 2222.490103][ T26] audit: type=1800 audit(2000001518.990:435): pid=17101 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17889 res=0 03:58:39 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0b") r1 = getpgrp(0x0) wait4(r1, 0x0, 0x0, 0x0) 03:58:39 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @local, 0x7}, 0x1c) sendmmsg(r0, &(0x7f0000000100), 0x8000000000002e3, 0x0) 03:58:39 executing program 1: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000000)={0x6, 0x4, 0x7ffe, 0x3f, 0x0, 0xffffffffffffffff, 0x0, [0x2400000018cf63, 0xe00000f, 0x0, 0x6000000, 0x0, 0x0, 0x34000, 0x0, 0x0, 0xc00200, 0x0, 0x0, 0x32000, 0xf]}, 0x3c) 03:58:39 executing program 0: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x2000002) fallocate(r2, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, 0x0) sendfile(r0, r1, 0x0, 0x10000) [ 2222.613764][ T26] audit: type=1804 audit(2000001519.040:436): pid=17108 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir632706297/syzkaller.hYyTFP/1020/file0" dev="sda1" ino=17889 res=1 03:58:39 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$IPVS_CMD_NEW_SERVICE(r0, 0x0, 0x8080) [ 2222.725764][ T26] audit: type=1804 audit(2000001519.060:437): pid=17101 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir632706297/syzkaller.hYyTFP/1020/file0" dev="sda1" ino=17889 res=1 [ 2222.772995][ T26] audit: type=1800 audit(2000001519.260:438): pid=17124 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17302 res=0 [ 2222.793859][ T26] audit: type=1804 audit(2000001519.260:439): pid=17124 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir632706297/syzkaller.hYyTFP/1021/file0" dev="sda1" ino=17302 res=1 [ 2222.831677][ T26] audit: type=1804 audit(2000001519.270:440): pid=17124 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir632706297/syzkaller.hYyTFP/1021/file0" dev="sda1" ino=17302 res=1 03:58:42 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a", 0x74}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:58:42 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0b") r1 = getpgrp(0x0) wait4(r1, 0x0, 0x0, 0x0) 03:58:42 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @local, 0x7}, 0x1c) sendmmsg(r0, &(0x7f0000000100), 0x8000000000002e3, 0x0) 03:58:42 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="90000000", @ANYRES16=0x0, @ANYBLOB="000429bd7000fddbdf250100000058000100080004004e220000080009004e00000008000b007369700008000800010100000800060073656400080001000a000000080009004a0000000800090050000000ff164df51ea0769d0c0006006e6f6e65000000000c0002fc070006000900000008000500010000000800050022524007000000080005001fc2e7b653324542a85a539c1c6329edbde15465dde33d8dde"], 0x3}}, 0x8080) 03:58:42 executing program 1: bpf$MAP_CREATE(0xc00000000000000, 0x0, 0x0) 03:58:42 executing program 0: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x2000002) fallocate(r2, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, 0x0) sendfile(r0, r1, 0x0, 0x10000) 03:58:42 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="90000000", @ANYRES16=0x0, @ANYBLOB="000429bd7000fddbdf250100000058000100080004004e220000080009004e00000008000b007369700008000800010100000800060073656400080001000a000000080009004a0000000800090050000000ff164df51ea0769d0c0006006e6f6e65000000000c0002fc070006000900000008000500010000000800050022524007000000080005001fc2e7b653324542a85a539c1c6329edbde15465dde33d8dde"], 0x3}}, 0x8080) 03:58:42 executing program 1: bpf$MAP_CREATE(0xc00000000000000, 0x0, 0x0) [ 2225.594765][ T26] audit: type=1800 audit(2000001522.100:441): pid=17141 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17893 res=0 03:58:42 executing program 0: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x2000002) fallocate(r2, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, 0x0) sendfile(r0, r1, 0x0, 0x10000) 03:58:42 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @local, 0x7}, 0x1c) sendmmsg(r0, &(0x7f0000000100), 0x8000000000002e3, 0x0) 03:58:42 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0b") r1 = getpgrp(0x0) wait4(r1, 0x0, 0x0, 0x0) [ 2225.657207][ T26] audit: type=1804 audit(2000001522.100:442): pid=17141 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir632706297/syzkaller.hYyTFP/1022/file0" dev="sda1" ino=17893 res=1 03:58:42 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="90000000", @ANYRES16=0x0, @ANYBLOB="000429bd7000fddbdf250100000058000100080004004e220000080009004e00000008000b007369700008000800010100000800060073656400080001000a000000080009004a0000000800090050000000ff164df51ea0769d0c0006006e6f6e65000000000c0002fc070006000900000008000500010000000800050022524007000000080005001fc2e7b653324542a85a539c1c6329edbde15465dde33d8dde"], 0x3}}, 0x8080) [ 2225.794156][ T26] audit: type=1804 audit(2000001522.120:443): pid=17141 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir632706297/syzkaller.hYyTFP/1022/file0" dev="sda1" ino=17893 res=1 [ 2225.877570][ T26] audit: type=1800 audit(2000001522.330:444): pid=17156 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17891 res=0 03:58:45 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a", 0x74}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:58:45 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47b") r1 = getpgrp(0x0) wait4(r1, 0x0, 0x0, 0x0) 03:58:45 executing program 1: bpf$MAP_CREATE(0xc00000000000000, 0x0, 0x0) 03:58:45 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, 0x0}, 0x8080) 03:58:45 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @local, 0x7}, 0x1c) sendmmsg(r0, &(0x7f0000000100), 0x8000000000002e3, 0x0) 03:58:45 executing program 0: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x2000002) fallocate(r2, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000040)={0xff00, 0xffffffffffffffff, 0x0, 0x0, 0xf}) sendfile(r0, r1, 0x0, 0x10000) 03:58:45 executing program 1: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000000)={0x0, 0x4, 0x7ffe, 0x3f, 0x0, 0xffffffffffffffff, 0x0, [0x2400000018cf63, 0xe00000f, 0x0, 0x6000000, 0x0, 0x0, 0x34000, 0x0, 0x0, 0xc00200, 0x0, 0x0, 0x32000, 0xf]}, 0x3c) 03:58:45 executing program 0: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x2000002) fallocate(r2, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000040)={0xff00, 0xffffffffffffffff, 0x0, 0x0, 0xf}) sendfile(r0, r1, 0x0, 0x10000) [ 2228.675148][ T26] kauditd_printk_skb: 2 callbacks suppressed [ 2228.675161][ T26] audit: type=1800 audit(2000001525.180:447): pid=17173 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17325 res=0 03:58:45 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47b") r1 = getpgrp(0x0) wait4(r1, 0x0, 0x0, 0x0) 03:58:45 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, 0x0}, 0x8080) 03:58:45 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) sendmmsg(r0, &(0x7f0000000100), 0x8000000000002e3, 0x0) 03:58:45 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47b") r1 = getpgrp(0x0) wait4(r1, 0x0, 0x0, 0x0) [ 2228.846637][ T26] audit: type=1804 audit(2000001525.180:448): pid=17173 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir632706297/syzkaller.hYyTFP/1024/file0" dev="sda1" ino=17325 res=1 [ 2228.922831][ T26] audit: type=1804 audit(2000001525.180:449): pid=17173 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir632706297/syzkaller.hYyTFP/1024/file0" dev="sda1" ino=17325 res=1 [ 2228.955336][ T26] audit: type=1800 audit(2000001525.310:450): pid=17184 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16748 res=0 [ 2228.976586][ T26] audit: type=1804 audit(2000001525.320:451): pid=17184 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir632706297/syzkaller.hYyTFP/1025/file0" dev="sda1" ino=16748 res=1 [ 2229.002803][ T26] audit: type=1804 audit(2000001525.370:452): pid=17184 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir632706297/syzkaller.hYyTFP/1025/file0" dev="sda1" ino=16748 res=1 03:58:48 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a", 0x74}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:58:48 executing program 1: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000000)={0x0, 0x4, 0x7ffe, 0x3f, 0x0, 0xffffffffffffffff, 0x0, [0x2400000018cf63, 0xe00000f, 0x0, 0x6000000, 0x0, 0x0, 0x34000, 0x0, 0x0, 0xc00200, 0x0, 0x0, 0x32000, 0xf]}, 0x3c) 03:58:48 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, 0x0}, 0x8080) 03:58:48 executing program 0: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x2000002) fallocate(r2, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000040)={0xff00, 0xffffffffffffffff, 0x0, 0x0, 0xf}) sendfile(r0, r1, 0x0, 0x10000) 03:58:48 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) sendmmsg(r0, &(0x7f0000000100), 0x8000000000002e3, 0x0) 03:58:48 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf0") r1 = getpgrp(0x0) wait4(r1, 0x0, 0x0, 0x0) 03:58:48 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf0") r1 = getpgrp(0x0) wait4(r1, 0x0, 0x0, 0x0) 03:58:48 executing program 1: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000000)={0x0, 0x4, 0x7ffe, 0x3f, 0x0, 0xffffffffffffffff, 0x0, [0x2400000018cf63, 0xe00000f, 0x0, 0x6000000, 0x0, 0x0, 0x34000, 0x0, 0x0, 0xc00200, 0x0, 0x0, 0x32000, 0xf]}, 0x3c) [ 2231.715143][ T26] audit: type=1800 audit(2000001528.220:453): pid=17202 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17000 res=0 03:58:48 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)}, 0x8080) 03:58:48 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) sendmmsg(r0, &(0x7f0000000100), 0x8000000000002e3, 0x0) [ 2231.785389][ T26] audit: type=1804 audit(2000001528.250:454): pid=17202 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir632706297/syzkaller.hYyTFP/1026/file0" dev="sda1" ino=17000 res=1 03:58:48 executing program 0: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x2000002) fallocate(r2, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000040)={0xff00, r3}) sendfile(r0, r1, 0x0, 0x10000) 03:58:48 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf0") r1 = getpgrp(0x0) wait4(r1, 0x0, 0x0, 0x0) [ 2231.908007][ T26] audit: type=1804 audit(2000001528.290:455): pid=17202 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir632706297/syzkaller.hYyTFP/1026/file0" dev="sda1" ino=17000 res=1 [ 2231.988785][ T26] audit: type=1800 audit(2000001528.480:456): pid=17226 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16696 res=0 03:58:51 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a", 0x74}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 03:58:51 executing program 1: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000000)={0x6, 0x0, 0x7ffe, 0x3f, 0x0, 0xffffffffffffffff, 0x0, [0x2400000018cf63, 0xe00000f, 0x0, 0x6000000, 0x0, 0x0, 0x34000, 0x0, 0x0, 0xc00200, 0x0, 0x0, 0x32000, 0xf]}, 0x3c) 03:58:51 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)}, 0x8080) 03:58:51 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @local, 0x7}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f0000000100), 0x8000000000002e3, 0x0) 03:58:51 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") getpgrp(0x0) wait4(0x0, 0x0, 0x0, 0x0) 03:58:51 executing program 0: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x2000002) fallocate(r2, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000040)={0xff00, r3}) sendfile(r0, r1, 0x0, 0x10000) 03:58:51 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @local, 0x7}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f0000000100), 0x8000000000002e3, 0x0) 03:58:51 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)}, 0x8080) 03:58:51 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") getpgrp(0x0) wait4(0x0, 0x0, 0x0, 0x0) [ 2234.807592][ T26] kauditd_printk_skb: 2 callbacks suppressed [ 2234.807603][ T26] audit: type=1800 audit(2000001531.310:459): pid=17241 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17355 res=0 03:58:51 executing program 1: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000000)={0x6, 0x0, 0x7ffe, 0x3f, 0x0, 0xffffffffffffffff, 0x0, [0x2400000018cf63, 0xe00000f, 0x0, 0x6000000, 0x0, 0x0, 0x34000, 0x0, 0x0, 0xc00200, 0x0, 0x0, 0x32000, 0xf]}, 0x3c) [ 2234.891482][ T26] audit: type=1804 audit(2000001531.350:460): pid=17241 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir632706297/syzkaller.hYyTFP/1028/file0" dev="sda1" ino=17355 res=1 03:58:51 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @local, 0x7}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f0000000100), 0x8000000000002e3, 0x0) 03:58:51 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="90000000", @ANYRES16=0x0], 0x2}}, 0x8080) [ 2234.964394][ T26] audit: type=1804 audit(2000001531.360:461): pid=17241 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir632706297/syzkaller.hYyTFP/1028/file0" dev="sda1" ino=17355 res=1 03:58:54 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a", 0x74}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x9, r0, 0x0, 0x0) 03:58:54 executing program 1: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000000)={0x6, 0x0, 0x7ffe, 0x3f, 0x0, 0xffffffffffffffff, 0x0, [0x2400000018cf63, 0xe00000f, 0x0, 0x6000000, 0x0, 0x0, 0x34000, 0x0, 0x0, 0xc00200, 0x0, 0x0, 0x32000, 0xf]}, 0x3c) 03:58:54 executing program 0: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x2000002) fallocate(r2, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000040)={0xff00, r3}) sendfile(r0, r1, 0x0, 0x10000) 03:58:54 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") getpgrp(0x0) wait4(0x0, 0x0, 0x0, 0x0) 03:58:54 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @local, 0x7}, 0x1c) sendmmsg(r0, &(0x7f0000000100), 0x8000000000002e3, 0x0) 03:58:54 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="90000000", @ANYRES16=0x0], 0x2}}, 0x8080) 03:58:54 executing program 2: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@codepage={'codepage', 0x3d, 'cp865'}}, {@codepage={'codepage', 0x3d, 'iso8859-6'}}]}) [ 2237.882404][ T26] audit: type=1800 audit(2000001534.380:462): pid=17273 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16673 res=0 03:58:54 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="90000000", @ANYRES16=0x0], 0x2}}, 0x8080) 03:58:54 executing program 1: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000000)={0x6, 0x4, 0x0, 0x3f, 0x0, 0xffffffffffffffff, 0x0, [0x2400000018cf63, 0xe00000f, 0x0, 0x6000000, 0x0, 0x0, 0x34000, 0x0, 0x0, 0xc00200, 0x0, 0x0, 0x32000, 0xf]}, 0x3c) [ 2237.951788][ T26] audit: type=1804 audit(2000001534.420:463): pid=17273 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir632706297/syzkaller.hYyTFP/1029/file0" dev="sda1" ino=16673 res=1 [ 2238.020208][T17282] hfs: unable to change codepage [ 2238.031932][ T26] audit: type=1804 audit(2000001534.420:464): pid=17273 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir632706297/syzkaller.hYyTFP/1029/file0" dev="sda1" ino=16673 res=1 03:58:54 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="90000000", @ANYRES16=0x0, @ANYBLOB], 0x3}}, 0x8080) 03:58:54 executing program 1: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000000)={0x6, 0x4, 0x0, 0x3f, 0x0, 0xffffffffffffffff, 0x0, [0x2400000018cf63, 0xe00000f, 0x0, 0x6000000, 0x0, 0x0, 0x34000, 0x0, 0x0, 0xc00200, 0x0, 0x0, 0x32000, 0xf]}, 0x3c) [ 2238.066833][T17282] hfs: unable to parse mount options 03:58:54 executing program 0: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x2000002) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xff00, r2, 0x0, 0x0, 0xf}) sendfile(0xffffffffffffffff, r0, 0x0, 0x10000) [ 2238.142600][T17282] hfs: unable to change codepage [ 2238.155236][T17282] hfs: unable to parse mount options [ 2238.283454][ T26] audit: type=1800 audit(2000001534.790:465): pid=17296 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16610 res=0 [ 2238.318858][ T26] audit: type=1804 audit(2000001534.820:466): pid=17296 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir632706297/syzkaller.hYyTFP/1030/file0" dev="sda1" ino=16610 res=1 [ 2238.363406][ T26] audit: type=1804 audit(2000001534.820:467): pid=17296 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir632706297/syzkaller.hYyTFP/1030/file0" dev="sda1" ino=16610 res=1 03:58:57 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a", 0x74}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x9, r0, 0x0, 0x0) 03:58:57 executing program 1: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000000)={0x6, 0x4, 0x0, 0x3f, 0x0, 0xffffffffffffffff, 0x0, [0x2400000018cf63, 0xe00000f, 0x0, 0x6000000, 0x0, 0x0, 0x34000, 0x0, 0x0, 0xc00200, 0x0, 0x0, 0x32000, 0xf]}, 0x3c) 03:58:57 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="90000000", @ANYRES16=0x0, @ANYBLOB], 0x3}}, 0x8080) 03:58:57 executing program 2: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@codepage={'codepage', 0x3d, 'cp865'}}, {@codepage={'codepage', 0x3d, 'iso8859-6'}}]}) 03:58:57 executing program 0: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x2000002) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xff00, r2, 0x0, 0x0, 0xf}) sendfile(0xffffffffffffffff, r0, 0x0, 0x10000) 03:58:57 executing program 4: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @local, 0x7}, 0x1c) sendmmsg(r0, &(0x7f0000000100), 0x8000000000002e3, 0x0) 03:58:57 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="90000000", @ANYRES16=0x0, @ANYBLOB], 0x3}}, 0x8080) [ 2240.927432][ T26] audit: type=1800 audit(2000001537.430:468): pid=17308 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16602 res=0 [ 2240.966810][T17312] hfs: unable to change codepage 03:58:57 executing program 1: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000000)={0x6, 0x4, 0x7ffe, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0x2400000018cf63, 0xe00000f, 0x0, 0x6000000, 0x0, 0x0, 0x34000, 0x0, 0x0, 0xc00200, 0x0, 0x0, 0x32000, 0xf]}, 0x3c) 03:58:57 executing program 0: open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x2000002) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xff00, r2, 0x0, 0x0, 0xf}) sendfile(0xffffffffffffffff, r0, 0x0, 0x10000) [ 2240.973045][T17312] hfs: unable to parse mount options [ 2240.982930][ T26] audit: type=1804 audit(2000001537.460:469): pid=17308 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir632706297/syzkaller.hYyTFP/1031/file0" dev="sda1" ino=16602 res=1 03:58:57 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="90000000", @ANYRES16=0x0, @ANYBLOB="000429bd7000fddbdf250100000058000100080004004e220000080009004e00000008000b007369700008000800010100000800060073656400080001000a000000080009004a00000008000900500000"], 0x3}}, 0x8080) [ 2241.046645][ T26] audit: type=1804 audit(2000001537.470:470): pid=17308 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir632706297/syzkaller.hYyTFP/1031/file0" dev="sda1" ino=16602 res=1 03:58:57 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="90000000", @ANYRES16=0x0, @ANYBLOB="000429bd7000fddbdf250100000058000100080004004e220000080009004e00000008000b007369700008000800010100000800060073656400080001000a000000080009004a00000008000900500000"], 0x3}}, 0x8080) 03:58:57 executing program 1: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000000)={0x6, 0x4, 0x7ffe, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0x2400000018cf63, 0xe00000f, 0x0, 0x6000000, 0x0, 0x0, 0x34000, 0x0, 0x0, 0xc00200, 0x0, 0x0, 0x32000, 0xf]}, 0x3c) [ 2241.127804][ T26] audit: type=1800 audit(2000001537.630:471): pid=17324 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16603 res=0 [ 2241.207642][ T26] audit: type=1804 audit(2000001537.660:472): pid=17324 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir632706297/syzkaller.hYyTFP/1032/file0" dev="sda1" ino=16603 res=1 [ 2241.244140][ T26] audit: type=1804 audit(2000001537.670:473): pid=17324 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir632706297/syzkaller.hYyTFP/1032/file0" dev="sda1" ino=16603 res=1 03:59:00 executing program 0: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x2000002) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xff00, r2, 0x0, 0x0, 0xf}) sendfile(r0, 0xffffffffffffffff, 0x0, 0x10000) 03:59:00 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a", 0x74}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x9, r0, 0x0, 0x0) 03:59:00 executing program 2: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@codepage={'codepage', 0x3d, 'cp865'}}, {@codepage={'codepage', 0x3d, 'iso8859-6'}}]}) 03:59:00 executing program 1: bpf$MAP_CREATE(0xc00000000000000, &(0x7f0000000000)={0x6, 0x4, 0x7ffe, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0x2400000018cf63, 0xe00000f, 0x0, 0x6000000, 0x0, 0x0, 0x34000, 0x0, 0x0, 0xc00200, 0x0, 0x0, 0x32000, 0xf]}, 0x3c) 03:59:00 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="90000000", @ANYRES16=0x0, @ANYBLOB="000429bd7000fddbdf250100000058000100080004004e220000080009004e00000008000b007369700008000800010100000800060073656400080001000a000000080009004a00000008000900500000"], 0x3}}, 0x8080) 03:59:00 executing program 4: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @local, 0x7}, 0x1c) sendmmsg(r0, &(0x7f0000000100), 0x8000000000002e3, 0x0) 03:59:00 executing program 1: r0 = socket$inet6(0xa, 0x100000000000001, 0x84) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$bt_hci(r0, 0x84, 0x0, &(0x7f0000001140)=""/4096, &(0x7f0000002180)=0x1000) mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0x2, 0x32, 0xffffffffffffffff, 0x0) [ 2243.979885][ T26] audit: type=1800 audit(2000001540.480:474): pid=17343 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16608 res=0 [ 2244.024242][T17341] hfs: unable to change codepage [ 2244.039299][T17341] hfs: unable to parse mount options 03:59:00 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="90000000", @ANYRES16=0x0, @ANYBLOB="000429bd7000fddbdf250100000058000100080004004e220000080009004e00000008000b007369700008000800010100000800060073656400080001000a000000080009004a0000000800090050000000ff164df51ea0769d0c0006006e6f6e65000000000c0002fc07000600090000000800050001000000"], 0x3}}, 0x8080) 03:59:00 executing program 0: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x2000002) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xff00, r2, 0x0, 0x0, 0xf}) sendfile(r0, 0xffffffffffffffff, 0x0, 0x10000) [ 2244.089628][ T26] audit: type=1804 audit(2000001540.550:475): pid=17343 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir632706297/syzkaller.hYyTFP/1033/file0" dev="sda1" ino=16608 res=1 [ 2244.177123][ T26] audit: type=1804 audit(2000001540.560:476): pid=17343 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir632706297/syzkaller.hYyTFP/1033/file0" dev="sda1" ino=16608 res=1 03:59:00 executing program 2: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@codepage={'codepage', 0x3d, 'cp865'}}, {@codepage={'codepage', 0x3d, 'iso8859-6'}}]}) 03:59:00 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x5, &(0x7f0000000100)=[{0x1d, 0x0, 0x7}, {}, {}, {}, {}]}) 03:59:00 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="90000000", @ANYRES16=0x0, @ANYBLOB="000429bd7000fddbdf250100000058000100080004004e220000080009004e00000008000b007369700008000800010100000800060073656400080001000a000000080009004a0000000800090050000000ff164df51ea0769d0c0006006e6f6e65000000000c0002fc07000600090000000800050001000000"], 0x3}}, 0x8080) 03:59:00 executing program 0: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x2000002) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0xff00, r2, 0x0, 0x0, 0xf}) sendfile(r0, 0xffffffffffffffff, 0x0, 0x10000) [ 2244.251833][ T26] audit: type=1800 audit(2000001540.730:477): pid=17359 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16754 res=0 [ 2244.348943][T17365] hfs: unable to change codepage [ 2244.376722][T17365] hfs: unable to parse mount options 03:59:03 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a", 0x74}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 03:59:03 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x5, &(0x7f0000000100)=[{0x1d, 0x0, 0x7}, {}, {}, {}, {}]}) 03:59:03 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="90000000", @ANYRES16=0x0, @ANYBLOB="000429bd7000fddbdf250100000058000100080004004e220000080009004e00000008000b007369700008000800010100000800060073656400080001000a000000080009004a0000000800090050000000ff164df51ea0769d0c0006006e6f6e65000000000c0002fc07000600090000000800050001000000"], 