1e9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={&(0x7f0000000100)=@in6={0xa, 0x4e22, 0x0, @loopback}, 0x80, &(0x7f00000001c0), 0x2ab, &(0x7f0000000680)}, 0x0) sendmsg$kcm(r0, &(0x7f0000002b80)={&(0x7f00000005c0)=@in6={0xa, 0x4e21, 0x0, @local}, 0x80, 0x0}, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmsg(r0, &(0x7f00000029c0)={0x0, 0x0, 0x0}, 0x2061) 02:37:31 executing program 0: r0 = socket$unix(0x1, 0x805, 0x0) bind$unix(r0, &(0x7f00000000c0)=@abs={0x1}, 0x2) setgid(0x0) listen(r0, 0x0) setresgid(0x0, 0x0, 0x0) listen(r0, 0x0) [ 240.257337][T16279] XFS (loop2): Mounting V4 Filesystem [ 240.344740][T16279] XFS (loop2): empty log check failed [ 240.350552][T16279] XFS (loop2): log mount/recovery failed: error -5 [ 240.362516][T16279] XFS (loop2): log mount failed 02:37:31 executing program 0: r0 = socket$unix(0x1, 0x805, 0x0) bind$unix(r0, &(0x7f00000000c0)=@abs={0x1}, 0x2) setgid(0x0) listen(r0, 0x0) setresgid(0x0, 0x0, 0x0) listen(r0, 0x0) 02:37:31 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000008a00)=[{{0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000000)=""/48, 0x30}], 0x1}}], 0x1, 0x0, 0x0) 02:37:31 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000280)={0x40000000000002, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000000)={0x3, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000380)={@multicast2=0xe0000001, @loopback}, 0xc) 02:37:31 executing program 4: r0 = socket(0x2, 0x3, 0x100000001) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xd}}, 0x10) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0x10) sendto(r0, &(0x7f0000000200)="b5d7", 0x2, 0x8004, 0x0, 0x0) write(r0, &(0x7f0000000040)="8a15", 0x2) 02:37:31 executing program 3: r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x19, &(0x7f0000000380), 0x96) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1e9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={&(0x7f0000000100)=@in6={0xa, 0x4e22, 0x0, @loopback}, 0x80, &(0x7f00000001c0), 0x2ab, &(0x7f0000000680)}, 0x0) sendmsg$kcm(r0, &(0x7f0000002b80)={&(0x7f00000005c0)=@in6={0xa, 0x4e21, 0x0, @local}, 0x80, 0x0}, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmsg(r0, &(0x7f00000029c0)={0x0, 0x0, 0x0}, 0x2061) 02:37:31 executing program 2: r0 = socket(0x2, 0x3, 0x100000001) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xd}}, 0x10) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0x10) sendto(r0, &(0x7f0000000200)="b5d7", 0x2, 0x8004, 0x0, 0x0) write(r0, &(0x7f0000000040)="8a15", 0x2) 02:37:32 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000280)={0x40000000000002, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000000)={0x3, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000380)={@multicast2=0xe0000001, @loopback}, 0xc) 02:37:32 executing program 4: r0 = socket(0x2, 0x3, 0x100000001) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xd}}, 0x10) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0x10) sendto(r0, &(0x7f0000000200)="b5d7", 0x2, 0x8004, 0x0, 0x0) write(r0, &(0x7f0000000040)="8a15", 0x2) 02:37:32 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a", 0x4) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r1, &(0x7f0000008a00)=[{{0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000000)=""/48, 0x30}], 0x1}}], 0x1, 0x0, 0x0) 02:37:32 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) lremovexattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@known='trusted.overlay.opaque\x00') 02:37:32 executing program 3: r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x19, &(0x7f0000000380), 0x96) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1e9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={&(0x7f0000000100)=@in6={0xa, 0x4e22, 0x0, @loopback}, 0x80, &(0x7f00000001c0), 0x2ab, &(0x7f0000000680)}, 0x0) sendmsg$kcm(r0, &(0x7f0000002b80)={&(0x7f00000005c0)=@in6={0xa, 0x4e21, 0x0, @local}, 0x80, 0x0}, 0x0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmsg(r0, &(0x7f00000029c0)={0x0, 0x0, 0x0}, 0x2061) 02:37:32 executing program 2: r0 = socket(0x2, 0x3, 0x100000001) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xd}}, 0x10) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0x10) sendto(r0, &(0x7f0000000200)="b5d7", 0x2, 0x8004, 0x0, 0x0) write(r0, &(0x7f0000000040)="8a15", 0x2) 02:37:32 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'batadv0\x00', 0xfffffffffffffffe}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'batadv0\x00', 0xf7fffffffffffffd}) 02:37:32 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000200)={'ip6tnl0\x00', {0x2, 0x0, @multicast2}}) 02:37:32 executing program 4: unshare(0x8000400) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, 0x0) 02:37:32 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) lremovexattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@known='trusted.overlay.opaque\x00') [ 240.861602][T16351] device batadv0 entered promiscuous mode 02:37:32 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x9bf9de5e9b6f91c1) 02:37:32 executing program 2: r0 = socket(0x2, 0x3, 0x100000001) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xd}}, 0x10) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @multicast2}, 0x10) sendto(r0, &(0x7f0000000200)="b5d7", 0x2, 0x8004, 0x0, 0x0) write(r0, &(0x7f0000000040)="8a15", 0x2) 02:37:32 executing program 4: unshare(0x8000400) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, 0x0) 02:37:32 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000000040)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x87}}, &(0x7f0000000080)='GPL\x04\x9c5\x14\xbfw-\xa0z\xe8.vY\n6\xf6I>\xc1\xab\x91\xb3\x97\xe4*\xbf\x1e\xa6\xcd\x8c\xd7t\'\xfc\x9a\x9e+qe\xf5+A\a\xbf\bP\xd8\x99\xdcR\xd0\x13\x17]\xdb\x1b/F <*\x05\xb7\"\xe3>Uo\xb2\xe3\xf3\x9a<\xde\x1f\xcaSd\x037\xec\x95aF\xbd\xbf\xcb\x11Pp\x19V1\xde]!\xa5\xea\x9ec\x8c+\xdbx\xa5\x01\xcaKn\xa3\x13\xd8%h\xf98,,?o\xab\xa6\xb4\xeeTy;N\xd2m\xae>R\"P)\xbb*\xc0\x00\x7fwuL?#\xce\xda\x98\t\xb9\xa9hJ\x94\n\xbc\xaa\x8c\xfc\xc7\x13>\xc4\"\xe9\xc88\x881\x8dA\xe9\xa4\x93\xf0\x19_\xe2Y\x96Q\xb8\x95\x04\xf5\xdb\xa1F%\xce#f\xf3=\x95\xdb\xa9/\x86ry\xca\xbfJ\xce\xdd\xc8Z\x8a\xf7\xa0\xfah\xd7g\xceQ6\xb9\xd0\xd1\x96lI\x9c\xb6\xbf4\xc2\x98\x86f\x97\x00'/248, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x14) 02:37:32 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) lremovexattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@known='trusted.overlay.opaque\x00') 02:37:32 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000000040)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x87}}, &(0x7f0000000080)='GPL\x04\x9c5\x14\xbfw-\xa0z\xe8.vY\n6\xf6I>\xc1\xab\x91\xb3\x97\xe4*\xbf\x1e\xa6\xcd\x8c\xd7t\'\xfc\x9a\x9e+qe\xf5+A\a\xbf\bP\xd8\x99\xdcR\xd0\x13\x17]\xdb\x1b/F <*\x05\xb7\"\xe3>Uo\xb2\xe3\xf3\x9a<\xde\x1f\xcaSd\x037\xec\x95aF\xbd\xbf\xcb\x11Pp\x19V1\xde]!\xa5\xea\x9ec\x8c+\xdbx\xa5\x01\xcaKn\xa3\x13\xd8%h\xf98,,?o\xab\xa6\xb4\xeeTy;N\xd2m\xae>R\"P)\xbb*\xc0\x00\x7fwuL?#\xce\xda\x98\t\xb9\xa9hJ\x94\n\xbc\xaa\x8c\xfc\xc7\x13>\xc4\"\xe9\xc88\x881\x8dA\xe9\xa4\x93\xf0\x19_\xe2Y\x96Q\xb8\x95\x04\xf5\xdb\xa1F%\xce#f\xf3=\x95\xdb\xa9/\x86ry\xca\xbfJ\xce\xdd\xc8Z\x8a\xf7\xa0\xfah\xd7g\xceQ6\xb9\xd0\xd1\x96lI\x9c\xb6\xbf4\xc2\x98\x86f\x97\x00'/248, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x14) 02:37:32 executing program 4: unshare(0x8000400) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, 0x0) 02:37:32 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) lremovexattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@known='trusted.overlay.opaque\x00') [ 241.331380][T16355] 8021q: adding VLAN 0 to HW filter on device batadv0 02:37:32 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'batadv0\x00', 0xfffffffffffffffe}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'batadv0\x00', 0xf7fffffffffffffd}) 02:37:32 executing program 4: unshare(0x8000400) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, 0x0) 02:37:32 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000000040)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x87}}, &(0x7f0000000080)='GPL\x04\x9c5\x14\xbfw-\xa0z\xe8.vY\n6\xf6I>\xc1\xab\x91\xb3\x97\xe4*\xbf\x1e\xa6\xcd\x8c\xd7t\'\xfc\x9a\x9e+qe\xf5+A\a\xbf\bP\xd8\x99\xdcR\xd0\x13\x17]\xdb\x1b/F <*\x05\xb7\"\xe3>Uo\xb2\xe3\xf3\x9a<\xde\x1f\xcaSd\x037\xec\x95aF\xbd\xbf\xcb\x11Pp\x19V1\xde]!\xa5\xea\x9ec\x8c+\xdbx\xa5\x01\xcaKn\xa3\x13\xd8%h\xf98,,?o\xab\xa6\xb4\xeeTy;N\xd2m\xae>R\"P)\xbb*\xc0\x00\x7fwuL?#\xce\xda\x98\t\xb9\xa9hJ\x94\n\xbc\xaa\x8c\xfc\xc7\x13>\xc4\"\xe9\xc88\x881\x8dA\xe9\xa4\x93\xf0\x19_\xe2Y\x96Q\xb8\x95\x04\xf5\xdb\xa1F%\xce#f\xf3=\x95\xdb\xa9/\x86ry\xca\xbfJ\xce\xdd\xc8Z\x8a\xf7\xa0\xfah\xd7g\xceQ6\xb9\xd0\xd1\x96lI\x9c\xb6\xbf4\xc2\x98\x86f\x97\x00'/248, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x14) 02:37:32 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0x0) 02:37:32 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x9bf9de5e9b6f91c1) 02:37:32 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000200)={'ip6tnl0\x00', {0x2, 0x0, @multicast2}}) 02:37:32 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000000040)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x87}}, &(0x7f0000000080)='GPL\x04\x9c5\x14\xbfw-\xa0z\xe8.vY\n6\xf6I>\xc1\xab\x91\xb3\x97\xe4*\xbf\x1e\xa6\xcd\x8c\xd7t\'\xfc\x9a\x9e+qe\xf5+A\a\xbf\bP\xd8\x99\xdcR\xd0\x13\x17]\xdb\x1b/F <*\x05\xb7\"\xe3>Uo\xb2\xe3\xf3\x9a<\xde\x1f\xcaSd\x037\xec\x95aF\xbd\xbf\xcb\x11Pp\x19V1\xde]!\xa5\xea\x9ec\x8c+\xdbx\xa5\x01\xcaKn\xa3\x13\xd8%h\xf98,,?o\xab\xa6\xb4\xeeTy;N\xd2m\xae>R\"P)\xbb*\xc0\x00\x7fwuL?#\xce\xda\x98\t\xb9\xa9hJ\x94\n\xbc\xaa\x8c\xfc\xc7\x13>\xc4\"\xe9\xc88\x881\x8dA\xe9\xa4\x93\xf0\x19_\xe2Y\x96Q\xb8\x95\x04\xf5\xdb\xa1F%\xce#f\xf3=\x95\xdb\xa9/\x86ry\xca\xbfJ\xce\xdd\xc8Z\x8a\xf7\xa0\xfah\xd7g\xceQ6\xb9\xd0\xd1\x96lI\x9c\xb6\xbf4\xc2\x98\x86f\x97\x00'/248, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x14) 02:37:32 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'batadv0\x00', 0xfffffffffffffffe}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'batadv0\x00', 0xf7fffffffffffffd}) 02:37:33 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x9bf9de5e9b6f91c1) 02:37:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x8000001000008912, &(0x7f0000000180)="11dca5055e0bcfec7be070") r1 = socket$inet(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0xe21}, 0x10) r2 = socket$inet(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f0000eed000)={0x2, 0x4e21}, 0x10) syz_emit_ethernet(0xfed1, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x4e21, 0x8}}}}}, 0x0) 02:37:33 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000200)={'ip6tnl0\x00', {0x2, 0x0, @multicast2}}) 02:37:33 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x9bf9de5e9b6f91c1) [ 241.801951][T16401] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 241.844016][T16406] device batadv0 entered promiscuous mode 02:37:33 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'batadv0\x00', 0xfffffffffffffffe}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'batadv0\x00', 0xf7fffffffffffffd}) 02:37:33 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x9bf9de5e9b6f91c1) [ 242.018975][T16413] 8021q: adding VLAN 0 to HW filter on device batadv0 02:37:33 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000200)={'ip6tnl0\x00', {0x2, 0x0, @multicast2}}) 02:37:33 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x9bf9de5e9b6f91c1) 02:37:33 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'batadv0\x00', 0xfffffffffffffffe}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'batadv0\x00', 0xf7fffffffffffffd}) 02:37:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x8000001000008912, &(0x7f0000000180)="11dca5055e0bcfec7be070") r1 = socket$inet(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0xe21}, 0x10) r2 = socket$inet(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f0000eed000)={0x2, 0x4e21}, 0x10) syz_emit_ethernet(0xfed1, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x4e21, 0x8}}}}}, 0x0) [ 242.304302][T16426] 8021q: adding VLAN 0 to HW filter on device batadv0 02:37:33 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x8000001000008912, &(0x7f0000000180)="11dca5055e0bcfec7be070") r1 = socket$inet(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0xe21}, 0x10) r2 = socket$inet(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f0000eed000)={0x2, 0x4e21}, 0x10) syz_emit_ethernet(0xfed1, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x4e21, 0x8}}}}}, 0x0) 02:37:33 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x9bf9de5e9b6f91c1) 02:37:33 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'batadv0\x00', 0xfffffffffffffffe}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'batadv0\x00', 0xf7fffffffffffffd}) 02:37:34 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000340)={0xffffffffffffffff}) io_setup(0x4, &(0x7f0000000100)=0x0) r3 = dup2(r1, r0) io_submit(r2, 0x2, &(0x7f0000001680)=[&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, r3, 0xfffffffffffffffe, 0x2c2, 0x0, 0x0, 0x0, 0xffffffffffffff9c}]) [ 242.618954][T16440] 8021q: adding VLAN 0 to HW filter on device batadv0 02:37:34 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'batadv0\x00', 0xfffffffffffffffe}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'batadv0\x00', 0xf7fffffffffffffd}) 02:37:34 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x8000001000008912, &(0x7f0000000180)="11dca5055e0bcfec7be070") r1 = socket$inet(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0xe21}, 0x10) r2 = socket$inet(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f0000eed000)={0x2, 0x4e21}, 0x10) syz_emit_ethernet(0xfed1, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x4e21, 0x8}}}}}, 0x0) 02:37:34 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x8000001000008912, &(0x7f0000000180)="11dca5055e0bcfec7be070") r1 = socket$inet(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0xe21}, 0x10) r2 = socket$inet(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f0000eed000)={0x2, 0x4e21}, 0x10) syz_emit_ethernet(0xfed1, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x4e21, 0x8}}}}}, 0x0) 02:37:34 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000000)="2e0000002c008151e00f80ecdb4cb904014865160b00010005000000000000190e000600000000010000000153b4", 0x2e}], 0x1}, 0x0) 02:37:34 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000340)={0xffffffffffffffff}) io_setup(0x4, &(0x7f0000000100)=0x0) r3 = dup2(r1, r0) io_submit(r2, 0x2, &(0x7f0000001680)=[&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, r3, 0xfffffffffffffffe, 0x2c2, 0x0, 0x0, 0x0, 0xffffffffffffff9c}]) 02:37:34 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000000)="2e0000002c008151e00f80ecdb4cb904014865160b00010005000000000000190e000600000000010000000153b4", 0x2e}], 0x1}, 0x0) 02:37:34 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000340)={0xffffffffffffffff}) io_setup(0x4, &(0x7f0000000100)=0x0) r3 = dup2(r1, r0) io_submit(r2, 0x2, &(0x7f0000001680)=[&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, r3, 0xfffffffffffffffe, 0x2c2, 0x0, 0x0, 0x0, 0xffffffffffffff9c}]) 02:37:34 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000000)="2e0000002c008151e00f80ecdb4cb904014865160b00010005000000000000190e000600000000010000000153b4", 0x2e}], 0x1}, 0x0) 02:37:34 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000000)="2e0000002c008151e00f80ecdb4cb904014865160b00010005000000000000190e000600000000010000000153b4", 0x2e}], 0x1}, 0x0) 02:37:34 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000340)={0xffffffffffffffff}) io_setup(0x4, &(0x7f0000000100)=0x0) r3 = dup2(r1, r0) io_submit(r2, 0x2, &(0x7f0000001680)=[&(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, r3, 0xfffffffffffffffe, 0x2c2, 0x0, 0x0, 0x0, 0xffffffffffffff9c}]) 02:37:34 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x35}]}) 02:37:34 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x35}]}) [ 243.364539][T16471] 8021q: adding VLAN 0 to HW filter on device batadv0 02:37:34 executing program 3: mmap(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0xfffffffffffffffc, 0x5e831, 0xffffffffffffffff, 0x0) 02:37:34 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) recvmmsg(r0, &(0x7f0000001280)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 02:37:34 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x35}]}) 02:37:34 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x8000001000008912, &(0x7f0000000180)="11dca5055e0bcfec7be070") r1 = socket$inet(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0xe21}, 0x10) r2 = socket$inet(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f0000eed000)={0x2, 0x4e21}, 0x10) syz_emit_ethernet(0xfed1, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x4e21, 0x8}}}}}, 0x0) 02:37:34 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x8000001000008912, &(0x7f0000000180)="11dca5055e0bcfec7be070") r1 = socket$inet(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0xe21}, 0x10) r2 = socket$inet(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f0000eed000)={0x2, 0x4e21}, 0x10) syz_emit_ethernet(0xfed1, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x4e21, 0x8}}}}}, 0x0) 02:37:34 executing program 0: r0 = memfd_create(&(0x7f0000000000)='-vboxnet0\x00', 0x6) ftruncate(r0, 0x0) 02:37:34 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) recvmmsg(r0, &(0x7f0000001280)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 02:37:35 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x35}]}) 02:37:35 executing program 1: r0 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x1, 0x2) ioctl$TIOCSSERIAL(r0, 0x541f, &(0x7f0000000380)={0x80, 0x9b8, 0x7, 0x4, 0x2, 0x0, 0x0, 0x2, 0x101, 0x0, 0x800100, 0x200, 0xca6c, 0x0, 0x0, 0x5, 0x80}) close(0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000400)) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) r3 = socket$inet6(0xa, 0x803, 0x3) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x78, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r4, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66726f8cfafd6c8fe2c98de7ba44947a79015f0fe57917cb62a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef2818a179"}, 0xd8) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r0, 0x40a85321, &(0x7f0000000440)={{0x100000001, 0x7}, 'port1\x00', 0x22, 0x10002, 0x4, 0x1f, 0x2, 0x80000001, 0x9, 0x0, 0x4, 0x9}) bind$inet(r4, &(0x7f0000000180)={0x2, 0x4e23, @dev}, 0x10) semget(0xffffffffffffffff, 0x0, 0x0) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) connect$inet(r4, &(0x7f0000000040)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000100), 0x4) dup3(r4, r3, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) socket$inet(0x2, 0x3, 0x2) socket$inet6_tcp(0xa, 0x1, 0x0) write$UHID_INPUT2(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r2, 0x660c) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) recvmsg(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000003ac0)=""/4096, 0x1002}], 0x1, 0x0, 0x4f}, 0x100) write$binfmt_elf64(r4, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 02:37:35 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x2, 0x3, &(0x7f0000000040)=@framed={{0xffffff85, 0x0, 0x11, 0x0, 0xffffffffffffffff, 0x6f}}, &(0x7f0000000240)='GPL\x00', 0x1, 0x10a, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 02:37:35 executing program 0: r0 = memfd_create(&(0x7f0000000000)='-vboxnet0\x00', 0x6) ftruncate(r0, 0x0) 02:37:35 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) recvmmsg(r0, &(0x7f0000001280)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 02:37:35 executing program 3: mmap(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0xfffffffffffffffc, 0x5e831, 0xffffffffffffffff, 0x0) 02:37:35 executing program 0: r0 = memfd_create(&(0x7f0000000000)='-vboxnet0\x00', 0x6) ftruncate(r0, 0x0) 02:37:35 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x2, 0x3, &(0x7f0000000040)=@framed={{0xffffff85, 0x0, 0x11, 0x0, 0xffffffffffffffff, 0x6f}}, &(0x7f0000000240)='GPL\x00', 0x1, 0x10a, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 02:37:35 executing program 5: r0 = epoll_create1(0x0) r1 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000001c0)) 02:37:35 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) recvmmsg(r0, &(0x7f0000001280)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 02:37:35 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x2, 0x3, &(0x7f0000000040)=@framed={{0xffffff85, 0x0, 0x11, 0x0, 0xffffffffffffffff, 0x6f}}, &(0x7f0000000240)='GPL\x00', 0x1, 0x10a, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 02:37:35 executing program 0: r0 = memfd_create(&(0x7f0000000000)='-vboxnet0\x00', 0x6) ftruncate(r0, 0x0) 02:37:35 executing program 5: r0 = epoll_create1(0x0) r1 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000001c0)) 02:37:35 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x2, 0x3, &(0x7f0000000040)=@framed={{0xffffff85, 0x0, 0x11, 0x0, 0xffffffffffffffff, 0x6f}}, &(0x7f0000000240)='GPL\x00', 0x1, 0x10a, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 02:37:35 executing program 4: r0 = epoll_create1(0x0) r1 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000001c0)) 02:37:35 executing program 3: mmap(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0xfffffffffffffffc, 0x5e831, 0xffffffffffffffff, 0x0) 02:37:35 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='GPL\x00aller\x00'}, 0x48) 02:37:35 executing program 1: r0 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x1, 0x2) ioctl$TIOCSSERIAL(r0, 0x541f, &(0x7f0000000380)={0x80, 0x9b8, 0x7, 0x4, 0x2, 0x0, 0x0, 0x2, 0x101, 0x0, 0x800100, 0x200, 0xca6c, 0x0, 0x0, 0x5, 0x80}) close(0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000400)) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) r3 = socket$inet6(0xa, 0x803, 0x3) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x78, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r4, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66726f8cfafd6c8fe2c98de7ba44947a79015f0fe57917cb62a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef2818a179"}, 0xd8) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r0, 0x40a85321, &(0x7f0000000440)={{0x100000001, 0x7}, 'port1\x00', 0x22, 0x10002, 0x4, 0x1f, 0x2, 0x80000001, 0x9, 0x0, 0x4, 0x9}) bind$inet(r4, &(0x7f0000000180)={0x2, 0x4e23, @dev}, 0x10) semget(0xffffffffffffffff, 0x0, 0x0) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) connect$inet(r4, &(0x7f0000000040)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000100), 0x4) dup3(r4, r3, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) socket$inet(0x2, 0x3, 0x2) socket$inet6_tcp(0xa, 0x1, 0x0) write$UHID_INPUT2(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r2, 0x660c) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) recvmsg(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000003ac0)=""/4096, 0x1002}], 0x1, 0x0, 0x4f}, 0x100) write$binfmt_elf64(r4, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 02:37:35 executing program 5: r0 = epoll_create1(0x0) r1 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000001c0)) 02:37:36 executing program 5: r0 = epoll_create1(0x0) r1 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000001c0)) 02:37:36 executing program 2: r0 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x1, 0x2) ioctl$TIOCSSERIAL(r0, 0x541f, &(0x7f0000000380)={0x80, 0x9b8, 0x7, 0x4, 0x2, 0x0, 0x0, 0x2, 0x101, 0x0, 0x800100, 0x200, 0xca6c, 0x0, 0x0, 0x5, 0x80}) close(0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000400)) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) r3 = socket$inet6(0xa, 0x803, 0x3) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x78, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r4, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66726f8cfafd6c8fe2c98de7ba44947a79015f0fe57917cb62a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef2818a179"}, 0xd8) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r0, 0x40a85321, &(0x7f0000000440)={{0x100000001, 0x7}, 'port1\x00', 0x22, 0x10002, 0x4, 0x1f, 0x2, 0x80000001, 0x9, 0x0, 0x4, 0x9}) bind$inet(r4, &(0x7f0000000180)={0x2, 0x4e23, @dev}, 0x10) semget(0xffffffffffffffff, 0x0, 0x0) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) connect$inet(r4, &(0x7f0000000040)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000100), 0x4) dup3(r4, r3, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) socket$inet(0x2, 0x3, 0x2) socket$inet6_tcp(0xa, 0x1, 0x0) write$UHID_INPUT2(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r2, 0x660c) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) recvmsg(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000003ac0)=""/4096, 0x1002}], 0x1, 0x0, 0x4f}, 0x100) write$binfmt_elf64(r4, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 02:37:36 executing program 4: r0 = epoll_create1(0x0) r1 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000001c0)) 02:37:36 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='GPL\x00aller\x00'}, 0x48) 02:37:36 executing program 5: r0 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x1, 0x2) ioctl$TIOCSSERIAL(r0, 0x541f, &(0x7f0000000380)={0x80, 0x9b8, 0x7, 0x4, 0x2, 0x0, 0x0, 0x2, 0x101, 0x0, 0x800100, 0x200, 0xca6c, 0x0, 0x0, 0x5, 0x80}) close(0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000400)) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) r3 = socket$inet6(0xa, 0x803, 