0x3}}, 0x8080) 03:59:03 executing program 4: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @local, 0x7}, 0x1c) sendmmsg(r0, &(0x7f0000000100), 0x8000000000002e3, 0x0) 03:59:03 executing program 0: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x2000002) fallocate(r2, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000040)={0xff00, r3, 0x0, 0x0, 0xf}) sendfile(r0, r1, 0x0, 0x0) 03:59:03 executing program 2: syz_mount_image$hfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@codepage={'codepage', 0x3d, 'cp865'}}, {@codepage={'codepage', 0x3d, 'iso8859-6'}}]}) 03:59:03 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x5, &(0x7f0000000100)=[{0x1d, 0x0, 0x7}, {}, {}, {}, {}]}) [ 2247.047252][ T26] kauditd_printk_skb: 5 callbacks suppressed [ 2247.047263][ T26] audit: type=1800 audit(2000001543.550:483): pid=17383 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16785 res=0 03:59:03 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="90000000", @ANYRES16=0x0, @ANYBLOB="000429bd7000fddbdf250100000058000100080004004e220000080009004e00000008000b007369700008000800010100000800060073656400080001000a000000080009004a0000000800090050000000ff164df51ea0769d0c0006006e6f6e65000000000c0002fc070006000900000008000500010000000800050022524007000000080005001fc2e7b653"], 0x3}}, 0x8080) [ 2247.110906][ T26] audit: type=1804 audit(2000001543.580:484): pid=17383 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir632706297/syzkaller.hYyTFP/1036/file0" dev="sda1" ino=16785 res=1 03:59:03 executing program 0: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x2000002) fallocate(r2, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000040)={0xff00, r3, 0x0, 0x0, 0xf}) sendfile(r0, r1, 0x0, 0x0) [ 2247.146012][ T26] audit: type=1804 audit(2000001543.600:485): pid=17383 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir632706297/syzkaller.hYyTFP/1036/file0" dev="sda1" ino=16785 res=1 03:59:03 executing program 2: syz_mount_image$hfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@codepage={'codepage', 0x3d, 'cp865'}}, {@codepage={'codepage', 0x3d, 'iso8859-6'}}]}) 03:59:03 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x5, &(0x7f0000000100)=[{0x1d, 0x0, 0x7}, {}, {}, {}, {}]}) [ 2247.239866][ T26] audit: type=1800 audit(2000001543.740:486): pid=17397 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16935 res=0 03:59:03 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="90000000", @ANYRES16=0x0, @ANYBLOB="000429bd7000fddbdf250100000058000100080004004e220000080009004e00000008000b007369700008000800010100000800060073656400080001000a000000080009004a0000000800090050000000ff164df51ea0769d0c0006006e6f6e65000000000c0002fc070006000900000008000500010000000800050022524007000000080005001fc2e7b653"], 0x3}}, 0x8080) [ 2247.297273][ T26] audit: type=1804 audit(2000001543.770:487): pid=17397 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir632706297/syzkaller.hYyTFP/1037/file0" dev="sda1" ino=16935 res=1 [ 2247.358603][ T26] audit: type=1804 audit(2000001543.780:488): pid=17397 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir632706297/syzkaller.hYyTFP/1037/file0" dev="sda1" ino=16935 res=1 03:59:06 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a", 0x74}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 03:59:06 executing program 0: r0 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x2000002) fallocate(r2, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000040)={0xff00, r3, 0x0, 0x0, 0xf}) sendfile(r0, r1, 0x0, 0x0) 03:59:06 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000140)={0x5, &(0x7f0000000100)=[{0x1d, 0x0, 0x7}, {}, {}, {}, {}]}) 03:59:06 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @local, 0x7}, 0x1c) sendmmsg(r0, &(0x7f0000000100), 0x8000000000002e3, 0x0) 03:59:06 executing program 2: syz_mount_image$hfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@codepage={'codepage', 0x3d, 'cp865'}}, {@codepage={'codepage', 0x3d, 'iso8859-6'}}]}) 03:59:06 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="90000000", @ANYRES16=0x0, @ANYBLOB="000429bd7000fddbdf250100000058000100080004004e220000080009004e00000008000b007369700008000800010100000800060073656400080001000a000000080009004a0000000800090050000000ff164df51ea0769d0c0006006e6f6e65000000000c0002fc070006000900000008000500010000000800050022524007000000080005001fc2e7b653"], 0x3}}, 0x8080) 03:59:06 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="90000000", @ANYRES16=0x0, @ANYBLOB="000429bd7000fddbdf250100000058000100080004004e220000080009004e00000008000b007369700008000800010100000800060073656400080001000a000000080009004a0000000800090050000000ff164df51ea0769d0c0006006e6f6e65000000000c0002fc070006000900000008000500010000000800050022524007000000080005001fc2e7b653324542a85a539c1c6329"], 0x3}}, 0x8080) [ 2250.128515][ T26] audit: type=1800 audit(2000001546.630:489): pid=17415 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=17233 res=0 03:59:06 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000140)={0x5, &(0x7f0000000100)=[{0x1d, 0x0, 0x7}, {}, {}, {}, {}]}) [ 2250.198118][ T26] audit: type=1804 audit(2000001546.630:490): pid=17415 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir632706297/syzkaller.hYyTFP/1038/file0" dev="sda1" ino=17233 res=1 03:59:06 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001900)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='hugetlb.2MB.e_in_bytes\x00\x00\x00\x00\x00', 0x275a, 0x0) r2 = creat(&(0x7f0000000180)='./file0\x00', 0x0) write$P9_RCLUNK(r2, &(0x7f0000000000)={0x7}, 0x7) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(r1, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0x0, r2}) 03:59:06 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000140)={0x5, &(0x7f0000000100)=[{0x1d, 0x0, 0x7}, {}, {}, {}, {}]}) [ 2250.278304][ T26] audit: type=1804 audit(2000001546.660:491): pid=17415 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir632706297/syzkaller.hYyTFP/1038/file0" dev="sda1" ino=17233 res=1 03:59:06 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="90000000", @ANYRES16=0x0, @ANYBLOB="000429bd7000fddbdf250100000058000100080004004e220000080009004e00000008000b007369700008000800010100000800060073656400080001000a000000080009004a0000000800090050000000ff164df51ea0769d0c0006006e6f6e65000000000c0002fc070006000900000008000500010000000800050022524007000000080005001fc2e7b653324542a85a539c1c6329"], 0x3}}, 0x8080) 03:59:06 executing program 2: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@codepage={'codepage', 0x3d, 'cp865'}}, {@codepage={'codepage', 0x3d, 'iso8859-6'}}]}) [ 2250.395976][ T26] audit: type=1800 audit(2000001546.890:492): pid=17437 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.0" name="hugetlb.2MB.e_in_bytes" dev="sda1" ino=17249 res=0 03:59:09 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a", 0x74}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 03:59:09 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0xc0189436, 0x7fffffffefff) 03:59:09 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="90000000", @ANYRES16=0x0, @ANYBLOB="000429bd7000fddbdf250100000058000100080004004e220000080009004e00000008000b007369700008000800010100000800060073656400080001000a000000080009004a0000000800090050000000ff164df51ea0769d0c0006006e6f6e65000000000c0002fc070006000900000008000500010000000800050022524007000000080005001fc2e7b653324542a85a539c1c6329"], 0x3}}, 0x8080) 03:59:09 executing program 1: seccomp(0x1, 0x0, 0x0) 03:59:09 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @local, 0x7}, 0x1c) sendmmsg(r0, &(0x7f0000000100), 0x8000000000002e3, 0x0) 03:59:09 executing program 2: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@codepage={'codepage', 0x3d, 'cp865'}}, {@codepage={'codepage', 0x3d, 'iso8859-6'}}]}) 03:59:09 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="90000000", @ANYRES16=0x0, @ANYBLOB="000429bd7000fddbdf250100000058000100080004004e220000080009004e00000008000b007369700008000800010100000800060073656400080001000a000000080009004a0000000800090050000000ff164df51ea0769d0c0006006e6f6e65000000000c0002fc070006000900000008000500010000000800050022524007000000080005001fc2e7b653324542a85a539c1c6329edbde15465"], 0x3}}, 0x8080) 03:59:09 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0xc0189436, 0x7fffffffefff) 03:59:09 executing program 1: seccomp(0x1, 0x0, 0x0) 03:59:09 executing program 2: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@codepage={'codepage', 0x3d, 'cp865'}}, {@codepage={'codepage', 0x3d, 'iso8859-6'}}]}) 03:59:09 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="90000000", @ANYRES16=0x0, @ANYBLOB="000429bd7000fddbdf250100000058000100080004004e220000080009004e00000008000b007369700008000800010100000800060073656400080001000a000000080009004a0000000800090050000000ff164df51ea0769d0c0006006e6f6e65000000000c0002fc070006000900000008000500010000000800050022524007000000080005001fc2e7b653324542a85a539c1c6329edbde15465"], 0x3}}, 0x8080) 03:59:09 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0xc0189436, 0x7fffffffefff) 03:59:12 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a", 0x74}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 03:59:12 executing program 1: seccomp(0x1, 0x0, 0x0) 03:59:12 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="90000000", @ANYRES16=0x0, @ANYBLOB="000429bd7000fddbdf250100000058000100080004004e220000080009004e00000008000b007369700008000800010100000800060073656400080001000a000000080009004a0000000800090050000000ff164df51ea0769d0c0006006e6f6e65000000000c0002fc070006000900000008000500010000000800050022524007000000080005001fc2e7b653324542a85a539c1c6329edbde15465"], 0x3}}, 0x8080) 03:59:12 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0xc0189436, 0x7fffffffefff) 03:59:12 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @local, 0x7}, 0x1c) sendmmsg(r0, &(0x7f0000000100), 0x8000000000002e3, 0x0) 03:59:12 executing program 2: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:59:12 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) 03:59:12 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="90000000", @ANYRES16=0x0, @ANYBLOB="000429bd7000fddbdf250100000058000100080004004e220000080009004e00000008000b007369700008000800010100000800060073656400080001000a000000080009004a0000000800090050000000ff164df51ea0769d0c0006006e6f6e65000000000c0002fc070006000900000008000500010000000800050022524007000000080005001fc2e7b653324542a85a539c1c6329edbde15465dde33d"], 0x3}}, 0x8080) 03:59:12 executing program 0: ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0xc0189436, 0x7fffffffefff) [ 2256.335548][T17497] hfs: can't find a HFS filesystem on dev loop2 03:59:12 executing program 2: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:59:13 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) 03:59:13 executing program 4: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @local, 0x7}, 0x1c) sendmmsg(r0, &(0x7f0000000100), 0x8000000000002e3, 0x0) [ 2256.542878][T17514] hfs: can't find a HFS filesystem on dev loop2 03:59:15 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a", 0x74}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 03:59:15 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="90000000", @ANYRES16=0x0, @ANYBLOB="000429bd7000fddbdf250100000058000100080004004e220000080009004e00000008000b007369700008000800010100000800060073656400080001000a000000080009004a0000000800090050000000ff164df51ea0769d0c0006006e6f6e65000000000c0002fc070006000900000008000500010000000800050022524007000000080005001fc2e7b653324542a85a539c1c6329edbde15465dde33d"], 0x3}}, 0x8080) 03:59:15 executing program 0: ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0xc0189436, 0x7fffffffefff) 03:59:15 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) 03:59:15 executing program 2: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:59:15 executing program 4: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @local, 0x7}, 0x1c) sendmmsg(r0, &(0x7f0000000100), 0x8000000000002e3, 0x0) 03:59:15 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x4, &(0x7f0000000100)=[{0x1d, 0x0, 0x7}, {}, {}, {}]}) 03:59:15 executing program 0: ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0xc0189436, 0x7fffffffefff) 03:59:15 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="90000000", @ANYRES16=0x0, @ANYBLOB="000429bd7000fddbdf250100000058000100080004004e220000080009004e00000008000b007369700008000800010100000800060073656400080001000a000000080009004a0000000800090050000000ff164df51ea0769d0c0006006e6f6e65000000000c0002fc070006000900000008000500010000000800050022524007000000080005001fc2e7b653324542a85a539c1c6329edbde15465dde33d"], 0x3}}, 0x8080) [ 2259.415448][T17533] hfs: can't find a HFS filesystem on dev loop2 03:59:16 executing program 2: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@codepage={'codepage', 0x3d, 'cp865'}}]}) 03:59:16 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x3, &(0x7f0000000100)=[{0x1d, 0x0, 0x7}, {}, {}]}) 03:59:16 executing program 0: r0 = syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0xc0189436, 0x7fffffffefff) [ 2259.587928][T17551] hfs: can't find a HFS filesystem on dev loop2 03:59:18 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="a4ab12f728db4b2b4d2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf56db763e3062d037dca291318d0a17270bbce74b46f4db2a92ba0c9fb228bc105af8c4a067888318b04aeb1747555ba16ea10e6ddb915ceb6397e514f3482ca3c4a1d3b9b3c08eaba138725c4fe54204eaa3a", 0x74}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 03:59:18 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="90000000", @ANYRES16=0x0, @ANYBLOB="000429bd7000fddbdf250100000058000100080004004e220000080009004e00000008000b007369700008000800010100000800060073656400080001000a000000080009004a0000000800090050000000ff164df51ea0769d0c0006006e6f6e65000000000c0002fc070006000900000008000500010000000800050022524007000000080005001fc2e7b653324542a85a539c1c6329edbde15465dde33d8d"], 0x3}}, 0x8080) 03:59:18 executing program 0: r0 = syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0xc0189436, 0x7fffffffefff) 03:59:18 executing program 2: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@codepage={'codepage', 0x3d, 'cp865'}}]}) 03:59:18 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x2, &(0x7f0000000100)=[{0x1d, 0x0, 0x7}, {}]}) 03:59:18 executing program 4: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @local, 0x7}, 0x1c) sendmmsg(r0, &(0x7f0000000100), 0x8000000000002e3, 0x0) 03:59:18 executing program 0: r0 = syz_open_dev$sg(0x0, 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0xc0189436, 0x7fffffffefff) 03:59:19 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000100)=[{0x1d, 0x0, 0x7}]}) 03:59:19 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="90000000", @ANYRES16=0x0, @ANYBLOB="000429bd7000fddbdf250100000058000100080004004e220000080009004e00000008000b007369700008000800010100000800060073656400080001000a000000080009004a0000000800090050000000ff164df51ea0769d0c0006006e6f6e65000000000c0002fc070006000900000008000500010000000800050022524007000000080005001fc2e7b653324542a85a539c1c6329edbde15465dde33d8d"], 0x3}}, 0x8080) [ 2262.491649][T17569] hfs: can't find a HFS filesystem on dev loop2 03:59:19 executing program 0: syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0xc0189436, 0x7fffffffefff) 03:59:19 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="90000000", @ANYRES16=0x0, @ANYBLOB="000429bd7000fddbdf250100000058000100080004004e220000080009004e00000008000b007369700008000800010100000800060073656400080001000a000000080009004a0000000800090050000000ff164df51ea0769d0c0006006e6f6e65000000000c0002fc070006000900000008000500010000000800050022524007000000080005001fc2e7b653324542a85a539c1c6329edbde15465dde33d8d"], 0x3}}, 0x8080) 03:59:19 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000100)=[{0x1d, 0x0, 0x7}]}) 03:59:22 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @local, 0x7}, 0x1c) sendmmsg(r0, &(0x7f0000000100), 0x8000000000002e3, 0x0) 03:59:22 executing program 2: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@codepage={'codepage', 0x3d, 'cp865'}}]}) 03:59:22 executing program 0: syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0xc0189436, 0x7fffffffefff) 03:59:22 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="90000000", @ANYBLOB="000429bd7000fddbdf250100000058000100080004004e220000080009004e00000008000b007369700008000800010100000800060073656400080001000a000000080009004a0000000800090050000000ff164df51ea0769d0c0006006e6f6e65000000000c0002fc070006000900000008000500010000000800050022524007000000080005001fc2e7b653324542a85a539c1c6329edbde15465dde33d8dde"], 0x2}}, 0x8080) 03:59:22 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000100)=[{0x1d, 0x0, 0x7}]}) 03:59:22 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() tkill(r0, 0x9) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/udp6\x00') sendfile(r1, r2, 0x0, 0x1000003) 03:59:22 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000100)=[{}]}) 03:59:22 executing program 0: syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0xc0189436, 0x7fffffffefff) 03:59:22 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="90000000", @ANYBLOB="000429bd7000fddbdf250100000058000100080004004e220000080009004e00000008000b007369700008000800010100000800060073656400080001000a000000080009004a0000000800090050000000ff164df51ea0769d0c0006006e6f6e65000000000c0002fc070006000900000008000500010000000800050022524007000000080005001fc2e7b653324542a85a539c1c6329edbde15465dde33d8dde"], 0x2}}, 0x8080) 03:59:22 executing program 5: ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_script(r0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="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"], 0x32e) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000)=0xda9, 0x4) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) [ 2265.566343][T17604] hfs: can't find a HFS filesystem on dev loop2 03:59:22 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000100)=[{}]}) 03:59:22 executing program 2: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@codepage={'codepage', 0x3d, 'iso8859-6'}}]}) 03:59:22 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @local, 0x7}, 0x1c) sendmmsg(r0, &(0x7f0000000100), 0x8000000000002e3, 0x0) 03:59:22 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="90000000", @ANYBLOB="000429bd7000fddbdf250100000058000100080004004e220000080009004e00000008000b007369700008000800010100000800060073656400080001000a000000080009004a0000000800090050000000ff164df51ea0769d0c0006006e6f6e65000000000c0002fc070006000900000008000500010000000800050022524007000000080005001fc2e7b653324542a85a539c1c6329edbde15465dde33d8dde"], 0x2}}, 0x8080) 03:59:22 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x2000000002800100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="a4ab12f728db4b2b2f2f3ff7ad273b1e89e46f905080af4c90ccb170e60b3a8bf574b763e3062d037dca291318d0a17270bbce74", 0x34}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 03:59:22 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000100)=[{}]}) 03:59:22 executing program 2: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@codepage={'codepage', 0x3d, 'iso8859-6'}}]}) 03:59:22 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000ac0)=ANY=[@ANYRES16=0x0, @ANYBLOB="000429bd7000fddbdf250100000058000100080004004e220000080009004e00000008000b007369700008000800010100000800060073656400080001000a000000080009004a0000000800090050000000ff164df51ea0769d0c0006006e6f6e65000000000c0002fc070006000900000008000500010000000800050022524007000000080005001fc2e7b653324542a85a539c1c6329edbde15465dde33d8dde"], 0x2}}, 0x8080) [ 2265.853375][T17626] hfs: can't find a HFS filesystem on dev loop2 03:59:22 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x2, &(0x7f0000000100)=[{0x0, 0x0, 0x7}, {}]}) 03:59:22 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:59:22 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000ac0)=ANY=[@ANYRES16=0x0, @ANYBLOB="000429bd7000fddbdf250100000058000100080004004e220000080009004e00000008000b007369700008000800010100000800060073656400080001000a000000080009004a0000000800090050000000ff164df51ea0769d0c0006006e6f6e65000000000c0002fc070006000900000008000500010000000800050022524007000000080005001fc2e7b653324542a85a539c1c6329edbde15465dde33d8dde"], 0x2}}, 0x8080) [ 2265.990576][T17643] hfs: can't find a HFS filesystem on dev loop2 [ 2266.102368][T17650] FAT-fs (loop0): bogus number of reserved sectors [ 2266.132471][T17650] FAT-fs (loop0): Can't find a valid FAT filesystem [ 2266.247245][T17650] FAT-fs (loop0): bogus number of reserved sectors [ 2266.254742][T17650] FAT-fs (loop0): Can't find a valid FAT filesystem 03:59:22 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_script(r0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000)=0xda9, 0x4) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 03:59:22 executing program 2: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@codepage={'codepage', 0x3d, 'iso8859-6'}}]}) 03:59:22 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x2, &(0x7f0000000100)=[{0x0, 0x0, 0x7}, {}]}) 03:59:22 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000ac0)=ANY=[@ANYRES16=0x0, @ANYBLOB="000429bd7000fddbdf250100000058000100080004004e220000080009004e00000008000b007369700008000800010100000800060073656400080001000a000000080009004a0000000800090050000000ff164df51ea0769d0c0006006e6f6e65000000000c0002fc070006000900000008000500010000000800050022524007000000080005001fc2e7b653324542a85a539c1c6329edbde15465dde33d8dde"], 0x2}}, 0x8080) 03:59:22 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @local, 0x7}, 0x1c) sendmmsg(r0, &(0x7f0000000100), 0x8000000000002e3, 0x0) 03:59:22 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:59:23 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x2, &(0x7f0000000100)=[{0x0, 0x0, 0x7}, {}]}) 03:59:23 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000ac0)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="000429bd7000fddbdf250100000058000100080004004e220000080009004e00000008000b007369700008000800010100000800060073656400080001000a000000080009004a0000000800090050000000ff164df51ea0769d0c0006006e6f6e65000000000c0002fc070006000900000008000500010000000800050022524007000000080005001fc2e7b653324542a85a539c1c6329edbde15465dde33d8dde"], 0x3}}, 0x8080) [ 2266.567114][T17673] hfs: can't find a HFS filesystem on dev loop2 [ 2266.575590][T17672] FAT-fs (loop0): bogus number of reserved sectors [ 2266.602170][T17672] FAT-fs (loop0): Can't find a valid FAT filesystem 03:59:23 executing program 2: creat(&(0x7f00000001c0)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000500)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) unlink(&(0x7f0000000180)='./file0\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") writev(0xffffffffffffffff, 0x0, 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) link(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file1\x00') close(r0) creat(&(0x7f0000000100)='./file0\x00', 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) 03:59:23 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x2, &(0x7f0000000100)=[{0x1d}, {}]}) 03:59:23 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000ac0)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="000429bd7000fddbdf250100000058000100080004004e220000080009004e00000008000b007369700008000800010100000800060073656400080001000a000000080009004a0000000800090050000000ff164df51ea0769d0c0006006e6f6e65000000000c0002fc070006000900000008000500010000000800050022524007000000080005001fc2e7b653324542a85a539c1c6329edbde15465dde33d8dde"], 0x3}}, 0x8080) 03:59:23 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 2266.909965][T17698] FAT-fs (loop0): bogus number of reserved sectors [ 2266.921107][T17698] FAT-fs (loop0): Can't find a valid FAT filesystem 03:59:23 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000ac0)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="000429bd7000fddbdf250100000058000100080004004e220000080009004e00000008000b007369700008000800010100000800060073656400080001000a000000080009004a0000000800090050000000ff164df51ea0769d0c0006006e6f6e65000000000c0002fc070006000900000008000500010000000800050022524007000000080005001fc2e7b653324542a85a539c1c6329edbde15465dde33d8dde"], 