0x3) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x78, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r4, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66726f8cfafd6c8fe2c98de7ba44947a79015f0fe57917cb62a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef2818a179"}, 0xd8) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r0, 0x40a85321, &(0x7f0000000440)={{0x100000001, 0x7}, 'port1\x00', 0x22, 0x10002, 0x4, 0x1f, 0x2, 0x80000001, 0x9, 0x0, 0x4, 0x9}) bind$inet(r4, &(0x7f0000000180)={0x2, 0x4e23, @dev}, 0x10) semget(0xffffffffffffffff, 0x0, 0x0) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) connect$inet(r4, &(0x7f0000000040)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000100), 0x4) dup3(r4, r3, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) socket$inet(0x2, 0x3, 0x2) socket$inet6_tcp(0xa, 0x1, 0x0) write$UHID_INPUT2(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r2, 0x660c) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) recvmsg(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000003ac0)=""/4096, 0x1002}], 0x1, 0x0, 0x4f}, 0x100) write$binfmt_elf64(r4, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 02:37:36 executing program 4: r0 = epoll_create1(0x0) r1 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000001c0)) 02:37:36 executing program 3: mmap(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0xfffffffffffffffc, 0x5e831, 0xffffffffffffffff, 0x0) 02:37:36 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='GPL\x00aller\x00'}, 0x48) 02:37:36 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x18}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 02:37:36 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003400000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='GPL\x00aller\x00'}, 0x48) 02:37:36 executing program 1: r0 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x1, 0x2) ioctl$TIOCSSERIAL(r0, 0x541f, &(0x7f0000000380)={0x80, 0x9b8, 0x7, 0x4, 0x2, 0x0, 0x0, 0x2, 0x101, 0x0, 0x800100, 0x200, 0xca6c, 0x0, 0x0, 0x5, 0x80}) close(0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000400)) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) r3 = socket$inet6(0xa, 0x803, 0x3) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x78, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r4, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66726f8cfafd6c8fe2c98de7ba44947a79015f0fe57917cb62a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef2818a179"}, 0xd8) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r0, 0x40a85321, &(0x7f0000000440)={{0x100000001, 0x7}, 'port1\x00', 0x22, 0x10002, 0x4, 0x1f, 0x2, 0x80000001, 0x9, 0x0, 0x4, 0x9}) bind$inet(r4, &(0x7f0000000180)={0x2, 0x4e23, @dev}, 0x10) semget(0xffffffffffffffff, 0x0, 0x0) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) connect$inet(r4, &(0x7f0000000040)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000100), 0x4) dup3(r4, r3, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) socket$inet(0x2, 0x3, 0x2) socket$inet6_tcp(0xa, 0x1, 0x0) write$UHID_INPUT2(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r2, 0x660c) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) recvmsg(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000003ac0)=""/4096, 0x1002}], 0x1, 0x0, 0x4f}, 0x100) write$binfmt_elf64(r4, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 02:37:36 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x18}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 02:37:36 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000800)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10) 02:37:37 executing program 2: r0 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x1, 0x2) ioctl$TIOCSSERIAL(r0, 0x541f, &(0x7f0000000380)={0x80, 0x9b8, 0x7, 0x4, 0x2, 0x0, 0x0, 0x2, 0x101, 0x0, 0x800100, 0x200, 0xca6c, 0x0, 0x0, 0x5, 0x80}) close(0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000400)) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) r3 = socket$inet6(0xa, 0x803, 0x3) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x78, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r4, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66726f8cfafd6c8fe2c98de7ba44947a79015f0fe57917cb62a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef2818a179"}, 0xd8) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r0, 0x40a85321, &(0x7f0000000440)={{0x100000001, 0x7}, 'port1\x00', 0x22, 0x10002, 0x4, 0x1f, 0x2, 0x80000001, 0x9, 0x0, 0x4, 0x9}) bind$inet(r4, &(0x7f0000000180)={0x2, 0x4e23, @dev}, 0x10) semget(0xffffffffffffffff, 0x0, 0x0) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) connect$inet(r4, &(0x7f0000000040)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000100), 0x4) dup3(r4, r3, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) socket$inet(0x2, 0x3, 0x2) socket$inet6_tcp(0xa, 0x1, 0x0) write$UHID_INPUT2(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r2, 0x660c) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) recvmsg(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000003ac0)=""/4096, 0x1002}], 0x1, 0x0, 0x4f}, 0x100) write$binfmt_elf64(r4, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 02:37:37 executing program 0: mlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) 02:37:37 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000800)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10) 02:37:37 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x18}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 02:37:37 executing program 5: r0 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x1, 0x2) ioctl$TIOCSSERIAL(r0, 0x541f, &(0x7f0000000380)={0x80, 0x9b8, 0x7, 0x4, 0x2, 0x0, 0x0, 0x2, 0x101, 0x0, 0x800100, 0x200, 0xca6c, 0x0, 0x0, 0x5, 0x80}) close(0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000400)) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) r3 = socket$inet6(0xa, 0x803, 0x3) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x78, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r4, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66726f8cfafd6c8fe2c98de7ba44947a79015f0fe57917cb62a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef2818a179"}, 0xd8) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r0, 0x40a85321, &(0x7f0000000440)={{0x100000001, 0x7}, 'port1\x00', 0x22, 0x10002, 0x4, 0x1f, 0x2, 0x80000001, 0x9, 0x0, 0x4, 0x9}) bind$inet(r4, &(0x7f0000000180)={0x2, 0x4e23, @dev}, 0x10) semget(0xffffffffffffffff, 0x0, 0x0) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) connect$inet(r4, &(0x7f0000000040)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000100), 0x4) dup3(r4, r3, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) socket$inet(0x2, 0x3, 0x2) socket$inet6_tcp(0xa, 0x1, 0x0) write$UHID_INPUT2(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r2, 0x660c) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) recvmsg(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000003ac0)=""/4096, 0x1002}], 0x1, 0x0, 0x4f}, 0x100) write$binfmt_elf64(r4, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 02:37:37 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000800)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10) 02:37:37 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x18}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 02:37:37 executing program 0: mlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) 02:37:37 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r0, &(0x7f0000000800)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0x1}}, 0x10) 02:37:37 executing program 1: r0 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x1, 0x2) ioctl$TIOCSSERIAL(r0, 0x541f, &(0x7f0000000380)={0x80, 0x9b8, 0x7, 0x4, 0x2, 0x0, 0x0, 0x2, 0x101, 0x0, 0x800100, 0x200, 0xca6c, 0x0, 0x0, 0x5, 0x80}) close(0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000400)) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) r3 = socket$inet6(0xa, 0x803, 0x3) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x78, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r4, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66726f8cfafd6c8fe2c98de7ba44947a79015f0fe57917cb62a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef2818a179"}, 0xd8) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r0, 0x40a85321, &(0x7f0000000440)={{0x100000001, 0x7}, 'port1\x00', 0x22, 0x10002, 0x4, 0x1f, 0x2, 0x80000001, 0x9, 0x0, 0x4, 0x9}) bind$inet(r4, &(0x7f0000000180)={0x2, 0x4e23, @dev}, 0x10) semget(0xffffffffffffffff, 0x0, 0x0) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) connect$inet(r4, &(0x7f0000000040)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000100), 0x4) dup3(r4, r3, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) socket$inet(0x2, 0x3, 0x2) socket$inet6_tcp(0xa, 0x1, 0x0) write$UHID_INPUT2(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r2, 0x660c) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) recvmsg(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000003ac0)=""/4096, 0x1002}], 0x1, 0x0, 0x4f}, 0x100) write$binfmt_elf64(r4, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 02:37:37 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x20000000000000, 0x700, 0x0, 0x0, 0x4e}, [@ldst={0x3, 0x2, 0x3, 0x1c10a1, 0x0, 0x1e}]}, &(0x7f0000003ff6)='G\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) 02:37:37 executing program 0: mlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) 02:37:38 executing program 2: r0 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x1, 0x2) ioctl$TIOCSSERIAL(r0, 0x541f, &(0x7f0000000380)={0x80, 0x9b8, 0x7, 0x4, 0x2, 0x0, 0x0, 0x2, 0x101, 0x0, 0x800100, 0x200, 0xca6c, 0x0, 0x0, 0x5, 0x80}) close(0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000400)) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) r3 = socket$inet6(0xa, 0x803, 0x3) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x78, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r4, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66726f8cfafd6c8fe2c98de7ba44947a79015f0fe57917cb62a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef2818a179"}, 0xd8) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r0, 0x40a85321, &(0x7f0000000440)={{0x100000001, 0x7}, 'port1\x00', 0x22, 0x10002, 0x4, 0x1f, 0x2, 0x80000001, 0x9, 0x0, 0x4, 0x9}) bind$inet(r4, &(0x7f0000000180)={0x2, 0x4e23, @dev}, 0x10) semget(0xffffffffffffffff, 0x0, 0x0) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) connect$inet(r4, &(0x7f0000000040)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000100), 0x4) dup3(r4, r3, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) socket$inet(0x2, 0x3, 0x2) socket$inet6_tcp(0xa, 0x1, 0x0) write$UHID_INPUT2(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r2, 0x660c) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) recvmsg(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000003ac0)=""/4096, 0x1002}], 0x1, 0x0, 0x4f}, 0x100) write$binfmt_elf64(r4, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 02:37:38 executing program 3: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="747970653d94"]) 02:37:38 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x20000000000000, 0x700, 0x0, 0x0, 0x4e}, [@ldst={0x3, 0x2, 0x3, 0x1c10a1, 0x0, 0x1e}]}, &(0x7f0000003ff6)='G\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) 02:37:38 executing program 0: mlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) 02:37:38 executing program 5: r0 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x1, 0x2) ioctl$TIOCSSERIAL(r0, 0x541f, &(0x7f0000000380)={0x80, 0x9b8, 0x7, 0x4, 0x2, 0x0, 0x0, 0x2, 0x101, 0x0, 0x800100, 0x200, 0xca6c, 0x0, 0x0, 0x5, 0x80}) close(0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000400)) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) r3 = socket$inet6(0xa, 0x803, 0x3) ioctl$int_in(r1, 0x5421, &(0x7f0000000000)) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x78, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r4, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66726f8cfafd6c8fe2c98de7ba44947a79015f0fe57917cb62a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef2818a179"}, 0xd8) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r0, 0x40a85321, &(0x7f0000000440)={{0x100000001, 0x7}, 'port1\x00', 0x22, 0x10002, 0x4, 0x1f, 0x2, 0x80000001, 0x9, 0x0, 0x4, 0x9}) bind$inet(r4, &(0x7f0000000180)={0x2, 0x4e23, @dev}, 0x10) semget(0xffffffffffffffff, 0x0, 0x0) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) connect$inet(r4, &(0x7f0000000040)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000100), 0x4) dup3(r4, r3, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) socket$inet(0x2, 0x3, 0x2) socket$inet6_tcp(0xa, 0x1, 0x0) write$UHID_INPUT2(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r2, 0x660c) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) recvmsg(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000003ac0)=""/4096, 0x1002}], 0x1, 0x0, 0x4f}, 0x100) write$binfmt_elf64(r4, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 02:37:38 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x20000000000000, 0x700, 0x0, 0x0, 0x4e}, [@ldst={0x3, 0x2, 0x3, 0x1c10a1, 0x0, 0x1e}]}, &(0x7f0000003ff6)='G\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) 02:37:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca50d5e5d02ec7be070") r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000f404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 246.745260][T16661] hfs: type requires a 4 character value [ 246.751083][T16661] hfs: unable to parse mount options [ 246.866478][T16661] hfs: type requires a 4 character value [ 246.900764][T16661] hfs: unable to parse mount options [ 246.930635][T16675] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.0'. 02:37:38 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x20000000000000, 0x700, 0x0, 0x0, 0x4e}, [@ldst={0x3, 0x2, 0x3, 0x1c10a1, 0x0, 0x1e}]}, &(0x7f0000003ff6)='G\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) 02:37:38 executing program 3: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="747970653d94"]) [ 247.086978][T16675] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 02:37:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca50d5e5d02ec7be070") r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000f404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 02:37:38 executing program 4: rt_sigprocmask(0x0, &(0x7f0000000000)={0xfffffffffffffffe}, 0x0, 0x8) setrlimit(0x1, &(0x7f0000000240)) r0 = creat(&(0x7f00000000c0)='./file1\x00', 0x0) write(r0, &(0x7f0000000080)="e4", 0x1) 02:37:38 executing program 3: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="747970653d94"]) [ 247.184713][T16685] hfs: type requires a 4 character value [ 247.190360][T16685] hfs: unable to parse mount options [ 247.488000][T16693] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.0'. [ 247.519761][T16693] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 247.534735][T16697] hfs: type requires a 4 character value [ 247.555694][T16697] hfs: unable to parse mount options 02:37:39 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xe}}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r1, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)={0x48, 0x14, 0x7, 0x0, 0x0, {0x2, 0xf0ffff, 0x600}, [@generic="667e279639a91d7b7f0000017daf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f423682a9447015739d53d5"]}, 0x48}}, 0x0) 02:37:39 executing program 1: shmat(0x0, &(0x7f0000ffa000/0x3000)=nil, 0x0) mlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x4) 02:37:39 executing program 4: rt_sigprocmask(0x0, &(0x7f0000000000)={0xfffffffffffffffe}, 0x0, 0x8) setrlimit(0x1, &(0x7f0000000240)) r0 = creat(&(0x7f00000000c0)='./file1\x00', 0x0) write(r0, &(0x7f0000000080)="e4", 0x1) 02:37:39 executing program 3: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="747970653d94"]) 02:37:39 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca50d5e5d02ec7be070") r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000f404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 02:37:39 executing program 2: openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000240)='/dev/cachefiles\x00', 0x0, 0x0) [ 247.819845][T16713] hfs: type requires a 4 character value 02:37:39 executing program 1: shmat(0x0, &(0x7f0000ffa000/0x3000)=nil, 0x0) mlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x4) 02:37:39 executing program 4: rt_sigprocmask(0x0, &(0x7f0000000000)={0xfffffffffffffffe}, 0x0, 0x8) setrlimit(0x1, &(0x7f0000000240)) r0 = creat(&(0x7f00000000c0)='./file1\x00', 0x0) write(r0, &(0x7f0000000080)="e4", 0x1) [ 247.867179][T16721] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.0'. [ 247.900103][T16713] hfs: unable to parse mount options 02:37:39 executing program 2: openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000240)='/dev/cachefiles\x00', 0x0, 0x0) [ 247.909361][T16721] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 02:37:39 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xe}}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r1, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)={0x48, 0x14, 0x7, 0x0, 0x0, {0x2, 0xf0ffff, 0x600}, [@generic="667e279639a91d7b7f0000017daf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f423682a9447015739d53d5"]}, 0x48}}, 0x0) 02:37:39 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca50d5e5d02ec7be070") r1 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000f404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 02:37:39 executing program 3: shmat(0x0, &(0x7f0000ffa000/0x3000)=nil, 0x0) mlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x4) 02:37:39 executing program 4: rt_sigprocmask(0x0, &(0x7f0000000000)={0xfffffffffffffffe}, 0x0, 0x8) setrlimit(0x1, &(0x7f0000000240)) r0 = creat(&(0x7f00000000c0)='./file1\x00', 0x0) write(r0, &(0x7f0000000080)="e4", 0x1) 02:37:39 executing program 1: shmat(0x0, &(0x7f0000ffa000/0x3000)=nil, 0x0) mlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x4) 02:37:39 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xe}}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r1, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)={0x48, 0x14, 0x7, 0x0, 0x0, {0x2, 0xf0ffff, 0x600}, [@generic="667e279639a91d7b7f0000017daf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f423682a9447015739d53d5"]}, 0x48}}, 0x0) [ 248.103715][T16737] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.0'. 02:37:39 executing program 2: openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000240)='/dev/cachefiles\x00', 0x0, 0x0) [ 248.148524][T16737] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 02:37:39 executing program 5: r0 = socket$inet_tcp(0x2, 0x3, 0x6) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xe}}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r1, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)={0x48, 0x14, 0x7, 0x0, 0x0, {0x2, 0xf0ffff, 0x600}, [@generic="667e279639a91d7b7f0000017daf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f423682a9447015739d53d5"]}, 0x48}}, 0x0) 02:37:39 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)={0x1c, 0x33, 0x119, 0x0, 0x0, {0x3}, [@generic="ffd38d9b", @nested={0x4, 0x8}]}, 0x1c}}, 0x0) 02:37:39 executing program 0: mremap(&(0x7f0000001000/0x1000)=nil, 0x7ffffffff000, 0x1000, 0x0, &(0x7f0000000000/0x1000)=nil) 02:37:39 executing program 3: shmat(0x0, &(0x7f0000ffa000/0x3000)=nil, 0x0) mlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x4) 02:37:39 executing program 1: shmat(0x0, &(0x7f0000ffa000/0x3000)=nil, 0x0) mlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x4) 02:37:39 executing program 2: openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000240)='/dev/cachefiles\x00', 0x0, 0x0) 02:37:39 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)={0x1c, 0x33, 0x119, 0x0, 0x0, {0x3}, [@generic="ffd38d9b", @nested={0x4, 0x8}]}, 0x1c}}, 0x0) 02:37:39 executing program 5: r0 = socket(0xa, 0x40000000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x11?\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x19, 0x2, 0x208, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000b3a8a4de7f741381000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000100000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff020000000500000000000000000076657468305f746f5f7465616d00000064756d6d79300000000000000000000064756d0004300000000000000000000073797a6b616c6c8279a7e00000000000ffffffffffff000000000000ffffffffffff00000000000000007000000070000000a000000072656469726563740000000000000000000000000000000000000000000000000800000000000000ffffffff000000000b00000000000000000073797a6b616c6c65723100000000000067726574617030000000000000000000766c616e30000000000000000000000064756d6d7930000000000000000000000180c2000000000000000000aaaaaaaaaabb00000000000000007000000070000000a8000000736e6174000000000000000000000000000000000000000000000000000000001000000000000000000000000000ffffffff000000000000"]}, 0x280) 02:37:39 executing program 3: shmat(0x0, &(0x7f0000ffa000/0x3000)=nil, 0x0) mlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x4) 02:37:39 executing program 0: mremap(&(0x7f0000001000/0x1000)=nil, 0x7ffffffff000, 0x1000, 0x0, &(0x7f0000000000/0x1000)=nil) 02:37:39 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000200)=[@in], 0x10) 02:37:39 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000040)={0x2, 0x1, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x40}}, 0x0) sendmsg$key(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) 02:37:40 executing program 3: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='setgroups\x00') exit(0x0) syz_open_procfs(0x0, &(0x7f0000000140)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15t[f\x16\x9dL\xe3\xc9\xf8Q\xf3<\x98\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92\x048\xb2\x02\xf1C\xdf\xa6\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea') 02:37:40 executing program 5: r0 = socket(0xa, 0x40000000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x11?\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x19, 0x2, 0x208, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="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"]}, 0x280) 02:37:40 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)={0x1c, 0x33, 0x119, 0x0, 0x0, {0x3}, [@generic="ffd38d9b", @nested={0x4, 0x8}]}, 0x1c}}, 0x0) 02:37:40 executing program 0: mremap(&(0x7f0000001000/0x1000)=nil, 0x7ffffffff000, 0x1000, 0x0, &(0x7f0000000000/0x1000)=nil) 02:37:40 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000200)=[@in], 0x10) 02:37:40 executing program 5: r0 = socket(0xa, 0x40000000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x11?\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x19, 0x2, 0x208, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="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"]}, 0x280) 02:37:40 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000040)={0x2, 0x1, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x40}}, 0x0) sendmsg$key(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) 02:37:40 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)={0x1c, 0x33, 0x119, 0x0, 0x0, {0x3}, [@generic="ffd38d9b", @nested={0x4, 0x8}]}, 0x1c}}, 0x0) 02:37:40 executing program 0: mremap(&(0x7f0000001000/0x1000)=nil, 0x7ffffffff000, 0x1000, 0x0, &(0x7f0000000000/0x1000)=nil) 02:37:40 executing program 5: r0 = socket(0xa, 0x40000000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x11?\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x19, 0x2, 0x208, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="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"]}, 0x280) 02:37:40 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000040)={0x2, 0x1, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x40}}, 0x0) sendmsg$key(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) 02:37:40 executing program 5: setrlimit(0x7, &(0x7f0000000100)) socket$rxrpc(0x21, 0x2, 0x2) 02:37:40 executing program 4: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000180)='nfs\x00', 0x0, &(0x7f0000000080)='\xdd-ppp0,,vboxnet1-\x00') 02:37:40 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000200)=[@in], 0x10) 02:37:40 executing program 3: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='setgroups\x00') exit(0x0) syz_open_procfs(0x0, &(0x7f0000000140)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15t[f\x16\x9dL\xe3\xc9\xf8Q\xf3<\x98\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92\x048\xb2\x02\xf1C\xdf\xa6\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea') 02:37:40 executing program 0: prlimit64(0x0, 0x7, &(0x7f0000000040)={0x0, 0x3b7fbb63}, 0x0) 02:37:40 executing program 5: setrlimit(0x7, &(0x7f0000000100)) socket$rxrpc(0x21, 0x2, 0x2) 02:37:40 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000040)={0x2, 0x1, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x40}}, 0x0) sendmsg$key(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) 02:37:41 executing program 0: prlimit64(0x0, 0x7, &(0x7f0000000040)={0x0, 0x3b7fbb63}, 0x0) 02:37:41 executing program 5: setrlimit(0x7, &(0x7f0000000100)) socket$rxrpc(0x21, 0x2, 0x2) 02:37:41 executing program 2: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='setgroups\x00') exit(0x0) syz_open_procfs(0x0, &(0x7f0000000140)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15t[f\x16\x9dL\xe3\xc9\xf8Q\xf3<\x98\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92\x048\xb2\x02\xf1C\xdf\xa6\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea') 02:37:41 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000200)=[@in], 0x10) [ 249.597352][T16836] NFS: bad mount option value specified: vboxnet1- 02:37:41 executing program 4: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000180)='nfs\x00', 0x0, &(0x7f0000000080)='\xdd-ppp0,,vboxnet1-\x00') 02:37:41 executing program 0: prlimit64(0x0, 0x7, &(0x7f0000000040)={0x0, 0x3b7fbb63}, 0x0) 02:37:41 executing program 5: setrlimit(0x7, &(0x7f0000000100)) socket$rxrpc(0x21, 0x2, 0x2) 02:37:41 executing program 1: clock_adjtime(0x0, &(0x7f0000001b00)={0x7fffffff}) [ 249.803772][T16857] NFS: bad mount option value specified: vboxnet1- 02:37:41 executing program 3: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='setgroups\x00') exit(0x0) syz_open_procfs(0x0, &(0x7f0000000140)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15t[f\x16\x9dL\xe3\xc9\xf8Q\xf3<\x98\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92\x048\xb2\x02\xf1C\xdf\xa6\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea') 02:37:41 executing program 4: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000180)='nfs\x00', 0x0, &(0x7f0000000080)='\xdd-ppp0,,vboxnet1-\x00') 02:37:41 executing program 5: r0 = io_uring_setup(0x64, &(0x7f0000000140)) io_uring_enter(r0, 0x0, 0x3, 0x1, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x401000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") io_uring_enter(r0, 0x3f00, 0x0, 0x0, 0x0, 0x0) 02:37:41 executing program 0: prlimit64(0x0, 0x7, &(0x7f0000000040)={0x0, 0x3b7fbb63}, 0x0) 02:37:41 executing program 1: clock_adjtime(0x0, &(0x7f0000001b00)={0x7fffffff}) 02:37:41 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000000)="390000001300090069000007a2e407edab0080580900000046008107a277001419000a0010000000000003f5000000000000ef38bf461e59d7", 0x39}], 0x1) 02:37:41 executing program 2: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='setgroups\x00') exit(0x0) syz_open_procfs(0x0, &(0x7f0000000140)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15t[f\x16\x9dL\xe3\xc9\xf8Q\xf3<\x98\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92\x048\xb2\x02\xf1C\xdf\xa6\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea') [ 250.483979][T16874] NFS: bad mount option value specified: vboxnet1- 02:37:41 executing program 1: clock_adjtime(0x0, &(0x7f0000001b00)={0x7fffffff}) 02:37:41 executing program 4: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000180)='nfs\x00', 0x0, &(0x7f0000000080)='\xdd-ppp0,,vboxnet1-\x00') [ 250.612995][T16887] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 250.635364][T16887] team0: Device ip6tnl0 is of different type 02:37:42 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000000)="390000001300090069000007a2e407edab0080580900000046008107a277001419000a0010000000000003f5000000000000ef38bf461e59d7", 0x39}], 0x1) 02:37:42 executing program 1: clock_adjtime(0x0, &(0x7f0000001b00)={0x7fffffff}) [ 250.667263][T16893] NFS: bad mount option value specified: vboxnet1- 02:37:42 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000280)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000100)='S', 0x1, r1) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r0, r0}, &(0x7f0000000600)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crc32c-generic\x00\x14\x00\x00\x00\x00\x00\x00\xc0\x00\x00\x00\x00\x00\xff\xff\xfe\x00\x00\x00@\x00'}}) [ 250.814966][T16901] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 250.855888][T16901] team0: Device ip6tnl0 is of different type 02:37:42 executing program 3: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='setgroups\x00') exit(0x0) syz_open_procfs(0x0, &(0x7f0000000140)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15t[f\x16\x9dL\xe3\xc9\xf8Q\xf3<\x98\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92\x048\xb2\x02\xf1C\xdf\xa6\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea') 02:37:42 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x14, 0x10, 0x701, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) recvmmsg(r0, &(0x7f0000001a00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) recvmmsg(r0, &(0x7f0000004f80)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 02:37:42 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000000)="390000001300090069000007a2e407edab0080580900000046008107a277001419000a0010000000000003f5000000000000ef38bf461e59d7", 0x39}], 0x1) 02:37:42 executing program 5: r0 = io_uring_setup(0x64, &(0x7f0000000140)) io_uring_enter(r0, 0x0, 0x3, 0x1, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x401000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") io_uring_enter(r0, 0x3f00, 0x0, 0x0, 0x0, 0x0) 02:37:42 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000280)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000100)='S', 0x1, r1) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r0, r0}, &(0x7f0000000600)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crc32c-generic\x00\x14\x00\x00\x00\x00\x00\x00\xc0\x00\x00\x00\x00\x00\xff\xff\xfe\x00\x00\x00@\x00'}}) 02:37:42 executing program 2: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='setgroups\x00') exit(0x0) syz_open_procfs(0x0, &(0x7f0000000140)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15t[f\x16\x9dL\xe3\xc9\xf8Q\xf3<\x98\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92\x048\xb2\x02\xf1C\xdf\xa6\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea') [ 251.423234][T16915] netlink: 'syz-executor.0': attribute type 10 has an invalid length. 02:37:42 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000280)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000100)='S', 0x1, r1) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r0, r0}, &(0x7f0000000600)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crc32c-generic\x00\x14\x00\x00\x00\x00\x00\x00\xc0\x00\x00\x00\x00\x00\xff\xff\xfe\x00\x00\x00@\x00'}}) 02:37:42 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x14, 0x10, 0x701, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) recvmmsg(r0, &(0x7f0000001a00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) recvmmsg(r0, &(0x7f0000004f80)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) [ 251.467655][T16915] team0: Device ip6tnl0 is of different type 02:37:42 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000000)="390000001300090069000007a2e407edab0080580900000046008107a277001419000a0010000000000003f5000000000000ef38bf461e59d7", 0x39}], 0x1) 02:37:43 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000280)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000100)='S', 0x1, r1) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r0, r0}, &(0x7f0000000600)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crc32c-generic\x00\x14\x00\x00\x00\x00\x00\x00\xc0\x00\x00\x00\x00\x00\xff\xff\xfe\x00\x00\x00@\x00'}}) 02:37:43 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x14, 0x10, 0x701, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) recvmmsg(r0, &(0x7f0000001a00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) recvmmsg(r0, &(0x7f0000004f80)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) [ 251.610939][T16935] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 251.632677][T16935] team0: Device ip6tnl0 is of different type 02:37:43 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x14, 0x10, 0x701, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) recvmmsg(r0, &(0x7f0000001a00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) recvmmsg(r0, &(0x7f0000004f80)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 02:37:43 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x14, 0x10, 0x701, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) recvmmsg(r0, &(0x7f0000001a00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) recvmmsg(r0, &(0x7f0000004f80)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 02:37:43 executing program 5: r0 = io_uring_setup(0x64, &(0x7f0000000140)) io_uring_enter(r0, 0x0, 0x3, 0x1, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x401000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") io_uring_enter(r0, 0x3f00, 0x0, 0x0, 0x0, 0x0) 02:37:43 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x14, 0x10, 0x701, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) recvmmsg(r0, &(0x7f0000001a00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) recvmmsg(r0, &(0x7f0000004f80)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 02:37:43 executing program 1: r0 = io_uring_setup(0x64, &(0x7f0000000140)) io_uring_enter(r0, 0x0, 0x3, 0x1, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x401000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") io_uring_enter(r0, 0x3f00, 0x0, 0x0, 0x0, 0x0) 02:37:43 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x14, 0x10, 0x701, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) recvmmsg(r0, &(0x7f0000001a00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) recvmmsg(r0, &(0x7f0000004f80)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 02:37:43 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000280)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000100)='S', 0x1, r1) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r0, r0}, &(0x7f0000000600)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crc32c-generic\x00\x14\x00\x00\x00\x00\x00\x00\xc0\x00\x00\x00\x00\x00\xff\xff\xfe\x00\x00\x00@\x00'}}) 02:37:43 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000280)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000100)='S', 0x1, r1) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r0, r0}, &(0x7f0000000600)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crc32c-generic\x00\x14\x00\x00\x00\x00\x00\x00\xc0\x00\x00\x00\x00\x00\xff\xff\xfe\x00\x00\x00@\x00'}}) 02:37:43 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x14, 0x10, 0x701, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) recvmmsg(r0, &(0x7f0000001a00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) recvmmsg(r0, &(0x7f0000004f80)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 02:37:43 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x14, 0x10, 0x701, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) recvmmsg(r0, &(0x7f0000001a00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) recvmmsg(r0, &(0x7f0000004f80)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 02:37:43 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000280)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000100)='S', 0x1, r1) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r0, r0}, &(0x7f0000000600)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crc32c-generic\x00\x14\x00\x00\x00\x00\x00\x00\xc0\x00\x00\x00\x00\x00\xff\xff\xfe\x00\x00\x00@\x00'}}) 02:37:43 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000280)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000100)='S', 0x1, r1) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r0, r0}, &(0x7f0000000600)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crc32c-generic\x00\x14\x00\x00\x00\x00\x00\x00\xc0\x00\x00\x00\x00\x00\xff\xff\xfe\x00\x00\x00@\x00'}}) 02:37:43 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000280)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000100)='S', 0x1, r1) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r0, r0}, &(0x7f0000000600)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crc32c-generic\x00\x14\x00\x00\x00\x00\x00\x00\xc0\x00\x00\x00\x00\x00\xff\xff\xfe\x00\x00\x00@\x00'}}) 02:37:43 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x14, 0x10, 0x701, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) recvmmsg(r0, &(0x7f0000001a00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) recvmmsg(r0, &(0x7f0000004f80)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 02:37:44 executing program 5: r0 = io_uring_setup(0x64, &(0x7f0000000140)) io_uring_enter(r0, 0x0, 0x3, 0x1, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x401000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") io_uring_enter(r0, 0x3f00, 0x0, 0x0, 0x0, 0x0) 02:37:44 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000280)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000100)='S', 0x1, r1) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r0, r0}, &(0x7f0000000600)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crc32c-generic\x00\x14\x00\x00\x00\x00\x00\x00\xc0\x00\x00\x00\x00\x00\xff\xff\xfe\x00\x00\x00@\x00'}}) 02:37:44 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000280)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000100)='S', 0x1, r1) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r0, r0}, &(0x7f0000000600)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crc32c-generic\x00\x14\x00\x00\x00\x00\x00\x00\xc0\x00\x00\x00\x00\x00\xff\xff\xfe\x00\x00\x00@\x00'}}) 02:37:44 executing program 4: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f00000001c0)={0x8}, 0x10) write(r0, &(0x7f0000000080)="240000001a005f0214f9f407000904001100000000010000000000000800040003000000", 0x24) 02:37:44 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000280)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000100)='S', 0x1, r1) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r0, r0}, &(0x7f0000000600)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crc32c-generic\x00\x14\x00\x00\x00\x00\x00\x00\xc0\x00\x00\x00\x00\x00\xff\xff\xfe\x00\x00\x00@\x00'}}) 02:37:44 executing program 1: r0 = io_uring_setup(0x64, &(0x7f0000000140)) io_uring_enter(r0, 0x0, 0x3, 0x1, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x401000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") io_uring_enter(r0, 0x3f00, 0x0, 0x0, 0x0, 0x0) 02:37:44 executing program 3: setreuid(0xffffffffffffffff, 0xee01) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x163, 0x11, 0x38}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 02:37:44 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000280)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000100)='S', 0x1, r1) keyctl$dh_compute(0x17, &(0x7f0000000140)={r2, r0, r0}, &(0x7f0000000600)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f00000001c0)={'crc32c-generic\x00\x14\x00\x00\x00\x00\x00\x00\xc0\x00\x00\x00\x00\x00\xff\xff\xfe\x00\x00\x00@\x00'}}) 02:37:44 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x28, r1, 0x1, 0x0, 0x0, {0x5}, [@TIPC_NLA_BEARER={0x14, 0x1, [@TIPC_NLA_BEARER_NAME={0x4, 0x1, @udp='udp:syz0\x00'}]}]}, 0x28}}, 0x0) 02:37:44 executing program 4: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f00000001c0)={0x8}, 0x10) write(r0, &(0x7f0000000080)="240000001a005f0214f9f407000904001100000000010000000000000800040003000000", 0x24) 02:37:44 executing program 3: setreuid(0xffffffffffffffff, 0xee01) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x163, 0x11, 0x38}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 02:37:44 executing program 0: r0 = socket$rxrpc(0x21, 0x2, 0x2) sendmmsg$sock(r0, &(0x7f0000008300)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000003600)=[@txtime={{0x18, 0x110, 0x2}}], 0x18}}], 0x1, 0x0) 02:37:45 executing program 1: r0 = io_uring_setup(0x64, &(0x7f0000000140)) io_uring_enter(r0, 0x0, 0x3, 0x1, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x401000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") io_uring_enter(r0, 0x3f00, 0x0, 0x0, 0x0, 0x0) 02:37:45 executing program 4: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f00000001c0)={0x8}, 0x10) write(r0, &(0x7f0000000080)="240000001a005f0214f9f407000904001100000000010000000000000800040003000000", 0x24) 02:37:45 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x28, r1, 0x1, 0x0, 0x0, {0x5}, [@TIPC_NLA_BEARER={0x14, 0x1, [@TIPC_NLA_BEARER_NAME={0x4, 0x1, @udp='udp:syz0\x00'}]}]}, 0x28}}, 0x0) 02:37:45 executing program 3: setreuid(0xffffffffffffffff, 0xee01) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x163, 0x11, 0x38}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 02:37:45 executing program 0: r0 = socket$rxrpc(0x21, 0x2, 0x2) sendmmsg$sock(r0, &(0x7f0000008300)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000003600)=[@txtime={{0x18, 0x110, 0x2}}], 0x18}}], 0x1, 0x0) 02:37:45 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = socket(0x10, 0x803, 0x0) sendto(r1, &(0x7f00000000c0)="120000001200e7ef007b2c3ef4afd7030a7c", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000020c0), 0x320, 0x0, &(0x7f0000003700)={0x77359400}) 02:37:45 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x28, r1, 0x1, 0x0, 0x0, {0x5}, [@TIPC_NLA_BEARER={0x14, 0x1, [@TIPC_NLA_BEARER_NAME={0x4, 0x1, @udp='udp:syz0\x00'}]}]}, 0x28}}, 0x0) 02:37:45 executing program 0: r0 = socket$rxrpc(0x21, 0x2, 0x2) sendmmsg$sock(r0, &(0x7f0000008300)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000003600)=[@txtime={{0x18, 0x110, 0x2}}], 0x18}}], 0x1, 0x0) 02:37:45 executing program 4: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f00000001c0)={0x8}, 0x10) write(r0, &(0x7f0000000080)="240000001a005f0214f9f407000904001100000000010000000000000800040003000000", 0x24) 02:37:45 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = socket(0x10, 0x803, 0x0) sendto(r1, &(0x7f00000000c0)="120000001200e7ef007b2c3ef4afd7030a7c", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000020c0), 0x320, 0x0, &(0x7f0000003700)={0x77359400}) 02:37:45 executing program 3: setreuid(0xffffffffffffffff, 0xee01) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x163, 0x11, 0x38}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 02:37:45 executing program 0: r0 = socket$rxrpc(0x21, 0x2, 0x2) sendmmsg$sock(r0, &(0x7f0000008300)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000003600)=[@txtime={{0x18, 0x110, 0x2}}], 0x18}}], 0x1, 0x0) 02:37:46 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x8, 0x66}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x7, 0x1ab, &(0x7f000000cf3d)=""/195}, 0x48) 02:37:46 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = socket(0x10, 0x803, 0x0) sendto(r1, &(0x7f00000000c0)="120000001200e7ef007b2c3ef4afd7030a7c", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000020c0), 0x320, 0x0, &(0x7f0000003700)={0x77359400}) 02:37:46 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = socket(0x10, 0x803, 0x0) sendto(r1, &(0x7f00000000c0)="120000001200e7ef007b2c3ef4afd7030a7c", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000020c0), 0x320, 0x0, &(0x7f0000003700)={0x77359400}) 02:37:46 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x28, r1, 0x1, 0x0, 0x0, {0x5}, [@TIPC_NLA_BEARER={0x14, 0x1, [@TIPC_NLA_BEARER_NAME={0x4, 0x1, @udp='udp:syz0\x00'}]}]}, 0x28}}, 0x0) 02:37:46 executing program 3: sendmsg$netlink(0xffffffffffffffff, &(0x7f0000006a40)={0x0, 0x0, &(0x7f00000048c0)=[{&(0x7f0000000500)={0x1084, 0x0, 0x0, 0x0, 0x0, "", [@nested={0x90, 0x0, [@generic="6f415a91dc70be87a343000bf8262b72bbdef3a7b1551b1e5332e0bed91a1fb757f698f7d8c3069b091e49bff28a47307f368cb44310c572b562c25db941fd68c71295dcd1", @typed={0xc, 0x0, @str='vfat\x00'}, @typed={0x8, 0x0, @pid}, @typed={0xc, 0x0, @u64}, @generic="b3cfb5357e77c23ed03c53055c2e3140758ca4bfe725c72f2a786079f9718280250ea34a"]}, @generic="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"]}, 0x1084}], 0x1}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0xfffffffffffffd4c}], 0x0, 0x0) 02:37:46 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_int(r0, 0x29, 0xcf, 0x0, &(0x7f0000000000)) 02:37:46 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xa, 0x5, 0xb, 0x8000000000000008, 0x0, 0x1}, 0x1f) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0, 0x3f00}, 0x2c) 02:37:46 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = socket(0x10, 0x803, 0x0) sendto(r1, &(0x7f00000000c0)="120000001200e7ef007b2c3ef4afd7030a7c", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000020c0), 0x320, 0x0, &(0x7f0000003700)={0x77359400}) 02:37:46 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = socket(0x10, 0x803, 0x0) sendto(r1, &(0x7f00000000c0)="120000001200e7ef007b2c3ef4afd7030a7c", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000020c0), 0x320, 0x0, &(0x7f0000003700)={0x77359400}) 02:37:46 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_int(r0, 0x29, 0xcf, 0x0, &(0x7f0000000000)) 02:37:46 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x8, 0x66}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x7, 0x1ab, &(0x7f000000cf3d)=""/195}, 0x48) 02:37:46 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xa, 0x5, 0xb, 0x8000000000000008, 0x0, 0x1}, 0x1f) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0, 0x3f00}, 0x2c) 02:37:46 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xa, 0x5, 0xb, 0x8000000000000008, 0x0, 0x1}, 0x1f) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0, 0x3f00}, 0x2c) 02:37:46 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x8, 0x66}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x7, 0x1ab, &(0x7f000000cf3d)=""/195}, 0x48) 02:37:46 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_int(r0, 0x29, 0xcf, 0x0, &(0x7f0000000000)) 02:37:46 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = socket(0x10, 0x803, 0x0) sendto(r1, &(0x7f00000000c0)="120000001200e7ef007b2c3ef4afd7030a7c", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000020c0), 0x320, 0x0, &(0x7f0000003700)={0x77359400}) 02:37:46 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_int(r0, 0x29, 0xcf, 0x0, &(0x7f0000000000)) 02:37:46 executing program 5: socket$vsock_stream(0x28, 0x4, 0x0) 02:37:46 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xa, 0x5, 0xb, 0x8000000000000008, 0x0, 0x1}, 0x1f) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0, 0x3f00}, 0x2c) 02:37:46 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000000100)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x8, 0x66}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x7, 0x1ab, &(0x7f000000cf3d)=""/195}, 0x48) 02:37:46 executing program 3: sendmsg$netlink(0xffffffffffffffff, &(0x7f0000006a40)={0x0, 0x0, &(0x7f00000048c0)=[{&(0x7f0000000500)={0x1084, 0x0, 0x0, 0x0, 0x0, "", [@nested={0x90, 0x0, [@generic="6f415a91dc70be87a343000bf8262b72bbdef3a7b1551b1e5332e0bed91a1fb757f698f7d8c3069b091e49bff28a47307f368cb44310c572b562c25db941fd68c71295dcd1", @typed={0xc, 0x0, @str='vfat\x00'}, @typed={0x8, 0x0, @pid}, @typed={0xc, 0x0, @u64}, @generic="b3cfb5357e77c23ed03c53055c2e3140758ca4bfe725c72f2a786079f9718280250ea34a"]}, @generic="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"]}, 0x1084}], 0x1}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0xfffffffffffffd4c}], 0x0, 0x0) 02:37:46 executing program 4: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000a83000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) 02:37:47 executing program 5: socket$vsock_stream(0x28, 0x4, 0x0) 02:37:47 executing program 4: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000a83000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) 02:37:47 executing program 2: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000a83000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) 02:37:47 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x2, 0x100000000000913, 0x6}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0, 0x2}, 0x2c) 02:37:47 executing program 1: r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000900)={0x41}, 0x10) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000040)={0x41, 0x2}, 0x10) close(r1) 02:37:47 executing program 5: socket$vsock_stream(0x28, 0x4, 0x0) 02:37:47 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x2, 0x100000000000913, 0x6}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0, 0x2}, 0x2c) 02:37:47 executing program 4: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000a83000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) 02:37:47 executing program 2: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000a83000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) 02:37:47 executing program 1: r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000900)={0x41}, 0x10) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000040)={0x41, 0x2}, 0x10) close(r1) 02:37:47 executing program 3: sendmsg$netlink(0xffffffffffffffff, &(0x7f0000006a40)={0x0, 0x0, &(0x7f00000048c0)=[{&(0x7f0000000500)={0x1084, 0x0, 0x0, 0x0, 0x0, "", [@nested={0x90, 0x0, [@generic="6f415a91dc70be87a343000bf8262b72bbdef3a7b1551b1e5332e0bed91a1fb757f698f7d8c3069b091e49bff28a47307f368cb44310c572b562c25db941fd68c71295dcd1", @typed={0xc, 0x0, @str='vfat\x00'}, @typed={0x8, 0x0, @pid}, @typed={0xc, 