0x3}}, 0x8080) 03:59:23 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x2, &(0x7f0000000100)=[{0x1d}, {}]}) 03:59:23 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @local, 0x7}, 0x1c) sendmmsg(r0, &(0x7f0000000100), 0x8000000000002e3, 0x0) 03:59:23 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:59:23 executing program 5: creat(&(0x7f00000001c0)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000500)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) unlink(&(0x7f0000000180)='./file0\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") writev(0xffffffffffffffff, 0x0, 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) link(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file1\x00') close(r0) creat(&(0x7f0000000100)='./file0\x00', 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) 03:59:23 executing program 2: creat(&(0x7f00000001c0)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000500)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) unlink(&(0x7f0000000180)='./file0\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") writev(0xffffffffffffffff, 0x0, 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) link(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file1\x00') close(r0) creat(&(0x7f0000000100)='./file0\x00', 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) 03:59:24 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x2, &(0x7f0000000100)=[{0x1d}, {}]}) 03:59:24 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="9000", @ANYRES16=0x0, @ANYBLOB="000429bd7000fddbdf250100000058000100080004004e220000080009004e00000008000b007369700008000800010100000800060073656400080001000a000000080009004a0000000800090050000000ff164df51ea0769d0c0006006e6f6e65000000000c0002fc070006000900000008000500010000000800050022524007000000080005001fc2e7b653324542a85a539c1c6329edbde15465dde33d8dde"], 0x3}}, 0x8080) [ 2267.466827][T17719] FAT-fs (loop0): bogus number of reserved sectors [ 2267.495012][T17719] FAT-fs (loop0): Can't find a valid FAT filesystem 03:59:24 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="9000", @ANYRES16=0x0, @ANYBLOB="000429bd7000fddbdf250100000058000100080004004e220000080009004e00000008000b007369700008000800010100000800060073656400080001000a000000080009004a0000000800090050000000ff164df51ea0769d0c0006006e6f6e65000000000c0002fc070006000900000008000500010000000800050022524007000000080005001fc2e7b653324542a85a539c1c6329edbde15465dde33d8dde"], 0x3}}, 0x8080) 03:59:24 executing program 0: syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:59:24 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) connect$inet(r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") write(r1, &(0x7f00000001c0), 0x0) r2 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r2, 0x107, 0xf, &(0x7f0000000180)="6a08da0b", 0x4) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) sendto$inet6(r2, &(0x7f00000003c0)="ce03110075000100ff901efc67195c22cc6dc37916237d8599b512eceb92bd30961166bf00000000070000e19b40b4288ba4e852e8876e977ac94186835a03d045871d6fe30032b46ec4b52a4245f456142304a7821d1c6c8689f4ac12c50cc25534655ee7b237c7a5ba6dcc956757bf80f7146faaefba7f62928a83b54c10bd50c4ea9709367ee58afd37f6f9a0a92decda7d3e5dabe32ba34964ae3278f4c1c443f92eb36c74609cc828c5e225e412a93ffde44006284418dcd9bc1875e6f8c0810e8824591f3064f53560d549cc59f64f7771c5e006e116015eee9913669ccaabee5f0ce3dc19bad70307", 0x100b1, 0x0, 0x0, 0xfffffffffffffed2) 03:59:24 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @local, 0x7}, 0x1c) sendmmsg(r0, &(0x7f0000000100), 0x8000000000002e3, 0x0) [ 2267.753261][T17738] FAT-fs (loop0): bogus number of reserved sectors 03:59:24 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="9000", @ANYRES16=0x0, @ANYBLOB="000429bd7000fddbdf250100000058000100080004004e220000080009004e00000008000b007369700008000800010100000800060073656400080001000a000000080009004a0000000800090050000000ff164df51ea0769d0c0006006e6f6e65000000000c0002fc070006000900000008000500010000000800050022524007000000080005001fc2e7b653324542a85a539c1c6329edbde15465dde33d8dde"], 0x3}}, 0x8080) [ 2267.810061][T17738] FAT-fs (loop0): Can't find a valid FAT filesystem 03:59:24 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="900000", @ANYRES16=0x0, @ANYBLOB="000429bd7000fddbdf250100000058000100080004004e220000080009004e00000008000b007369700008000800010100000800060073656400080001000a000000080009004a0000000800090050000000ff164df51ea0769d0c0006006e6f6e65000000000c0002fc070006000900000008000500010000000800050022524007000000080005001fc2e7b653324542a85a539c1c6329edbde15465dde33d8dde"], 0x3}}, 0x8080) 03:59:24 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) signalfd(0xffffffffffffffff, &(0x7f0000000000), 0x8) 03:59:24 executing program 0: syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:59:24 executing program 5: creat(&(0x7f00000001c0)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000500)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) unlink(&(0x7f0000000180)='./file0\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") writev(0xffffffffffffffff, 0x0, 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) link(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file1\x00') close(r0) creat(&(0x7f0000000100)='./file0\x00', 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) 03:59:24 executing program 2: creat(&(0x7f00000001c0)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000500)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) unlink(&(0x7f0000000180)='./file0\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") writev(0xffffffffffffffff, 0x0, 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) link(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file1\x00') close(r0) creat(&(0x7f0000000100)='./file0\x00', 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) 03:59:24 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="900000", @ANYRES16=0x0, @ANYBLOB="000429bd7000fddbdf250100000058000100080004004e220000080009004e00000008000b007369700008000800010100000800060073656400080001000a000000080009004a0000000800090050000000ff164df51ea0769d0c0006006e6f6e65000000000c0002fc070006000900000008000500010000000800050022524007000000080005001fc2e7b653324542a85a539c1c6329edbde15465dde33d8dde"], 0x3}}, 0x8080) 03:59:24 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f00000000c0)={0x7b, 0x5, [0x40000071], [0xc1]}) 03:59:24 executing program 0: syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:59:24 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @local, 0x7}, 0x1c) sendmmsg(r0, &(0x7f0000000100), 0x8000000000002e3, 0x0) 03:59:24 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="900000", @ANYRES16=0x0, @ANYBLOB="000429bd7000fddbdf250100000058000100080004004e220000080009004e00000008000b007369700008000800010100000800060073656400080001000a000000080009004a0000000800090050000000ff164df51ea0769d0c0006006e6f6e65000000000c0002fc070006000900000008000500010000000800050022524007000000080005001fc2e7b653324542a85a539c1c6329edbde15465dde33d8dde"], 0x3}}, 0x8080) 03:59:25 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000000006, 0x0) r1 = dup2(r0, r0) write$P9_RMKNOD(r1, &(0x7f0000000000)={0x10305}, 0xfffffee2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000100)) 03:59:25 executing program 0: syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:59:25 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000001440)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x4) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) recvmsg(r0, &(0x7f0000000140)={0x0, 0x3a, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa47475}, 0x100) 03:59:25 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="90000000", @ANYRES16=0x0, @ANYBLOB="000429bd7000fddbdf250100000058000100080004004e220000080009004e00000008000b007369700008000800010100000800060073656400080001000a000000080009004a0000000800090050000000ff164df51ea0769d0c0006006e6f6e65000000000c0002fc070006000900000008000500010000000800050022524007000000080005001fc2e7b653324542a85a539c1c6329edbde15465dde33d8dde"], 0x3}}, 0x0) 03:59:25 executing program 0: syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 03:59:25 executing program 5: creat(&(0x7f00000001c0)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000500)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) unlink(&(0x7f0000000180)='./file0\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") writev(0xffffffffffffffff, 0x0, 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) link(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file1\x00') close(r0) creat(&(0x7f0000000100)='./file0\x00', 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) 03:59:25 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @local, 0x7}, 0x1c) sendmmsg(r0, &(0x7f0000000100), 0x8000000000002e3, 0x0) 03:59:25 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="90000000", @ANYRES16=0x0, @ANYBLOB="000429bd7000fddbdf250100000058000100080004004e220000080009004e00000008000b007369700008000800010100000800060073656400080001000a000000080009004a0000000800090050000000ff164df51ea0769d0c0006006e6f6e65000000000c0002fc070006000900000008000500010000000800050022524007000000080005001fc2e7b653324542a85a539c1c6329edbde15465dde33d8dde"], 0x3}}, 0x0) 03:59:25 executing program 0: syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 03:59:25 executing program 1: syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:59:25 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @local, 0x7}, 0x1c) sendmmsg(r0, &(0x7f0000000100), 0x8000000000002e3, 0x0) 03:59:25 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="90000000", @ANYRES16=0x0, @ANYBLOB="000429bd7000fddbdf250100000058000100080004004e220000080009004e00000008000b007369700008000800010100000800060073656400080001000a000000080009004a0000000800090050000000ff164df51ea0769d0c0006006e6f6e65000000000c0002fc070006000900000008000500010000000800050022524007000000080005001fc2e7b653324542a85a539c1c6329edbde15465dde33d8dde"], 0x3}}, 0x0) 03:59:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @local, 0x7}, 0x1c) sendmmsg(r0, &(0x7f0000000100), 0x8000000000002e3, 0x0) [ 2269.485740][T17838] FAT-fs (loop1): bogus number of reserved sectors 03:59:26 executing program 0: syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 2269.532435][T17838] FAT-fs (loop1): Can't find a valid FAT filesystem [ 2269.534652][T17852] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 03:59:26 executing program 3: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@codepage={'codepage', 0x3d, 'iso8859-6'}}]}) 03:59:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @local, 0x7}, 0x1c) sendmmsg(r0, &(0x7f0000000100), 0x8000000000002e3, 0x0) [ 2269.772508][T17867] hfs: can't find a HFS filesystem on dev loop3 03:59:26 executing program 1: syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:59:26 executing program 5: creat(&(0x7f00000001c0)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000500)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) unlink(&(0x7f0000000180)='./file0\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") writev(0xffffffffffffffff, 0x0, 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) link(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file1\x00') close(r0) creat(&(0x7f0000000100)='./file0\x00', 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 2269.923306][T17877] FAT-fs (loop1): bogus number of reserved sectors [ 2269.957155][T17877] FAT-fs (loop1): Can't find a valid FAT filesystem 03:59:26 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x1, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f00000000c0)={@dev, r3}, 0x14) 03:59:26 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x20000}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) r1 = socket$kcm(0xa, 0x2, 0x0) close(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000140)={&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x35a, 0x0}, 0x0) sendmsg$kcm(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040)=',', 0x1}], 0x1}, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) write$cgroup_int(r3, &(0x7f0000000200), 0xfffffda0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x15eb) 03:59:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @local, 0x7}, 0x1c) sendmmsg(r0, &(0x7f0000000100), 0x8000000000002e3, 0x0) 03:59:26 executing program 3: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@codepage={'codepage', 0x3d, 'iso8859-6'}}]}) 03:59:26 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_script(r0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="2321202e2f66696c65300aea205486396972100d97c042b2cd925268e43cc84ee8a5606e6635f7ee806b5f917ba77a9d73c005f1d65ab06dcefc5700000000fbc241e44552829a60768e93d001671f3effb1f1ef21e12e108339e01432fb49132d56cd027b2e1c17a9f416e5f982e0e6a5627c7c8622d30435d28ff9ac41074a89eb0a605441116a309995c5280c53b4ba8527106e72752b7b1b7dfc2e916adc640c7a441cb0d319c93a8c46bf6b74171178be3dc9d4069ce0792872656be855a6524126f1fdaf7dd82c4e83ec0d0ebe5be42ed339023388576a9a57c7b628ccf45e9600e1d2ea4470ece86713678f239e277019b6c7620b36940aff03000000000000907ae86b75c3b9f26fcd4e9cdf9a941f3d3a5335b5cfa5697cbd85e5092ccf5a054450daf8a436f2ad8a00076381db30872f54d3d8be1c803cd3f0c8b4977cdb1ffae90d0294f2d9d53b70c425e0c0b175ffdb8a43ee659f31793971ee7b56b2141f1ea0da7f7bebc0a221234c5cf78bf9edae73082e8c2d16d443d7b0b515d7015bf19b844c202cb510ffff2158bc5e219459d30ded5fa72504bd6ac17200535a53ff3b2c8f6d88eca4a2644a5cea8a413ecc5580361a19e9606bda2fb8115dc33e0da9a3892320d499b2a82743d51374c50200d0cbfa078883e070404db9f62b570ccce8c97b4734affa8da72fe3927026094ddaa41ee7b840ea941c99f795cef5e0b1d1168c2fa632a4105eaf445d0e0cd5248bad0bf5b73a8e2d53df88e5494f982d8fe9ccba0ea6b54d397195ba248b5c4090b82857dc1f69d92a7714dc0383e2bb157d0e31cff09c2b98f55761c08cf6d32c9cdb98494d7ce22f4ab7597f7bbc438ce3b55fb08d6437746343ebd89aec4a7f863c9865e2b27008bfbc4439a8478292b291ef7979590e0583d607cb899548c98610c645cf5848f1a1ea61277852e44473db56bff0dfd6f675cc1d6ca026fe5f2cf5c325b5ae5ae2532e64de8ce0505e8ab69b19fa7067c68a06a1eb32e23a79b9fa008fc3e75729acf724096b42a1d484dc5efdb00c39240c0b71b81c7636695a0caae6dd34dc573cf173afcb7889d5c1"], 0x309) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000)=0xda9, 0x4) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 03:59:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @local, 0x7}, 0x1c) sendmmsg(r0, &(0x7f0000000100), 0x8000000000002e3, 0x0) [ 2270.163426][T17895] hfs: can't find a HFS filesystem on dev loop3 03:59:26 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x1, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f00000000c0)={@dev, r3}, 0x14) 03:59:26 executing program 3: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@codepage={'codepage', 0x3d, 'iso8859-6'}}]}) 03:59:26 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000080)={0x30, 0x0, 0x31c, 0x0, 0x0, {{}, 0x0, 0x5, 0x0, {0x14}}}, 0x30}}, 0x0) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000140)={0x1c, 0x0, 0x0, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}]}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000180)={0x28, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x410c, 0x0, {0xc, 0x14, 'syz1\x00'}}}, 0x28}}, 0x0) recvmsg(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000007c0)=""/138, 0x8a}, {&(0x7f0000000580)=""/244, 0xf4}, {&(0x7f0000000300)=""/162, 0xa2}, {&(0x7f0000001600)=""/4096, 0x1000}, {&(0x7f00000027c0)=""/129, 0x81}], 0x38}, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002880)={0x14, 0x42, 0x105}, 0x14}}, 0x0) 03:59:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @local, 0x7}, 0x1c) sendmmsg(r0, &(0x7f0000000100), 0x8000000000002e3, 0x0) 03:59:27 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x1, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f00000000c0)={@dev, r3}, 0x14) [ 2270.506626][T17923] hfs: can't find a HFS filesystem on dev loop3 03:59:27 executing program 5: creat(&(0x7f00000001c0)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000500)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) unlink(&(0x7f0000000180)='./file0\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") writev(0xffffffffffffffff, 0x0, 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) link(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file1\x00') close(r0) creat(&(0x7f0000000100)='./file0\x00', 0x0) 03:59:27 executing program 1: pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x10005) socket$inet(0x2, 0x3, 0x29) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 03:59:27 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000000100), 0x8000000000002e3, 0x0) 03:59:27 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x20000}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) r1 = socket$kcm(0xa, 0x2, 0x0) close(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000140)={&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x35a, 0x0}, 0x0) sendmsg$kcm(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040)=',', 0x1}], 0x1}, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) write$cgroup_int(r3, &(0x7f0000000200), 0xfffffda0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x15eb) 03:59:27 executing program 3: syz_mount_image$hfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@codepage={'codepage', 0x3d, 'iso8859-6'}}]}) 03:59:27 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x1, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f00000000c0)={@dev, r3}, 0x14) 03:59:27 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000000100), 0x8000000000002e3, 0x0) 03:59:27 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x1, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f00000000c0)={@dev}, 0x14) 03:59:27 executing program 3: syz_mount_image$hfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@codepage={'codepage', 0x3d, 'iso8859-6'}}]}) 03:59:27 executing program 1: pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x10005) socket$inet(0x2, 0x3, 0x29) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 03:59:27 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000000100), 0x8000000000002e3, 0x0) 03:59:27 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x20000}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) r1 = socket$kcm(0xa, 0x2, 0x0) close(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000140)={&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x35a, 0x0}, 0x0) sendmsg$kcm(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040)=',', 0x1}], 0x1}, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) write$cgroup_int(r3, &(0x7f0000000200), 0xfffffda0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x15eb) [ 2271.203200][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2271.209031][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2271.213174][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2271.214860][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2271.220470][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2271.226199][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2271.283185][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2271.288994][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:59:27 executing program 5: creat(&(0x7f00000001c0)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000500)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) unlink(&(0x7f0000000180)='./file0\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") writev(0xffffffffffffffff, 0x0, 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) link(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file1\x00') close(r0) 03:59:27 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x1, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f00000000c0)={@dev}, 0x14) 03:59:27 executing program 3: syz_mount_image$hfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@codepage={'codepage', 0x3d, 'iso8859-6'}}]}) 03:59:27 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x7}, 0x1c) sendmmsg(r0, &(0x7f0000000100), 0x8000000000002e3, 0x0) 03:59:27 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x20000}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) r1 = socket$kcm(0xa, 0x2, 0x0) close(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000140)={&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x35a, 0x0}, 0x0) sendmsg$kcm(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040)=',', 0x1}], 0x1}, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) write$cgroup_int(r3, &(0x7f0000000200), 0xfffffda0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x15eb) 03:59:27 executing program 1: pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x10005) socket$inet(0x2, 0x3, 0x29) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 03:59:28 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x1, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f00000000c0)={@dev}, 0x14) [ 2271.523157][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2271.528970][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:59:28 executing program 3: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@codepage={'codepage', 0x3d, 'iso8859-6'}}]}) 03:59:28 executing program 1: pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x10005) socket$inet(0x2, 0x3, 0x29) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 03:59:28 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x1, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f00000000c0)={@dev, r3}, 0x14) 03:59:28 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x20000}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) r0 = socket$kcm(0xa, 0x2, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000140)={&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x35a, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040)=',', 0x1}], 0x1}, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) write$cgroup_int(r2, &(0x7f0000000200), 0xfffffda0) 03:59:28 executing program 3: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@codepage={'codepage', 0x3d, 'iso8859-6'}}]}) 03:59:28 executing program 5: creat(&(0x7f00000001c0)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000500)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) unlink(&(0x7f0000000180)='./file0\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") writev(0xffffffffffffffff, 0x0, 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) link(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file1\x00') 03:59:28 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x1, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f00000000c0)={@dev, r3}, 0x14) 03:59:28 executing program 1: pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x10005) socket$inet(0x2, 0x3, 0x29) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 03:59:28 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x7}, 0x1c) sendmmsg(r0, &(0x7f0000000100), 0x8000000000002e3, 0x0) 03:59:28 executing program 3: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@codepage={'codepage', 0x3d, 'iso8859-6'}}]}) 03:59:28 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x20000}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) r0 = socket$kcm(0xa, 0x2, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000140)={&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x35a, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040)=',', 0x1}], 0x1}, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x1) 03:59:28 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x1, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f00000000c0)={@dev, r3}, 0x14) 03:59:28 executing program 3: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:59:28 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x20000}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) r0 = socket$kcm(0xa, 0x2, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000140)={&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x35a, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040)=',', 