0x0, @u64}, @generic="b3cfb5357e77c23ed03c53055c2e3140758ca4bfe725c72f2a786079f9718280250ea34a"]}, @generic="10e56154cae85297f10cd791ef0368a39bfe257e9f19866c1238114766209118bb7c8c806f05841f2e416c05bc3e37c938e6629b933d3e5f5d58b0cbca6fe3ce7127550e17a70c4aa411f13e33da0e739323aa16a6ce98a985a9472f0c6f089105df8ab57d2fd6645d61edaebad95a9f2c7c7ef5da7ec1416a67752077264e8bc9e0219197e1d7ebd666ff25d2fba398801f6d9291bcaf38b9de21ec78fdee6478da4f7b02d663e285dabb1b33cf318be3f96c8baf640a5aae4a734f03fc979ab9bb0ad6e24107c851a4552400e0d4a21cc0a95e545527e23208708a21af9390ddb29e48fa7b400fdb8175791c647f8769e22889389c0fa749233b162b7beb0f699111de4a6afde7470df1b5662b0392665380deb5ac42d22ef75913ae01879a68ee2de490dad48e0be4e5b66f85835ba1deefe064391814f1cc7f0ce0b309eba2cb5d322ed80a80da7f75c4a38bdbf94461cd695823e9b16ef92734a235d6e72f9aa7b2b9e58c04cfcfe602dbaf21b3107170ab841022c22032bcb0b3ba3f9a253dfbe25c8487266e9d52cdea39b15487a779ec85f091ec133c182aa9b87a5c992a019cf0e086275b61d8ee857bcc6a2deb08fc95222da38f44fa442b9abf798fa220ec469d0955ffffb1ba7f678f91c76bc281eec1a06c93fc3d967293574266894d604a50a1e6f1be17e54c525ccd53b2dac170ad4bf64459f938b7eca0d28dc61059caae29b4663048024656f44b896202935e6f78a13173e7a6174d69d1931352bae644ac6a83defee8efe7e7a040d825a28996980d449275020577b9d9cee706c67d552078f14eb6fd8f280a0420af76fefb48b22e996660a44eae06ebdfa6b59852abbbdabd468b16380ad872e6541946cc3f519e3de1174d226cc7dc309df1dfb1092f50038c3878efeb83788087d88f1f9ae4e57e1f681c3ccd07227cddb69194913b36fd057b4b04b72c0e7f4440a76a898a0cd0a290e45e8e0dd149b7a1852b6b878b057df3b41e863aebf60d97fb6b08de73bd741f29e0cdf25871e9fd5a63c5ac77d293210f91152bd761d41cde1cf9885bc512ab90e23bb7d4a7a22edc98d38fd0d000752c08e87784ccf951c0bdd409d7fed9804bffdef0ae069438e4d56637c9458798e886ecef86913d71a7100d26de73f36820978277c552df201f1ecaa6748eba0b916684fe23bbf6713f638cfd6a9b2d64e1797a377496318dc068f92ff93c8a1bc6d052406d3f60846b45947de9d2165a3a17bfa441601339a921a0cd5d82239786d3a6c768bb1f7d5619c91d201d8399182cf8d72643deba06682a1abe64f3e30ca718c74c8449470fb47d43a92f243a1d81db9f5ba826f6fa8cf78d5adbb7a56b9380411e43ba6326964d2da7bdc12ea66e5d205f29f2f0f480f22e4c110f420a6291217a00ead6824af4b2c0b3ebbdcbc80c72c50262710cbfa320e3bc9e01310baea5e4c0af9ec3ffc5771f15ca45a0c6c7620726ece6985dc72908d7af93ffb38f6fb819c91626a575d2cbc5831e0a7cde2e5610de9dbbf7b2f4179d8ad9b572f450cb772da191cc69c1ebce87f2c37d06578be9cc503bed8c40639be430ab386dc5c1d698c5ec30e19a616d243033133923d480911b6baff1ff01c8d0fe4921ff60e51986b6c33fb9ad12eff8259cfd8c7f9650c1e6fbac3a420f6fd480294036fdf7d5b9dcb64e1a59b424c59732baae04a7f33ae199ba705700f0bb3b7327594d86b0c26cc239de95cb3bf304c7d85b5d71bb359a1430c69e3134f53a1d92f2d6a1e70181108f64d7ad6b7a2c7fd869b49e58b77b6a14862bafc52e37c283f51af109430adb964aaff1864d8260bf1980ef9c6135ca2f87517c9c087e642600b35915bee751a13b3be77df6d974cda5e8e0a116237aec51eca55ee793af20a8b68f2a2cbdbab5800dba2a491abbf029c8f76ea50939655c3a91ec43b4fbabf58a23853b8c0e0ff6643f3c1b2f3089281bcc560f7c9b5368aae0e8060db71f03c0b511f2392b78d6d072f531f196cb99c4b2c43aa5d58ee62d3cccfb898b21fcaf3b8cc1004987a9a5de3dd3b5faa378aa9329637a45af7d13953e408b6785fa1b430777a5262e38592a164af55232cc9aae9aea6b8d63073b18eed379d86d9fc41891398bb4dd4de7bcb4ce0e66166918197fa108e93baa233ca04f86d4979fb638e79fc630e757305bd4004cb89d2351c317ff3d97d323a48ba92bb916e00038c3aaff88cc175c2e0f3ecaafecc2475fdc4b06b26744cf884cf6bf013b06ee20e8ca77996e6e9e12a0911cb25cbc926db8f29b397d5dd664c9582b7a266a960e89a70d6909ffdc7c4f5c31e47ac30efcb10f6bd3ead539ff3befd01be3bff8e135956c36221026337063061089964d59d094afae31dd6ced6efdcee6638b1b643bdf65cb723e4fd1fbc4bfbe079279889807ddfceed6c70c40c26d7fee67693a812cee50aa2649df81ba6f749fa1a9ce9cd522e254182d3922fb1594165193b2b33450adab4611192b1013707764ed3514d9773438ee205d569035f74e9d1360eed35c575603955e4802388240829b47a972c93881a13f58201610737312eaa9018584c2767668eee07eaef391713d72f3f94413b892b68d630478e841df98e846decc1742cc1c7df3c6233fd9a5ba8d78a046e2aef49a4ed8cfc8de3651d78476fbfd77cfc70dc7ea17da8b3940ea86aaebddd7989050591857da950a7b76671270f7bd742510207d32c844e889a8d8824bb9e62274fdcc9258f6b631314cdd84fc526963b1ea2618b81889d68d5413d2e1e99f30cf78e1bd3e78ba6afc1d9c0dd394eb0be43b06485cf29e081783359091a889a312d129c787c72793a2615fe08f0e4e5b2ae9a02f53ecac5fb0154577edd9253b91734de6269a9f92731328c2d5dac1bce193fe9a29462f9bc648a789514da206d4172b9c888da0083b9ede4e2118f067bafa696f6b0b62a640ac9943ebf111267eb181ddb3f88661313655032d85f8f1067972423212dffeaaf7b268e8e6b652ecef591d434df7d6795bf374186677ca0624f523d81b817b59a29a9b7638944af36c997116d0f16c3a78ae30a973aaeff5bf5f98e306c75852db53b218235f0144ae5d163d33034ad7a990a3fae52755c1869e5dae0b5373c49f05d02035cfc73a15b47f44323ff36c9bddbbe04af29e0d4bc83def22f37d78f9ceac78a77ec144e476f51877d55d00f8b8cbfdc7cb9ac946428cce9851bde1fb32f3903d3f2bc818589dfd3950377b145125dcb94c648b636f12a5e4a1310bfcab2f9fd2c99884eed4c008a934960400cad378a2f8c950b399e50cfc2d42b20a3ab471046c0995f41d6485ff22b439f260cd94999c583797dd92f0236fea4e674a2f7b62bde71163d002772a617c110be685c53f3dbae74a375b56c68e7972c005653e51e818095e440b334b8f936602a4202039af0ab3e24c171f096263a9ac6ca774bd2b3ca583226411cb48a6f03b22327f2f652b1ec1a1243a7c0da805642231eadd931bef0f5e6d268c41a44a481501cd970597d50200cc59d06c7fdef346c899b7e382ef67631f17852d6ff4e00b3fa4351ca4d26561a9be5d5f5e05d97b0484e3ea3f9895d99b8385c9830abe7f2e45f9a1f116ef3110b68710dd8b8ee7320e7ce91bdd6c20ad8a5f4f9e4fa7097fc48adeadd38b3730b2a6b14b1939915b7c02460a9b797b20ad3390cfa411eacac2bf5f97f335237051315fd2c97e694ea7b9d52ecc857d032d8fb5e3fe7629200a3c1e9f7b10fefa48a6c528c5b99538d2684511d213e7c0e9f7cec917510f267e2fb8a21373cdb01795f1cf40ff459011315f2dbc35bfff0fa56a9399feaf992c6daf32b618c55577f0c9f39ea3a30a183682511b77dfe57131528704f8d93a9761a7993fe5323689a7089a47e5e48c3a62e2f8036e73169c4b3ca6f78d23ef3c43a6d8414fff4726dfdd7f4a47932462033760522f7b9eddc1a83708967c76e9ab39abc537f387a6d6f88e22108f9f6415c1dc07cb6e7543f57a7d79694ac77c001af766a5a90fd07edcc8981e548226424c23914a8050a78804b243d1058e23479d0f51dd064ab8fef171cbd6057b0702eb28b04bd320aaa169dae71ba34608f31e60913b9723e8cec1c0dfaaa6c8f3d3d5a28d4fd006a37d3dca298f8c0edaca3195c56bf8f3bd163981d35205802bea384d9630d852af3a4a2ac2a1cdd929ae8997c599c7af237f90b9fae42e2afbea54c195861b3c80d96ddbfe8428694a56f06a9b52d336acffabc4470a5e188b7f7ab0f884f06582183b6f9ceb0504c5e96c96da50869320ffaee552633498ad68804c5b64b411136f85cebb6d7a1353c72f5522f453b61aeb6aad9b2ac766537dc729bb23a41914e77b43d638115c3769ad97de0797c845af755970bf32e37f5f820a5ecac5c194feedd0a8a35df8b743e71e88f3f43fad07e7098bbfd689720e8636a52a788ad08282fc2f4a054b75a9f30117e15c8aa7ba7ff569cf4db2c3f20efbccb2e92282376d1068e8296a53d180a92dc47f83ad54c85603baea081120d5cc0f418ba6274de6dd92be1cc7408a822c83b9a129840e0c13a92cef7493ffdd561d439df43fd9638e2f230538671989cfd1938064e24501339493bcfbd18f68c37d8312bd2d7bc8c3155730dc4744228e24c63407fb73e87b6fe27c1736251729cb994f96398b9248e402fd61055c9a376421b92b01dd6223715f779249d6194acd02dac5e76c726fa575655fc8fa17060eee5a2ec11c82c228bac44bbe1a62b005511e341381566de693af6e272538c4595e12eca0727e37183cc7bffcefa33a4e0491d100553fefa00835bf35abb94c6d99b11f61c910a40cbeea69603685facc85569f7f2237f85fb397cab2dde975a176c2b9a05f00052ebd6b50ada0f412f4ae14270bb1060c2809490e50ae3027aa168b44a418beb1b4973a24ca2bb3327756da4bcaeee8f42f4d73f767b15f6f91b56685c301994338d6ecf80b3dbc161fa19a23e1200f2bc221a296c503252d2e7676cfd466fc9c151bd85cc78091b8bffc19e441459eab1c3cbca6c5c0bcdcc293497316c9448d2c122df84b5a1d30be805e3a046fb960a899c8c2e93a40b49ca13886c49231ba79048df0df43ab0f8bff53dc47fd8b1fae2dbf8a352bb03c018ce43f33c267a9d11b2c5cd6a77294280d6f255b254039a5924f1b862b45c62ea2baabbc6b03da1a686e883dfcd4757012b3c607dc0ce6dd1e1b22d30ecd6402644d9c4ff57ba8b89197162a35e84840663756b78e2fa8a98bb5239394be7c05e8edc22ff3bb92cbfe92bb1cd6e5d65123a05bc62614eefcb9e2afcebe2cca14d3e0820649e452c37cff36e976ad2c217ad7e9bd3111022c624040c98ce6e9db9e254778a97613e5ad2ab3b79bcf356fb91c9d1dba448e5b32e318e749ac147260259ef24e5947d70cb050a5a316d9205f88894c795874b1324a9512d42aeec33fe4417f06a24ef464959a5151fdbe37af5e65018d554711aae0d43401d1cfd5c0064f502f79fa012a45f5af4c547cd650221ecac60a4babce7c31b971dfd7b5e2397102bd49b1981d2599f29f7512c80967a1182fdaa94f7fc737825403e363ca4075e2899f34a1a169d93c35bed3b52198611da562623c67ffbe3c62f941a65252d7c836c548e5714ab21237ce0c8097baee186ee25b9a00bec866d623526f03420125d6cb21ade62343e5"]}, 0x1084}], 0x1}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0xfffffffffffffd4c}], 0x0, 0x0) 02:37:47 executing program 5: socket$vsock_stream(0x28, 0x4, 0x0) 02:37:47 executing program 4: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000a83000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) 02:37:47 executing program 2: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000a83000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) 02:37:47 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x2, 0x100000000000913, 0x6}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0, 0x2}, 0x2c) 02:37:47 executing program 1: r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000900)={0x41}, 0x10) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000040)={0x41, 0x2}, 0x10) close(r1) 02:37:47 executing program 5: r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000900)={0x41}, 0x10) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000040)={0x41, 0x2}, 0x10) close(r1) 02:37:47 executing program 1: r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000900)={0x41}, 0x10) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000040)={0x41, 0x2}, 0x10) close(r1) 02:37:47 executing program 4: r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000900)={0x41}, 0x10) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000040)={0x41, 0x2}, 0x10) close(r1) 02:37:47 executing program 5: r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000900)={0x41}, 0x10) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000040)={0x41, 0x2}, 0x10) close(r1) 02:37:47 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x2, 0x100000000000913, 0x6}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0, 0x2}, 0x2c) 02:37:47 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000180)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) 02:37:48 executing program 3: sendmsg$netlink(0xffffffffffffffff, &(0x7f0000006a40)={0x0, 0x0, &(0x7f00000048c0)=[{&(0x7f0000000500)={0x1084, 0x0, 0x0, 0x0, 0x0, "", [@nested={0x90, 0x0, [@generic="6f415a91dc70be87a343000bf8262b72bbdef3a7b1551b1e5332e0bed91a1fb757f698f7d8c3069b091e49bff28a47307f368cb44310c572b562c25db941fd68c71295dcd1", @typed={0xc, 0x0, @str='vfat\x00'}, @typed={0x8, 0x0, @pid}, @typed={0xc, 0x0, @u64}, @generic="b3cfb5357e77c23ed03c53055c2e3140758ca4bfe725c72f2a786079f9718280250ea34a"]}, @generic="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"]}, 0x1084}], 0x1}, 0x0) syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0xfffffffffffffd4c}], 0x0, 0x0) 02:37:48 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xe, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x54}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 02:37:48 executing program 5: r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000900)={0x41}, 0x10) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000040)={0x41, 0x2}, 0x10) close(r1) 02:37:48 executing program 4: r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000900)={0x41}, 0x10) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000040)={0x41, 0x2}, 0x10) close(r1) 02:37:48 executing program 0: userfaultfd(0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, 0x0) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, 0x0) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x6d, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) mmap(&(0x7f0000000000/0x22000)=nil, 0x22000, 0x0, 0x10, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) 02:37:48 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000180)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) 02:37:48 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, r0, 0x0, r0, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r0, 0x6609, 0x0) 02:37:48 executing program 4: r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000900)={0x41}, 0x10) r1 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000040)={0x41, 0x2}, 0x10) close(r1) 02:37:48 executing program 0: userfaultfd(0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, 0x0) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, 0x0) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x6d, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) mmap(&(0x7f0000000000/0x22000)=nil, 0x22000, 0x0, 0x10, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) 02:37:48 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000180)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) 02:37:48 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xe, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x54}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 02:37:48 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x88}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 02:37:48 executing program 0: userfaultfd(0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, 0x0) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, 0x0) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x6d, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) mmap(&(0x7f0000000000/0x22000)=nil, 0x22000, 0x0, 0x10, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) 02:37:48 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, r0, 0x0, r0, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r0, 0x6609, 0x0) 02:37:48 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xe, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x54}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 02:37:48 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x88}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 02:37:48 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000180)='./file0\x00', 0x0, 0x1004, 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',lowerdir=.:file0']) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) 02:37:48 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, r0, 0x0, r0, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r0, 0x6609, 0x0) 02:37:48 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xe, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x54}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 02:37:48 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x88}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 02:37:48 executing program 0: userfaultfd(0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, 0x0) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, 0x0) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x6d, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0x8) mmap(&(0x7f0000000000/0x22000)=nil, 0x22000, 0x0, 0x10, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) 02:37:48 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, r0, 0x0, r0, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r0, 0x6609, 0x0) 02:37:48 executing program 2: syz_mount_image$msdos(&(0x7f0000000140)='msdos\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@fat=@sys_immutable='sys_immutable'}]}) 02:37:48 executing program 0: fsetxattr(0xffffffffffffffff, &(0x7f00000001c0)=@random={'security.', ')@])\x00'}, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000280)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040010080002e360e59acaa4f37be5a0000ffff53ef", 0x261, 0x400}], 0x2, 0x0) 02:37:49 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x88}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 02:37:49 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, r0, 0x0, r0, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r0, 0x6609, 0x0) 02:37:49 executing program 1: syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) syz_open_dev$vbi(0x0, 0xffffffffffffffff, 0x2) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0x0, {0x2804}, [@nested={0x8, 0x11, [@generic="802f"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) [ 257.597278][T17258] FAT-fs (loop2): bogus number of reserved sectors 02:37:49 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, r0, 0x0, r0, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r0, 0x6609, 0x0) [ 257.716248][T17258] FAT-fs (loop2): Can't find a valid FAT filesystem 02:37:49 executing program 0: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) msync(&(0x7f000091c000/0x3000)=nil, 0x3000, 0x0) 02:37:49 executing program 0: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) msync(&(0x7f000091c000/0x3000)=nil, 0x3000, 0x0) 02:37:49 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000044, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) [ 257.849414][T17258] FAT-fs (loop2): bogus number of reserved sectors 02:37:49 executing program 5: keyctl$set_reqkey_keyring(0xe, 0x7) keyctl$join(0x1, 0x0) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 02:37:49 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, r0, 0x0, r0, 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0x10000000d) ioctl$TUNSETFILTEREBPF(r0, 0x6609, 0x0) [ 257.891245][T17258] FAT-fs (loop2): Can't find a valid FAT filesystem [ 257.980701][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 02:37:49 executing program 2: syz_mount_image$msdos(&(0x7f0000000140)='msdos\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@fat=@sys_immutable='sys_immutable'}]}) 02:37:49 executing program 0: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) msync(&(0x7f000091c000/0x3000)=nil, 0x3000, 0x0) [ 258.041810][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 02:37:49 executing program 5: keyctl$set_reqkey_keyring(0xe, 0x7) keyctl$join(0x1, 0x0) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 02:37:49 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000044, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 02:37:49 executing program 3: keyctl$set_reqkey_keyring(0xe, 0x7) keyctl$join(0x1, 0x0) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) [ 258.204327][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 258.216049][T17298] FAT-fs (loop2): bogus number of reserved sectors [ 258.257831][T17298] FAT-fs (loop2): Can't find a valid FAT filesystem [ 258.450769][T17267] sysfs: cannot create duplicate filename '/class/ieee80211/€!' [ 258.460192][T17267] CPU: 0 PID: 17267 Comm: syz-executor.1 Not tainted 5.2.0+ #24 [ 258.467928][T17267] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 258.479057][T17267] Call Trace: [ 258.482487][T17267] dump_stack+0x1d8/0x2f8 [ 258.486862][T17267] sysfs_warn_dup+0x9c/0xb0 [ 258.491386][T17267] sysfs_do_create_link_sd+0xc2/0x110 [ 258.496770][T17267] sysfs_create_link+0x68/0x80 [ 258.501569][T17267] device_add+0xa32/0x1570 [ 258.505997][T17267] ? __kmalloc+0x23e/0x300 [ 258.510447][T17267] ? netlink_rcv_skb+0x1f0/0x460 [ 258.515366][T17267] ? netlink_sendmsg+0xa7a/0xd40 [ 258.520356][T17267] ? __x64_sys_sendmsg+0x1cf/0x290 [ 258.525696][T17267] ? do_syscall_64+0xfe/0x140 [ 258.530487][T17267] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 258.536686][T17267] ? dev_set_name+0x110/0x110 [ 258.541404][T17267] ? ieee80211_set_bitrate_flags+0x72f/0x740 [ 258.547438][T17267] wiphy_register+0x1c2e/0x2b90 [ 258.553325][T17267] ? cfg80211_event_work+0x30/0x30 [ 258.558468][T17267] ? ieee80211_register_hw+0x12d4/0x3a70 [ 258.564136][T17267] ? rcu_read_lock_sched_held+0x127/0x1c0 [ 258.569864][T17267] ? trace_kmalloc+0xcd/0x130 [ 258.581701][T17267] ? ieee80211_register_hw+0x12d4/0x3a70 [ 258.587423][T17267] ? ieee80211_cs_list_valid+0x280/0x2d0 [ 258.593320][T17267] ? ieee80211_register_hw+0x12d4/0x3a70 [ 258.598978][T17267] ieee80211_register_hw+0x1da0/0x3a70 [ 258.604934][T17267] ? ieee80211_tasklet_handler+0x1e0/0x1e0 [ 258.610735][T17267] ? rcu_read_lock_sched_held+0x127/0x1c0 [ 258.616439][T17267] ? memset+0x31/0x40 [ 258.620471][T17267] ? hrtimer_init+0x11d/0x1d0 [ 258.625312][T17267] mac80211_hwsim_new_radio+0x1bb1/0x3640 [ 258.631132][T17267] hwsim_new_radio_nl+0xb62/0x1070 [ 258.636278][T17267] ? __nla_validate+0x50/0x50 [ 258.640941][T17267] ? hwsim_tx_info_frame_received_nl+0xf70/0xf70 [ 258.647252][T17267] genl_rcv_msg+0xe7a/0x1330 [ 258.651941][T17267] ? genl_unbind+0x2b0/0x2b0 [ 258.656570][T17267] ? trace_lock_acquire+0x190/0x190 [ 258.661760][T17267] netlink_rcv_skb+0x1f0/0x460 [ 258.666541][T17267] ? genl_unbind+0x2b0/0x2b0 [ 258.672243][T17267] ? netlink_ack+0xa80/0xa80 [ 258.677019][T17267] ? genl_rcv+0x19/0x40 [ 258.681165][T17267] genl_rcv+0x28/0x40 [ 258.685141][T17267] netlink_unicast+0x809/0x990 [ 258.689895][T17267] ? netlink_detachskb+0x50/0x50 [ 258.695336][T17267] ? __phys_addr_symbol+0x2f/0x70 [ 258.701006][T17267] ? __check_object_size+0x314/0x400 [ 258.706627][T17267] ? security_netlink_send+0x94/0xb0 [ 258.711970][T17267] netlink_sendmsg+0xa7a/0xd40 [ 258.717266][T17267] ? netlink_getsockopt+0x9f0/0x9f0 [ 258.722520][T17267] ? tomoyo_socket_sendmsg+0x25/0x30 [ 258.727995][T17267] ? security_socket_sendmsg+0xa0/0xd0 [ 258.733443][T17267] ? netlink_getsockopt+0x9f0/0x9f0 [ 258.738644][T17267] ___sys_sendmsg+0x66b/0x9a0 [ 258.743319][T17267] ? __sys_sendmsg+0x250/0x250 [ 258.748078][T17267] ? __lock_acquire+0x1ce0/0x1ce0 [ 258.753517][T17267] ? check_preemption_disabled+0x47/0x2a0 [ 258.759272][T17267] ? rcu_lock_release+0x26/0x30 [ 258.764107][T17267] ? __fget+0x4fe/0x540 [ 258.768342][T17267] ? __might_fault+0xd2/0x160 [ 258.773003][T17267] ? fget_many+0x30/0x30 [ 258.777234][T17267] ? kasan_check_read+0x11/0x20 [ 258.782111][T17267] ? _copy_to_user+0xca/0xf0 [ 258.786705][T17267] ? __fdget+0x17c/0x200 [ 258.791210][T17267] __x64_sys_sendmsg+0x1cf/0x290 [ 258.796142][T17267] ? ___sys_sendmsg+0x9a0/0x9a0 [ 258.801068][T17267] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 258.806776][T17267] ? do_syscall_64+0x1d/0x140 [ 258.811448][T17267] do_syscall_64+0xfe/0x140 [ 258.815931][T17267] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 258.821802][T17267] RIP: 0033:0x459819 [ 258.825763][T17267] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 02:37:50 executing program 1: syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) syz_open_dev$vbi(0x0, 0xffffffffffffffff, 0x2) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0x0, {0x2804}, [@nested={0x8, 0x11, [@generic="802f"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) 02:37:50 executing program 0: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) msync(&(0x7f000091c000/0x3000)=nil, 0x3000, 0x0) 02:37:50 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000044, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) 02:37:50 executing program 5: keyctl$set_reqkey_keyring(0xe, 0x7) keyctl$join(0x1, 0x0) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 02:37:50 executing program 3: keyctl$set_reqkey_keyring(0xe, 0x7) keyctl$join(0x1, 0x0) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 02:37:50 executing program 2: syz_mount_image$msdos(&(0x7f0000000140)='msdos\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@fat=@sys_immutable='sys_immutable'}]}) [ 258.845835][T17267] RSP: 002b:00007efe730c7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 258.854621][T17267] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459819 [ 258.862598][T17267] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000004 [ 258.870571][T17267] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 258.878526][T17267] R10: 0000000000000000 R11: 0000000000000246 R12: 00007efe730c86d4 [ 258.886505][T17267] R13: 00000000004c757d R14: 00000000004dcac8 R15: 00000000ffffffff 02:37:50 executing program 5: keyctl$set_reqkey_keyring(0xe, 0x7) keyctl$join(0x1, 0x0) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 02:37:50 executing program 3: keyctl$set_reqkey_keyring(0xe, 0x7) keyctl$join(0x1, 0x0) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) [ 258.971367][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 258.988392][T17328] FAT-fs (loop2): bogus number of reserved sectors [ 258.999034][T17328] FAT-fs (loop2): Can't find a valid FAT filesystem 02:37:50 executing program 0: getxattr(0x0, 0x0, 0x0, 0x0) 02:37:50 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000044, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) [ 259.114146][T17333] sysfs: cannot create duplicate filename '/class/ieee80211/€!' [ 259.161516][T17333] CPU: 0 PID: 17333 Comm: syz-executor.1 Not tainted 5.2.0+ #24 [ 259.169287][T17333] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 259.172786][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 259.179881][T17333] Call Trace: [ 259.179912][T17333] dump_stack+0x1d8/0x2f8 [ 259.179939][T17333] sysfs_warn_dup+0x9c/0xb0 [ 259.203459][T17333] sysfs_do_create_link_sd+0xc2/0x110 02:37:50 executing program 0: getxattr(0x0, 0x0, 0x0, 0x0) [ 259.208849][T17333] sysfs_create_link+0x68/0x80 [ 259.213625][T17333] device_add+0xa32/0x1570 [ 259.218727][T17333] ? retint_kernel+0x2b/0x2b [ 259.223340][T17333] ? dev_set_name+0x110/0x110 [ 259.228024][T17333] ? ieee80211_set_bitrate_flags+0x50a/0x740 [ 259.236967][T17333] ? rtnl_lock+0x9/0x20 [ 259.241241][T17333] wiphy_register+0x1c2e/0x2b90 [ 259.246746][T17333] ? cfg80211_event_work+0x30/0x30 [ 259.251903][T17333] ? retint_kernel+0x2b/0x2b 02:37:50 executing program 0: getxattr(0x0, 0x0, 0x0, 0x0) [ 259.256780][T17333] ? ieee80211_register_hw+0x1a8d/0x3a70 [ 259.262432][T17333] ? ieee80211_register_hw+0x1b46/0x3a70 [ 259.268093][T17333] ieee80211_register_hw+0x1da0/0x3a70 [ 259.275226][T17333] ? ieee80211_tasklet_handler+0x1e0/0x1e0 [ 259.281763][T17333] ? retint_kernel+0x2b/0x2b [ 259.286372][T17333] ? hrtimer_init+0xe5/0x1d0 [ 259.290993][T17333] mac80211_hwsim_new_radio+0x1bb1/0x3640 [ 259.297009][T17333] hwsim_new_radio_nl+0xb62/0x1070 [ 259.302147][T17333] ? __nla_validate+0x50/0x50 [ 259.308048][T17333] ? hwsim_tx_info_frame_received_nl+0xf70/0xf70 [ 259.314390][T17333] ? check_preemption_disabled+0xa9/0x2a0 [ 259.320140][T17333] genl_rcv_msg+0xe7a/0x1330 [ 259.325034][T17333] ? check_preemption_disabled+0x3a/0x2a0 [ 259.330857][T17333] ? genl_unbind+0x2b0/0x2b0 [ 259.335628][T17333] ? finish_task_switch+0x251/0x550 [ 259.335657][T17333] ? __schedule+0x65d/0x9e0 [ 259.335679][T17333] netlink_rcv_skb+0x1f0/0x460 [ 259.335691][T17333] ? genl_unbind+0x2b0/0x2b0 [ 259.350343][T17333] ? netlink_ack+0xa80/0xa80 [ 259.350363][T17333] ? __down_read+0x192/0x3d0 [ 259.350377][T17333] ? genl_unbind+0x2b0/0x2b0 [ 259.359633][T17333] genl_rcv+0x28/0x40 [ 259.359648][T17333] netlink_unicast+0x809/0x990 [ 259.359666][T17333] ? netlink_detachskb+0x50/0x50 [ 259.382434][T17333] ? __phys_addr_symbol+0x2f/0x70 [ 259.387459][T17333] ? __check_object_size+0x314/0x400 [ 259.392755][T17333] ? security_netlink_send+0x94/0xb0 [ 259.398038][T17333] netlink_sendmsg+0xa7a/0xd40 [ 259.402801][T17333] ? netlink_getsockopt+0x9f0/0x9f0 [ 259.407987][T17333] ? tomoyo_socket_sendmsg+0x25/0x30 [ 259.413281][T17333] ? security_socket_sendmsg+0xa0/0xd0 [ 259.418817][T17333] ? netlink_getsockopt+0x9f0/0x9f0 [ 259.424208][T17333] ___sys_sendmsg+0x66b/0x9a0 [ 259.438436][T17333] ? __sys_sendmsg+0x250/0x250 [ 259.449491][T17333] ? __lock_acquire+0x1ce0/0x1ce0 [ 259.459063][T17333] ? rcu_read_unlock_special+0x24b/0x570 [ 259.464887][T17333] ? check_preemption_disabled+0x47/0x2a0 [ 259.470623][T17333] ? rcu_lock_release+0x26/0x30 [ 259.476926][T17333] ? __fget+0x4fe/0x540 [ 259.481085][T17333] ? __might_fault+0xd2/0x160 [ 259.485768][T17333] ? fget_many+0x30/0x30 [ 259.490088][T17333] ? kasan_check_read+0x11/0x20 [ 259.494921][T17333] ? _copy_to_user+0xca/0xf0 [ 259.499496][T17333] ? __fdget+0x17c/0x200 [ 259.503725][T17333] __x64_sys_sendmsg+0x1cf/0x290 [ 259.508890][T17333] ? ___sys_sendmsg+0x9a0/0x9a0 [ 259.513818][T17333] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 259.519547][T17333] ? do_syscall_64+0x1d/0x140 [ 259.524207][T17333] do_syscall_64+0xfe/0x140 [ 259.528724][T17333] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 259.534612][T17333] RIP: 0033:0x459819 [ 259.538512][T17333] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 259.558101][T17333] RSP: 002b:00007efe730c7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 259.566492][T17333] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459819 [ 259.574443][T17333] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000004 [ 259.582402][T17333] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 259.590557][T17333] R10: 0000000000000000 R11: 0000000000000246 R12: 00007efe730c86d4 [ 259.598516][T17333] R13: 00000000004c757d R14: 00000000004dcac8 R15: 00000000ffffffff 02:37:51 executing program 1: syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) syz_open_dev$vbi(0x0, 0xffffffffffffffff, 0x2) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0x0, {0x2804}, [@nested={0x8, 0x11, [@generic="802f"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) 02:37:51 executing program 0: getxattr(0x0, 0x0, 0x0, 0x0) 02:37:51 executing program 2: syz_mount_image$msdos(&(0x7f0000000140)='msdos\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@fat=@sys_immutable='sys_immutable'}]}) 02:37:51 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x0) bind(r0, &(0x7f0000000780)=@generic={0x11, "f5e2155f6a12e5e874e57a82c2b7d1fcfefc9c11f0070e77b51d1e263d0ce4f9019a034f6b01ddce7b7d06006abcdec61c0cd833092b3b3a9bea06910d3439f81bb339b1cb35a34b7d49b2f1c3f0648143001c2edda5482e5c191a4250bc4b6e69d141908d13bd576a77b954734d35eac137fcc1db40a8dbacccb6b011d5"}, 0x80) 02:37:51 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") r1 = socket$inet(0x10, 0x20000000000002, 0x0) sendmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="24000000130007021dfffd946f610500070000001f00000000000400080009000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:51 executing program 5: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x4003ff) fallocate(r0, 0x3, 0x8004, 0x20007ffc) fallocate(r0, 0x3, 0x5e89, 0xfff9) [ 259.765992][T17360] FAT-fs (loop2): bogus number of reserved sectors [ 259.788571][T17363] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 259.809790][T17360] FAT-fs (loop2): Can't find a valid FAT filesystem 02:37:51 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x3, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x1020, 0x0) 02:37:51 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x0) bind(r0, &(0x7f0000000780)=@generic={0x11, "f5e2155f6a12e5e874e57a82c2b7d1fcfefc9c11f0070e77b51d1e263d0ce4f9019a034f6b01ddce7b7d06006abcdec61c0cd833092b3b3a9bea06910d3439f81bb339b1cb35a34b7d49b2f1c3f0648143001c2edda5482e5c191a4250bc4b6e69d141908d13bd576a77b954734d35eac137fcc1db40a8dbacccb6b011d5"}, 0x80) 02:37:51 executing program 5: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x4003ff) fallocate(r0, 0x3, 0x8004, 0x20007ffc) fallocate(r0, 0x3, 0x5e89, 0xfff9) 02:37:51 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x0) bind(r0, &(0x7f0000000780)=@generic={0x11, "f5e2155f6a12e5e874e57a82c2b7d1fcfefc9c11f0070e77b51d1e263d0ce4f9019a034f6b01ddce7b7d06006abcdec61c0cd833092b3b3a9bea06910d3439f81bb339b1cb35a34b7d49b2f1c3f0648143001c2edda5482e5c191a4250bc4b6e69d141908d13bd576a77b954734d35eac137fcc1db40a8dbacccb6b011d5"}, 0x80) 02:37:51 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x3, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x1020, 0x0) 02:37:51 executing program 5: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x4003ff) fallocate(r0, 0x3, 0x8004, 0x20007ffc) fallocate(r0, 0x3, 0x5e89, 0xfff9) [ 260.264068][T17371] sysfs: cannot create duplicate filename '/class/ieee80211/€!' [ 260.273035][T17371] CPU: 0 PID: 17371 Comm: syz-executor.1 Not tainted 5.2.0+ #24 [ 260.280667][T17371] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 260.290804][T17371] Call Trace: [ 260.294084][T17371] dump_stack+0x1d8/0x2f8 [ 260.298408][T17371] sysfs_warn_dup+0x9c/0xb0 [ 260.302894][T17371] sysfs_do_create_link_sd+0xc2/0x110 [ 260.308274][T17371] sysfs_create_link+0x68/0x80 [ 260.313021][T17371] device_add+0xa32/0x1570 [ 260.317416][T17371] ? check_preemption_disabled+0xa9/0x2a0 [ 260.329201][T17371] ? retint_kernel+0x2b/0x2b [ 260.333792][T17371] ? dev_set_name+0x110/0x110 [ 260.338455][T17371] wiphy_register+0x1c2e/0x2b90 [ 260.343306][T17371] ? cfg80211_event_work+0x30/0x30 [ 260.348407][T17371] ? retint_kernel+0x2b/0x2b [ 260.352984][T17371] ieee80211_register_hw+0x1da0/0x3a70 [ 260.358450][T17371] ? ieee80211_tasklet_handler+0x1e0/0x1e0 [ 260.364267][T17371] ? retint_kernel+0x2b/0x2b [ 260.368844][T17371] ? hrtimer_init+0xe5/0x1d0 [ 260.373440][T17371] mac80211_hwsim_new_radio+0x1bb1/0x3640 [ 260.379154][T17371] hwsim_new_radio_nl+0xb62/0x1070 [ 260.384266][T17371] ? hwsim_tx_info_frame_received_nl+0xf70/0xf70 [ 260.390604][T17371] ? __nla_validate_parse+0xce5/0x2010 [ 260.396058][T17371] ? genl_rcv_msg+0xc4c/0x1330 [ 260.400814][T17371] genl_rcv_msg+0xe7a/0x1330 [ 260.405483][T17371] ? genl_unbind+0x2b0/0x2b0 [ 260.410067][T17371] ? trace_lock_acquire+0x190/0x190 [ 260.415972][T17371] netlink_rcv_skb+0x1f0/0x460 [ 260.420864][T17371] ? genl_unbind+0x2b0/0x2b0 [ 260.425454][T17371] ? netlink_ack+0xa80/0xa80 [ 260.430036][T17371] ? __down_read+0x192/0x3d0 [ 260.434813][T17371] genl_rcv+0x28/0x40 [ 260.438797][T17371] netlink_unicast+0x809/0x990 [ 260.443730][T17371] ? netlink_detachskb+0x50/0x50 [ 260.448659][T17371] ? netlink_sendmsg+0x892/0xd40 [ 260.453594][T17371] netlink_sendmsg+0xa7a/0xd40 [ 260.458351][T17371] ? netlink_getsockopt+0x9f0/0x9f0 [ 260.463557][T17371] ? tomoyo_socket_sendmsg+0x25/0x30 [ 260.468939][T17371] ? security_socket_sendmsg+0xa0/0xd0 [ 260.474384][T17371] ? netlink_getsockopt+0x9f0/0x9f0 [ 260.479576][T17371] ___sys_sendmsg+0x66b/0x9a0 [ 260.484255][T17371] ? __sys_sendmsg+0x250/0x250 [ 260.489225][T17371] ? __lock_acquire+0x1ce0/0x1ce0 [ 260.494376][T17371] ? check_preemption_disabled+0x47/0x2a0 [ 260.500082][T17371] ? rcu_lock_release+0x26/0x30 [ 260.504916][T17371] ? __fget+0x4fe/0x540 [ 260.509058][T17371] ? __might_fault+0xd2/0x160 [ 260.513756][T17371] ? fget_many+0x30/0x30 [ 260.517993][T17371] ? kasan_check_read+0x11/0x20 [ 260.522822][T17371] ? _copy_to_user+0xca/0xf0 [ 260.527393][T17371] ? __fdget+0x17c/0x200 [ 260.531635][T17371] __x64_sys_sendmsg+0x1cf/0x290 [ 260.536572][T17371] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 260.542010][T17371] ? ___sys_sendmsg+0x9a0/0x9a0 [ 260.546854][T17371] ? do_syscall_64+0xc0/0x140 [ 260.551535][T17371] do_syscall_64+0xfe/0x140 [ 260.556032][T17371] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 260.561904][T17371] RIP: 0033:0x459819 [ 260.565780][T17371] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 260.585374][T17371] RSP: 002b:00007efe730c7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 260.593777][T17371] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459819 [ 260.601764][T17371] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000004 [ 260.609718][T17371] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 260.617950][T17371] R10: 0000000000000000 R11: 0000000000000246 R12: 00007efe730c86d4 [ 260.625929][T17371] R13: 00000000004c757d R14: 00000000004dcac8 R15: 00000000ffffffff 02:37:52 executing program 1: syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) syz_open_dev$vbi(0x0, 0xffffffffffffffff, 0x2) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001700)={0x1c, 0x23, 0x829, 0x0, 0x0, {0x2804}, [@nested={0x8, 0x11, [@generic="802f"]}]}, 0x1c}, 0x1, 0x6087ffffffff}, 0x0) 02:37:52 executing program 2: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x4003ff) fallocate(r0, 0x3, 0x8004, 0x20007ffc) fallocate(r0, 0x3, 0x5e89, 0xfff9) 02:37:52 executing program 4: r0 = socket(0x200000000000011, 0x3, 0x0) bind(r0, &(0x7f0000000780)=@generic={0x11, "f5e2155f6a12e5e874e57a82c2b7d1fcfefc9c11f0070e77b51d1e263d0ce4f9019a034f6b01ddce7b7d06006abcdec61c0cd833092b3b3a9bea06910d3439f81bb339b1cb35a34b7d49b2f1c3f0648143001c2edda5482e5c191a4250bc4b6e69d141908d13bd576a77b954734d35eac137fcc1db40a8dbacccb6b011d5"}, 0x80) 02:37:52 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x3, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x1020, 0x0) 02:37:52 executing program 5: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x4003ff) fallocate(r0, 0x3, 0x8004, 0x20007ffc) fallocate(r0, 0x3, 0x5e89, 0xfff9) 02:37:52 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") r1 = socket$inet(0x10, 0x20000000000002, 0x0) sendmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="24000000130007021dfffd946f610500070000001f00000000000400080009000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:52 executing program 4: statx(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0) 02:37:52 executing program 2: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x4003ff) fallocate(r0, 0x3, 0x8004, 0x20007ffc) fallocate(r0, 0x3, 0x5e89, 0xfff9) [ 260.762027][T17406] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 02:37:52 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x3, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x1020, 0x0) 02:37:52 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x2046, 0x73) connect(0xffffffffffffffff, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev}, 0x80) sendmmsg$inet_sctp(0xffffffffffffffff, 0x0, 0x0, 0xa5c) ioctl$sock_rose_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000040)={@dev, 0x0, @default, @rose={'rose', 0x0}, 0x6, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @netrom, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) recvmmsg(0xffffffffffffffff, &(0x7f0000007e00), 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000004300)=[{&(0x7f0000000140)="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", 0x1f7, 0x9}, {&(0x7f00000032c0)="c9", 0xffffffffffffffa6}]) recvmsg(0xffffffffffffffff, 0x0, 0x40000020) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000008c0)={0x0, 0x7fff}, &(0x7f0000000900)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000a00)={0x0, 0xf68}, &(0x7f0000000a40)=0xc) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000a80)={0x0, 0x3, 0x10, 0x1ff, 0x4}, &(0x7f0000000ac0)=0x18) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000940)={0x0, 0x82, "45e98821f7aac4d078bc18d28d1d21ae4db5e0ba74ce328f7ce940564c40037bec9b8b6d677cb7323c1097e93c8e46653a2921bf1c1c9b24c7f8ef32d0ad6bd311fb538d57875789f8c6a92d43ed178467c4e8a33bcb8d3309fa1be36fc84c4996c8ab5055f67af6f14822d0e93694e8586278497ca039271c27aba817d4a2822e71"}, &(0x7f0000000800)=0x62) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000840)={0x0, 0x300000000}, &(0x7f0000000880)=0x8) 02:37:52 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") r1 = socket$inet(0x10, 0x20000000000002, 0x0) sendmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="24000000130007021dfffd946f610500070000001f00000000000400080009000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:52 executing program 4: statx(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0) [ 260.926844][T17410] sysfs: cannot create duplicate filename '/class/ieee80211/€!' [ 260.982759][T17410] CPU: 0 PID: 17410 Comm: syz-executor.1 Not tainted 5.2.0+ #24 [ 260.991282][T17410] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 261.001349][T17410] Call Trace: [ 261.004666][T17410] dump_stack+0x1d8/0x2f8 [ 261.009016][T17410] sysfs_warn_dup+0x9c/0xb0 [ 261.013645][T17410] sysfs_do_create_link_sd+0xc2/0x110 [ 261.019210][T17410] sysfs_create_link+0x68/0x80 [ 261.025546][T17410] device_add+0xa32/0x1570 [ 261.030242][T17410] ? __sanitizer_cov_trace_pc+0x45/0x50 [ 261.035802][T17410] ? dev_set_name+0x110/0x110 [ 261.040491][T17410] ? ieee80211_set_bitrate_flags+0x72f/0x740 [ 261.046658][T17410] wiphy_register+0x1c2e/0x2b90 [ 261.051531][T17410] ? cfg80211_event_work+0x30/0x30 [ 261.056651][T17410] ? retint_kernel+0x2b/0x2b [ 261.061252][T17410] ? ieee80211_register_hw+0x1c82/0x3a70 [ 261.066903][T17410] ieee80211_register_hw+0x1da0/0x3a70 [ 261.072645][T17410] ? ieee80211_tasklet_handler+0x1e0/0x1e0 [ 261.078463][T17410] ? retint_kernel+0x2b/0x2b [ 261.083102][T17410] ? hrtimer_init+0xe5/0x1d0 [ 261.087710][T17410] mac80211_hwsim_new_radio+0x1bb1/0x3640 [ 261.093984][T17410] hwsim_new_radio_nl+0xb62/0x1070 [ 261.099827][T17410] ? hwsim_tx_info_frame_received_nl+0xf70/0xf70 [ 261.106197][T17410] genl_rcv_msg+0xe7a/0x1330 [ 261.110808][T17410] ? genl_unbind+0x2b0/0x2b0 [ 261.115420][T17410] ? trace_lock_acquire+0x190/0x190 [ 261.120720][T17410] netlink_rcv_skb+0x1f0/0x460 [ 261.125514][T17410] ? genl_unbind+0x2b0/0x2b0 [ 261.130145][T17410] ? netlink_ack+0xa80/0xa80 [ 261.134775][T17410] ? genl_rcv+0x19/0x40 [ 261.138981][T17410] genl_rcv+0x28/0x40 [ 261.142970][T17410] netlink_unicast+0x809/0x990 [ 261.147745][T17410] ? netlink_detachskb+0x50/0x50 [ 261.152679][T17410] ? __phys_addr_symbol+0x2f/0x70 [ 261.157704][T17410] ? __check_object_size+0x314/0x400 [ 261.162990][T17410] ? security_netlink_send+0x94/0xb0 [ 261.168279][T17410] netlink_sendmsg+0xa7a/0xd40 [ 261.173056][T17410] ? netlink_getsockopt+0x9f0/0x9f0 [ 261.178259][T17410] ? tomoyo_socket_sendmsg+0x25/0x30 [ 261.183550][T17410] ? security_socket_sendmsg+0xa0/0xd0 [ 261.189021][T17410] ? netlink_getsockopt+0x9f0/0x9f0 [ 261.194408][T17410] ___sys_sendmsg+0x66b/0x9a0 [ 261.199545][T17410] ? __sys_sendmsg+0x250/0x250 [ 261.204319][T17410] ? __lock_acquire+0x1ce0/0x1ce0 [ 261.209355][T17410] ? check_preemption_disabled+0x47/0x2a0 [ 261.215091][T17410] ? retint_kernel+0x2b/0x2b [ 261.219688][T17410] ? trace_hardirqs_on_caller+0x74/0x80 [ 261.225243][T17410] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 261.230718][T17410] ? check_preemption_disabled+0xa9/0x2a0 [ 261.236445][T17410] ? retint_kernel+0x2b/0x2b [ 261.241053][T17410] __x64_sys_sendmsg+0x1cf/0x290 [ 261.246003][T17410] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 261.251472][T17410] ? ___sys_sendmsg+0x9a0/0x9a0 [ 261.256340][T17410] ? do_syscall_64+0xc0/0x140 [ 261.261028][T17410] do_syscall_64+0xfe/0x140 [ 261.265537][T17410] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 261.271432][T17410] RIP: 0033:0x459819 [ 261.275328][T17410] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 261.294950][T17410] RSP: 002b:00007efe730c7c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 261.303393][T17410] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459819 [ 261.312849][T17410] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000004 [ 261.320838][T17410] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 261.328824][T17410] R10: 0000000000000000 R11: 0000000000000246 R12: 00007efe730c86d4 [ 261.336812][T17410] R13: 00000000004c757d R14: 00000000004dcac8 R15: 00000000ffffffff [ 261.412730][T17426] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 02:37:52 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") r1 = socket$inet(0x10, 0x20000000000002, 0x0) sendmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="24000000130007021dfffd946f610500070000001f00000000000400080009000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:37:52 executing program 2: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x4003ff) fallocate(r0, 0x3, 0x8004, 0x20007ffc) fallocate(r0, 0x3, 0x5e89, 0xfff9) 02:37:52 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a0662bc45ff810500000000000058000b480400945f64009400050028925ae9ffffffffffffff8000f0fffeffe809000000fff5dd0000001000010002081000414900000904fcff", 0x58}], 0x1) 02:37:52 executing program 4: statx(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0) 02:37:52 executing program 1: memfd_create(&(0x7f0000000340)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f\xb387\xd8\xea\xed\xd5@\x82>\x1e\xc96\r\x9d\xb1;\xfae\xdc\'\x83)?\x90;\x8fvn\xc2\xb0\xeaN\xce\xbf\x8d|\xce\xb3\xa2Y\xb6\xb8U\x82\x16|j[\xa5\xcd\x88\xe5nV5f\x86\x12l\xf8\xfbr\xe2\a\xbc(\x99K\xd1\x15\x1f\x9a\x192>;\x05\x1f\x05H\xd0y^\x84\xe2\x15\xe0p\x1d\x87\xc8\xb9\xc1\x90I2\xaa\xee\"\xc7\xfdn\xd1\xb9\xc2\xf6\xa6\xdc\xb5jc\x8c!f\xackO\xbb\xd4\x0f\xd3hy\x90\xb0>\x84\x04\xfbc\xdd\x99\x874$\x8d\x06Y\x93C\x1f\xc8\\\x9bq\xa4\xc9\xfb\v\x91\x0e\x9f\"a\xa3L\xd7\xfd\xbb\xe5\xc4\"-\xb5(3\xd0\x81\x98I2>>\xcdu\v\x8d\x0fL\xca\x15\x85@\xad\x14\x13X\xbe\xber;\x06\xa7\x9c\xe3\xa7\xc0r\x8a\xac\xe1tIX1l\xd4\xaa\xbe\xfb?&\xf8\xc7\xdf\xfb^\\\b\xef\x19\xed\xfdf\xde\xfb\xb1#4\xe70\xac\x86\x99y\xee\r\xb1n\xae\v\xd0G\xd8\xbd:P\xc3v\xafn\x06k\xe0M\x94\xc7\xd41\xc2i\xef\xe3-o\x9c-\xe5\fl\xb8\xec\x8eps\xaf\"\xa1\'D\x96\xf3\x1a\xee\xeak\a\x80\n=\xc9x\xc0\x95L`\x8c\x05(\xa4\xd7\xaf\xd49\xdf\xa1R\x10\bEgP\xb5+H\xafX\xcc&?\xf0\xd1A\xbd\xcc\x94\xcb\xbcL\xb7\xf4\xcc\x84\xbc\xdf8 \x7f\xf7\xd0\xbe%\xa3\bV\xf0#\x92\x91\xbb\xc4b\xffo\xf72+\xb1\x9dmM\xb2\xe2\x89\x93\x92>\xadq\x13r\x98\xb4\x9c\xb6\xba\xdc\xf1\xcb\xdfg\xeag\xfa\xf8\x1a\x9e\xa1]\xc4u\x9f|\xf5\xbd\xb7\xe8', 0x10000004) 02:37:53 executing program 4: statx(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0) [ 261.616459][T17437] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 02:37:53 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@gid={'gid'}}]}) 02:37:53 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a0662bc45ff810500000000000058000b480400945f64009400050028925ae9ffffffffffffff8000f0fffeffe809000000fff5dd0000001000010002081000414900000904fcff", 0x58}], 0x1) 02:37:53 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000003c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-twofish-3way\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x10000080800) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="59f3fabb6e72d1858cd1b5c087dc89fa89854f94b037e206", 0x18) sendto$unix(r1, &(0x7f0000000140), 0xf1bd028ea361ecb, 0x0, 0x0, 0x97628ea86bc7e79b) recvfrom(r1, &(0x7f0000001240)=""/4096, 0xffffff7e, 0x0, 0x0, 0x3000) 02:37:53 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x2046, 0x73) connect(0xffffffffffffffff, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev}, 0x80) sendmmsg$inet_sctp(0xffffffffffffffff, 0x0, 0x0, 0xa5c) ioctl$sock_rose_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000040)={@dev, 0x0, @default, @rose={'rose', 0x0}, 0x6, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @netrom, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) recvmmsg(0xffffffffffffffff, &(0x7f0000007e00), 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000004300)=[{&(0x7f0000000140)="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", 0x1f7, 0x9}, {&(0x7f00000032c0)="c9", 0xffffffffffffffa6}]) recvmsg(0xffffffffffffffff, 0x0, 0x40000020) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000008c0)={0x0, 0x7fff}, &(0x7f0000000900)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000a00)={0x0, 0xf68}, &(0x7f0000000a40)=0xc) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000a80)={0x0, 0x3, 0x10, 0x1ff, 0x4}, &(0x7f0000000ac0)=0x18) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000940)={0x0, 0x82, "45e98821f7aac4d078bc18d28d1d21ae4db5e0ba74ce328f7ce940564c40037bec9b8b6d677cb7323c1097e93c8e46653a2921bf1c1c9b24c7f8ef32d0ad6bd311fb538d57875789f8c6a92d43ed178467c4e8a33bcb8d3309fa1be36fc84c4996c8ab5055f67af6f14822d0e93694e8586278497ca039271c27aba817d4a2822e71"}, &(0x7f0000000800)=0x62) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000840)={0x0, 0x300000000}, &(0x7f0000000880)=0x8) 02:37:53 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x20000000000000, 0x700, 0x0, 0x0, 0x4e, 0xa0}, [@ldst={0x3, 0x2, 0x3, 0x1c10a1, 0x0, 0x9e}]}, &(0x7f0000003ff6)='G\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) 02:37:53 executing program 1: memfd_create(&(0x7f0000000340)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f\xb387\xd8\xea\xed\xd5@\x82>\x1e\xc96\r\x9d\xb1;\xfae\xdc\'\x83)?\x90;\x8fvn\xc2\xb0\xeaN\xce\xbf\x8d|\xce\xb3\xa2Y\xb6\xb8U\x82\x16|j[\xa5\xcd\x88\xe5nV5f\x86\x12l\xf8\xfbr\xe2\a\xbc(\x99K\xd1\x15\x1f\x9a\x192>;\x05\x1f\x05H\xd0y^\x84\xe2\x15\xe0p\x1d\x87\xc8\xb9\xc1\x90I2\xaa\xee\"\xc7\xfdn\xd1\xb9\xc2\xf6\xa6\xdc\xb5jc\x8c!f\xackO\xbb\xd4\x0f\xd3hy\x90\xb0>\x84\x04\xfbc\xdd\x99\x874$\x8d\x06Y\x93C\x1f\xc8\\\x9bq\xa4\xc9\xfb\v\x91\x0e\x9f\"a\xa3L\xd7\xfd\xbb\xe5\xc4\"-\xb5(3\xd0\x81\x98I2>>\xcdu\v\x8d\x0fL\xca\x15\x85@\xad\x14\x13X\xbe\xber;\x06\xa7\x9c\xe3\xa7\xc0r\x8a\xac\xe1tIX1l\xd4\xaa\xbe\xfb?&\xf8\xc7\xdf\xfb^\\\b\xef\x19\xed\xfdf\xde\xfb\xb1#4\xe70\xac\x86\x99y\xee\r\xb1n\xae\v\xd0G\xd8\xbd:P\xc3v\xafn\x06k\xe0M\x94\xc7\xd41\xc2i\xef\xe3-o\x9c-\xe5\fl\xb8\xec\x8eps\xaf\"\xa1\'D\x96\xf3\x1a\xee\xeak\a\x80\n=\xc9x\xc0\x95L`\x8c\x05(\xa4\xd7\xaf\xd49\xdf\xa1R\x10\bEgP\xb5+H\xafX\xcc&?\xf0\xd1A\xbd\xcc\x94\xcb\xbcL\xb7\xf4\xcc\x84\xbc\xdf8 \x7f\xf7\xd0\xbe%\xa3\bV\xf0#\x92\x91\xbb\xc4b\xffo\xf72+\xb1\x9dmM\xb2\xe2\x89\x93\x92>\xadq\x13r\x98\xb4\x9c\xb6\xba\xdc\xf1\xcb\xdfg\xeag\xfa\xf8\x1a\x9e\xa1]\xc4u\x9f|\xf5\xbd\xb7\xe8', 0x10000004) 02:37:53 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a0662bc45ff810500000000000058000b480400945f64009400050028925ae9ffffffffffffff8000f0fffeffe809000000fff5dd0000001000010002081000414900000904fcff", 0x58}], 0x1) 02:37:53 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@gid={'gid'}}]}) 02:37:53 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a0662bc45ff810500000000000058000b480400945f64009400050028925ae9ffffffffffffff8000f0fffeffe809000000fff5dd0000001000010002081000414900000904fcff", 0x58}], 0x1) 02:37:53 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x20000000000000, 0x700, 0x0, 0x0, 0x4e, 0xa0}, [@ldst={0x3, 0x2, 0x3, 0x1c10a1, 0x0, 0x9e}]}, &(0x7f0000003ff6)='G\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) 02:37:53 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000003c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-twofish-3way\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x10000080800) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="59f3fabb6e72d1858cd1b5c087dc89fa89854f94b037e206", 0x18) sendto$unix(r1, &(0x7f0000000140), 0xf1bd028ea361ecb, 0x0, 0x0, 0x97628ea86bc7e79b) recvfrom(r1, &(0x7f0000001240)=""/4096, 0xffffff7e, 0x0, 0x0, 0x3000) 02:37:53 executing program 1: memfd_create(&(0x7f0000000340)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f\xb387\xd8\xea\xed\xd5@\x82>\x1e\xc96\r\x9d\xb1;\xfae\xdc\'\x83)?\x90;\x8fvn\xc2\xb0\xeaN\xce\xbf\x8d|\xce\xb3\xa2Y\xb6\xb8U\x82\x16|j[\xa5\xcd\x88\xe5nV5f\x86\x12l\xf8\xfbr\xe2\a\xbc(\x99K\xd1\x15\x1f\x9a\x192>;\x05\x1f\x05H\xd0y^\x84\xe2\x15\xe0p\x1d\x87\xc8\xb9\xc1\x90I2\xaa\xee\"\xc7\xfdn\xd1\xb9\xc2\xf6\xa6\xdc\xb5jc\x8c!f\xackO\xbb\xd4\x0f\xd3hy\x90\xb0>\x84\x04\xfbc\xdd\x99\x874$\x8d\x06Y\x93C\x1f\xc8\\\x9bq\xa4\xc9\xfb\v\x91\x0e\x9f\"a\xa3L\xd7\xfd\xbb\xe5\xc4\"-\xb5(3\xd0\x81\x98I2>>\xcdu\v\x8d\x0fL\xca\x15\x85@\xad\x14\x13X\xbe\xber;\x06\xa7\x9c\xe3\xa7\xc0r\x8a\xac\xe1tIX1l\xd4\xaa\xbe\xfb?&\xf8\xc7\xdf\xfb^\\\b\xef\x19\xed\xfdf\xde\xfb\xb1#4\xe70\xac\x86\x99y\xee\r\xb1n\xae\v\xd0G\xd8\xbd:P\xc3v\xafn\x06k\xe0M\x94\xc7\xd41\xc2i\xef\xe3-o\x9c-\xe5\fl\xb8\xec\x8eps\xaf\"\xa1\'D\x96\xf3\x1a\xee\xeak\a\x80\n=\xc9x\xc0\x95L`\x8c\x05(\xa4\xd7\xaf\xd49\xdf\xa1R\x10\bEgP\xb5+H\xafX\xcc&?\xf0\xd1A\xbd\xcc\x94\xcb\xbcL\xb7\xf4\xcc\x84\xbc\xdf8 \x7f\xf7\xd0\xbe%\xa3\bV\xf0#\x92\x91\xbb\xc4b\xffo\xf72+\xb1\x9dmM\xb2\xe2\x89\x93\x92>\xadq\x13r\x98\xb4\x9c\xb6\xba\xdc\xf1\xcb\xdfg\xeag\xfa\xf8\x1a\x9e\xa1]\xc4u\x9f|\xf5\xbd\xb7\xe8', 0x10000004) 02:37:53 executing program 1: memfd_create(&(0x7f0000000340)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f\xb387\xd8\xea\xed\xd5@\x82>\x1e\xc96\r\x9d\xb1;\xfae\xdc\'\x83)?\x90;\x8fvn\xc2\xb0\xeaN\xce\xbf\x8d|\xce\xb3\xa2Y\xb6\xb8U\x82\x16|j[\xa5\xcd\x88\xe5nV5f\x86\x12l\xf8\xfbr\xe2\a\xbc(\x99K\xd1\x15\x1f\x9a\x192>;\x05\x1f\x05H\xd0y^\x84\xe2\x15\xe0p\x1d\x87\xc8\xb9\xc1\x90I2\xaa\xee\"\xc7\xfdn\xd1\xb9\xc2\xf6\xa6\xdc\xb5jc\x8c!f\xackO\xbb\xd4\x0f\xd3hy\x90\xb0>\x84\x04\xfbc\xdd\x99\x874$\x8d\x06Y\x93C\x1f\xc8\\\x9bq\xa4\xc9\xfb\v\x91\x0e\x9f\"a\xa3L\xd7\xfd\xbb\xe5\xc4\"-\xb5(3\xd0\x81\x98I2>>\xcdu\v\x8d\x0fL\xca\x15\x85@\xad\x14\x13X\xbe\xber;\x06\xa7\x9c\xe3\xa7\xc0r\x8a\xac\xe1tIX1l\xd4\xaa\xbe\xfb?&\xf8\xc7\xdf\xfb^\\\b\xef\x19\xed\xfdf\xde\xfb\xb1#4\xe70\xac\x86\x99y\xee\r\xb1n\xae\v\xd0G\xd8\xbd:P\xc3v\xafn\x06k\xe0M\x94\xc7\xd41\xc2i\xef\xe3-o\x9c-\xe5\fl\xb8\xec\x8eps\xaf\"\xa1\'D\x96\xf3\x1a\xee\xeak\a\x80\n=\xc9x\xc0\x95L`\x8c\x05(\xa4\xd7\xaf\xd49\xdf\xa1R\x10\bEgP\xb5+H\xafX\xcc&?