0x1}], 0x1}, 0x0) 03:59:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x1, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f00000000c0)={@dev, r2}, 0x14) [ 2272.561322][T18073] hfs: can't find a HFS filesystem on dev loop3 03:59:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x1, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f00000000c0)={@dev, r2}, 0x14) 03:59:29 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x20000}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) r0 = socket$kcm(0xa, 0x2, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000140)={&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x35a, 0x0}, 0x0) 03:59:29 executing program 5: creat(&(0x7f00000001c0)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000500)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) unlink(&(0x7f0000000180)='./file0\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") writev(0xffffffffffffffff, 0x0, 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 03:59:29 executing program 3: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 2272.963538][T18091] hfs: can't find a HFS filesystem on dev loop3 03:59:29 executing program 1: pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x10005) socket$inet(0x2, 0x3, 0x29) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 03:59:29 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x7}, 0x1c) sendmmsg(r0, &(0x7f0000000100), 0x8000000000002e3, 0x0) 03:59:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x1, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f00000000c0)={@dev, r2}, 0x14) 03:59:29 executing program 3: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:59:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f00000000c0)={@dev, r2}, 0x14) [ 2273.307738][T18107] hfs: can't find a HFS filesystem on dev loop3 03:59:29 executing program 5: creat(&(0x7f00000001c0)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000500)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) unlink(&(0x7f0000000180)='./file0\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") writev(0xffffffffffffffff, 0x0, 0x0) 03:59:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f00000000c0)={@dev, r2}, 0x14) 03:59:29 executing program 3: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)) 03:59:30 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x20000}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) r0 = socket$kcm(0xa, 0x2, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000140)={&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x35a, 0x0}, 0x0) 03:59:30 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f00000000c0)={@dev, r2}, 0x14) [ 2273.554675][T18124] hfs: can't find a HFS filesystem on dev loop3 03:59:30 executing program 3: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)) 03:59:30 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet6(0xa, 0x1, 0x0) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000000c0)={@dev, r2}, 0x14) [ 2273.767805][T18137] hfs: can't find a HFS filesystem on dev loop3 03:59:30 executing program 1: pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x10005) socket$inet(0x2, 0x3, 0x29) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 03:59:30 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @local}, 0x1c) sendmmsg(r0, &(0x7f0000000100), 0x8000000000002e3, 0x0) 03:59:30 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet6(0xa, 0x1, 0x0) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000000c0)={@dev, r2}, 0x14) 03:59:30 executing program 3: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)) 03:59:30 executing program 5: creat(&(0x7f00000001c0)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000500)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) unlink(&(0x7f0000000180)='./file0\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") 03:59:30 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet6(0xa, 0x1, 0x0) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000000c0)={@dev, r2}, 0x14) [ 2274.159044][T18151] hfs: can't find a HFS filesystem on dev loop3 03:59:30 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @local}, 0x1c) sendmmsg(r0, &(0x7f0000000100), 0x8000000000002e3, 0x0) 03:59:30 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_script(r0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="2321202e2f66696c65300aea205486396972100d97c042b2cd925268e43cc84ee8a5606e6635f7ee806b5f917ba77a9d73c005f1d65ab06dcefc5700000000fbc241e44552829a60768e93d001671f3effb1f1ef21e12e108339e01432fb49132d56cd027b2e1c17a9f416e5f982e0e6a5627c7c8622d30435d28ff9ac41074a89eb0a605441116a309995c5280c53b4ba8527106e72752b7b1b7dfc2e916adc640c7a441cb0d319c93a8c46bf6b74171178be3dc9d4069ce0792872656be855a6524126f1fdaf7dd82c4e83ec0d0ebe5be42ed339023388576a9a57c7b628ccf45e9600e1d2ea4470ece86713678f239e277019b6c7620b36940aff03000000000000907ae86b75c3b9f26fcd4e9cdf9a941f3d3a5335b5cfa5697cbd85e5092ccf5a054450daf8a436f2ad8a00076381db30872f54d3d8be1c803cd3f0c8b4977cdb1ffae90d0294f2d9d53b70c425e0c0b175ffdb8a43ee659f31793971ee7b56b2141f1ea0da7f7bebc0a221234c5cf78bf9edae73082e8c2d16d443d7b0b515d7015bf19b844c202cb510ffff2158bc5e219459d30ded5fa72504bd6ac17200535a53ff3b2c8f6d88eca4a2644a5cea8a413ecc5580361a19e9606bda2fb8115dc33e0da9a3892320d499b2a82743d51374c50200d0cbfa078883e070404db9f62b570ccce8c97b4734affa8da72fe3927026094ddaa41ee7b840ea94"], 0x1ff) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000)=0xda9, 0x4) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 03:59:30 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x20000}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) r0 = socket$kcm(0xa, 0x2, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000140)={&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x35a, 0x0}, 0x0) 03:59:30 executing program 2: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r0 = socket$inet6(0xa, 0x1, 0x0) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000000c0)={@dev, r2}, 0x14) 03:59:30 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @local}, 0x1c) sendmmsg(r0, &(0x7f0000000100), 0x8000000000002e3, 0x0) 03:59:30 executing program 3: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) ioctl$RNDGETENTCNT(r0, 0x40045201, &(0x7f0000000040)) 03:59:31 executing program 1: pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x10005) socket$inet(0x2, 0x3, 0x29) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 03:59:31 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @local, 0x7}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f0000000100), 0x8000000000002e3, 0x0) 03:59:31 executing program 3: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) ioctl$RNDGETENTCNT(r0, 0x40045201, &(0x7f0000000040)) 03:59:31 executing program 2: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r0 = socket$inet6(0xa, 0x1, 0x0) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000000c0)={@dev, r2}, 0x14) 03:59:31 executing program 5: creat(&(0x7f00000001c0)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000500)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) unlink(&(0x7f0000000180)='./file0\x00') socket$inet_udplite(0x2, 0x2, 0x88) 03:59:31 executing program 3: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) ioctl$RNDGETENTCNT(r0, 0x40045201, &(0x7f0000000040)) 03:59:31 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @local, 0x7}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f0000000100), 0x8000000000002e3, 0x0) 03:59:31 executing program 2: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r0 = socket$inet6(0xa, 0x1, 0x0) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000000c0)={@dev, r2}, 0x14) 03:59:31 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x20000}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) r0 = socket$kcm(0xa, 0x2, 0x0) close(r0) recvmsg(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x35a, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040)=',', 0x1}], 0x1}, 0x0) 03:59:31 executing program 3: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) ioctl$RNDGETENTCNT(r0, 0x40045201, &(0x7f0000000040)) 03:59:31 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @local, 0x7}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f0000000100), 0x8000000000002e3, 0x0) 03:59:31 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r0 = socket$inet6(0xa, 0x1, 0x0) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000000c0)={@dev, r2}, 0x14) 03:59:32 executing program 1: pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x10005) socket$inet(0x2, 0x3, 0x29) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 03:59:32 executing program 5: creat(&(0x7f00000001c0)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000500)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) unlink(&(0x7f0000000180)='./file0\x00') socket$inet_udplite(0x2, 0x2, 0x88) 03:59:32 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @local, 0x7}, 0x1c) sendmmsg(r0, 0x0, 0x0, 0x0) 03:59:32 executing program 3: ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000040)) 03:59:32 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r0 = socket$inet6(0xa, 0x1, 0x0) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000000c0)={@dev, r2}, 0x14) 03:59:32 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x20000}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) r0 = socket$kcm(0xa, 0x2, 0x0) close(r0) recvmsg(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x35a, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040)=',', 0x1}], 0x1}, 0x0) 03:59:32 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @local, 0x7}, 0x1c) sendmmsg(r0, 0x0, 0x0, 0x0) 03:59:32 executing program 3: ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000040)) 03:59:32 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x20000}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) r0 = socket$kcm(0xa, 0x2, 0x0) close(r0) recvmsg(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x35a, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040)=',', 0x1}], 0x1}, 0x0) 03:59:32 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r0 = socket$inet6(0xa, 0x1, 0x0) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000000c0)={@dev, r2}, 0x14) 03:59:32 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @local, 0x7}, 0x1c) sendmmsg(r0, 0x0, 0x0, 0x0) 03:59:32 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x20000}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) r0 = socket$kcm(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000140)={&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x35a, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040)=',', 0x1}], 0x1}, 0x0) 03:59:33 executing program 1: pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x10005) socket$inet(0x2, 0x3, 0x29) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 03:59:33 executing program 3: ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000040)) 03:59:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x1, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f00000000c0)={@dev, r3}, 0x14) 03:59:33 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) 03:59:33 executing program 5: creat(&(0x7f00000001c0)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000500)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) unlink(&(0x7f0000000180)='./file0\x00') socket$inet_udplite(0x2, 0x2, 0x88) 03:59:33 executing program 3: r0 = openat$urandom(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$RNDGETENTCNT(r0, 0x40045201, &(0x7f0000000040)) 03:59:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x1, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f00000000c0)={@dev, r3}, 0x14) 03:59:33 executing program 3: r0 = openat$urandom(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$RNDGETENTCNT(r0, 0x40045201, &(0x7f0000000040)) 03:59:33 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00\x84\xe0\xda\x82a\xbe\x18O\x17\x1b\\\x143\x06v\x9b=>\xc1\xd9\x06\x00\x05\xf7\xae\xce\xbeA,j5\xac\xf5\xf0&\xc5$\x951QC\x87\x9f\xe0};\xac\xb7k>0\xce\xcd~\xd766*\fo=Cg&[\x8b\xe2\xbd\xe9\x16\xc6\x1e\x97e]\xb0\xed\xe7I\x18\x96RS\x10\x8cyr\xb7\xcf', 0x275a, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000001600)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 03:59:33 executing program 3: r0 = openat$urandom(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$RNDGETENTCNT(r0, 0x40045201, &(0x7f0000000040)) 03:59:33 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x20000}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) r0 = socket$kcm(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000140)={&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x35a, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040)=',', 0x1}], 0x1}, 0x0) 03:59:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x1, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f00000000c0)={@dev, r3}, 0x14) [ 2277.203188][ C0] net_ratelimit: 22 callbacks suppressed [ 2277.203195][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2277.214700][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2277.443191][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2277.443219][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2277.448990][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2277.454752][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2277.466185][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2277.523190][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2277.528988][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:59:34 executing program 1: pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x10005) socket$inet(0x2, 0x3, 0x29) socket$packet(0x11, 0x3, 0x300) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 03:59:34 executing program 3: openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000040)) 03:59:34 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f00000000c0)={@dev, r3}, 0x14) 03:59:34 executing program 5: creat(&(0x7f00000001c0)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000500)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) unlink(&(0x7f0000000180)='./file0\x00') ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") 03:59:34 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) timer_delete(0x0) 03:59:34 executing program 3: openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000040)) 03:59:34 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) timer_delete(0x0) 03:59:34 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f00000000c0)={@dev, r3}, 0x14) 03:59:34 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x20000}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) r0 = socket$kcm(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000140)={&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x35a, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040)=',', 0x1}], 0x1}, 0x0) 03:59:34 executing program 3: openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000040)) 03:59:34 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) timer_delete(0x0) 03:59:34 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f00000000c0)={@dev, r3}, 0x14) 03:59:34 executing program 1: pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x10005) socket$inet(0x2, 0x3, 0x29) socket$packet(0x11, 0x3, 0x300) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 03:59:34 executing program 3: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) ioctl$RNDGETENTCNT(r0, 0x40045201, 0x0) 03:59:34 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) timer_delete(0x0) 03:59:34 executing program 5: creat(&(0x7f00000001c0)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000500)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) unlink(&(0x7f0000000180)='./file0\x00') ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") 03:59:34 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) r1 = socket$inet6(0xa, 0x1, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f00000000c0)={@dev, r3}, 0x14) 03:59:34 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) timer_delete(0x0) 03:59:34 executing program 3: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) ioctl$RNDGETENTCNT(r0, 0x40045201, 0x0) 03:59:34 executing program 1: pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x10005) socket$inet(0x2, 0x3, 0x29) socket$packet(0x11, 0x3, 0x300) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 03:59:35 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x20000}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000140)={&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x35a, 0x0}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040)=',', 0x1}], 0x1}, 0x0) 03:59:35 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) timer_delete(0x0) 03:59:35 executing program 3: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) ioctl$RNDGETENTCNT(r0, 0x40045201, 0x0) 03:59:35 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) r1 = socket$inet6(0xa, 0x1, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f00000000c0)={@dev, r3}, 0x14) 03:59:35 executing program 1: pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x10005) socket$inet(0x2, 0x3, 0x29) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 03:59:35 executing program 5: creat(&(0x7f00000001c0)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000500)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) unlink(&(0x7f0000000180)='./file0\x00') ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") 03:59:35 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) r1 = dup(r0) ioctl$TIOCSBRK(r1, 0x5427) 03:59:35 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) timer_delete(0x0) 03:59:35 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) r1 = socket$inet6(0xa, 0x1, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f00000000c0)={@dev, r3}, 0x14) 03:59:35 executing program 1: pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x10005) socket$inet(0x2, 0x3, 0x29) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 03:59:35 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) timer_delete(0x0) 03:59:35 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f0000000000)='user\x00', 0x0, &(0x7f0000000080)="d2", 0x1, 0xfffffffffffffffd) 03:59:36 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x20000}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000140)={&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x35a, 0x0}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040)=',', 0x1}], 0x1}, 0x0) 03:59:36 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0b") r1 = socket$inet6(0xa, 0x1, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f00000000c0)={@dev, r3}, 0x14) 03:59:36 executing program 1: pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x10005) socket$inet(0x2, 0x3, 0x29) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 03:59:36 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) timer_delete(0x0) 03:59:36 executing program 3: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="d2", 0x1, 0xfffffffffffffffd) keyctl$clear(0x7, r0) 03:59:36 executing program 5: creat(&(0x7f00000001c0)='./file1\x00', 0x0) creat(&(0x7f0000000500)='./file0\x00', 0x0) unlink(&(0x7f0000000180)='./file0\x00') r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") 03:59:36 executing program 3: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="d2", 0x1, 0xfffffffffffffffd) keyctl$clear(0x7, r0) 03:59:36 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) timer_delete(0x0) 03:59:36 executing program 5: creat(&(0x7f00000001c0)='./file1\x00', 0x0) creat(&(0x7f0000000500)='./file0\x00', 0x0) unlink(&(0x7f0000000180)='./file0\x00') r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") 03:59:36 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0b") r1 = socket$inet6(0xa, 0x1, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f00000000c0)={@dev, r3}, 0x14) 03:59:36 executing program 1: pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x10005) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 03:59:36 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) timer_delete(0x0) 03:59:36 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x20000}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000140)={&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x35a, 0x0}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040)=',', 0x1}], 0x1}, 0x0) 03:59:36 executing program 3: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="d2", 0x1, 0xfffffffffffffffd) keyctl$clear(0x7, r0) 03:59:36 executing program 5: creat(&(0x7f00000001c0)='./file1\x00', 0x0) creat(&(0x7f0000000500)='./file0\x00', 0x0) unlink(&(0x7f0000000180)='./file0\x00') r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") 03:59:36 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0b") r1 = socket$inet6(0xa, 0x1, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f00000000c0)={@dev, r3}, 0x14) 03:59:36 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) timer_delete(0x0) 03:59:37 executing program 5: creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) unlink(&(0x7f0000000180)='./file0\x00') r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") 03:59:37 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) timer_delete(0x0) 03:59:37 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47b") r1 = socket$inet6(0xa, 0x1, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f00000000c0)={@dev, r3}, 0x14) 03:59:37 executing program 3: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="d2", 0x1, 0xfffffffffffffffd) keyctl$clear(0x7, r0) 03:59:37 executing program 5: creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) unlink(&(0x7f0000000180)='./file0\x00') r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") 03:59:37 executing program 1: pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x10005) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 03:59:37 executing program 4: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) timer_delete(0x0) 03:59:37 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000140)={&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x35a, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040)=',', 0x1}], 0x1}, 0x0) 03:59:37 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47b") r1 = socket$inet6(0xa, 0x1, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f00000000c0)={@dev, r3}, 0x14) 03:59:37 executing program 3: keyctl$clear(0x7, 0x0) 03:59:37 executing program 5: creat(&(0x7f00000001c0)='./file1\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) unlink(&(0x7f0000000180)='./file0\x00') r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") 03:59:37 executing program 4: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) timer_delete(0x0) 03:59:37 executing program 4: socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) timer_delete(0x0) 03:59:37 executing program 3: keyctl$clear(0x7, 0x0) 03:59:37 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47b") r1 = socket$inet6(0xa, 0x1, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f00000000c0)={@dev, r3}, 0x14) 03:59:37 executing program 5: r0 = creat(&(0x7f0000000500)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) unlink(&(0x7f0000000180)='./file0\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") [ 2281.363163][ C0] protocol 88fb is buggy, dev hsr_slave_0 03:59:37 executing program 3: keyctl$clear(0x7, 0x0) 03:59:38 executing program 1: pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x10005) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 03:59:38 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) timer_delete(0x0) 03:59:38 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000140)={&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x35a, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040)=',', 0x1}], 0x1}, 0x0) 03:59:38 executing program 3: r0 = add_key(0x0, &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="d2", 0x1, 0xfffffffffffffffd) keyctl$clear(0x7, r0) 03:59:38 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf0") r1 = socket$inet6(0xa, 0x1, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f00000000c0)={@dev, r3}, 0x14) 03:59:38 executing program 3: r0 = add_key(0x0, &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="d2", 0x1, 0xfffffffffffffffd) keyctl$clear(0x7, r0) 03:59:38 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) timer_delete(0x0) 03:59:38 executing program 0: r0 = socket$kcm(0xa, 0x0, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000140)={&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x35a, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040)=',', 0x1}], 0x1}, 0x0) 03:59:38 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf0") r1 = socket$inet6(0xa, 0x1, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f00000000c0)={@dev, r3}, 0x14) 03:59:38 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) timer_delete(0x0) 03:59:38 executing program 3: r0 = add_key(0x0, &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="d2", 0x1, 0xfffffffffffffffd) keyctl$clear(0x7, r0) 03:59:38 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf0") r1 = socket$inet6(0xa, 0x1, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f00000000c0)={@dev, r3}, 0x14) 03:59:38 executing program 1: pipe(&(0x7f0000000380)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) socket$inet(0x2, 0x3, 0x29) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r1, 0x0, 0x10005, 0x0) 03:59:38 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) timer_delete(0x0) 03:59:38 executing program 5: r0 = creat(0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) unlink(&(0x7f0000000180)='./file0\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") 03:59:38 executing program 3: r0 = add_key(&(0x7f0000000000)='user\x00', 0x0, &(0x7f0000000080)="d2", 0x1, 0xfffffffffffffffd) keyctl$clear(0x7, r0) 03:59:38 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x0, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f00000000c0)={@dev, r3}, 0x14) 03:59:39 executing program 5: r0 = creat(0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) unlink(&(0x7f0000000180)='./file0\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") 03:59:39 executing program 3: r0 = add_key(&(0x7f0000000000)='user\x00', 0x0, &(0x7f0000000080)="d2", 0x1, 0xfffffffffffffffd) keyctl$clear(0x7, r0) 03:59:39 executing program 0: r0 = socket$kcm(0xa, 0x0, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000140)={&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x35a, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040)=',', 0x1}], 0x1}, 0x0) 03:59:39 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) timer_delete(0x0) 03:59:39 executing program 5: r0 = creat(0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) unlink(&(0x7f0000000180)='./file0\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") 03:59:39 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x0, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f00000000c0)={@dev, r3}, 0x14) 03:59:39 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) timer_delete(0x0) 03:59:39 executing program 1: pipe(&(0x7f0000000380)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) socket$inet(0x2, 0x3, 0x29) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r1, 0x0, 0x10005, 0x0) 03:59:39 executing program 3: r0 = add_key(&(0x7f0000000000)='user\x00', 0x0, &(0x7f0000000080)="d2", 0x1, 0xfffffffffffffffd) keyctl$clear(0x7, r0) 03:59:39 executing program 5: creat(&(0x7f0000000500)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) unlink(&(0x7f0000000180)='./file0\x00') r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") 03:59:39 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x0, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f00000000c0)={@dev, r3}, 0x14) 03:59:39 executing program 4: creat(0x0, 0x0) r0 = creat(&(0x7f0000000500)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) unlink(&(0x7f0000000180)='./file0\x00') ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)="11dca50d5e0b") clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) link(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file1\x00') creat(&(0x7f0000000100)='./file0\x00', 0x0) 03:59:39 executing program 3: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$clear(0x7, r0) 03:59:39 executing program 5: creat(&(0x7f0000000500)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) unlink(&(0x7f0000000180)='./file0\x00') r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") 03:59:39 executing program 0: r0 = socket$kcm(0xa, 0x0, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000140)={&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x35a, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040)=',', 0x1}], 0x1}, 0x0) [ 2283.443176][ C0] net_ratelimit: 3 callbacks suppressed [ 2283.443184][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2283.454533][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:59:40 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x1, 0x0) r2 = socket(0x0, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f00000000c0)={@dev, r3}, 0x14) 03:59:40 executing program 5: creat(&(0x7f0000000500)='./file0\x00', 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) unlink(&(0x7f0000000180)='./file0\x00') r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") 03:59:40 executing program 3: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$clear(0x7, r0) 03:59:40 executing program 5: r0 = creat(&(0x7f0000000500)='./file0\x00', 0x0) write$binfmt_elf64(r0, 0x0, 0x0) unlink(&(0x7f0000000180)='./file0\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") [ 2283.683168][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2283.683196][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2283.688954][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2283.694685][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2283.706109][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2283.763175][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2283.768994][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2284.003202][ C0] protocol 88fb is buggy, dev hsr_slave_0 03:59:40 executing program 1: pipe(&(0x7f0000000380)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) socket$inet(0x2, 0x3, 0x29) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r1, 0x0, 0x10005, 0x0) 03:59:40 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x1, 0x0) r2 = socket(0x0, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f00000000c0)={@dev, r3}, 0x14) 03:59:40 executing program 3: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$clear(0x7, r0) 03:59:40 executing program 5: r0 = creat(&(0x7f0000000500)='./file0\x00', 0x0) write$binfmt_elf64(r0, 0x0, 0x0) unlink(&(0x7f0000000180)='./file0\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") 03:59:40 executing program 4: r0 = open(&(0x7f0000000040)='./file0\x00', 0x10000000002fc, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) flock(r1, 0x2) flock(r0, 0x2) dup2(r0, r1) 03:59:40 executing program 3: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080), 0x0, 0xfffffffffffffffd) keyctl$clear(0x7, r0) 03:59:40 executing program 5: r0 = creat(&(0x7f0000000500)='./file0\x00', 0x0) write$binfmt_elf64(r0, 0x0, 0x0) unlink(&(0x7f0000000180)='./file0\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") 03:59:40 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000140)={&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x35a, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040)=',', 0x1}], 0x1}, 0x0) 03:59:40 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x1, 0x0) r2 = socket(0x0, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f00000000c0)={@dev, r3}, 0x14) 03:59:40 executing program 4: r0 = open(&(0x7f0000000040)='./file0\x00', 0x10000000002fc, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) flock(r1, 0x2) flock(r0, 0x2) dup2(r0, r1) 03:59:40 executing program 3: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080), 0x0, 0xfffffffffffffffd) keyctl$clear(0x7, r0) 03:59:40 executing program 5: r0 = creat(&(0x7f0000000500)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) unlink(0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") 03:59:41 executing program 1: pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x10005) socket$inet(0x2, 0x3, 0x29) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 03:59:41 executing program 3: r0 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080), 0x0, 0xfffffffffffffffd) keyctl$clear(0x7, r0) 03:59:41 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x1, 0x0) r2 = socket(0x100000000011, 0x0, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f00000000c0)={@dev, r3}, 0x14) 03:59:41 executing program 4: r0 = open(&(0x7f0000000040)='./file0\x00', 0x10000000002fc, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) flock(r1, 0x2) flock(r0, 0x2) dup2(r0, r1) 03:59:41 executing program 5: r0 = creat(&(0x7f0000000500)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) unlink(0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") 03:59:41 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x1, 0x0) r2 = socket(0x100000000011, 0x0, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f00000000c0)={@dev, r3}, 0x14) 03:59:41 executing program 3: add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="d2", 0x1, 0xfffffffffffffffd) keyctl$clear(0x7, 0x0) 03:59:41 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000140)={&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x35a, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040)=',', 0x1}], 0x1}, 0x0) 03:59:41 executing program 4: r0 = open(&(0x7f0000000040)='./file0\x00', 0x10000000002fc, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) flock(r1, 0x2) flock(r0, 0x2) dup2(r0, r1) 03:59:41 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x1, 0x0) r2 = socket(0x100000000011, 0x0, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f00000000c0)={@dev, r3}, 0x14) 03:59:41 executing program 1: pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x10005) socket$inet(0x2, 0x3, 0x29) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 03:59:41 executing program 3: add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="d2", 0x1, 0xfffffffffffffffd) keyctl$clear(0x7, 0x0) 03:59:41 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x1, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f00000000c0)={@dev, r3}, 0x14) 03:59:42 executing program 3: add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="d2", 0x1, 0xfffffffffffffffd) keyctl$clear(0x7, 0x0) 03:59:42 executing program 4: r0 = open(&(0x7f0000000040)='./file0\x00', 0x10000000002fc, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) flock(r1, 0x2) flock(r0, 0x2) 03:59:42 executing program 1: pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x10005) socket$inet(0x2, 0x3, 0x29) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 03:59:42 executing program 5: r0 = creat(&(0x7f0000000500)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) unlink(0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") 03:59:42 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x1, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f00000000c0)={@dev, r3}, 0x14) 03:59:42 executing program 3: lsetxattr(&(0x7f0000fc0000)='./file1\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="757365722eb7966daf0934845df31fe86345ccc068ab78dbac74ea3383aa7ca0ee5f79e6eb8e3e365625bd471dc21d5fd68e8eea579ed88a23fa23da14228a55bf0f23110ce1dd045e4ac46df8eb5c4100e64ac7f39a53a9e1e3c1e42a43585e65bf2d3e3b59d5f6690ace7a70098f2298aa03aae9e3fbfc6d86712c22b9e566228393ef02fea6c496756b0ae1106cdb5142cf6c0407a6db6065a831e9f728d579ceef29dd68adaf80656fb8d7447bc81b46e20d19dd54ff62351c0e26faebe30778374bee3e1d21e8109066d326f533ceb8480cbfa431b06ab87a010d3f840108000000000000000245baf95cfee63d0343b93ebda7957b0cec3c4017b488fcd7bca9924731c7320b5f59d5800620386d853b385d90c91b2b2b40d605a556ed66015746d66846ccdaab4c84b9b472585869e0b2f9ee47bbf229d87ef6d793bb8ee379b2ebe6f090cf2dddfa8e3d12892b47d871a4545facb68998eeb4c95fe8e5eea5a2a12a8f7ba48ac03083357688872c5b01bbd796c6fa50fa62686c52e0efb793624ed28d542d4af27717de494889f3b3d99ae471b6939e04d58bfa9cf9be19c349bbe2d40f20ad270a58c791badee8857da7a855e648ded9853c21ec3db007dab5c0f22c1280201bf3bf2d0f80263cbede6aef7e361e72c8105c78273e95370d680709ff34b1019f391556e9dadd654d032828bddbead6412c6b29b000bc4dc2fe8a0a19ace0d586980e43086134b9bf67c3ae07ba7e76b62d669683e253049b385461"], &(0x7f0000fc0000)='//selinux\x00\x03\x01\x01', 0x5, 0x0) 03:59:42 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000140)={&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x35a, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040)=',', 0x1}], 0x1}, 0x0) 03:59:42 executing program 3: socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_emit_ethernet(0x42, &(0x7f0000000140)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x34, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @initdev}, @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8}}}}}}}}, 0x0) 03:59:42 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x1, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f00000000c0)={@dev, r3}, 0x14) 03:59:42 executing program 5: r0 = creat(&(0x7f0000000500)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) unlink(&(0x7f0000000180)='./file0\x00') socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") 03:59:42 executing program 1: pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) close(0xffffffffffffffff) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x10005) socket$inet(0x2, 0x3, 0x29) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x10005, 0x0) 03:59:42 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) 03:59:42 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x1, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f00000000c0)={@dev, r3}, 0x14) 03:59:42 executing program 4: r0 = open(&(0x7f0000000040)='./file0\x00', 0x10000000002fc, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) flock(r1, 0x2) flock(r0, 0x2) 03:59:42 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) 03:59:42 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x1, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f00000000c0)={@dev, r3}, 0x14) 03:59:42 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) 03:59:43 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) 03:59:43 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x0) close(r0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000140)={&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x35a, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040)=',', 0x1}], 0x1}, 0x0) 03:59:43 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x1, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f00000000c0)={@dev, r3}, 0x14) 03:59:43 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) 03:59:43 executing program 5: r0 = creat(&(0x7f0000000500)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) unlink(&(0x7f0000000180)='./file0\x00') socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") 03:59:43 executing program 1: pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) close(0xffffffffffffffff) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x10005) socket$inet(0x2, 0x3, 0x29) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x10005, 0x0) 03:59:43 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) 03:59:43 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x1, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f00000000c0)={@dev, r3}, 0x14) 03:59:43 executing program 4: r0 = open(&(0x7f0000000040)='./file0\x00', 0x10000000002fc, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) flock(r1, 0x2) flock(r0, 0x2) 03:59:43 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x0) close(r0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000140)={&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x35a, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040)=',', 0x1}], 0x1}, 0x0) 03:59:43 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) 03:59:43 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x1, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f00000000c0)={@dev, r3}, 0x14) 03:59:43 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x0) close(r0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000140)={&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x35a, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040)=',', 0x1}], 0x1}, 0x0) 03:59:43 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) 03:59:43 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x35a, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040)=',', 0x1}], 0x1}, 0x0) 03:59:43 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) 03:59:44 executing program 5: r0 = creat(&(0x7f0000000500)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) unlink(&(0x7f0000000180)='./file0\x00') socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") 03:59:44 executing program 1: pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) close(0xffffffffffffffff) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x10005) socket$inet(0x2, 0x3, 0x29) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x10005, 0x0) 03:59:44 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x1, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f00000000c0)={@dev, r3}, 0x14) 03:59:44 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x35a, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040)=',', 0x1}], 0x1}, 0x0) 03:59:44 executing program 4: r0 = open(&(0x7f0000000040)='./file0\x00', 0x10000000002fc, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) flock(r0, 0x2) dup2(r0, r1) 03:59:44 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) 03:59:44 executing program 5: r0 = creat(&(0x7f0000000500)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) unlink(&(0x7f0000000180)='./file0\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x0, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") 03:59:44 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x35a, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040)=',', 0x1}], 0x1}, 0x0) 03:59:44 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x1, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f00000000c0)={@dev, r3}, 0x14) 03:59:44 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) 03:59:44 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)) recvmsg(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x35a, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040)=',', 0x1}], 0x1}, 0x0) 03:59:44 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x1, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f00000000c0)={@dev, r3}, 0x14) 03:59:44 executing program 4: r0 = open(&(0x7f0000000040)='./file0\x00', 0x10000000002fc, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) flock(r0, 0x2) dup2(r0, r1) 03:59:45 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x10005) socket$inet(0x2, 0x3, 0x29) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x10005, 0x0) 03:59:45 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)) recvmsg(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x35a, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040)=',', 0x1}], 0x1}, 0x0) 03:59:45 executing program 4: r0 = open(&(0x7f0000000040)='./file0\x00', 0x10000000002fc, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) flock(r0, 0x2) dup2(r0, r1) 03:59:45 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) 03:59:45 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x1, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f00000000c0)={@dev, r3}, 0x14) 03:59:45 executing program 5: r0 = creat(&(0x7f0000000500)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) unlink(&(0x7f0000000180)='./file0\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x0, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") 03:59:45 executing program 4: r0 = open(&(0x7f0000000040)='./file0\x00', 0x10000000002fc, 0x0) flock(0xffffffffffffffff, 0x2) flock(r0, 0x2) dup2(r0, 0xffffffffffffffff) 03:59:45 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x1, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, 0x0, &(0x7f00000001c0)) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f00000000c0)={@dev}, 0x14) 03:59:45 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) 03:59:45 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)) recvmsg(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x35a, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040)=',', 0x1}], 0x1}, 0x0) 03:59:45 executing program 4: r0 = open(&(0x7f0000000040)='./file0\x00', 0x10000000002fc, 0x0) flock(0xffffffffffffffff, 0x2) flock(r0, 0x2) dup2(r0, 0xffffffffffffffff) 03:59:45 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x10005) socket$inet(0x2, 0x3, 0x29) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x10005, 0x0) 03:59:45 executing program 3: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) 03:59:45 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x1, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, 0x0, &(0x7f00000001c0)) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f00000000c0)={@dev}, 0x14) 03:59:45 executing program 4: r0 = open(&(0x7f0000000040)='./file0\x00', 0x10000000002fc, 0x0) flock(0xffffffffffffffff, 0x2) flock(r0, 0x2) dup2(r0, 0xffffffffffffffff) 03:59:45 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x10005) socket$inet(0x2, 0x3, 0x29) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x10005, 0x0) 03:59:45 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040)=',', 0x1}], 0x1}, 0x0) 03:59:45 executing program 5: r0 = creat(&(0x7f0000000500)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) unlink(&(0x7f0000000180)='./file0\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x0, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") 03:59:45 executing program 3: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) 03:59:45 executing program 4: r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) flock(r0, 0x2) flock(0xffffffffffffffff, 0x2) dup2(0xffffffffffffffff, r0) 03:59:45 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x1, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, 0x0, &(0x7f00000001c0)) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f00000000c0)={@dev}, 0x14) 03:59:45 executing program 1: pipe(0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x10005) socket$inet(0x2, 0x3, 0x29) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x10005, 0x0) 03:59:45 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040)=',', 0x1}], 0x1}, 0x0) 03:59:45 executing program 3: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) 03:59:46 executing program 4: r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) flock(r0, 0x2) flock(0xffffffffffffffff, 0x2) dup2(0xffffffffffffffff, r0) 03:59:46 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040)=',', 0x1}], 0x1}, 0x0) 03:59:46 executing program 1: pipe(0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x10005) socket$inet(0x2, 0x3, 0x29) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x10005, 0x0) 03:59:46 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x1, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0}, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f00000000c0)={@dev, r3}, 0x14) 03:59:46 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) 03:59:46 executing program 5: r0 = creat(&(0x7f0000000500)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) unlink(&(0x7f0000000180)='./file0\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, 0x0) 03:59:46 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040)=',', 0x1}], 0x1}, 0x0) 03:59:46 executing program 1: pipe(0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x10005) socket$inet(0x2, 0x3, 0x29) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x10005, 0x0) 03:59:46 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x1, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0}, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f00000000c0)={@dev, r3}, 