\xf0\xd1A\xbd\xcc\x94\xcb\xbcL\xb7\xf4\xcc\x84\xbc\xdf8 \x7f\xf7\xd0\xbe%\xa3\bV\xf0#\x92\x91\xbb\xc4b\xffo\xf72+\xb1\x9dmM\xb2\xe2\x89\x93\x92>\xadq\x13r\x98\xb4\x9c\xb6\xba\xdc\xf1\xcb\xdfg\xeag\xfa\xf8\x1a\x9e\xa1]\xc4u\x9f|\xf5\xbd\xb7\xe8', 0x10000004) 02:37:53 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@gid={'gid'}}]}) 02:37:53 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000003c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-twofish-3way\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x10000080800) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="59f3fabb6e72d1858cd1b5c087dc89fa89854f94b037e206", 0x18) sendto$unix(r1, &(0x7f0000000140), 0xf1bd028ea361ecb, 0x0, 0x0, 0x97628ea86bc7e79b) recvfrom(r1, &(0x7f0000001240)=""/4096, 0xffffff7e, 0x0, 0x0, 0x3000) 02:37:54 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x2046, 0x73) connect(0xffffffffffffffff, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev}, 0x80) sendmmsg$inet_sctp(0xffffffffffffffff, 0x0, 0x0, 0xa5c) ioctl$sock_rose_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000040)={@dev, 0x0, @default, @rose={'rose', 0x0}, 0x6, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @netrom, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) recvmmsg(0xffffffffffffffff, &(0x7f0000007e00), 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000004300)=[{&(0x7f0000000140)="f7946aec97612365107a599c24994bbf78e6abb34d17249c4690ccc71f78b600beeff9bdc798c1717d4916ed8bdd3e00e3db8ce3520ca71dd4110e91e168a751569614176633ebb5b32f4503eadd5b10ade843f2876a1d360ef2aa759262940d479242042b9c6d9cd4216521dac72b54e4d3dd633613dda947df4e0735be2cece41c0108905c612f92a5b286601fec82c3390d9e20ea4e996f962e9a47e0f9776d4c66d04f5c4fb836752a036dabaf0f4386e197e1682d0e9e89502e514d85f51a3b2d0256b0d3ad6674789ee842fe62523064e1e65118af9c86cc25f24e4840739ca3a37279022862336a51b5b474d14b0968a0b127f830412ae86faf65d15617578de70f6643e1c2d5b80ccf7df943dfe27435c04e4f0cd3415fdeb5c0ee5bf74013db58b9052e5a2ede426bfe61641036c008d006c93c0c6185196d2054a36844b7373c3c924869c9294e21680e4651b533f6322c5bb95562245852d42f90b9373f5c6c0226b2984a9fecdcfb2d9b469ce9afbb620a03d86998744124e70045f1595c797356a3bf9aa5e07c6343a6c13add569ddf392cd2b7db096a7c8da13c97e01a832fa166eb9adbfbd624a00caeb57b836e187e642c9237119400985e03b8a45e6031a418016e9b25c06c63bce2452af8da9adea1645682faec14b24ee3294cc3ab1865976b36ef28c37e7e52d51b56c5b3e6dd", 0x1f7, 0x9}, {&(0x7f00000032c0)="c9", 0xffffffffffffffa6}]) recvmsg(0xffffffffffffffff, 0x0, 0x40000020) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000008c0)={0x0, 0x7fff}, &(0x7f0000000900)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000a00)={0x0, 0xf68}, &(0x7f0000000a40)=0xc) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000a80)={0x0, 0x3, 0x10, 0x1ff, 0x4}, &(0x7f0000000ac0)=0x18) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000940)={0x0, 0x82, "45e98821f7aac4d078bc18d28d1d21ae4db5e0ba74ce328f7ce940564c40037bec9b8b6d677cb7323c1097e93c8e46653a2921bf1c1c9b24c7f8ef32d0ad6bd311fb538d57875789f8c6a92d43ed178467c4e8a33bcb8d3309fa1be36fc84c4996c8ab5055f67af6f14822d0e93694e8586278497ca039271c27aba817d4a2822e71"}, &(0x7f0000000800)=0x62) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000840)={0x0, 0x300000000}, &(0x7f0000000880)=0x8) 02:37:54 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x20000000000000, 0x700, 0x0, 0x0, 0x4e, 0xa0}, [@ldst={0x3, 0x2, 0x3, 0x1c10a1, 0x0, 0x9e}]}, &(0x7f0000003ff6)='G\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) 02:37:54 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000003c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-twofish-3way\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x10000080800) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="59f3fabb6e72d1858cd1b5c087dc89fa89854f94b037e206", 0x18) sendto$unix(r1, &(0x7f0000000140), 0xf1bd028ea361ecb, 0x0, 0x0, 0x97628ea86bc7e79b) recvfrom(r1, &(0x7f0000001240)=""/4096, 0xffffff7e, 0x0, 0x0, 0x3000) 02:37:54 executing program 4: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@gid={'gid'}}]}) 02:37:54 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000003c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-twofish-3way\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x10000080800) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="59f3fabb6e72d1858cd1b5c087dc89fa89854f94b037e206", 0x18) sendto$unix(r1, &(0x7f0000000140), 0xf1bd028ea361ecb, 0x0, 0x0, 0x97628ea86bc7e79b) recvfrom(r1, &(0x7f0000001240)=""/4096, 0xffffff7e, 0x0, 0x0, 0x3000) 02:37:54 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000003c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-twofish-3way\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x10000080800) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="59f3fabb6e72d1858cd1b5c087dc89fa89854f94b037e206", 0x18) sendto$unix(r1, &(0x7f0000000140), 0xf1bd028ea361ecb, 0x0, 0x0, 0x97628ea86bc7e79b) recvfrom(r1, &(0x7f0000001240)=""/4096, 0xffffff7e, 0x0, 0x0, 0x3000) 02:37:54 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000003c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-twofish-3way\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x10000080800) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="59f3fabb6e72d1858cd1b5c087dc89fa89854f94b037e206", 0x18) sendto$unix(r1, &(0x7f0000000140), 0xf1bd028ea361ecb, 0x0, 0x0, 0x97628ea86bc7e79b) recvfrom(r1, &(0x7f0000001240)=""/4096, 0xffffff7e, 0x0, 0x0, 0x3000) 02:37:54 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x20000000000000, 0x700, 0x0, 0x0, 0x4e, 0xa0}, [@ldst={0x3, 0x2, 0x3, 0x1c10a1, 0x0, 0x9e}]}, &(0x7f0000003ff6)='G\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) 02:37:54 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000003c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-twofish-3way\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x10000080800) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="59f3fabb6e72d1858cd1b5c087dc89fa89854f94b037e206", 0x18) sendto$unix(r1, &(0x7f0000000140), 0xf1bd028ea361ecb, 0x0, 0x0, 0x97628ea86bc7e79b) recvfrom(r1, &(0x7f0000001240)=""/4096, 0xffffff7e, 0x0, 0x0, 0x3000) 02:37:54 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000003c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-twofish-3way\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x10000080800) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="59f3fabb6e72d1858cd1b5c087dc89fa89854f94b037e206", 0x18) sendto$unix(r1, &(0x7f0000000140), 0xf1bd028ea361ecb, 0x0, 0x0, 0x97628ea86bc7e79b) recvfrom(r1, &(0x7f0000001240)=""/4096, 0xffffff7e, 0x0, 0x0, 0x3000) 02:37:54 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000003c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-twofish-3way\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x10000080800) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="59f3fabb6e72d1858cd1b5c087dc89fa89854f94b037e206", 0x18) sendto$unix(r1, &(0x7f0000000140), 0xf1bd028ea361ecb, 0x0, 0x0, 0x97628ea86bc7e79b) recvfrom(r1, &(0x7f0000001240)=""/4096, 0xffffff7e, 0x0, 0x0, 0x3000) 02:37:54 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000003c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-twofish-3way\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x10000080800) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="59f3fabb6e72d1858cd1b5c087dc89fa89854f94b037e206", 0x18) sendto$unix(r1, &(0x7f0000000140), 0xf1bd028ea361ecb, 0x0, 0x0, 0x97628ea86bc7e79b) recvfrom(r1, &(0x7f0000001240)=""/4096, 0xffffff7e, 0x0, 0x0, 0x3000) 02:37:55 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x2046, 0x73) connect(0xffffffffffffffff, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev}, 0x80) sendmmsg$inet_sctp(0xffffffffffffffff, 0x0, 0x0, 0xa5c) ioctl$sock_rose_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000040)={@dev, 0x0, @default, @rose={'rose', 0x0}, 0x6, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @netrom, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) recvmmsg(0xffffffffffffffff, &(0x7f0000007e00), 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000004300)=[{&(0x7f0000000140)="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", 0x1f7, 0x9}, {&(0x7f00000032c0)="c9", 0xffffffffffffffa6}]) recvmsg(0xffffffffffffffff, 0x0, 0x40000020) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000008c0)={0x0, 0x7fff}, &(0x7f0000000900)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000a00)={0x0, 0xf68}, &(0x7f0000000a40)=0xc) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000a80)={0x0, 0x3, 0x10, 0x1ff, 0x4}, &(0x7f0000000ac0)=0x18) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000940)={0x0, 0x82, "45e98821f7aac4d078bc18d28d1d21ae4db5e0ba74ce328f7ce940564c40037bec9b8b6d677cb7323c1097e93c8e46653a2921bf1c1c9b24c7f8ef32d0ad6bd311fb538d57875789f8c6a92d43ed178467c4e8a33bcb8d3309fa1be36fc84c4996c8ab5055f67af6f14822d0e93694e8586278497ca039271c27aba817d4a2822e71"}, &(0x7f0000000800)=0x62) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000840)={0x0, 0x300000000}, &(0x7f0000000880)=0x8) 02:37:55 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000003c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-twofish-3way\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x10000080800) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="59f3fabb6e72d1858cd1b5c087dc89fa89854f94b037e206", 0x18) sendto$unix(r1, &(0x7f0000000140), 0xf1bd028ea361ecb, 0x0, 0x0, 0x97628ea86bc7e79b) recvfrom(r1, &(0x7f0000001240)=""/4096, 0xffffff7e, 0x0, 0x0, 0x3000) 02:37:55 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000003c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-twofish-3way\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x10000080800) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="59f3fabb6e72d1858cd1b5c087dc89fa89854f94b037e206", 0x18) sendto$unix(r1, &(0x7f0000000140), 0xf1bd028ea361ecb, 0x0, 0x0, 0x97628ea86bc7e79b) recvfrom(r1, &(0x7f0000001240)=""/4096, 0xffffff7e, 0x0, 0x0, 0x3000) 02:37:55 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000003c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-twofish-3way\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x10000080800) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="59f3fabb6e72d1858cd1b5c087dc89fa89854f94b037e206", 0x18) sendto$unix(r1, &(0x7f0000000140), 0xf1bd028ea361ecb, 0x0, 0x0, 0x97628ea86bc7e79b) recvfrom(r1, &(0x7f0000001240)=""/4096, 0xffffff7e, 0x0, 0x0, 0x3000) 02:37:55 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x33, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 02:37:55 executing program 3: mknod$loop(&(0x7f00000002c0)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f00000000c0)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='bfs\x00', 0x0, 0x0) 02:37:55 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x33, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 264.333305][ T2498] block nbd3: Attempted send on invalid socket [ 264.339915][ T2498] blk_update_request: I/O error, dev nbd3, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 02:37:55 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000003c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-twofish-3way\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x10000080800) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="59f3fabb6e72d1858cd1b5c087dc89fa89854f94b037e206", 0x18) sendto$unix(r1, &(0x7f0000000140), 0xf1bd028ea361ecb, 0x0, 0x0, 0x97628ea86bc7e79b) recvfrom(r1, &(0x7f0000001240)=""/4096, 0xffffff7e, 0x0, 0x0, 0x3000) [ 264.427744][ T2498] block nbd3: Attempted send on invalid socket [ 264.434356][ T2498] blk_update_request: I/O error, dev nbd3, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 02:37:55 executing program 3: mknod$loop(&(0x7f00000002c0)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f00000000c0)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='bfs\x00', 0x0, 0x0) 02:37:55 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000003c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-twofish-3way\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x10000080800) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="59f3fabb6e72d1858cd1b5c087dc89fa89854f94b037e206", 0x18) sendto$unix(r1, &(0x7f0000000140), 0xf1bd028ea361ecb, 0x0, 0x0, 0x97628ea86bc7e79b) recvfrom(r1, &(0x7f0000001240)=""/4096, 0xffffff7e, 0x0, 0x0, 0x3000) 02:37:56 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x33, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 264.556111][ T2498] block nbd3: Attempted send on invalid socket [ 264.562419][ T2498] blk_update_request: I/O error, dev nbd3, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 02:37:56 executing program 3: mknod$loop(&(0x7f00000002c0)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f00000000c0)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='bfs\x00', 0x0, 0x0) [ 264.823895][ T2498] block nbd3: Attempted send on invalid socket [ 264.830151][ T2498] blk_update_request: I/O error, dev nbd3, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 02:37:56 executing program 3: mknod$loop(&(0x7f00000002c0)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f00000000c0)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='bfs\x00', 0x0, 0x0) 02:37:56 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r2 = socket(0x400000000000010, 0x802, 0x0) write(r2, &(0x7f0000000000)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) bind(r1, &(0x7f00000000c0)=@nl=@unspec, 0x80) 02:37:56 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x33, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 02:37:56 executing program 1: getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000640)=ANY=[@ANYBLOB="70000000b27edcc7c642439433b23b0a71018a25ca1970cb122e73301f05d711dc05143afe958d6db19eb1f72d74c61566905dc0fe5631790a9ed26c274b06eaab044219f8c54e8ac92ee10e781dc0364b101dc7d698ecbf0dcc0200000052265e0d4d2011a5da2917b2e36a160000"], 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000380)={0x0, 0x7ff}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x4e21, 0xe, @initdev={0xfe, 0x88, [], 0x1, 0x0}}}, 0x101, 0x7, 0x80000000, 0x5, 0xa6}, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x400, 0x16480) ioctl$VIDIOC_ENUM_FRAMESIZES(0xffffffffffffffff, 0xc02c564a, &(0x7f0000000000)={0x3, 0x3131354f, 0x2, @discrete={0x98b2, 0xffffffffffff022d}}) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e21, @multicast2}}}, 0x84) gettid() sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) mkdirat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x9) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 02:37:56 executing program 4: r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x89e1, 0x0) 02:37:56 executing program 2: r0 = getpgrp(0xffffffffffffffff) get_robust_list(r0, &(0x7f00000000c0)=0x0, &(0x7f0000000100)) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r1) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udp\x00') write$P9_RCLUNK(0xffffffffffffffff, &(0x7f0000000100)={0x7}, 0x7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) ioctl(r2, 0x1000008915, &(0x7f00000000c0)) r3 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r3, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x8000, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$binfmt_misc(r3, &(0x7f0000000200)=ANY=[], 0xffdc) read(r3, &(0x7f0000000380)=""/165, 0x101d7) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 265.006540][ T2498] block nbd3: Attempted send on invalid socket [ 265.012974][ T2498] blk_update_request: I/O error, dev nbd3, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 02:37:56 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000380)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000004240), 0xfffffe94) poll(&(0x7f0000000140)=[{r0}], 0x1, 0x9) 02:37:56 executing program 4: r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x89e1, 0x0) 02:37:56 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r2 = socket(0x400000000000010, 0x802, 0x0) write(r2, &(0x7f0000000000)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) bind(r1, &(0x7f00000000c0)=@nl=@unspec, 0x80) [ 265.051346][T17586] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 02:37:56 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r2 = socket(0x400000000000010, 0x802, 0x0) write(r2, &(0x7f0000000000)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) bind(r1, &(0x7f00000000c0)=@nl=@unspec, 0x80) 02:37:56 executing program 1: getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000640)=ANY=[@ANYBLOB="70000000b27edcc7c642439433b23b0a71018a25ca1970cb122e73301f05d711dc05143afe958d6db19eb1f72d74c61566905dc0fe5631790a9ed26c274b06eaab044219f8c54e8ac92ee10e781dc0364b101dc7d698ecbf0dcc0200000052265e0d4d2011a5da2917b2e36a160000"], 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000380)={0x0, 0x7ff}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x4e21, 0xe, @initdev={0xfe, 0x88, [], 0x1, 0x0}}}, 0x101, 0x7, 0x80000000, 0x5, 0xa6}, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x400, 0x16480) ioctl$VIDIOC_ENUM_FRAMESIZES(0xffffffffffffffff, 0xc02c564a, &(0x7f0000000000)={0x3, 0x3131354f, 0x2, @discrete={0x98b2, 0xffffffffffff022d}}) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e21, @multicast2}}}, 0x84) gettid() sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) mkdirat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x9) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 02:37:56 executing program 2: r0 = getpgrp(0xffffffffffffffff) get_robust_list(r0, &(0x7f00000000c0)=0x0, &(0x7f0000000100)) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r1) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udp\x00') write$P9_RCLUNK(0xffffffffffffffff, &(0x7f0000000100)={0x7}, 0x7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) ioctl(r2, 0x1000008915, &(0x7f00000000c0)) r3 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r3, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x8000, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$binfmt_misc(r3, &(0x7f0000000200)=ANY=[], 0xffdc) read(r3, &(0x7f0000000380)=""/165, 0x101d7) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 02:37:56 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r2 = socket(0x400000000000010, 0x802, 0x0) write(r2, &(0x7f0000000000)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) bind(r1, &(0x7f00000000c0)=@nl=@unspec, 0x80) 02:37:56 executing program 4: r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x89e1, 0x0) 02:37:56 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000380)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000004240), 0xfffffe94) poll(&(0x7f0000000140)=[{r0}], 0x1, 0x9) 02:37:56 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r2 = socket(0x400000000000010, 0x802, 0x0) write(r2, &(0x7f0000000000)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) bind(r1, &(0x7f00000000c0)=@nl=@unspec, 0x80) 02:37:56 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r2 = socket(0x400000000000010, 0x802, 0x0) write(r2, &(0x7f0000000000)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) bind(r1, &(0x7f00000000c0)=@nl=@unspec, 0x80) 02:37:56 executing program 4: r0 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x89e1, 0x0) 02:37:57 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000380)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000004240), 0xfffffe94) poll(&(0x7f0000000140)=[{r0}], 0x1, 0x9) 02:37:57 executing program 1: getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000640)=ANY=[@ANYBLOB="70000000b27edcc7c642439433b23b0a71018a25ca1970cb122e73301f05d711dc05143afe958d6db19eb1f72d74c61566905dc0fe5631790a9ed26c274b06eaab044219f8c54e8ac92ee10e781dc0364b101dc7d698ecbf0dcc0200000052265e0d4d2011a5da2917b2e36a160000"], 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000380)={0x0, 0x7ff}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x4e21, 0xe, @initdev={0xfe, 0x88, [], 0x1, 0x0}}}, 0x101, 0x7, 0x80000000, 0x5, 0xa6}, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x400, 0x16480) ioctl$VIDIOC_ENUM_FRAMESIZES(0xffffffffffffffff, 0xc02c564a, &(0x7f0000000000)={0x3, 0x3131354f, 0x2, @discrete={0x98b2, 0xffffffffffff022d}}) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e21, @multicast2}}}, 0x84) gettid() sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) mkdirat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x9) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 02:37:57 executing program 2: r0 = getpgrp(0xffffffffffffffff) get_robust_list(r0, &(0x7f00000000c0)=0x0, &(0x7f0000000100)) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r1) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udp\x00') write$P9_RCLUNK(0xffffffffffffffff, &(0x7f0000000100)={0x7}, 0x7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) ioctl(r2, 0x1000008915, &(0x7f00000000c0)) r3 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r3, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x8000, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$binfmt_misc(r3, &(0x7f0000000200)=ANY=[], 0xffdc) read(r3, &(0x7f0000000380)=""/165, 0x101d7) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 02:37:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r2 = socket(0x400000000000010, 0x802, 0x0) write(r2, &(0x7f0000000000)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) bind(r1, &(0x7f00000000c0)=@nl=@unspec, 0x80) 02:37:57 executing program 5: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000380)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000004240), 0xfffffe94) poll(&(0x7f0000000140)=[{r0}], 0x1, 0x9) 02:37:57 executing program 4: r0 = getpgrp(0xffffffffffffffff) get_robust_list(r0, &(0x7f00000000c0)=0x0, &(0x7f0000000100)) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r1) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udp\x00') write$P9_RCLUNK(0xffffffffffffffff, &(0x7f0000000100)={0x7}, 0x7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) ioctl(r2, 0x1000008915, &(0x7f00000000c0)) r3 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r3, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x8000, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$binfmt_misc(r3, &(0x7f0000000200)=ANY=[], 0xffdc) read(r3, &(0x7f0000000380)=""/165, 0x101d7) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 02:37:57 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000380)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000004240), 0xfffffe94) poll(&(0x7f0000000140)=[{r0}], 0x1, 0x9) 02:37:57 executing program 3: r0 = getpgrp(0xffffffffffffffff) get_robust_list(r0, &(0x7f00000000c0)=0x0, &(0x7f0000000100)) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r1) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udp\x00') write$P9_RCLUNK(0xffffffffffffffff, &(0x7f0000000100)={0x7}, 0x7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) ioctl(r2, 0x1000008915, &(0x7f00000000c0)) r3 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r3, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x8000, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$binfmt_misc(r3, &(0x7f0000000200)=ANY=[], 0xffdc) read(r3, &(0x7f0000000380)=""/165, 0x101d7) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 02:37:57 executing program 5: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000380)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000004240), 0xfffffe94) poll(&(0x7f0000000140)=[{r0}], 0x1, 0x9) 02:37:57 executing program 2: r0 = getpgrp(0xffffffffffffffff) get_robust_list(r0, &(0x7f00000000c0)=0x0, &(0x7f0000000100)) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r1) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udp\x00') write$P9_RCLUNK(0xffffffffffffffff, &(0x7f0000000100)={0x7}, 0x7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) ioctl(r2, 0x1000008915, &(0x7f00000000c0)) r3 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r3, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x8000, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$binfmt_misc(r3, &(0x7f0000000200)=ANY=[], 0xffdc) read(r3, &(0x7f0000000380)=""/165, 0x101d7) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 02:37:57 executing program 0: r0 = getpgrp(0xffffffffffffffff) get_robust_list(r0, &(0x7f00000000c0)=0x0, &(0x7f0000000100)) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r1) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udp\x00') write$P9_RCLUNK(0xffffffffffffffff, &(0x7f0000000100)={0x7}, 0x7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) ioctl(r2, 0x1000008915, &(0x7f00000000c0)) r3 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r3, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x8000, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$binfmt_misc(r3, &(0x7f0000000200)=ANY=[], 0xffdc) read(r3, &(0x7f0000000380)=""/165, 0x101d7) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 265.973049][T17656] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 02:37:57 executing program 5: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000380)='/dev/cuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000004240), 0xfffffe94) poll(&(0x7f0000000140)=[{r0}], 0x1, 0x9) 02:37:57 executing program 1: getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000640)=ANY=[@ANYBLOB="70000000b27edcc7c642439433b23b0a71018a25ca1970cb122e73301f05d711dc05143afe958d6db19eb1f72d74c61566905dc0fe5631790a9ed26c274b06eaab044219f8c54e8ac92ee10e781dc0364b101dc7d698ecbf0dcc0200000052265e0d4d2011a5da2917b2e36a160000"], 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000380)={0x0, 0x7ff}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x4e21, 0xe, @initdev={0xfe, 0x88, [], 0x1, 0x0}}}, 0x101, 0x7, 0x80000000, 0x5, 0xa6}, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x400, 0x16480) ioctl$VIDIOC_ENUM_FRAMESIZES(0xffffffffffffffff, 0xc02c564a, &(0x7f0000000000)={0x3, 0x3131354f, 0x2, @discrete={0x98b2, 0xffffffffffff022d}}) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e21, @multicast2}}}, 0x84) gettid() sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) mkdirat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x9) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 02:37:57 executing program 3: r0 = getpgrp(0xffffffffffffffff) get_robust_list(r0, &(0x7f00000000c0)=0x0, &(0x7f0000000100)) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r1) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udp\x00') write$P9_RCLUNK(0xffffffffffffffff, &(0x7f0000000100)={0x7}, 0x7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) ioctl(r2, 0x1000008915, &(0x7f00000000c0)) r3 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r3, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x8000, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$binfmt_misc(r3, &(0x7f0000000200)=ANY=[], 0xffdc) read(r3, &(0x7f0000000380)=""/165, 0x101d7) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 02:37:57 executing program 4: r0 = getpgrp(0xffffffffffffffff) get_robust_list(r0, &(0x7f00000000c0)=0x0, &(0x7f0000000100)) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r1) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udp\x00') write$P9_RCLUNK(0xffffffffffffffff, &(0x7f0000000100)={0x7}, 0x7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) ioctl(r2, 0x1000008915, &(0x7f00000000c0)) r3 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r3, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x8000, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$binfmt_misc(r3, &(0x7f0000000200)=ANY=[], 0xffdc) read(r3, &(0x7f0000000380)=""/165, 0x101d7) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 02:37:57 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/0\x03:]:,65.