0x14) 03:59:46 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) 03:59:46 executing program 4: r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) flock(r0, 0x2) flock(0xffffffffffffffff, 0x2) dup2(0xffffffffffffffff, r0) 03:59:46 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) 03:59:46 executing program 4: r0 = open(0x0, 0x10000000002fc, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) flock(r1, 0x2) flock(r0, 0x2) dup2(r0, r1) 03:59:46 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040)=',', 0x1}], 0x1}, 0x0) 03:59:46 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x1, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0}, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f00000000c0)={@dev, r3}, 0x14) 03:59:46 executing program 1: pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x10005) socket$inet(0x2, 0x3, 0x29) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 03:59:46 executing program 4: r0 = open(0x0, 0x10000000002fc, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) flock(r1, 0x2) flock(r0, 0x2) dup2(r0, r1) 03:59:46 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) 03:59:46 executing program 4: r0 = open(0x0, 0x10000000002fc, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) flock(r1, 0x2) flock(r0, 0x2) dup2(r0, r1) 03:59:46 executing program 1: pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x10005) socket$inet(0x2, 0x3, 0x29) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 03:59:46 executing program 5: r0 = creat(&(0x7f0000000500)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) unlink(&(0x7f0000000180)='./file0\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, 0x0) 03:59:46 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socket$inet6(0xa, 0x1, 0x0) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f00000000c0)={@dev, r2}, 0x14) 03:59:46 executing program 4: r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) flock(r1, 0x2) flock(r0, 0x2) dup2(r0, r1) 03:59:46 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) 03:59:46 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socket$inet6(0xa, 0x1, 0x0) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f00000000c0)={@dev, r2}, 0x14) 03:59:47 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040)=',', 0x1}], 0x1}, 0x0) 03:59:47 executing program 1: pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x10005) socket$inet(0x2, 0x3, 0x29) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 03:59:47 executing program 4: r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) flock(r1, 0x2) flock(r0, 0x2) dup2(r0, r1) 03:59:47 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) 03:59:47 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socket$inet6(0xa, 0x1, 0x0) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f00000000c0)={@dev, r2}, 0x14) 03:59:47 executing program 5: r0 = creat(&(0x7f0000000500)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) unlink(&(0x7f0000000180)='./file0\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, 0x0) 03:59:47 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) 03:59:47 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x1, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x0, &(0x7f00000000c0)={@dev, r3}, 0x14) 03:59:47 executing program 4: r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) flock(r1, 0x2) flock(r0, 0x2) dup2(r0, r1) 03:59:47 executing program 1: pipe(&(0x7f0000000380)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x10005) socket$inet(0x2, 0x3, 0x29) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r1, 0x0, 0x10005, 0x0) 03:59:47 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) 03:59:47 executing program 4: r0 = open(&(0x7f0000000040)='./file0\x00', 0x10000000002fc, 0x0) r1 = open(0x0, 0x0, 0x0) flock(r1, 0x2) flock(r0, 0x2) dup2(r0, r1) 03:59:48 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040)=',', 0x1}], 0x1}, 0x0) 03:59:48 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x1, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x0, &(0x7f00000000c0)={@dev, r3}, 0x14) 03:59:48 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) 03:59:48 executing program 4: r0 = open(&(0x7f0000000040)='./file0\x00', 0x10000000002fc, 0x0) r1 = open(0x0, 0x0, 0x0) flock(r1, 0x2) flock(r0, 0x2) dup2(r0, r1) 03:59:48 executing program 5: r0 = creat(&(0x7f0000000500)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) unlink(&(0x7f0000000180)='./file0\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)) 03:59:48 executing program 4: r0 = open(&(0x7f0000000040)='./file0\x00', 0x10000000002fc, 0x0) r1 = open(0x0, 0x0, 0x0) flock(r1, 0x2) flock(r0, 0x2) dup2(r0, r1) 03:59:48 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) [ 2291.763173][ C0] net_ratelimit: 11 callbacks suppressed [ 2291.763185][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2291.774650][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:59:48 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x1, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x0, &(0x7f00000000c0)={@dev, r3}, 0x14) 03:59:48 executing program 4: r0 = open(&(0x7f0000000040)='./file0\x00', 0x10000000002fc, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) flock(0xffffffffffffffff, 0x2) flock(r0, 0x2) dup2(r0, r1) 03:59:48 executing program 1: pipe(&(0x7f0000000380)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x10005) socket$inet(0x2, 0x3, 0x29) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r1, 0x0, 0x10005, 0x0) 03:59:48 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x1, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040), &(0x7f00000001c0)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1b, 0x0, 0x0) 03:59:48 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) [ 2292.003170][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2292.003185][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2292.008961][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2292.020455][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2292.026347][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2292.032120][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2292.083178][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2292.088993][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:59:49 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r0, 0x0, 0x0) 03:59:49 executing program 4: r0 = open(&(0x7f0000000040)='./file0\x00', 0x10000000002fc, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) flock(0xffffffffffffffff, 0x2) flock(r0, 0x2) dup2(r0, r1) 03:59:49 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x1, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040), &(0x7f00000001c0)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1b, 0x0, 0x0) 03:59:49 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) 03:59:49 executing program 5: r0 = creat(&(0x7f0000000500)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) unlink(&(0x7f0000000180)='./file0\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)) 03:59:49 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0b") munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) 03:59:49 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x1, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040), &(0x7f00000001c0)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1b, 0x0, 0x0) 03:59:49 executing program 4: r0 = open(&(0x7f0000000040)='./file0\x00', 0x10000000002fc, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) flock(0xffffffffffffffff, 0x2) flock(r0, 0x2) dup2(r0, r1) 03:59:49 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0b") munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) 03:59:49 executing program 1: pipe(&(0x7f0000000380)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x10005) socket$inet(0x2, 0x3, 0x29) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r1, 0x0, 0x10005, 0x0) 03:59:49 executing program 4: r0 = open(&(0x7f0000000040)='./file0\x00', 0x10000000002fc, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) flock(r1, 0x0) flock(r0, 0x2) dup2(r0, r1) 03:59:49 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x1, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040), &(0x7f00000001c0)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f00000000c0)={@dev}, 0x14) 03:59:49 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r0, 0x0, 0x0) 03:59:49 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0b") munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) 03:59:49 executing program 4: r0 = open(&(0x7f0000000040)='./file0\x00', 0x10000000002fc, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) flock(r1, 0x0) flock(r0, 0x2) dup2(r0, r1) 03:59:49 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x1, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040), &(0x7f00000001c0)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f00000000c0)={@dev}, 0x14) 03:59:49 executing program 5: r0 = creat(&(0x7f0000000500)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) unlink(&(0x7f0000000180)='./file0\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)) 03:59:50 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47b") munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) 03:59:50 executing program 4: r0 = open(&(0x7f0000000040)='./file0\x00', 0x10000000002fc, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) flock(r1, 0x0) flock(r0, 0x2) dup2(r0, r1) 03:59:50 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x1, 0x0) r2 = socket(0x100000000011, 0x2, 0x0) bind(r2, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040), &(0x7f00000001c0)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f00000000c0)={@dev}, 0x14) 03:59:50 executing program 4: r0 = open(&(0x7f0000000040)='./file0\x00', 0x10000000002fc, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) flock(r1, 0x2) flock(0xffffffffffffffff, 0x2) dup2(r0, r1) 03:59:50 executing program 1: pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, 0x0, 0x0) socket$inet(0x2, 0x3, 0x29) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 03:59:50 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47b") munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) 03:59:50 executing program 4: r0 = open(&(0x7f0000000040)='./file0\x00', 0x10000000002fc, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) flock(r1, 0x2) flock(0xffffffffffffffff, 0x2) dup2(r0, r1) 03:59:50 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r0, 0x0, 0x0) 03:59:50 executing program 2: unshare(0x8000400) r0 = mq_open(&(0x7f0000000000)='-$\x00', 0x6e93ebbbcc0884f7, 0x0, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) mq_notify(r0, 0x0) munlock(&(0x7f0000ffc000/0x2000)=nil, 0x2000) fcntl$dupfd(r0, 0x0, r0) r1 = creat(&(0x7f0000000340)='./file0\x00', 0x141) r2 = msgget(0x0, 0x380) msgctl$MSG_INFO(r2, 0xc, &(0x7f0000000200)=""/243) ioctl$sock_inet_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f00000001c0)) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000380)=0x4, 0x4) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000040)={{{@in6=@dev, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@loopback}}, &(0x7f0000000140)=0xe8) umount2(&(0x7f0000001480)='./file0\x00', 0x8) ioprio_get$uid(0x3, r3) 03:59:50 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47b") munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) 03:59:50 executing program 4: r0 = open(&(0x7f0000000040)='./file0\x00', 0x10000000002fc, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) flock(r1, 0x2) flock(0xffffffffffffffff, 0x2) dup2(r0, r1) 03:59:50 executing program 5: r0 = creat(&(0x7f0000000500)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) unlink(&(0x7f0000000180)='./file0\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0b") 03:59:50 executing program 4: r0 = open(&(0x7f0000000040)='./file0\x00', 0x10000000002fc, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) flock(r1, 0x2) flock(r0, 0x0) dup2(r0, r1) 03:59:50 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf0") munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) 03:59:51 executing program 4: r0 = open(&(0x7f0000000040)='./file0\x00', 0x10000000002fc, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) flock(r1, 0x2) flock(r0, 0x0) dup2(r0, r1) 03:59:51 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf0") munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) 03:59:51 executing program 1: pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, 0x0, 0x0) socket$inet(0x2, 0x3, 0x29) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 03:59:51 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2}, 0x0) socket$inet6(0xa, 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) dup(0xffffffffffffffff) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000040)={0x17}) socket$netlink(0x10, 0x3, 0x4) 03:59:51 executing program 4: r0 = open(&(0x7f0000000040)='./file0\x00', 0x10000000002fc, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) flock(r1, 0x2) flock(r0, 0x0) dup2(r0, r1) 03:59:51 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) 03:59:51 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf0") munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) 03:59:51 executing program 4: r0 = open(&(0x7f0000000040)='./file0\x00', 0x10000000002fc, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) flock(r1, 0x2) flock(r0, 0x2) dup2(0xffffffffffffffff, r1) 03:59:51 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x20006, 0x0, 0x0, 0xfffffffffffffff8}]}) lookup_dcookie(0x0, 0x0, 0x0) 03:59:51 executing program 5: r0 = creat(&(0x7f0000000500)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) unlink(&(0x7f0000000180)='./file0\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0b") 03:59:51 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) r1 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) 03:59:51 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) r1 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) [ 2295.284935][ T26] audit: type=1326 audit(2000001591.790:493): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=19158 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45c72a code=0xffff0000 03:59:51 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) r1 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) 03:59:51 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) 03:59:52 executing program 1: pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, 0x0, 0x0) socket$inet(0x2, 0x3, 0x29) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 03:59:52 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) 03:59:52 executing program 5: r0 = creat(&(0x7f0000000500)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) unlink(&(0x7f0000000180)='./file0\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0b") [ 2296.036843][ T26] audit: type=1326 audit(2000001592.540:494): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=19158 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45c72a code=0xffff0000 03:59:52 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) 03:59:52 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) 03:59:52 executing program 5: r0 = creat(&(0x7f0000000500)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) unlink(&(0x7f0000000180)='./file0\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47b") 03:59:52 executing program 4: r0 = open(&(0x7f0000000040)='./file0\x00', 0x10000000002fc, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) flock(r1, 0x2) flock(r0, 0x2) dup2(0xffffffffffffffff, r1) 03:59:52 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000100)) 03:59:52 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) 03:59:52 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x20006, 0x0, 0x0, 0xfffffffffffffff8}]}) getpid() 03:59:52 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) [ 2296.299659][ T26] audit: type=1326 audit(2000001592.800:495): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=19210 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45c72a code=0xffff0000 03:59:52 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) 03:59:52 executing program 1: pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x10005) socket$inet(0x2, 0x0, 0x29) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 03:59:52 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) 03:59:53 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r1, 0x0) 03:59:53 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) 03:59:53 executing program 5: r0 = creat(&(0x7f0000000500)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) unlink(&(0x7f0000000180)='./file0\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47b") 03:59:53 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r1, 0x0) 03:59:53 executing program 4: r0 = open(&(0x7f0000000040)='./file0\x00', 0x10000000002fc, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) flock(r1, 0x2) flock(r0, 0x2) dup2(0xffffffffffffffff, r1) 03:59:53 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r1, 0x0) 03:59:53 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) [ 2297.096793][ T26] audit: type=1326 audit(2000001593.600:496): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=19210 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45c72a code=0xffff0000 03:59:53 executing program 2: r0 = timerfd_create(0x0, 0x0) read(r0, &(0x7f00000006c0)=""/75, 0x4b) 03:59:53 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) 03:59:53 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) 03:59:53 executing program 1: pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x10005) socket$inet(0x2, 0x0, 0x29) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 03:59:53 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='gid_map\x00') write$cgroup_pid(r0, 0x0, 0x0) 03:59:53 executing program 5: r0 = creat(&(0x7f0000000500)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) unlink(&(0x7f0000000180)='./file0\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47b") 03:59:54 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)}, 0x0) 03:59:54 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x800000000040, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x49ad, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000200), 0x4) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000280), 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x1040900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x37) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$cont(0x1f, r1, 0x0, 0x0) 03:59:54 executing program 5: r0 = creat(&(0x7f0000000500)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) unlink(&(0x7f0000000180)='./file0\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf0") 03:59:54 executing program 4: r0 = open(&(0x7f0000000040)='./file0\x00', 0x10000000002fc, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) flock(r1, 0x2) flock(r0, 0x2) dup2(r0, 0xffffffffffffffff) 03:59:54 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x38, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0xc, 0x2, [@TCA_HHF_NON_HH_WEIGHT={0x8}]}}]}, 0x38}}, 0x0) [ 2298.003177][ C0] net_ratelimit: 24 callbacks suppressed [ 2298.003185][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2298.014800][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:59:54 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x38, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0xc, 0x2, [@TCA_HHF_NON_HH_WEIGHT={0x8}]}}]}, 0x38}}, 0x0) 03:59:54 executing program 5: r0 = creat(&(0x7f0000000500)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) unlink(&(0x7f0000000180)='./file0\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf0") 03:59:54 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x38, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0xc, 0x2, [@TCA_HHF_NON_HH_WEIGHT={0x8}]}}]}, 0x38}}, 0x0) 03:59:54 executing program 1: pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x10005) socket$inet(0x2, 0x0, 0x29) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 03:59:54 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x38, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0xc, 0x2, [@TCA_HHF_NON_HH_WEIGHT={0x8}]}}]}, 0x38}}, 0x0) 03:59:54 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$nl_route(0x10, 0x3, 0x0) socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x38, 0x24, 0x507, 0x0, 0x0, {0x0, 0x0, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0xc, 0x2, [@TCA_HHF_NON_HH_WEIGHT={0x8}]}}]}, 0x38}}, 0x0) 03:59:54 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$nl_route(0x10, 0x3, 0x0) socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x38, 0x24, 0x507, 0x0, 0x0, {0x0, 0x0, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0xc, 0x2, [@TCA_HHF_NON_HH_WEIGHT={0x8}]}}]}, 0x38}}, 0x0) [ 2298.563211][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2298.569022][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:59:55 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)}, 0x0) 03:59:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66702000000000000007ba44947a79015f0fe57917c7c2a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef3818a17900"}, 0xd8) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000000240)="1b", 0x1, 0x8000, 0x0, 0x0) 03:59:57 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$nl_route(0x10, 0x3, 0x0) socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x38, 0x24, 0x507, 0x0, 0x0, {0x0, 0x0, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0xc, 0x2, [@TCA_HHF_NON_HH_WEIGHT={0x8}]}}]}, 0x38}}, 0x0) 03:59:57 executing program 5: r0 = creat(&(0x7f0000000500)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) unlink(&(0x7f0000000180)='./file0\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf0") 03:59:57 executing program 4: r0 = open(&(0x7f0000000040)='./file0\x00', 0x10000000002fc, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) flock(r1, 0x2) flock(r0, 0x2) dup2(r0, 0xffffffffffffffff) 03:59:57 executing program 1: pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x10005) socket$inet(0x2, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 03:59:57 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)}, 0x0) 03:59:57 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x38, 0x24, 0x507, 0x0, 0x0, {0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0xc, 0x2, [@TCA_HHF_NON_HH_WEIGHT={0x8}]}}]}, 0x38}}, 0x0) 03:59:57 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r4, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [], {}, [], {0x10, 0x6}}, 0x24, 0x0) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 03:59:57 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x38, 0x24, 0x507, 0x0, 0x0, {0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0xc, 0x2, [@TCA_HHF_NON_HH_WEIGHT={0x8}]}}]}, 0x38}}, 0x0) 03:59:57 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r4, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [], {}, [], {0x10, 0x6}}, 0x24, 0x0) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 03:59:57 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x38, 0x24, 0x507, 0x0, 0x0, {0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0xc, 0x2, [@TCA_HHF_NON_HH_WEIGHT={0x8}]}}]}, 0x38}}, 0x0) 03:59:57 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x38, 0x24, 0x507, 0x0, 0x0, {0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0xc, 0x2, [@TCA_HHF_NON_HH_WEIGHT={0x8}]}}]}, 0x38}}, 0x0) 03:59:57 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r4, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [], {}, [], {0x10, 0x6}}, 0x24, 0x0) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 03:59:57 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x38, 0x24, 0x507, 0x0, 0x0, {0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0xc, 0x2, [@TCA_HHF_NON_HH_WEIGHT={0x8}]}}]}, 0x38}}, 0x0) 03:59:57 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x38, 0x24, 0x507, 0x0, 0x0, {0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0xc, 0x2, [@TCA_HHF_NON_HH_WEIGHT={0x8}]}}]}, 