\\\x7f', &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ceph\x00', 0x0, 0x0) 02:37:57 executing program 0: r0 = getpgrp(0xffffffffffffffff) get_robust_list(r0, &(0x7f00000000c0)=0x0, &(0x7f0000000100)) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r1) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udp\x00') write$P9_RCLUNK(0xffffffffffffffff, &(0x7f0000000100)={0x7}, 0x7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) ioctl(r2, 0x1000008915, &(0x7f00000000c0)) r3 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r3, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x8000, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$binfmt_misc(r3, &(0x7f0000000200)=ANY=[], 0xffdc) read(r3, &(0x7f0000000380)=""/165, 0x101d7) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 02:37:57 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @mcast1}, 0x1c) [ 266.374296][T17692] ceph: device name is missing path (no : separator in /0:]:,65.\) 02:37:57 executing program 1: stat(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x5000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="02006800070f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 02:37:57 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/0\x03:]:,65.\\\x7f', &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ceph\x00', 0x0, 0x0) 02:37:57 executing program 4: r0 = getpgrp(0xffffffffffffffff) get_robust_list(r0, &(0x7f00000000c0)=0x0, &(0x7f0000000100)) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r1) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udp\x00') write$P9_RCLUNK(0xffffffffffffffff, &(0x7f0000000100)={0x7}, 0x7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) ioctl(r2, 0x1000008915, &(0x7f00000000c0)) r3 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r3, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x8000, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$binfmt_misc(r3, &(0x7f0000000200)=ANY=[], 0xffdc) read(r3, &(0x7f0000000380)=""/165, 0x101d7) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 02:37:57 executing program 3: r0 = getpgrp(0xffffffffffffffff) get_robust_list(r0, &(0x7f00000000c0)=0x0, &(0x7f0000000100)) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r1) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udp\x00') write$P9_RCLUNK(0xffffffffffffffff, &(0x7f0000000100)={0x7}, 0x7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) ioctl(r2, 0x1000008915, &(0x7f00000000c0)) r3 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r3, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x8000, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$binfmt_misc(r3, &(0x7f0000000200)=ANY=[], 0xffdc) read(r3, &(0x7f0000000380)=""/165, 0x101d7) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 266.605760][T17708] ceph: device name is missing path (no : separator in /0:]:,65.\) 02:37:58 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @mcast1}, 0x1c) 02:37:58 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/0\x03:]:,65.\\\x7f', &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ceph\x00', 0x0, 0x0) [ 266.764471][T17705] loop1: p1 < > p4 02:37:58 executing program 0: r0 = getpgrp(0xffffffffffffffff) get_robust_list(r0, &(0x7f00000000c0)=0x0, &(0x7f0000000100)) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r1) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udp\x00') write$P9_RCLUNK(0xffffffffffffffff, &(0x7f0000000100)={0x7}, 0x7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) ioctl(r2, 0x1000008915, &(0x7f00000000c0)) r3 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r3, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x8000, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$binfmt_misc(r3, &(0x7f0000000200)=ANY=[], 0xffdc) read(r3, &(0x7f0000000380)=""/165, 0x101d7) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) 02:37:58 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), &(0x7f0000000040)=0x4) 02:37:58 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@nullb='/0\x03:]:,65.\\\x7f', &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='ceph\x00', 0x0, 0x0) [ 266.873331][T17718] ceph: device name is missing path (no : separator in /0:]:,65.\) 02:37:58 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @mcast1}, 0x1c) 02:37:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000200)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1008}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x1e}], 0x8, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 02:37:58 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), &(0x7f0000000040)=0x4) [ 266.935753][T17705] loop1: p4 start 1854537728 is beyond EOD, [ 266.949110][T17705] truncated [ 267.054447][T17726] ceph: device name is missing path (no : separator in /0:]:,65.\) [ 267.211840][T17737] loop1: p1 < > p4 [ 267.271964][T17737] loop1: p4 start 1854537728 is beyond EOD, truncated 02:37:58 executing program 1: stat(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x5000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="02006800070f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 02:37:58 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @mcast1}, 0x1c) 02:37:58 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), &(0x7f0000000040)=0x4) 02:37:58 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00000000c0)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0xf13}) 02:37:58 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x20, 0x0, 0x25a) 02:37:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000200)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1008}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x1e}], 0x8, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 02:37:58 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x20, 0x0, 0x25a) 02:37:58 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), &(0x7f0000000040)=0x4) 02:37:58 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00000000c0)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0xf13}) 02:37:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000200)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1008}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x1e}], 0x8, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 02:37:58 executing program 2: socket$packet(0x11, 0x0, 0x300) r0 = open(&(0x7f0000002000)='./bus\x00', 0x800000000141042, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) write$cgroup_type(r0, &(0x7f0000000180)='threaded\x00', 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r1, 0x0, 0x40000000, 0x10000101) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, 0x0, 0x0) 02:37:59 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x20, 0x0, 0x25a) [ 267.634431][T17759] loop1: p1 < > p4 [ 267.687115][T17759] loop1: p4 start 1854537728 is beyond EOD, truncated [ 267.816804][T17779] blk_update_request: I/O error, dev loop1, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 267.828510][T17759] __loop_clr_fd: partition scan of loop1 failed (rc=-16) [ 267.856763][ T2499] blk_update_request: I/O error, dev loop1, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 267.868372][ T2499] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 267.887634][ T2498] blk_update_request: I/O error, dev loop1, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 267.898742][ T2498] Buffer I/O error on dev loop1p1, logical block 0, async page read 02:37:59 executing program 1: stat(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x5000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="02006800070f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 02:37:59 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040)='iso9660\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)={[{@utf8='utf8'}]}) 02:37:59 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00000000c0)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0xf13}) 02:37:59 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket(0x10, 0x2, 0x0) sendto(r1, &(0x7f0000000200)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1008}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x1e}], 0x8, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 02:37:59 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x20, 0x0, 0x25a) [ 267.908135][ T2498] blk_update_request: I/O error, dev loop1, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 267.919154][ T2498] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 267.930384][ T2498] blk_update_request: I/O error, dev loop1, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 267.941883][ T2498] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 267.958840][ T2498] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 267.967154][ T2498] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 267.975939][ T2498] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 267.985180][ T2498] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 267.994913][ T2498] Buffer I/O error on dev loop1p1, logical block 0, async page read 02:37:59 executing program 2: socket$packet(0x11, 0x0, 0x300) r0 = open(&(0x7f0000002000)='./bus\x00', 0x800000000141042, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) write$cgroup_type(r0, &(0x7f0000000180)='threaded\x00', 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r1, 0x0, 0x40000000, 0x10000101) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, 0x0, 0x0) [ 268.006302][ T26] audit: type=1800 audit(1562899079.420:32): pid=17774 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed comm="syz-executor.2" name="bus" dev="sda1" ino=16566 res=0 [ 268.007118][ T2499] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 268.036465][ T26] audit: type=1800 audit(1562899079.440:33): pid=17781 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed comm="syz-executor.2" name="bus" dev="sda1" ino=16566 res=0 02:37:59 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00000000c0)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0xf13}) 02:37:59 executing program 0: socket$packet(0x11, 0x0, 0x300) r0 = open(&(0x7f0000002000)='./bus\x00', 0x800000000141042, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) write$cgroup_type(r0, &(0x7f0000000180)='threaded\x00', 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r1, 0x0, 0x40000000, 0x10000101) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, 0x0, 0x0) 02:37:59 executing program 3: socket$packet(0x11, 0x0, 0x300) r0 = open(&(0x7f0000002000)='./bus\x00', 0x800000000141042, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) write$cgroup_type(r0, &(0x7f0000000180)='threaded\x00', 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r1, 0x0, 0x40000000, 0x10000101) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, 0x0, 0x0) [ 268.173689][T17786] ISOFS: Unable to identify CD-ROM format. [ 268.260640][T17797] loop1: p1 < > p4 02:37:59 executing program 5: socket$packet(0x11, 0x0, 0x300) r0 = open(&(0x7f0000002000)='./bus\x00', 0x800000000141042, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) write$cgroup_type(r0, &(0x7f0000000180)='threaded\x00', 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r1, 0x0, 0x40000000, 0x10000101) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, 0x0, 0x0) [ 268.338156][T17797] loop1: p4 start 1854537728 is beyond EOD, truncated [ 268.409053][T17786] ISOFS: Unable to identify CD-ROM format. 02:37:59 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040)='iso9660\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)={[{@utf8='utf8'}]}) 02:38:00 executing program 2: socket$packet(0x11, 0x0, 0x300) r0 = open(&(0x7f0000002000)='./bus\x00', 0x800000000141042, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) write$cgroup_type(r0, &(0x7f0000000180)='threaded\x00', 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r1, 0x0, 0x40000000, 0x10000101) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, 0x0, 0x0) 02:38:00 executing program 1: stat(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x5000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="02006800070f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) 02:38:00 executing program 3: socket$packet(0x11, 0x0, 0x300) r0 = open(&(0x7f0000002000)='./bus\x00', 0x800000000141042, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) write$cgroup_type(r0, &(0x7f0000000180)='threaded\x00', 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r1, 0x0, 0x40000000, 0x10000101) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, 0x0, 0x0) 02:38:00 executing program 5: socket$packet(0x11, 0x0, 0x300) r0 = open(&(0x7f0000002000)='./bus\x00', 0x800000000141042, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) write$cgroup_type(r0, &(0x7f0000000180)='threaded\x00', 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r1, 0x0, 0x40000000, 0x10000101) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, 0x0, 0x0) [ 268.825138][T17827] ISOFS: Unable to identify CD-ROM format. 02:38:00 executing program 0: socket$packet(0x11, 0x0, 0x300) r0 = open(&(0x7f0000002000)='./bus\x00', 0x800000000141042, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) write$cgroup_type(r0, &(0x7f0000000180)='threaded\x00', 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r1, 0x0, 0x40000000, 0x10000101) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, 0x0, 0x0) 02:38:00 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040)='iso9660\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)={[{@utf8='utf8'}]}) 02:38:00 executing program 2: socket$packet(0x11, 0x0, 0x300) r0 = open(&(0x7f0000002000)='./bus\x00', 0x800000000141042, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) write$cgroup_type(r0, &(0x7f0000000180)='threaded\x00', 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r1, 0x0, 0x40000000, 0x10000101) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, 0x0, 0x0) [ 269.134425][T17840] loop1: p1 < > p4 [ 269.182078][T17840] loop1: p4 start 1854537728 is beyond EOD, truncated 02:38:00 executing program 2: r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x1268, &(0x7f0000000080)={[0x7]}) 02:38:00 executing program 0: socket$packet(0x11, 0x0, 0x300) r0 = open(&(0x7f0000002000)='./bus\x00', 0x800000000141042, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) write$cgroup_type(r0, &(0x7f0000000180)='threaded\x00', 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r1, 0x0, 0x40000000, 0x10000101) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, 0x0, 0x0) [ 269.360145][T17854] ISOFS: Unable to identify CD-ROM format. 02:38:00 executing program 3: socket$packet(0x11, 0x0, 0x300) r0 = open(&(0x7f0000002000)='./bus\x00', 0x800000000141042, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) write$cgroup_type(r0, &(0x7f0000000180)='threaded\x00', 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r1, 0x0, 0x40000000, 0x10000101) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, 0x0, 0x0) 02:38:00 executing program 5: socket$packet(0x11, 0x0, 0x300) r0 = open(&(0x7f0000002000)='./bus\x00', 0x800000000141042, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) write$cgroup_type(r0, &(0x7f0000000180)='threaded\x00', 0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r1, 0x0, 0x40000000, 0x10000101) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, 0x0, 0x0) 02:38:00 executing program 2: write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000001200)=ANY=[@ANYBLOB="7f454c46000000000000000000000000000000800000000000000000380000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f7f1629aa33dfdf458fa253d7b961b38715549ef46991e9ba4c652ff6b1947dba74c0b2b647ebfc29c7d5ff2353666344d22978f5197664fdd525ece24d38a27aab93ecf61eb361365e6d88e8ceb7fbf309865d7f7a146f9e615ce11ef5273dc8dab6db425e083d4952cc59c983b7c9f75ef92b009a9ca56fd64048a4c5692bbd0504e73fd09e8e9d9b5bf3b9be8957ee2b4c494a135e816e292b3976b02c5ef07a6c19187a81c52bc9f0dd3c1043d9154767ba6018eb507ba998c47f628a5af70968af4bb739cc4aad8ddfeb903be02a33cce88b3bc79d291f2415d06e8ce4a5d95e2d94eebdcb946a461472fee2c8c53ca1f4779aa3cfb2cb8abde32b9980ecacf917cf365277ba92bf733421b427d2a9a4df11637dd6abc67a43b9aa69ae537cba1a008222ffdd45bdf9f633a7a779d5d4294441e20fc7d13a5edf330fc65f9e423cc8406435695e28d4164da042c91a87734a7a988decf43505d3c0a9518ba5f10448600ddf9664ef226e8e13622e46ed69fba31694c1376f2620bb046997de207826294f3780e11948ec53b2205251c38d29e478e26b7c8c9a2be937663019468bb5286e1bfd245e0affb81def08cec5e594477eeea95a4dfcbe350de317e009e4fe6144165acb49ed878d83eb0dd175be543bc8987b7d49eb7b8bba590b5f4389a9e6a73ee94775a2ae8c4a38d264888f008e2757154066bf28d018436cf70cf5e277737da8fb3b2b287d835b9c760534810673b560ca7b66c2c212a718f96622c6c59ac03cb7685bc0c5bd067bf21e1ec2b62625fc7c1e8ec7b6a9798affd75ca28c156c6b0f4bfae0642b7675987cd4540b8c203a4291a3b20389fce0bcea06897414dc6dbc39b4a827a852b34f2d1658e7646771802f3b979e74c4f6ac01622aae595e70bd6126fc1fde67c00b22f2a19f2e58adf5eefe6ec935ff68f4dc6f1116ea9795cca2daf7a4c1f62e2c1c401202a7e8206cc2cf57d0c703164697a0ac7f99cce6d69390c9080e81aad1e768ee1971deb3003b103dc0224944399e7ab34b6a5623d760f39a04d3a88457a89dae860cc6cdcd087815581480fc52cadb4ab34e8d90f982434321162d92df6ca9302649475bfcfdfade75e306cd9ad4a16d1eddd7ef2731cfaa8da2d87a55051540ebcac2ce62fe9a57070eb23cdae5e1e16e9e62c3ef50cd38ca5daa62dfda1fb30d7081ca803290918dba8f7ea63cf45ef7564bd837e5bd3f2689e518237ea04c0aa68336b2e9c5d5d5763b5ca6958bfb7a074ac0a2e80ff35f01c5fbcf7d593d987bd731bd3f7a156f4f45feaadac545a41cbe213fab1c305a0be63df61237eb3305d497a6c6d9f53c1f1bfd59f06826d9b994c78bcad276ab90f65dac1f3054b02fe24e4d1f8f314d7b42f559f3a08343b3045af4460cb45bdd61966fcb5a0d922d5102cfcc491763efe0749b07c6c86f2c2dd5c2b0618cecd17b13c1cae35dc60b147549b62f80a460a9e419892411e87870ec9d6f02dbd7dd4fb12da4b9afde52e432ba612f4728018de65bdab3697ca4533e3bbcda15d2b167cd9c2e6f8bd815cd4c1b64f36bb514968cc76859103124c7a70ae6f1b961a60dfc65b322d6d66adf1f918d78343a8cc5718e28a331428e6be4012e5088a7e81d44560cc852c114d777780b33d0b91c0841eded8c1bf3ce91c3adcbbe41dc08c8c0fe823777d1b98919207ba5fca485726bc672e68bf6bf260eda487a9c08c60bfcba33f6f19afe860283c57f7a9e43e3b99cd935893c149753ce7c4b26cfc24049916b55db319d117518557cf8d43a35319182bdfbacb085fef8becab7e0a9df49797776d7df59b3b3a2758b6931aec7994fde1af5606de344d21c8587616b73b02aa129d091723557c3310fdbd3d66eea93151d97c940319732e5815d075a4ad22fea5566b4e6fa8715aca0742ab669ec1534bc0c84503b2560ac515626905f49cb550952a27467e8bd2879c1160ad398c1072031a4be59fb36931d9e9885143a86a3798efc154cdee2ab7557976a14f82a37fe26e123d8b6c835340e2e537ee81c0d90998c858922063e6d3c0c6b777efde2d12ece1d91b10eedbacc8689ada5da76bef13279f5e8e8902e40023422b282463f70f8e5bf38ea83b8de7c644fa336e606ce05134644834891aa7605b0eb1456b0f9e7ffce41102495c704ba683b53d97df0f171483cc5c2b3f6c6fca72949e19e508174114f8e74fc36fa380c63b87032cb1542bc3054614dc2f2a450ddb3db346d8395dd399dcfe55ba9457ccea5ed22afc51a4301638c0ce53cf7dee5e9e6b2b492d2ccbd3777399d45a5ca2ba708927217a8c584eb802d05c6d08478c2ff76f1cb13610557c00451ae65cc014d7ab6fe9498e1145c65da4590166b70153a1cf6234f53888bbcc15818ff27b12699c3d64cbe7ff41bcb90f912c4e04650751dd1be542c8408f7f7ced20a57ed2220c9b799921265241fc367666c0b3bce8db7f18fae6e07074928c6382f8878bf4a98f085d05d27342e5471ea84a62d90c3020a8ca6e6f410419a7db33ec6bf7d4bde82b36108eeccb6213a5c87262eae3a6574a027702285405ebcccd2f9516d31a3394f1776a5150def9a8aede1993cfdf97eefaca67abc9f980d9532edf24909a6660aa50af58f0ac8c985ee871e5163d8cf505b194bb02e33ed9f1c41486d50be821e56966f32c2d06b3c0d4f1a09c1fdf2effaeda79161078e613a90af29fcc00874006b3436579bd8280d505f165b12704ed6302409edb2d1afeaf88b5a6aa0c1ed2dd669353c20fc1e72eb4cf5e296483677e3d0907d11c799720eab9b59c7c046264ce9bc82b91dd9b5a318e452626e65f39d48f841ae5bec8a9681df481cb406cc8d40b28c90c0305d27b2a0bd718a246e87255c782c82d5697cb23b215c9e9005c8ed327d7d96d93aadc4925e7a9ca0452217dc7782a7c40a2cf0a563f5ba28378b2cf2192ff7fea60068b2a38060f0ef857b97acb1dc1efe405128cddc6bfeca91288f43cc0e8235f139c34e4a0e13562e0258f9f39e55c8f62b2a14d1dd83ee19dae7cf54da309887ef1e64250aea36458b3a0bb14ff63f9614ea4c8d1335ac3b4208df33fa22c218447a5e5a539e413a09042ba3352d94dc064c38fad79a91e793b006c2ffd97ec0d2621d2f43a4a9eb0dd06ec96691e8ae92558864adf10bfccf60bd72d8a81dead1ab125b92d3b72b94a9b0d4677395c6e093ab4106f75717f9aec2973e7257fabbbbfc4e30036a55190d83e4b9bf680e4e4c6493ce389462a2f0fd614f47b5afcd3758f30ae2cc99d1d52a3c5f912117dff55c06043eb2aa5627afeee903cf35fb8e6d6ebb465cbd17a1eb79b890895844c6209d37ac7c15848f8d4fc6f094f821eb915e48a5792efc4d33e6027297b23fd84ff3b52cb7ca117b5dbbfd3cea05ab4e278ca6ff6eb7b2e14b5f3e54aa1cc8155d4404f1b0bb1d2f7d20f1ddd387b2cc0d34f0676cd4ab12d3b984c884e1adf583bb7ccfec26f7e190ecd93d10c4514e20c454f8a936b913cce53923a4b33d6a25084b32a3ed97c1e3f4621c1ac73e33209f3d9a4b191dc0b0ca0573d0f2b854437b54a8eea39e30683be41348bd04ce7b1acfa34eeb51fc35990c64d3f4dd3ba61b9fdd278b11d761a437297ad355166cbe2b5dd9c38a553e7ff32caab4f430e2bcca461c74f31012c50ab156614b270f1949313fa646549e380615444a0c2267ca6c07dc0ba297c60bdb73aa4115339b116587d3ad6fa442abba05b83c08f247aab1a633a171fcac1015306d573353382fee5e6e565c8ef8f49527eabea7f9c8c42cfc2176943a63f3133871aac22540f532ab02197db0bfee21d1535f2f5f7de953fea7cdfd78ff3fb85f59ad60f1b1823da2c115ea463b9f002f6b131d5b41bf2a2deec460dde5aa69273d8f9afcceff48e3ca92fc0bf6eede9851a5f139e460856d20600d4cca9b6d5de4d88cf4e166b0f0e420ac7d74626eb63b8d376328deb910dd47ef8d9f7ab6a140da3116368da621b4cb3b28aa618db5ea4d456235a062d548d7a3f91ea511ebdb3d0a8c9590adc642ebd5b092eb6d18ac380c5d7291ed005cc4400738f5bbabdc24eda7736ec1c11fc5ba753f048e237e560d1171db14dfececaae398fc6b121406887d8605e35608d6927f6deb67cad03a8e8c564312aaf8403b86cb4895c63fbaa3f3ffccf2efa677ae34295d06d27e7d292f93fc4b8f5829bb593a787eab39a8155ffcb585d010ab9f8b982c49b5778b98f2500a37b6dcd28147f228dbea25066134e7f8be98d5a1b5ac3d23ff13340594f840c3f0f9aed7b2793ce8cca22014620e6ee4c7f231db82d1064f53f23f92ce00a05e36ad17dc124d6a4daf7f7a9cdb68378dd75257965bbc62d89e6b547e44562e71c05a0f5c9d2f1d0c7d988d28706601633abdfe569854c32418e2de83815df7ea499c69d11c4dec770ea5d5b106877842452bebbec07590456a9f90b96093b3034bf94e31ad1c29762df906c37c79cfad38fe936731e9538c2905c718377b2a505c0fcafbf6a53478acce2c2b618d95af8442513e94d9ced16dda103bed0bce6bd4deeb491f743ff4c0a12393a0c44109842f3cc7cdfe04e48e26d732aa6cfabe5bb9818638f9aacdf6ada48aeed1223e58a60d39618a3c9750c698cd0029f914e4d01f69ec199f506c70be063ae5fd737ef3032c9872575eca2ff14f63efe7c2d37fc03f548210be9ebd9f90947f92ee0107b302124dec6a6d1a8287f81d1761abc626b8744156dbffdbfaff7b034567658aed0b68841dfba4df3e7e5254c696d06b1dfb9362f020720dcb5b7862b4b8eb3dbd164e90a04b3d4a331d142f5621531273db3c5fe056e6bb69c1cf9721693500b4895a577da72c18364c35a21a327271c63760508e7567f432c194cd0bd81d25f5269eeb90bc9990a18148f63888e42f82afd1169135dddf7a7d3a0efde3507a802ee49495be4e88be183f0720a5229f55d9610be7ab56ea6ff6922d6fa02072ee04649013f5a6e50298d6e83307352434e950e648b02cd2d25d90814cc0fff6fbf48b47bdae0566a622eaede735cee24902d71cce85c2eac5f9f3c8169f50957d92e7ac1dca0d48410be6493892e489ca94ddda444a1466c8449220f3ccd015c5fa8167dc54b17555ef33d19fe7bbd746511452af74957cda9dc4e3a08cc1399e99124690cca9a24412a1a0996c28c0fb55f319cf63a8de5fcaa7e70e755bad2d83aab8df97af388ec24b29be21fe18e1c3445d41a87753fb3fa930b6a2371554e060c86e9c2374a7584687b41f9cb75564806007ee9910af5756f9fcb0012664be9b9fd716d6234a0a1de36f919653b6796d2641b1d7b4b6b71f02839a74cfc8446cd84e4e679d66ddf0029"], 0xf4a) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'lo\x00', 0x0}) bind$packet(r3, &(0x7f0000000040)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000000140)=0xfb8, 0x4) splice(r0, 0x0, r2, 0x0, 0x10001, 0x0) 02:38:01 executing program 4: syz_mount_image$iso9660(&(0x7f0000000040)='iso9660\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)={[{@utf8='utf8'}]}) 02:38:01 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008032, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000769000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x10000000002) [ 269.685254][T17876] skbuff: bad partial csum: csum=57197/10496 headroom=2 headlen=2159 02:38:01 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x0, 0x0, 0xfffffffffffffffe) 02:38:01 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x0, 0x0, 0xfffffffffffffffe) [ 269.880230][T17886] ISOFS: Unable to identify CD-ROM format. 