0x38}}, 0x0) 03:59:58 executing program 4: r0 = open(&(0x7f0000000040)='./file0\x00', 0x10000000002fc, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) flock(r1, 0x2) flock(r0, 0x2) dup2(r0, 0xffffffffffffffff) 03:59:58 executing program 1: pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x10005) socket$inet(0x2, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 03:59:58 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x1040900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x37) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$cont(0x1f, r1, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) 03:59:58 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r4, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [], {}, [], {0x10, 0x6}}, 0x24, 0x0) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 03:59:58 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x38, 0x24, 0x507, 0x0, 0x0, {0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0xc, 0x2, [@TCA_HHF_NON_HH_WEIGHT={0x8}]}}]}, 0x38}}, 0x0) 03:59:58 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{0x0}], 0x1}, 0x0) 03:59:58 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x38, 0x24, 0x507, 0x0, 0x0, {0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0xc, 0x2, [@TCA_HHF_NON_HH_WEIGHT={0x8}]}}]}, 0x38}}, 0x0) 03:59:58 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) write$binfmt_script(r0, &(0x7f00000009c0)=ANY=[], 0x378) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendmmsg(r0, &(0x7f00000048c0)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="bbdbaf06d77587820b357b21e6035c35b79515cd4e4da37a6ad237cb3b3bcb50cbba34c17d72b6ed37e5c74a6864bddd11aaf3dd87a30beeb6a8f7c290085600f0ddeafe2140000efc0f5ee0b2729bf451489a592d458fe4a4d2b62baa99a9d0464e294627678150f329ee7efb8deef540dd351fd87aa03faed08778cd9522b3d545e894b59e5772a88ae0", 0x8b}, {&(0x7f00000002c0)="e12962441f41e3ab51d3dfde02485a2f09914eba2d10a107432a6ba0fbda39584c2c25862624e76807ab32ccb710e84057633ad74f0c3653afb22a42bea2ce20a9710b1e1d9e9b77b802d0cd4e7e1e9602de60e1684a8dd7856874ed4fb5baa10e90e5e7d6d01f0e55537e7f80af40bca1b2106dd266b715029302ec18b7c56993c12faf78b661e77c", 0x89}], 0x2}}], 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 03:59:58 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r4, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [], {}, [], {0x10, 0x6}}, 0x24, 0x0) symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 03:59:58 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x38, 0x24, 0x507, 0x0, 0x0, {0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0xc, 0x2, [@TCA_HHF_NON_HH_WEIGHT={0x8}]}}]}, 0x38}}, 0x0) 03:59:58 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r4, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [], {}, [], {0x10, 0x6}}, 0x24, 0x0) symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 03:59:58 executing program 2: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x38, 0x24, 0x507, 0x0, 0x0, {0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0xc, 0x2, [@TCA_HHF_NON_HH_WEIGHT={0x8}]}}]}, 0x38}}, 0x0) [ 2302.163235][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2302.169061][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2302.403178][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2302.403198][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2302.408992][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2302.414729][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:59:59 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r4, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [], {}, [], {0x10, 0x6}}, 0x24, 0x0) symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 03:59:59 executing program 1: pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x10005) socket$inet(0x2, 0x3, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 03:59:59 executing program 2: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x38, 0x24, 0x507, 0x0, 0x0, {0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0xc, 0x2, [@TCA_HHF_NON_HH_WEIGHT={0x8}]}}]}, 0x38}}, 0x0) 03:59:59 executing program 4: 03:59:59 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{0x0}], 0x1}, 0x0) 03:59:59 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r4, 0x0) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 03:59:59 executing program 2: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x38, 0x24, 0x507, 0x0, 0x0, {0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0xc, 0x2, [@TCA_HHF_NON_HH_WEIGHT={0x8}]}}]}, 0x38}}, 0x0) 03:59:59 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) write$binfmt_script(r0, &(0x7f00000009c0)=ANY=[], 0x378) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendmmsg(r0, &(0x7f00000048c0)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="bbdbaf06d77587820b357b21e6035c35b79515cd4e4da37a6ad237cb3b3bcb50cbba34c17d72b6ed37e5c74a6864bddd11aaf3dd87a30beeb6a8f7c290085600f0ddeafe2140000efc0f5ee0b2729bf451489a592d458fe4a4d2b62baa99a9d0464e294627678150f329ee7efb8deef540dd351fd87aa03faed08778cd9522b3d545e894b59e5772a88ae0", 0x8b}, {&(0x7f00000002c0)="e12962441f41e3ab51d3dfde02485a2f09914eba2d10a107432a6ba0fbda39584c2c25862624e76807ab32ccb710e84057633ad74f0c3653afb22a42bea2ce20a9710b1e1d9e9b77b802d0cd4e7e1e9602de60e1684a8dd7856874ed4fb5baa10e90e5e7d6d01f0e55537e7f80af40bca1b2106dd266b715029302ec18b7c56993c12faf78b661e77c", 0x89}], 0x2}}], 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 03:59:59 executing program 4: 03:59:59 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r4, 0x0) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 03:59:59 executing program 4: 03:59:59 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x38, 0x24, 0x507, 0x0, 0x0, {0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0xc, 0x2, [@TCA_HHF_NON_HH_WEIGHT={0x8}]}}]}, 0x38}}, 0x0) 03:59:59 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r4, 0x0) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 04:00:00 executing program 1: pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x10005) socket$inet(0x2, 0x3, 0x29) r3 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 04:00:00 executing program 4: 04:00:00 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x38, 0x24, 0x507, 0x0, 0x0, {0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0xc, 0x2, [@TCA_HHF_NON_HH_WEIGHT={0x8}]}}]}, 0x38}}, 0x0) 04:00:00 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [], {}, [], {0x10, 0x6}}, 0x24, 0x0) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 04:00:00 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{0x0}], 0x1}, 0x0) 04:00:00 executing program 4: 04:00:00 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) write$binfmt_script(r0, &(0x7f00000009c0)=ANY=[], 0x378) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendmmsg(r0, &(0x7f00000048c0)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="bbdbaf06d77587820b357b21e6035c35b79515cd4e4da37a6ad237cb3b3bcb50cbba34c17d72b6ed37e5c74a6864bddd11aaf3dd87a30beeb6a8f7c290085600f0ddeafe2140000efc0f5ee0b2729bf451489a592d458fe4a4d2b62baa99a9d0464e294627678150f329ee7efb8deef540dd351fd87aa03faed08778cd9522b3d545e894b59e5772a88ae0", 0x8b}, {&(0x7f00000002c0)="e12962441f41e3ab51d3dfde02485a2f09914eba2d10a107432a6ba0fbda39584c2c25862624e76807ab32ccb710e84057633ad74f0c3653afb22a42bea2ce20a9710b1e1d9e9b77b802d0cd4e7e1e9602de60e1684a8dd7856874ed4fb5baa10e90e5e7d6d01f0e55537e7f80af40bca1b2106dd266b715029302ec18b7c56993c12faf78b661e77c", 0x89}], 0x2}}], 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 04:00:00 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x38, 0x24, 0x507, 0x0, 0x0, {0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0xc, 0x2, [@TCA_HHF_NON_HH_WEIGHT={0x8}]}}]}, 0x38}}, 0x0) 04:00:00 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [], {}, [], {0x10, 0x6}}, 0x24, 0x0) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 04:00:00 executing program 4: 04:00:00 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x38, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0xc, 0x2, [@TCA_HHF_NON_HH_WEIGHT={0x8}]}}]}, 0x38}}, 0x0) 04:00:00 executing program 1: pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x10005) socket$inet(0x2, 0x3, 0x29) r3 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 04:00:00 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [], {}, [], {0x10, 0x6}}, 0x24, 0x0) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 04:00:00 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") clock_gettime(0x7, &(0x7f00000015c0)) 04:00:00 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x38, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0xc, 0x2, [@TCA_HHF_NON_HH_WEIGHT={0x8}]}}]}, 0x38}}, 0x0) 04:00:00 executing program 1: pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x10005) socket$inet(0x2, 0x3, 0x29) r3 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 04:00:00 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040)}], 0x1}, 0x0) 04:00:00 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") clock_gettime(0x7, &(0x7f00000015c0)) 04:00:01 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) write$binfmt_script(r0, &(0x7f00000009c0)=ANY=[], 0x378) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendmmsg(r0, &(0x7f00000048c0)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="bbdbaf06d77587820b357b21e6035c35b79515cd4e4da37a6ad237cb3b3bcb50cbba34c17d72b6ed37e5c74a6864bddd11aaf3dd87a30beeb6a8f7c290085600f0ddeafe2140000efc0f5ee0b2729bf451489a592d458fe4a4d2b62baa99a9d0464e294627678150f329ee7efb8deef540dd351fd87aa03faed08778cd9522b3d545e894b59e5772a88ae0", 0x8b}, {&(0x7f00000002c0)="e12962441f41e3ab51d3dfde02485a2f09914eba2d10a107432a6ba0fbda39584c2c25862624e76807ab32ccb710e84057633ad74f0c3653afb22a42bea2ce20a9710b1e1d9e9b77b802d0cd4e7e1e9602de60e1684a8dd7856874ed4fb5baa10e90e5e7d6d01f0e55537e7f80af40bca1b2106dd266b715029302ec18b7c56993c12faf78b661e77c", 0x89}], 0x2}}], 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 04:00:01 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) socket(0x10, 0x2, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [], {}, [], {0x10, 0x6}}, 0x24, 0x0) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 04:00:01 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x38, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0xc, 0x2, [@TCA_HHF_NON_HH_WEIGHT={0x8}]}}]}, 0x38}}, 0x0) 04:00:01 executing program 1: pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x10005) socket$inet(0x2, 0x3, 0x29) socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 04:00:01 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") clock_gettime(0x7, &(0x7f00000015c0)) 04:00:01 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x38, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0xc, 0x2, [@TCA_HHF_NON_HH_WEIGHT={0x8}]}}]}, 0x38}}, 0x0) 04:00:01 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) socket(0x10, 0x2, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [], {}, [], {0x10, 0x6}}, 0x24, 0x0) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 04:00:01 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") clock_gettime(0x7, &(0x7f00000015c0)) 04:00:01 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x38, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0xc, 0x2, [@TCA_HHF_NON_HH_WEIGHT={0x8}]}}]}, 0x38}}, 0x0) 04:00:01 executing program 1: pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x10005) socket$inet(0x2, 0x3, 0x29) socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 04:00:01 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040)}], 0x1}, 0x0) 04:00:01 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) clock_gettime(0x7, &(0x7f00000015c0)) 04:00:01 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) write$binfmt_script(r0, &(0x7f00000009c0)=ANY=[], 0x378) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendmmsg(r0, &(0x7f00000048c0)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="bbdbaf06d77587820b357b21e6035c35b79515cd4e4da37a6ad237cb3b3bcb50cbba34c17d72b6ed37e5c74a6864bddd11aaf3dd87a30beeb6a8f7c290085600f0ddeafe2140000efc0f5ee0b2729bf451489a592d458fe4a4d2b62baa99a9d0464e294627678150f329ee7efb8deef540dd351fd87aa03faed08778cd9522b3d545e894b59e5772a88ae0", 0x8b}, {&(0x7f00000002c0)="e12962441f41e3ab51d3dfde02485a2f09914eba2d10a107432a6ba0fbda39584c2c25862624e76807ab32ccb710e84057633ad74f0c3653afb22a42bea2ce20a9710b1e1d9e9b77b802d0cd4e7e1e9602de60e1684a8dd7856874ed4fb5baa10e90e5e7d6d01f0e55537e7f80af40bca1b2106dd266b715029302ec18b7c56993c12faf78b661e77c", 0x89}], 0x2}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 04:00:01 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) socket(0x10, 0x2, 0x0) chown(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [], {}, [], {0x10, 0x6}}, 0x24, 0x0) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 04:00:01 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x38, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0xc, 0x2, [@TCA_HHF_NON_HH_WEIGHT={0x8}]}}]}, 0x38}}, 0x0) 04:00:01 executing program 1: pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x10005) socket$inet(0x2, 0x3, 0x29) socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 04:00:01 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) clock_gettime(0x7, &(0x7f00000015c0)) 04:00:02 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) clock_gettime(0x7, &(0x7f00000015c0)) 04:00:02 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x38, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0xc, 0x2, [@TCA_HHF_NON_HH_WEIGHT={0x8}]}}]}, 0x38}}, 0x0) 04:00:02 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [], {}, [], {0x10, 0x6}}, 0x24, 0x0) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 04:00:02 executing program 4: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") clock_gettime(0x7, &(0x7f00000015c0)) 04:00:02 executing program 1: pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x10005) socket$inet(0x2, 0x3, 0x29) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, 0x0, 0x0) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 04:00:02 executing program 0: r0 = socket$kcm(0xa, 0x2, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040)}], 0x1}, 0x0) 04:00:02 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x38, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0xc, 0x2, [@TCA_HHF_NON_HH_WEIGHT={0x8}]}}]}, 0x38}}, 0x0) 04:00:02 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) write$binfmt_script(r0, &(0x7f00000009c0)=ANY=[], 0x378) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendmmsg(r0, &(0x7f00000048c0)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="bbdbaf06d77587820b357b21e6035c35b79515cd4e4da37a6ad237cb3b3bcb50cbba34c17d72b6ed37e5c74a6864bddd11aaf3dd87a30beeb6a8f7c290085600f0ddeafe2140000efc0f5ee0b2729bf451489a592d458fe4a4d2b62baa99a9d0464e294627678150f329ee7efb8deef540dd351fd87aa03faed08778cd9522b3d545e894b59e5772a88ae0", 0x8b}, {&(0x7f00000002c0)="e12962441f41e3ab51d3dfde02485a2f09914eba2d10a107432a6ba0fbda39584c2c25862624e76807ab32ccb710e84057633ad74f0c3653afb22a42bea2ce20a9710b1e1d9e9b77b802d0cd4e7e1e9602de60e1684a8dd7856874ed4fb5baa10e90e5e7d6d01f0e55537e7f80af40bca1b2106dd266b715029302ec18b7c56993c12faf78b661e77c", 0x89}], 0x2}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 04:00:02 executing program 4: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") clock_gettime(0x7, &(0x7f00000015c0)) 04:00:02 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [], {}, [], {0x10, 0x6}}, 0x24, 0x0) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 04:00:02 executing program 1: pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x10005) socket$inet(0x2, 0x3, 0x29) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, 0x0, 0x0) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 04:00:02 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x38, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0xc, 0x2, [@TCA_HHF_NON_HH_WEIGHT={0x8}]}}]}, 0x38}}, 0x0) 04:00:02 executing program 4: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") clock_gettime(0x7, &(0x7f00000015c0)) 04:00:02 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0b") r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x38, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0xc, 0x2, [@TCA_HHF_NON_HH_WEIGHT={0x8}]}}]}, 0x38}}, 0x0) 04:00:02 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [], {}, [], {0x10, 0x6}}, 0x24, 0x0) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 04:00:03 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") clock_gettime(0x7, &(0x7f00000015c0)) 04:00:03 executing program 1: pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x10005) socket$inet(0x2, 0x3, 0x29) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, 0x0, 0x0) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 04:00:03 executing program 1: pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x10005) socket$inet(0x2, 0x3, 0x29) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000001440), 0x4) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 04:00:03 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") clock_gettime(0x7, &(0x7f00000015c0)) 04:00:03 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) write$binfmt_script(r0, &(0x7f00000009c0)=ANY=[], 0x378) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendmmsg(r0, &(0x7f00000048c0)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="bbdbaf06d77587820b357b21e6035c35b79515cd4e4da37a6ad237cb3b3bcb50cbba34c17d72b6ed37e5c74a6864bddd11aaf3dd87a30beeb6a8f7c290085600f0ddeafe2140000efc0f5ee0b2729bf451489a592d458fe4a4d2b62baa99a9d0464e294627678150f329ee7efb8deef540dd351fd87aa03faed08778cd9522b3d545e894b59e5772a88ae0", 0x8b}, {&(0x7f00000002c0)="e12962441f41e3ab51d3dfde02485a2f09914eba2d10a107432a6ba0fbda39584c2c25862624e76807ab32ccb710e84057633ad74f0c3653afb22a42bea2ce20a9710b1e1d9e9b77b802d0cd4e7e1e9602de60e1684a8dd7856874ed4fb5baa10e90e5e7d6d01f0e55537e7f80af40bca1b2106dd266b715029302ec18b7c56993c12faf78b661e77c", 0x89}], 0x2}}], 0x1, 0x0) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 04:00:03 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x1040900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0xe) ioctl$DRM_IOCTL_GET_CAP(0xffffffffffffffff, 0xc010640c, 0x0) 04:00:03 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r4, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [], {}, [], {0x10, 0x6}}, 0x24, 0x0) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 04:00:03 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0b") r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x38, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0xc, 0x2, [@TCA_HHF_NON_HH_WEIGHT={0x8}]}}]}, 0x38}}, 0x0) 04:00:03 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") clock_gettime(0x7, &(0x7f00000015c0)) 04:00:03 executing program 1: pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x10005) socket$inet(0x2, 0x3, 0x29) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000001440), 0x4) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 04:00:03 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") clock_gettime(0x7, &(0x7f00000015c0)) 04:00:03 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x1040900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0xe) ioctl$DRM_IOCTL_GET_CAP(0xffffffffffffffff, 0xc010640c, 0x0) 04:00:03 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r4, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [], {}, [], {0x10, 0x6}}, 0x24, 0x0) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 04:00:03 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0b") r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x38, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0xc, 0x2, [@TCA_HHF_NON_HH_WEIGHT={0x8}]}}]}, 0x38}}, 0x0) 04:00:03 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") clock_gettime(0x7, &(0x7f00000015c0)) 04:00:03 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r4, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [], {}, [], {0x10, 0x6}}, 0x24, 0x0) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 04:00:04 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) write$binfmt_script(r0, &(0x7f00000009c0)=ANY=[], 0x378) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 04:00:04 executing program 1: pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x10005) socket$inet(0x2, 0x3, 0x29) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000001440), 0x4) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 04:00:04 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") clock_gettime(0x7, &(0x7f00000015c0)) 04:00:04 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x1040900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0xe) ioctl$DRM_IOCTL_GET_CAP(0xffffffffffffffff, 0xc010640c, 0x0) 04:00:04 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47b") r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x38, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0xc, 0x2, [@TCA_HHF_NON_HH_WEIGHT={0x8}]}}]}, 0x38}}, 0x0) 04:00:04 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, r1) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [], {}, [], {0x10, 0x6}}, 0x24, 0x0) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 04:00:04 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x1040900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0xe) ioctl$DRM_IOCTL_GET_CAP(0xffffffffffffffff, 0xc010640c, 0x0) 04:00:04 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) clock_gettime(0x7, &(0x7f00000015c0)) 04:00:04 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47b") r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x38, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0xc, 0x2, [@TCA_HHF_NON_HH_WEIGHT={0x8}]}}]}, 0x38}}, 0x0) 04:00:04 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x1040900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0xe) 04:00:04 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, r1) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [], {}, [], {0x10, 0x6}}, 0x24, 0x0) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 04:00:04 executing program 1: pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x10005) socket$inet(0x2, 0x3, 0x29) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 2308.643171][ C1] net_ratelimit: 4 callbacks suppressed [ 2308.643178][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2308.643217][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2308.648788][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2308.654580][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2308.671802][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2308.723212][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2308.729124][ C1] protocol 88fb is buggy, dev hsr_slave_1 04:00:05 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) write$binfmt_script(r0, &(0x7f00000009c0)=ANY=[], 0x378) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 04:00:05 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47b") r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x38, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0xc, 0x2, [@TCA_HHF_NON_HH_WEIGHT={0x8}]}}]}, 0x38}}, 0x0) [ 2308.963199][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2308.969051][ C0] protocol 88fb is buggy, dev hsr_slave_1 04:00:05 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$netlink(0x10, 0x3, 0xe) 04:00:05 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) clock_gettime(0x7, &(0x7f00000015c0)) 04:00:05 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) fcntl$dupfd(r0, 0x0, r1) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [], {}, [], {0x10, 0x6}}, 0x24, 0x0) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 04:00:05 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) clock_gettime(0x7, &(0x7f00000015c0)) 04:00:05 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf0") r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x38, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0xc, 0x2, [@TCA_HHF_NON_HH_WEIGHT={0x8}]}}]}, 0x38}}, 0x0) 04:00:05 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$netlink(0x10, 0x3, 0xe) 04:00:05 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r1, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [], {}, [], {0x10, 0x6}}, 0x24, 0x0) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 04:00:05 executing program 1: pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x10005) socket$inet(0x2, 0x3, 0x29) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 04:00:05 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) clock_gettime(0x7, &(0x7f00000015c0)) 04:00:05 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf0") r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x38, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0xc, 0x2, [@TCA_HHF_NON_HH_WEIGHT={0x8}]}}]}, 0x38}}, 0x0) 04:00:06 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) write$binfmt_script(r0, &(0x7f00000009c0)=ANY=[], 0x378) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 04:00:06 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r1, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [], {}, [], {0x10, 0x6}}, 0x24, 0x0) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 04:00:06 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) clock_gettime(0x7, &(0x7f00000015c0)) 04:00:06 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf0") r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x38, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0xc, 0x2, [@TCA_HHF_NON_HH_WEIGHT={0x8}]}}]}, 0x38}}, 0x0) 04:00:06 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$netlink(0x10, 0x3, 0xe) 04:00:06 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r1, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [], {}, [], {0x10, 0x6}}, 0x24, 0x0) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 04:00:06 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) clock_gettime(0x7, &(0x7f00000015c0)) 04:00:06 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$nl_route(0x10, 0x3, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x38, 0x24, 0x507, 0x0, 0x0, {0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0xc, 0x2, [@TCA_HHF_NON_HH_WEIGHT={0x8}]}}]}, 0x38}}, 0x0) 04:00:06 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) clone(0x1040900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0xe) 04:00:06 executing program 1: pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x10005) socket$inet(0x2, 0x3, 0x29) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 04:00:06 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [], {}, [], {0x10, 0x6}}, 0x24, 0x0) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 04:00:06 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) clone(0x1040900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0xe) 04:00:06 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0b") clock_gettime(0x7, &(0x7f00000015c0)) 04:00:06 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$nl_route(0x10, 0x3, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x38, 0x24, 0x507, 0x0, 0x0, {0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0xc, 0x2, [@TCA_HHF_NON_HH_WEIGHT={0x8}]}}]}, 0x38}}, 0x0) 04:00:06 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) clone(0x1040900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0xe) 04:00:06 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [], {}, [], {0x10, 0x6}}, 0x24, 0x0) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 04:00:06 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) write$binfmt_script(r0, &(0x7f00000009c0)=ANY=[], 0x378) socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg(r0, &(0x7f00000048c0)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="bbdbaf06d77587820b357b21e6035c35b79515cd4e4da37a6ad237cb3b3bcb50cbba34c17d72b6ed37e5c74a6864bddd11aaf3dd87a30beeb6a8f7c290085600f0ddeafe2140000efc0f5ee0b2729bf451489a592d458fe4a4d2b62baa99a9d0464e294627678150f329ee7efb8deef540dd351fd87aa03faed08778cd9522b3d545e894b59e5772a88ae0", 0x8b}, {&(0x7f00000002c0)="e12962441f41e3ab51d3dfde02485a2f09914eba2d10a107432a6ba0fbda39584c2c25862624e76807ab32ccb710e84057633ad74f0c3653afb22a42bea2ce20a9710b1e1d9e9b77b802d0cd4e7e1e9602de60e1684a8dd7856874ed4fb5baa10e90e5e7d6d01f0e55537e7f80af40bca1b2106dd266b715029302ec18b7c56993c12faf78b661e77c", 0x89}], 0x2}}], 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 04:00:06 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0b") clock_gettime(0x7, &(0x7f00000015c0)) 04:00:06 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$nl_route(0x10, 0x3, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x38, 0x24, 0x507, 0x0, 0x0, {0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0xc, 0x2, [@TCA_HHF_NON_HH_WEIGHT={0x8}]}}]}, 0x38}}, 0x0) 04:00:06 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [], {}, [], {0x10, 0x6}}, 0x24, 0x0) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 04:00:06 executing program 0: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x1040900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0xe) [ 2310.486156][ C0] protocol 88fb is buggy, dev hsr_slave_0 04:00:07 executing program 1: pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x10005) socket$inet(0x2, 0x3, 0x29) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) bind$inet(r2, 0x0, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 04:00:07 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0b") clock_gettime(0x7, &(0x7f00000015c0)) 04:00:07 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x38, 0x24, 0x507, 0x0, 0x0, {0x0, 0x0, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0xc, 0x2, [@TCA_HHF_NON_HH_WEIGHT={0x8}]}}]}, 0x38}}, 0x0) 04:00:07 executing program 0: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x1040900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0xe) 04:00:07 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [], {}, [], {0x10, 0x6}}, 0x24, 0x0) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 04:00:07 executing program 0: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x1040900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0xe) 04:00:07 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47b") clock_gettime(0x7, &(0x7f00000015c0)) 04:00:07 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) write$binfmt_script(r0, &(0x7f00000009c0)=ANY=[], 0x378) socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg(r0, &(0x7f00000048c0)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="bbdbaf06d77587820b357b21e6035c35b79515cd4e4da37a6ad237cb3b3bcb50cbba34c17d72b6ed37e5c74a6864bddd11aaf3dd87a30beeb6a8f7c290085600f0ddeafe2140000efc0f5ee0b2729bf451489a592d458fe4a4d2b62baa99a9d0464e294627678150f329ee7efb8deef540dd351fd87aa03faed08778cd9522b3d545e894b59e5772a88ae0", 0x8b}, {&(0x7f00000002c0)="e12962441f41e3ab51d3dfde02485a2f09914eba2d10a107432a6ba0fbda39584c2c25862624e76807ab32ccb710e84057633ad74f0c3653afb22a42bea2ce20a9710b1e1d9e9b77b802d0cd4e7e1e9602de60e1684a8dd7856874ed4fb5baa10e90e5e7d6d01f0e55537e7f80af40bca1b2106dd266b715029302ec18b7c56993c12faf78b661e77c", 0x89}], 0x2}}], 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 04:00:07 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [], {}, [], {0x10, 0x6}}, 0x24, 0x0) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 04:00:07 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x38, 0x24, 0x507, 0x0, 0x0, {0x0, 0x0, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0xc, 0x2, [@TCA_HHF_NON_HH_WEIGHT={0x8}]}}]}, 0x38}}, 0x0) 04:00:07 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x1040900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0xe) 04:00:07 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47b") clock_gettime(0x7, &(0x7f00000015c0)) 04:00:08 executing program 1: pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x10005) socket$inet(0x2, 0x3, 0x29) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) bind$inet(r2, 0x0, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 04:00:08 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x1040900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0xe) 04:00:08 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x38, 0x24, 0x507, 0x0, 0x0, {0x0, 0x0, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0xc, 0x2, [@TCA_HHF_NON_HH_WEIGHT={0x8}]}}]}, 0x38}}, 0x0) 04:00:08 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [], {}, [], {0x10, 0x6}}, 0x24, 0x0) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 04:00:08 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47b") clock_gettime(0x7, &(0x7f00000015c0)) 04:00:08 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) write$binfmt_script(r0, &(0x7f00000009c0)=ANY=[], 0x378) socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg(r0, &(0x7f00000048c0)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="bbdbaf06d77587820b357b21e6035c35b79515cd4e4da37a6ad237cb3b3bcb50cbba34c17d72b6ed37e5c74a6864bddd11aaf3dd87a30beeb6a8f7c290085600f0ddeafe2140000efc0f5ee0b2729bf451489a592d458fe4a4d2b62baa99a9d0464e294627678150f329ee7efb8deef540dd351fd87aa03faed08778cd9522b3d545e894b59e5772a88ae0", 0x8b}, {&(0x7f00000002c0)="e12962441f41e3ab51d3dfde02485a2f09914eba2d10a107432a6ba0fbda39584c2c25862624e76807ab32ccb710e84057633ad74f0c3653afb22a42bea2ce20a9710b1e1d9e9b77b802d0cd4e7e1e9602de60e1684a8dd7856874ed4fb5baa10e90e5e7d6d01f0e55537e7f80af40bca1b2106dd266b715029302ec18b7c56993c12faf78b661e77c", 0x89}], 0x2}}], 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 04:00:08 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x1040900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0xe) 04:00:08 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf0") clock_gettime(0x7, &(0x7f00000015c0)) 04:00:08 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r4, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [], {}, [], {0x10, 0x6}}, 0x24, 0x0) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 04:00:08 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x38, 0x24, 0x507, 0x0, 0x0, {0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0xc, 0x2, [@TCA_HHF_NON_HH_WEIGHT={0x8}]}}]}, 0x38}}, 0x0) 04:00:08 executing program 0: socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x1040900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0xe) 04:00:08 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf0") clock_gettime(0x7, &(0x7f00000015c0)) 04:00:09 executing program 1: pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x10005) socket$inet(0x2, 0x3, 0x29) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) bind$inet(r2, 0x0, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 04:00:09 executing program 0: socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x1040900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0xe) 04:00:09 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x38, 0x24, 0x507, 0x0, 0x0, {0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0xc, 0x2, [@TCA_HHF_NON_HH_WEIGHT={0x8}]}}]}, 0x38}}, 0x0) 04:00:09 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r4, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [], {}, [], {0x10, 0x6}}, 0x24, 0x0) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 04:00:09 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf0") clock_gettime(0x7, &(0x7f00000015c0)) 04:00:09 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) write$binfmt_script(r0, &(0x7f00000009c0)=ANY=[], 0x378) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendmmsg(r0, &(0x7f00000048c0)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="bbdbaf06d77587820b357b21e6035c35b79515cd4e4da37a6ad237cb3b3bcb50cbba34c17d72b6ed37e5c74a6864bddd11aaf3dd87a30beeb6a8f7c290085600f0ddeafe2140000efc0f5ee0b2729bf451489a592d458fe4a4d2b62baa99a9d0464e294627678150f329ee7efb8deef540dd351fd87aa03faed08778cd9522b3d545e894b59e5772a88ae0", 0x8b}, {&(0x7f00000002c0)="e12962441f41e3ab51d3dfde02485a2f09914eba2d10a107432a6ba0fbda39584c2c25862624e76807ab32ccb710e84057633ad74f0c3653afb22a42bea2ce20a9710b1e1d9e9b77b802d0cd4e7e1e9602de60e1684a8dd7856874ed4fb5baa10e90e5e7d6d01f0e55537e7f80af40bca1b2106dd266b715029302ec18b7c56993c12faf78b661e77c", 0x89}], 0x2}}], 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 04:00:09 executing program 0: socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x1040900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0xe) 04:00:09 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x38, 0x24, 0x507, 0x0, 0x0, {0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hhf={{0x8, 0x1, 'hhf\x00'}, {0xc, 0x2, [@TCA_HHF_NON_HH_WEIGHT={0x8}]}}]}, 0x38}}, 0x0) 04:00:09 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") clock_gettime(0x0, &(0x7f00000015c0)) 04:00:09 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r4, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [], {}, [], {0x10, 0x6}}, 0x24, 0x0) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 04:00:09 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x1040900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0xe) 04:00:09 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") clock_gettime(0x0, &(0x7f00000015c0)) 04:00:10 executing program 1: pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x10005) socket$inet(0x2, 0x3, 0x29) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 04:00:10 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00'}) sendmsg$nl_route_sched(r1, 0x0, 0x0) 04:00:10 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x1040900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0xe) 04:00:10 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") clock_gettime(0x0, &(0x7f00000015c0)) 04:00:10 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [], {}, [], {0x10, 0x6}}, 0x24, 0x0) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 04:00:10 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x211, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) write$binfmt_script(r0, &(0x7f00000009c0)=ANY=[], 0x378) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendmmsg(r0, &(0x7f00000048c0)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="bbdbaf06d77587820b357b21e6035c35b79515cd4e4da37a6ad237cb3b3bcb50cbba34c17d72b6ed37e5c74a6864bddd11aaf3dd87a30beeb6a8f7c290085600f0ddeafe2140000efc0f5ee0b2729bf451489a592d458fe4a4d2b62baa99a9d0464e294627678150f329ee7efb8deef540dd351fd87aa03faed08778cd9522b3d545e894b59e5772a88ae0", 0x8b}, {&(0x7f00000002c0)="e12962441f41e3ab51d3dfde02485a2f09914eba2d10a107432a6ba0fbda39584c2c25862624e76807ab32ccb710e84057633ad74f0c3653afb22a42bea2ce20a9710b1e1d9e9b77b802d0cd4e7e1e9602de60e1684a8dd7856874ed4fb5baa10e90e5e7d6d01f0e55537e7f80af40bca1b2106dd266b715029302ec18b7c56993c12faf78b661e77c", 0x89}], 0x2}}], 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 04:00:10 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00'}) sendmsg$nl_route_sched(r1, 0x0, 0x0) 04:00:10 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [], {}, [], {0x10, 0x6}}, 0x24, 0x0) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 04:00:10 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00'}) sendmsg$nl_route_sched(r1, 0x0, 0x0) 04:00:10 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r3, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [], {}, [], {0x10, 0x6}}, 0x24, 0x0) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') 04:00:10 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x1040900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0xe) [ 2418.683094][ C0] rcu: INFO: rcu_preempt self-detected stall on CPU [ 2418.689836][ C0] rcu: 0-....: (1 GPs behind) idle=cb2/1/0x4000000000000002 softirq=211524/211528 fqs=5239 [ 2418.699958][ C0] (t=10500 jiffies g=344165 q=1025) [ 2418.705255][ C0] NMI backtrace for cpu 0 [ 2418.709560][ C0] CPU: 0 PID: 9 Comm: ksoftirqd/0 Not tainted 5.3.0-rc8+ #0 [ 2418.716812][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2418.726851][ C0] Call Trace: [ 2418.730111][ C0] [ 2418.732958][ C0] dump_stack+0x172/0x1f0 [ 2418.737267][ C0] nmi_cpu_backtrace.cold+0x70/0xb2 [ 2418.742440][ C0] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2418.748656][ C0] ? lapic_can_unplug_cpu.cold+0x45/0x45 [ 2418.754262][ C0] nmi_trigger_cpumask_backtrace+0x23b/0x28b [ 2418.760227][ C0] arch_trigger_cpumask_backtrace+0x14/0x20 [ 2418.766104][ C0] rcu_dump_cpu_stacks+0x183/0x1cf [ 2418.771191][ C0] ? find_next_bit+0x107/0x130 [ 2418.776289][ C0] rcu_sched_clock_irq.cold+0x4dd/0xc13 [ 2418.781830][ C0] ? raise_softirq+0x138/0x340 [ 2418.786570][ C0] update_process_times+0x32/0x80 [ 2418.791570][ C0] tick_sched_handle+0xa2/0x190 [ 2418.796397][ C0] tick_sched_timer+0x53/0x140 [ 2418.801135][ C0] __hrtimer_run_queues+0x364/0xe40 [ 2418.806308][ C0] ? tick_sched_do_timer+0x1b0/0x1b0 [ 2418.811568][ C0] ? hrtimer_start_range_ns+0xcb0/0xcb0 [ 2418.817088][ C0] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2418.822780][ C0] ? ktime_get_update_offsets_now+0x2d3/0x440 [ 2418.828824][ C0] hrtimer_interrupt+0x314/0x770 [ 2418.833813][ C0] smp_apic_timer_interrupt+0x160/0x610 [ 2418.839333][ C0] apic_timer_interrupt+0xf/0x20 [ 2418.844241][ C0] [ 2418.847156][ C0] RIP: 0010:write_comp_data+0x0/0x70 [ 2418.852422][ C0] Code: 83 fa 02 75 20 48 8b 88 f8 12 00 00 8b 80 f4 12 00 00 48 8b 11 48 83 c2 01 48 39 d0 76 07 48 89 34 d1 48 89 11 5d c3 0f 1f 00 <65> 4c 8b 04 25 40 fe 01 00 65 8b 05 78 88 8f 7e a9 00 01 1f 00 75 [ 2418.872000][ C0] RSP: 0018:ffff8880a98b6990 EFLAGS: 00000246 ORIG_RAX: ffffffffffffff13 [ 2418.880387][ C0] RAX: 0000000000000001 RBX: ffff8880937f7df8 RCX: ffffffff85c66051 [ 2418.888332][ C0] RDX: 0000000000000001 RSI: 0000000000000000 RDI: 0000000000000001 [ 2418.896279][ C0] RBP: ffff8880a98b6998 R08: ffff8880a98a2240 R09: 0000000000000000 [ 2418.904225][ C0] R10: fffffbfff134afaf R11: ffff8880a98a2240 R12: dffffc0000000000 [ 2418.912179][ C0] R13: ffff8880937f7b00 R14: 0000000000000001 R15: 0000000000000000 [ 2418.920189][ C0] ? hhf_dequeue+0x5d1/0xa20 [ 2418.924757][ C0] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2418.930969][ C0] hhf_dequeue+0x5d1/0xa20 [ 2418.935412][ C0] __qdisc_run+0x1e7/0x19d0 [ 2418.939915][ C0] ? dev_queue_xmit+0x18/0x20 [ 2418.944572][ C0] __dev_queue_xmit+0x16f1/0x3650 [ 2418.949583][ C0] ? process_backlog+0x206/0x750 [ 2418.954496][ C0] ? net_rx_action+0x4d6/0x1030 [ 2418.959320][ C0] ? __do_softirq+0x262/0x98c [ 2418.963973][ C0] ? run_ksoftirqd+0x8e/0x110 [ 2418.968622][ C0] ? smpboot_thread_fn+0x6a3/0xa40 [ 2418.973724][ C0] ? netdev_core_pick_tx+0x2f0/0x2f0 [ 2418.978989][ C0] ? quarantine_put+0x11c/0x1c0 [ 2418.983828][ C0] ? trace_hardirqs_on+0x67/0x240 [ 2418.988869][ C0] ? __skb_ext_put+0xd9/0x210 [ 2418.993522][ C0] dev_queue_xmit+0x18/0x20 [ 2418.998007][ C0] ? dev_queue_xmit+0x18/0x20 [ 2419.002690][ C0] br_dev_queue_push_xmit+0x3f3/0x5c0 [ 2419.008038][ C0] ? __skb_ext_del+0xb0/0x2c0 [ 2419.012704][ C0] ? lock_downgrade+0x920/0x920 [ 2419.017557][ C0] br_nf_dev_queue_xmit+0x34e/0x1470 [ 2419.022827][ C0] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2419.028521][ C0] br_nf_post_routing+0x1502/0x1d30 [ 2419.033705][ C0] ? br_nf_dev_queue_xmit+0x1470/0x1470 [ 2419.039224][ C0] ? mark_held_locks+0xf0/0xf0 [ 2419.043963][ C0] ? nf_bridge_update_protocol+0x1d0/0x1d0 [ 2419.049757][ C0] nf_hook_slow+0xbc/0x1e0 [ 2419.054151][ C0] br_forward_finish+0x215/0x400 [ 2419.059073][ C0] ? br_dev_queue_push_xmit+0x5c0/0x5c0 [ 2419.064593][ C0] ? br_fdb_add.cold+0x8c/0x8c [ 2419.069373][ C0] ? ip_vs_out+0x244/0x1700 [ 2419.073873][ C0] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2419.079575][ C0] ? nf_hook_slow+0xf0/0x1e0 [ 2419.084140][ C0] br_nf_hook_thresh+0x2e9/0x370 [ 2419.089061][ C0] ? br_dev_queue_push_xmit+0x5c0/0x5c0 [ 2419.094581][ C0] ? setup_pre_routing+0x4b0/0x4b0 [ 2419.099676][ C0] ? br_dev_queue_push_xmit+0x5c0/0x5c0 [ 2419.105196][ C0] ? br_nf_forward_finish+0x176/0xa90 [ 2419.110544][ C0] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2419.116422][ C0] br_nf_forward_finish+0x66c/0xa90 [ 2419.121595][ C0] ? br_dev_queue_push_xmit+0x5c0/0x5c0 [ 2419.127117][ C0] br_nf_forward_ip+0xc74/0x21e0 [ 2419.132029][ C0] ? br_nf_forward_arp+0x1670/0x1670 [ 2419.137291][ C0] ? mark_held_locks+0xf0/0xf0 [ 2419.142041][ C0] ? br_nf_hook_thresh+0x370/0x370 [ 2419.147166][ C0] ? __vlan_flush+0x120/0x120 [ 2419.151820][ C0] nf_hook_slow+0xbc/0x1e0 [ 2419.156211][ C0] __br_forward+0x393/0xb00 [ 2419.160688][ C0] ? br_forward_finish+0x400/0x400 [ 2419.165774][ C0] ? br_dev_queue_push_xmit+0x5c0/0x5c0 [ 2419.171296][ C0] deliver_clone+0x61/0xc0 [ 2419.175778][ C0] br_flood+0x325/0x3d0 [ 2419.179934][ C0] br_handle_frame_finish+0xb46/0x1670 [ 2419.185405][ C0] ? br_handle_local_finish+0x20/0x20 [ 2419.190764][ C0] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2419.196465][ C0] ? nf_hook_slow+0xf0/0x1e0 [ 2419.201047][ C0] br_nf_hook_thresh+0x2e9/0x370 [ 2419.205964][ C0] ? br_handle_local_finish+0x20/0x20 [ 2419.211308][ C0] ? setup_pre_routing+0x4b0/0x4b0 [ 2419.216407][ C0] ? br_handle_local_finish+0x20/0x20 [ 2419.221806][ C0] ? nf_nat_ipv6_out+0x480/0x480 [ 2419.226724][ C0] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2419.232597][ C0] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 2419.238467][ C0] br_nf_pre_routing_finish_ipv6+0x6fb/0xd80 [ 2419.244421][ C0] ? br_handle_local_finish+0x20/0x20 [ 2419.249770][ C0] br_nf_pre_routing_ipv6+0x456/0x832 [ 2419.255116][ C0] ? br_validate_ipv6+0xb80/0xb80 [ 2419.260117][ C0] ? br_nf_pre_routing_finish.cold+0x124/0x124 [ 2419.266243][ C0] ? br_nf_pre_routing+0x246/0x2355 [ 2419.271417][ C0] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2419.277647][ C0] ? skb_pull_rcsum+0x155/0x300 [ 2419.282472][ C0] br_nf_pre_routing+0x1743/0x2355 [ 2419.287558][ C0] ? br_nf_pre_routing_finish+0x1730/0x1730 [ 2419.293428][ C0] ? br_nf_pre_routing_finish+0x1730/0x1730 [ 2419.300694][ C0] br_handle_frame+0x806/0x133e [ 2419.305534][ C0] ? br_handle_frame_finish+0x1670/0x1670 [ 2419.311231][ C0] ? br_handle_local_finish+0x20/0x20 [ 2419.316580][ C0] ? stack_trace_consume_entry+0x190/0x190 [ 2419.322370][ C0] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2419.328591][ C0] ? br_handle_frame_finish+0x1670/0x1670 [ 2419.334305][ C0] __netif_receive_skb_core+0xfc1/0x3060 [ 2419.339916][ C0] ? get_max_files+0x20/0x20 [ 2419.344478][ C0] ? save_stack+0x5c/0x90 [ 2419.348780][ C0] ? kmem_cache_free+0x86/0x320 [ 2419.353602][ C0] ? file_free_rcu+0x30/0xe0 [ 2419.358166][ C0] ? do_xdp_generic+0x50/0x50 [ 2419.362816][ C0] ? kthread+0x361/0x430 [ 2419.367031][ C0] ? ret_from_fork+0x24/0x30 [ 2419.371606][ C0] ? debug_object_deactivate+0x1d9/0x320 [ 2419.377215][ C0] ? debug_check_no_obj_freed+0x20a/0x43f [ 2419.382917][ C0] ? __kasan_check_read+0x11/0x20 [ 2419.387916][ C0] ? __kasan_check_write+0x14/0x20 [ 2419.393107][ C0] __netif_receive_skb_one_core+0xa8/0x1a0 [ 2419.398889][ C0] ? __netif_receive_skb_one_core+0xa8/0x1a0 [ 2419.404851][ C0] ? __kasan_check_write+0x14/0x20 [ 2419.409940][ C0] ? __netif_receive_skb_core+0x3060/0x3060 [ 2419.415811][ C0] ? lock_acquire+0x190/0x410 [ 2419.420461][ C0] ? process_backlog+0x195/0x750 [ 2419.425375][ C0] __netif_receive_skb+0x2c/0x1d0 [ 2419.430375][ C0] process_backlog+0x206/0x750 [ 2419.435112][ C0] ? __perf_event_task_sched_in+0x1cb/0x820 [ 2419.440978][ C0] ? __perf_event_task_sched_out+0x1ff/0x17a0 [ 2419.447024][ C0] net_rx_action+0x4d6/0x1030 [ 2419.451689][ C0] ? napi_complete_done+0x4b0/0x4b0 [ 2419.456867][ C0] ? sched_clock+0x2e/0x50 [ 2419.461262][ C0] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2419.467479][ C0] __do_softirq+0x262/0x98c [ 2419.471960][ C0] ? takeover_tasklets+0x820/0x820 [ 2419.477043][ C0] run_ksoftirqd+0x8e/0x110 [ 2419.481521][ C0] smpboot_thread_fn+0x6a3/0xa40 [ 2419.486434][ C0] ? smpboot_register_percpu_thread+0x390/0x390 [ 2419.492656][ C0] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2419.498868][ C0] ? __kthread_parkme+0x108/0x1c0 [ 2419.503866][ C0] ? __kasan_check_read+0x11/0x20 [ 2419.508862][ C0] kthread+0x361/0x430 [ 2419.512910][ C0] ? smpboot_register_percpu_thread+0x390/0x390 [ 2419.519125][ C0] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 2419.525346][ C0] ret_from_fork+0x24/0x30