02:38:01 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x0, 0x0, 0xfffffffffffffffe) 02:38:01 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)={0x18, 0x19, 0x2000000000000301, 0x0, 0x0, {0xffffff16}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 02:38:01 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001680)=@bridge_delneigh={0x28, 0x1d, 0x109, 0x0, 0x0, {0xc}, [@NDA_DST_MAC={0xc, 0x1, @link_local}]}, 0x28}}, 0x0) 02:38:01 executing program 4: writev(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="390000001300090468fe0700001a00000700ff3f03000000450001070000001419001a0004001210070000f48aa159", 0x2f}], 0x1) r0 = socket(0x10, 0x800000000080002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x492492492492805, 0x0) 02:38:01 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x0, 0x0, 0xfffffffffffffffe) 02:38:01 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)={0x18, 0x19, 0x2000000000000301, 0x0, 0x0, {0xffffff16}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 02:38:01 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001680)=@bridge_delneigh={0x28, 0x1d, 0x109, 0x0, 0x0, {0xc}, [@NDA_DST_MAC={0xc, 0x1, @link_local}]}, 0x28}}, 0x0) 02:38:01 executing program 2: write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000001200)=ANY=[@ANYBLOB="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"], 0xf4a) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'lo\x00', 0x0}) bind$packet(r3, &(0x7f0000000040)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000000140)=0xfb8, 0x4) splice(r0, 0x0, r2, 0x0, 0x10001, 0x0) 02:38:01 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)={0x18, 0x19, 0x2000000000000301, 0x0, 0x0, {0xffffff16}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 02:38:01 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008032, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000769000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x10000000002) 02:38:01 executing program 1: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008032, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000769000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x10000000002) 02:38:01 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001680)=@bridge_delneigh={0x28, 0x1d, 0x109, 0x0, 0x0, {0xc}, [@NDA_DST_MAC={0xc, 0x1, @link_local}]}, 0x28}}, 0x0) 02:38:01 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)={0x18, 0x19, 0x2000000000000301, 0x0, 0x0, {0xffffff16}, [@nested={0x4, 0x2}]}, 0x18}}, 0x0) 02:38:01 executing program 4: writev(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="390000001300090468fe0700001a00000700ff3f03000000450001070000001419001a0004001210070000f48aa159", 0x2f}], 0x1) r0 = socket(0x10, 0x800000000080002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 270.592927][T17937] skbuff: bad partial csum: csum=57197/10496 headroom=2 headlen=2159 02:38:02 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001680)=@bridge_delneigh={0x28, 0x1d, 0x109, 0x0, 0x0, {0xc}, [@NDA_DST_MAC={0xc, 0x1, @link_local}]}, 0x28}}, 0x0) 02:38:02 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0000a5055e0bcfec7be070") setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @mcast2}}, 0x5c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000), 0x14) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r1, 0x29, 0x40, &(0x7f0000001fde), 0x4) 02:38:02 executing program 3: futex(0xfffffffffffffffd, 0x85, 0x0, 0x0, 0x0, 0x0) 02:38:02 executing program 1: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008032, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000769000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x10000000002) 02:38:02 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0000a5055e0bcfec7be070") setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @mcast2}}, 0x5c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000), 0x14) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r1, 0x29, 0x40, &(0x7f0000001fde), 0x4) 02:38:02 executing program 2: write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000001200)=ANY=[@ANYBLOB="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"], 0xf4a) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'lo\x00', 0x0}) bind$packet(r3, &(0x7f0000000040)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000000140)=0xfb8, 0x4) splice(r0, 0x0, r2, 0x0, 0x10001, 0x0) 02:38:02 executing program 3: futex(0xfffffffffffffffd, 0x85, 0x0, 0x0, 0x0, 0x0) 02:38:02 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0000a5055e0bcfec7be070") setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @mcast2}}, 0x5c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000), 0x14) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r1, 0x29, 0x40, &(0x7f0000001fde), 0x4) 02:38:02 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008032, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000769000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x10000000002) 02:38:02 executing program 1: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008032, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000769000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x10000000002) 02:38:02 executing program 4: writev(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="390000001300090468fe0700001a00000700ff3f03000000450001070000001419001a0004001210070000f48aa159", 0x2f}], 0x1) r0 = socket(0x10, 0x800000000080002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x492492492492805, 0x0) 02:38:02 executing program 3: futex(0xfffffffffffffffd, 0x85, 0x0, 0x0, 0x0, 0x0) 02:38:02 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0000a5055e0bcfec7be070") setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa, 0x0, 0x0, @mcast2}, {0xa, 0x0, 0x0, @mcast2}}, 0x5c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000), 0x14) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r1, 0x29, 0x40, &(0x7f0000001fde), 0x4) 02:38:02 executing program 3: futex(0xfffffffffffffffd, 0x85, 0x0, 0x0, 0x0, 0x0) [ 271.465241][T17984] skbuff: bad partial csum: csum=57197/10496 headroom=2 headlen=2159 02:38:02 executing program 5: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0) 02:38:03 executing program 5: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0) 02:38:03 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = memfd_create(&(0x7f0000000240)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r1, 0x0, 0x0, 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r1, 0x0) poll(&(0x7f0000000100)=[{}], 0x1, 0x0) select(0x40, &(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000180)={0x0, 0x2710}) 02:38:03 executing program 2: write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000001200)=ANY=[@ANYBLOB="7f454c46000000000000000000000000000000800000000000000000380000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f7f1629aa33dfdf458fa253d7b961b38715549ef46991e9ba4c652ff6b1947dba74c0b2b647ebfc29c7d5ff2353666344d22978f5197664fdd525ece24d38a27aab93ecf61eb361365e6d88e8ceb7fbf309865d7f7a146f9e615ce11ef5273dc8dab6db425e083d4952cc59c983b7c9f75ef92b009a9ca56fd64048a4c5692bbd0504e73fd09e8e9d9b5bf3b9be8957ee2b4c494a135e816e292b3976b02c5ef07a6c19187a81c52bc9f0dd3c1043d9154767ba6018eb507ba998c47f628a5af70968af4bb739cc4aad8ddfeb903be02a33cce88b3bc79d291f2415d06e8ce4a5d95e2d94eebdcb946a461472fee2c8c53ca1f4779aa3cfb2cb8abde32b9980ecacf917cf365277ba92bf733421b427d2a9a4df11637dd6abc67a43b9aa69ae537cba1a008222ffdd45bdf9f633a7a779d5d4294441e20fc7d13a5edf330fc65f9e423cc8406435695e28d4164da042c91a87734a7a988decf43505d3c0a9518ba5f10448600ddf9664ef226e8e13622e46ed69fba31694c1376f2620bb046997de207826294f3780e11948ec53b2205251c38d29e478e26b7c8c9a2be937663019468bb5286e1bfd245e0affb81def08cec5e594477eeea95a4dfcbe350de317e009e4fe6144165acb49ed878d83eb0dd175be543bc8987b7d49eb7b8bba590b5f4389a9e6a73ee94775a2ae8c4a38d264888f008e2757154066bf28d018436cf70cf5e277737da8fb3b2b287d835b9c760534810673b560ca7b66c2c212a718f96622c6c59ac03cb7685bc0c5bd067bf21e1ec2b62625fc7c1e8ec7b6a9798affd75ca28c156c6b0f4bfae0642b7675987cd4540b8c203a4291a3b20389fce0bcea06897414dc6dbc39b4a827a852b34f2d1658e7646771802f3b979e74c4f6ac01622aae595e70bd6126fc1fde67c00b22f2a19f2e58adf5eefe6ec935ff68f4dc6f1116ea9795cca2daf7a4c1f62e2c1c401202a7e8206cc2cf57d0c703164697a0ac7f99cce6d69390c9080e81aad1e768ee1971deb3003b103dc0224944399e7ab34b6a5623d760f39a04d3a88457a89dae860cc6cdcd087815581480fc52cadb4ab34e8d90f982434321162d92df6ca9302649475bfcfdfade75e306cd9ad4a16d1eddd7ef2731cfaa8da2d87a55051540ebcac2ce62fe9a57070eb23cdae5e1e16e9e62c3ef50cd38ca5daa62dfda1fb30d7081ca803290918dba8f7ea63cf45ef7564bd837e5bd3f2689e518237ea04c0aa68336b2e9c5d5d5763b5ca6958bfb7a074ac0a2e80ff35f01c5fbcf7d593d987bd731bd3f7a156f4f45feaadac545a41cbe213fab1c305a0be63df61237eb3305d497a6c6d9f53c1f1bfd59f06826d9b994c78bcad276ab90f65dac1f3054b02fe24e4d1f8f314d7b42f559f3a08343b3045af4460cb45bdd61966fcb5a0d922d5102cfcc491763efe0749b07c6c86f2c2dd5c2b0618cecd17b13c1cae35dc60b147549b62f80a460a9e419892411e87870ec9d6f02dbd7dd4fb12da4b9afde52e432ba612f4728018de65bdab3697ca4533e3bbcda15d2b167cd9c2e6f8bd815cd4c1b64f36bb514968cc76859103124c7a70ae6f1b961a60dfc65b322d6d66adf1f918d78343a8cc5718e28a331428e6be4012e5088a7e81d44560cc852c114d777780b33d0b91c0841eded8c1bf3ce91c3adcbbe41dc08c8c0fe823777d1b98919207ba5fca485726bc672e68bf6bf260eda487a9c08c60bfcba33f6f19afe860283c57f7a9e43e3b99cd935893c149753ce7c4b26cfc24049916b55db319d117518557cf8d43a35319182bdfbacb085fef8becab7e0a9df49797776d7df59b3b3a2758b6931aec7994fde1af5606de344d21c8587616b73b02aa129d091723557c3310fdbd3d66eea93151d97c940319732e5815d075a4ad22fea5566b4e6fa8715aca0742ab669ec1534bc0c84503b2560ac515626905f49cb550952a27467e8bd2879c1160ad398c1072031a4be59fb36931d9e9885143a86a3798efc154cdee2ab7557976a14f82a37fe26e123d8b6c835340e2e537ee81c0d90998c858922063e6d3c0c6b777efde2d12ece1d91b10eedbacc8689ada5da76bef13279f5e8e8902e40023422b282463f70f8e5bf38ea83b8de7c644fa336e606ce05134644834891aa7605b0eb1456b0f9e7ffce41102495c704ba683b53d97df0f171483cc5c2b3f6c6fca72949e19e508174114f8e74fc36fa380c63b87032cb1542bc3054614dc2f2a450ddb3db346d8395dd399dcfe55ba9457ccea5ed22afc51a4301638c0ce53cf7dee5e9e6b2b492d2ccbd3777399d45a5ca2ba708927217a8c584eb802d05c6d08478c2ff76f1cb13610557c00451ae65cc014d7ab6fe9498e1145c65da4590166b70153a1cf6234f53888bbcc15818ff27b12699c3d64cbe7ff41bcb90f912c4e04650751dd1be542c8408f7f7ced20a57ed2220c9b799921265241fc367666c0b3bce8db7f18fae6e07074928c6382f8878bf4a98f085d05d27342e5471ea84a62d90c3020a8ca6e6f410419a7db33ec6bf7d4bde82b36108eeccb6213a5c87262eae3a6574a027702285405ebcccd2f9516d31a3394f1776a5150def9a8aede1993cfdf97eefaca67abc9f980d9532edf24909a6660aa50af58f0ac8c985ee871e5163d8cf505b194bb02e33ed9f1c41486d50be821e56966f32c2d06b3c0d4f1a09c1fdf2effaeda79161078e613a90af29fcc00874006b3436579bd8280d505f165b12704ed6302409edb2d1afeaf88b5a6aa0c1ed2dd669353c20fc1e72eb4cf5e296483677e3d0907d11c799720eab9b59c7c046264ce9bc82b91dd9b5a318e452626e65f39d48f841ae5bec8a9681df481cb406cc8d40b28c90c0305d27b2a0bd718a246e87255c782c82d5697cb23b215c9e9005c8ed327d7d96d93aadc4925e7a9ca0452217dc7782a7c40a2cf0a563f5ba28378b2cf2192ff7fea60068b2a38060f0ef857b97acb1dc1efe405128cddc6bfeca91288f43cc0e8235f139c34e4a0e13562e0258f9f39e55c8f62b2a14d1dd83ee19dae7cf54da309887ef1e64250aea36458b3a0bb14ff63f9614ea4c8d1335ac3b4208df33fa22c218447a5e5a539e413a09042ba3352d94dc064c38fad79a91e793b006c2ffd97ec0d2621d2f43a4a9eb0dd06ec96691e8ae92558864adf10bfccf60bd72d8a81dead1ab125b92d3b72b94a9b0d4677395c6e093ab4106f75717f9aec2973e7257fabbbbfc4e30036a55190d83e4b9bf680e4e4c6493ce389462a2f0fd614f47b5afcd3758f30ae2cc99d1d52a3c5f912117dff55c06043eb2aa5627afeee903cf35fb8e6d6ebb465cbd17a1eb79b890895844c6209d37ac7c15848f8d4fc6f094f821eb915e48a5792efc4d33e6027297b23fd84ff3b52cb7ca117b5dbbfd3cea05ab4e278ca6ff6eb7b2e14b5f3e54aa1cc8155d4404f1b0bb1d2f7d20f1ddd387b2cc0d34f0676cd4ab12d3b984c884e1adf583bb7ccfec26f7e190ecd93d10c4514e20c454f8a936b913cce53923a4b33d6a25084b32a3ed97c1e3f4621c1ac73e33209f3d9a4b191dc0b0ca0573d0f2b854437b54a8eea39e30683be41348bd04ce7b1acfa34eeb51fc35990c64d3f4dd3ba61b9fdd278b11d761a437297ad355166cbe2b5dd9c38a553e7ff32caab4f430e2bcca461c74f31012c50ab156614b270f1949313fa646549e380615444a0c2267ca6c07dc0ba297c60bdb73aa4115339b116587d3ad6fa442abba05b83c08f247aab1a633a171fcac1015306d573353382fee5e6e565c8ef8f49527eabea7f9c8c42cfc2176943a63f3133871aac22540f532ab02197db0bfee21d1535f2f5f7de953fea7cdfd78ff3fb85f59ad60f1b1823da2c115ea463b9f002f6b131d5b41bf2a2deec460dde5aa69273d8f9afcceff48e3ca92fc0bf6eede9851a5f139e460856d20600d4cca9b6d5de4d88cf4e166b0f0e420ac7d74626eb63b8d376328deb910dd47ef8d9f7ab6a140da3116368da621b4cb3b28aa618db5ea4d456235a062d548d7a3f91ea511ebdb3d0a8c9590adc642ebd5b092eb6d18ac380c5d7291ed005cc4400738f5bbabdc24eda7736ec1c11fc5ba753f048e237e560d1171db14dfececaae398fc6b121406887d8605e35608d6927f6deb67cad03a8e8c564312aaf8403b86cb4895c63fbaa3f3ffccf2efa677ae34295d06d27e7d292f93fc4b8f5829bb593a787eab39a8155ffcb585d010ab9f8b982c49b5778b98f2500a37b6dcd28147f228dbea25066134e7f8be98d5a1b5ac3d23ff13340594f840c3f0f9aed7b2793ce8cca22014620e6ee4c7f231db82d1064f53f23f92ce00a05e36ad17dc124d6a4daf7f7a9cdb68378dd75257965bbc62d89e6b547e44562e71c05a0f5c9d2f1d0c7d988d28706601633abdfe569854c32418e2de83815df7ea499c69d11c4dec770ea5d5b106877842452bebbec07590456a9f90b96093b3034bf94e31ad1c29762df906c37c79cfad38fe936731e9538c2905c718377b2a505c0fcafbf6a53478acce2c2b618d95af8442513e94d9ced16dda103bed0bce6bd4deeb491f743ff4c0a12393a0c44109842f3cc7cdfe04e48e26d732aa6cfabe5bb9818638f9aacdf6ada48aeed1223e58a60d39618a3c9750c698cd0029f914e4d01f69ec199f506c70be063ae5fd737ef3032c9872575eca2ff14f63efe7c2d37fc03f548210be9ebd9f90947f92ee0107b302124dec6a6d1a8287f81d1761abc626b8744156dbffdbfaff7b034567658aed0b68841dfba4df3e7e5254c696d06b1dfb9362f020720dcb5b7862b4b8eb3dbd164e90a04b3d4a331d142f5621531273db3c5fe056e6bb69c1cf9721693500b4895a577da72c18364c35a21a327271c63760508e7567f432c194cd0bd81d25f5269eeb90bc9990a18148f63888e42f82afd1169135dddf7a7d3a0efde3507a802ee49495be4e88be183f0720a5229f55d9610be7ab56ea6ff6922d6fa02072ee04649013f5a6e50298d6e83307352434e950e648b02cd2d25d90814cc0fff6fbf48b47bdae0566a622eaede735cee24902d71cce85c2eac5f9f3c8169f50957d92e7ac1dca0d48410be6493892e489ca94ddda444a1466c8449220f3ccd015c5fa8167dc54b17555ef33d19fe7bbd746511452af74957cda9dc4e3a08cc1399e99124690cca9a24412a1a0996c28c0fb55f319cf63a8de5fcaa7e70e755bad2d83aab8df97af388ec24b29be21fe18e1c3445d41a87753fb3fa930b6a2371554e060c86e9c2374a7584687b41f9cb75564806007ee9910af5756f9fcb0012664be9b9fd716d6234a0a1de36f919653b6796d2641b1d7b4b6b71f02839a74cfc8446cd84e4e679d66ddf0029"], 0xf4a) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'lo\x00', 0x0}) bind$packet(r3, &(0x7f0000000040)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$packet_int(r3, 0x107, 0xf, &(0x7f0000000140)=0xfb8, 0x4) splice(r0, 0x0, r2, 0x0, 0x10001, 0x0) 02:38:03 executing program 4: writev(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="390000001300090468fe0700001a00000700ff3f03000000450001070000001419001a0004001210070000f48aa159", 0x2f}], 0x1) r0 = socket(0x10, 0x800000000080002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x492492492492805, 0x0) 02:38:03 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000002, 0x800000000008032, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000769000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x3) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x10000000002) 02:38:03 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x2, 0x100000000012, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 02:38:03 executing program 5: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0) 02:38:03 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = memfd_create(&(0x7f0000000240)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r1, 0x0, 0x0, 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r1, 0x0) poll(&(0x7f0000000100)=[{}], 0x1, 0x0) select(0x40, &(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000180)={0x0, 0x2710}) 02:38:03 executing program 5: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffd, 0x0) 02:38:03 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = memfd_create(&(0x7f0000000240)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r1, 0x0, 0x0, 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r1, 0x0) poll(&(0x7f0000000100)=[{}], 0x1, 0x0) select(0x40, &(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000180)={0x0, 0x2710}) 02:38:03 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x2, 0x100000000012, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 02:38:03 executing program 5: r0 = socket$packet(0x11, 0x2000000000002, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x3}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x2000000002}, 0x3d) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x0) [ 272.309776][T18023] skbuff: bad partial csum: csum=57197/10496 headroom=2 headlen=2159 02:38:03 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x2, 0x100000000012, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 02:38:03 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = memfd_create(&(0x7f0000000240)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r1, 0x0, 0x0, 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r1, 0x0) poll(&(0x7f0000000100)=[{}], 0x1, 0x0) select(0x40, &(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000180)={0x0, 0x2710}) 02:38:04 executing program 5: r0 = socket$packet(0x11, 0x2000000000002, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x3}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x2000000002}, 0x3d) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x0) 02:38:04 executing program 2: r0 = socket$packet(0x11, 0x2000000000002, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x3}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x2000000002}, 0x3d) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x0) 02:38:04 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) listen(r0, 0x0) 02:38:04 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000700)='map_files\x00~\xb5\x96\xd7\x1a\x14\xf5A\xaaN\x04\x00\x00\x00\x00\x00\x00\x00;\x02NH1\xe4\xba\x82W\xfd\'\xce\xe3\b\v\xc0Kw\xf8}\xba\x83\xba\x92\x9ej\xd5r8\xfd\xfcm2\x9f2\x1c\xfc\xca\xf2\x9a)\xd2\xd3\xd4#\x9e\xaaQ\x9a\x1eS\t-b\x85BE\xf2\xd2\xc0\x0f\x9c\x9d\xa5\x03\x00\x00\x00\x00\x00\x00\x00\x04F\xa1d\x15\x9d\x16w\x8b\x0e\xa7[C\x9b\x05V\xeb\xb0\x8e\xf6\xa6j\x7fZZJs\x86Q7J\xb1\x02\x99\xe5H#\fy\xa6o@{\x83\xb8\xe0\xec\xc4B\xf5\xb9\xc33\x8dfk\xfd2q}\f\xd0\x98\xaa\xd0\xec\xd3:\x86Y>\x16e~CeV\x8a\xc5\x14\'@d\xa0\xb9\x03\xb73\xc5\x89\x8dS\x8c\xd5\xc2\x9e\xe8W\xcfg\x13,\xa4\\\xa9\xde\xc6\xe6Nj\xe4\x92\x03.]\xeamg\x8bX\x82\x83\x95\x84bF\xe0\xf1\x0f\xdf\xba\xac\xed\xd1\xdbb\x15k\x0f\xbb\xd3h\xc1/F\x15\x05\v\xf8eq\xb4\xdc^\xc0(\xf7\xff#\a\xfc\xa3\x95\x85>f\xef\v2a\x03\xef\x17d&\x97\'\xec\xfa2\xca\x12\x15\xb4\x80u\xa0.\v\x97\x04\xd5R;\x98\xa6\xbe\x1f\x06\xcdm\x1f\x90L\xf7\x8dg0\x81v\xa4+\xa2\xfdX%\xfd\xf8\xe0\xa62\x87\x16/<\xdd\tg\xcb$;37\x92\x85(\xa6\xaf\xe7\xc2\xeb+\xbd\x1aQ\xd4\xd3\xe8Z\x11X/\xdb\xef;u*\x1bq\x06Q\xbd\xad\x98\xbfc%;\x9c\xb7\v\xbd\xe8\xfa$\xabh;7M\xd7\xc5\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x12\xd2\x96\xb1u\xddF;f\x1f\x85#\x9b\xbf({\xb0\x0f\xdf\xc7\xcf(}\x1ey\xe7\xb8N\x9d\xa4\x1bR\x84 \x85\xc0\x11xS\x06\xb0\xf8\xb9k \x8f\"\x8bU;\xd8s\xbe') fchdir(r0) r1 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) quotactl(0x2080000202, &(0x7f0000000040)='./file1\x00', 0x0, &(0x7f0000000140)='-') 02:38:04 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x2, 0x100000000012, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 02:38:04 executing program 3: clock_adjtime(0xfffffffffffffffb, &(0x7f0000f74f98)) 02:38:04 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) listen(r0, 0x0) 02:38:04 executing program 3: clock_adjtime(0xfffffffffffffffb, &(0x7f0000f74f98)) 02:38:04 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000700)='map_files\x00~\xb5\x96\xd7\x1a\x14\xf5A\xaaN\x04\x00\x00\x00\x00\x00\x00\x00;\x02NH1\xe4\xba\x82W\xfd\'\xce\xe3\b\v\xc0Kw\xf8}\xba\x83\xba\x92\x9ej\xd5r8\xfd\xfcm2\x9f2\x1c\xfc\xca\xf2\x9a)\xd2\xd3\xd4#\x9e\xaaQ\x9a\x1eS\t-b\x85BE\xf2\xd2\xc0\x0f\x9c\x9d\xa5\x03\x00\x00\x00\x00\x00\x00\x00\x04F\xa1d\x15\x9d\x16w\x8b\x0e\xa7[C\x9b\x05V\xeb\xb0\x8e\xf6\xa6j\x7fZZJs\x86Q7J\xb1\x02\x99\xe5H#\fy\xa6o@{\x83\xb8\xe0\xec\xc4B\xf5\xb9\xc33\x8dfk\xfd2q}\f\xd0\x98\xaa\xd0\xec\xd3:\x86Y>\x16e~CeV\x8a\xc5\x14\'@d\xa0\xb9\x03\xb73\xc5\x89\x8dS\x8c\xd5\xc2\x9e\xe8W\xcfg\x13,\xa4\\\xa9\xde\xc6\xe6Nj\xe4\x92\x03.]\xeamg\x8bX\x82\x83\x95\x84bF\xe0\xf1\x0f\xdf\xba\xac\xed\xd1\xdbb\x15k\x0f\xbb\xd3h\xc1/F\x15\x05\v\xf8eq\xb4\xdc^\xc0(\xf7\xff#\a\xfc\xa3\x95\x85>f\xef\v2a\x03\xef\x17d&\x97\'\xec\xfa2\xca\x12\x15\xb4\x80u\xa0.\v\x97\x04\xd5R;\x98\xa6\xbe\x1f\x06\xcdm\x1f\x90L\xf7\x8dg0\x81v\xa4+\xa2\xfdX%\xfd\xf8\xe0\xa62\x87\x16/<\xdd\tg\xcb$;37\x92\x85(\xa6\xaf\xe7\xc2\xeb+\xbd\x1aQ\xd4\xd3\xe8Z\x11X/\xdb\xef;u*\x1bq\x06Q\xbd\xad\x98\xbfc%;\x9c\xb7\v\xbd\xe8\xfa$\xabh;7M\xd7\xc5\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x12\xd2\x96\xb1u\xddF;f\x1f\x85#\x9b\xbf({\xb0\x0f\xdf\xc7\xcf(}\x1ey\xe7\xb8N\x9d\xa4\x1bR\x84 \x85\xc0\x11xS\x06\xb0\xf8\xb9k \x8f\"\x8bU;\xd8s\xbe') fchdir(r0) r1 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) quotactl(0x2080000202, &(0x7f0000000040)='./file1\x00', 0x0, &(0x7f0000000140)='-') 02:38:04 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) rename(&(0x7f0000000c80)='./file0\x00', &(0x7f0000000cc0)='./file0/file0\x00') 02:38:04 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) listen(r0, 0x0) 02:38:04 executing program 3: clock_adjtime(0xfffffffffffffffb, &(0x7f0000f74f98)) 02:38:05 executing program 5: r0 = socket$packet(0x11, 0x2000000000002, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x3}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x2000000002}, 0x3d) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x0) 02:38:05 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) rename(&(0x7f0000000c80)='./file0\x00', &(0x7f0000000cc0)='./file0/file0\x00') 02:38:05 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) listen(r0, 0x0) 02:38:05 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000700)='map_files\x00~\xb5\x96\xd7\x1a\x14\xf5A\xaaN\x04\x00\x00\x00\x00\x00\x00\x00;\x02NH1\xe4\xba\x82W\xfd\'\xce\xe3\b\v\xc0Kw\xf8}\xba\x83\xba\x92\x9ej\xd5r8\xfd\xfcm2\x9f2\x1c\xfc\xca\xf2\x9a)\xd2\xd3\xd4#\x9e\xaaQ\x9a\x1eS\t-b\x85BE\xf2\xd2\xc0\x0f\x9c\x9d\xa5\x03\x00\x00\x00\x00\x00\x00\x00\x04F\xa1d\x15\x9d\x16w\x8b\x0e\xa7[C\x9b\x05V\xeb\xb0\x8e\xf6\xa6j\x7fZZJs\x86Q7J\xb1\x02\x99\xe5H#\fy\xa6o@{\x83\xb8\xe0\xec\xc4B\xf5\xb9\xc33\x8dfk\xfd2q}\f\xd0\x98\xaa\xd0\xec\xd3:\x86Y>\x16e~CeV\x8a\xc5\x14\'@d\xa0\xb9\x03\xb73\xc5\x89\x8dS\x8c\xd5\xc2\x9e\xe8W\xcfg\x13,\xa4\\\xa9\xde\xc6\xe6Nj\xe4\x92\x03.]\xeamg\x8bX\x82\x83\x95\x84bF\xe0\xf1\x0f\xdf\xba\xac\xed\xd1\xdbb\x15k\x0f\xbb\xd3h\xc1/F\x15\x05\v\xf8eq\xb4\xdc^\xc0(\xf7\xff#\a\xfc\xa3\x95\x85>f\xef\v2a\x03\xef\x17d&\x97\'\xec\xfa2\xca\x12\x15\xb4\x80u\xa0.\v\x97\x04\xd5R;\x98\xa6\xbe\x1f\x06\xcdm\x1f\x90L\xf7\x8dg0\x81v\xa4+\xa2\xfdX%\xfd\xf8\xe0\xa62\x87\x16/<\xdd\tg\xcb$;37\x92\x85(\xa6\xaf\xe7\xc2\xeb+\xbd\x1aQ\xd4\xd3\xe8Z\x11X/\xdb\xef;u*\x1bq\x06Q\xbd\xad\x98\xbfc%;\x9c\xb7\v\xbd\xe8\xfa$\xabh;7M\xd7\xc5\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x12\xd2\x96\xb1u\xddF;f\x1f\x85#\x9b\xbf({\xb0\x0f\xdf\xc7\xcf(}\x1ey\xe7\xb8N\x9d\xa4\x1bR\x84 \x85\xc0\x11xS\x06\xb0\xf8\xb9k \x8f\"\x8bU;\xd8s\xbe') fchdir(r0) r1 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) quotactl(0x2080000202, &(0x7f0000000040)='./file1\x00', 0x0, &(0x7f0000000140)='-') 02:38:05 executing program 3: clock_adjtime(0xfffffffffffffffb, &(0x7f0000f74f98)) 02:38:05 executing program 2: r0 = socket$packet(0x11, 0x2000000000002, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x3}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x2000000002}, 0x3d) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x0) 02:38:05 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x1, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x7}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) 02:38:05 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/stat\x00') getdents(r0, &(0x7f00000000c0)=""/143, 0x49) getdents64(r0, &(0x7f0000000000)=""/35, 0x23) 02:38:05 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) rename(&(0x7f0000000c80)='./file0\x00', &(0x7f0000000cc0)='./file0/file0\x00') 02:38:05 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000700)='map_files\x00~\xb5\x96\xd7\x1a\x14\xf5A\xaaN\x04\x00\x00\x00\x00\x00\x00\x00;\x02NH1\xe4\xba\x82W\xfd\'\xce\xe3\b\v\xc0Kw\xf8}\xba\x83\xba\x92\x9ej\xd5r8\xfd\xfcm2\x9f2\x1c\xfc\xca\xf2\x9a)\xd2\xd3\xd4#\x9e\xaaQ\x9a\x1eS\t-b\x85BE\xf2\xd2\xc0\x0f\x9c\x9d\xa5\x03\x00\x00\x00\x00\x00\x00\x00\x04F\xa1d\x15\x9d\x16w\x8b\x0e\xa7[C\x9b\x05V\xeb\xb0\x8e\xf6\xa6j\x7fZZJs\x86Q7J\xb1\x02\x99\xe5H#\fy\xa6o@{\x83\xb8\xe0\xec\xc4B\xf5\xb9\xc33\x8dfk\xfd2q}\f\xd0\x98\xaa\xd0\xec\xd3:\x86Y>\x16e~CeV\x8a\xc5\x14\'@d\xa0\xb9\x03\xb73\xc5\x89\x8dS\x8c\xd5\xc2\x9e\xe8W\xcfg\x13,\xa4\\\xa9\xde\xc6\xe6Nj\xe4\x92\x03.]\xeamg\x8bX\x82\x83\x95\x84bF\xe0\xf1\x0f\xdf\xba\xac\xed\xd1\xdbb\x15k\x0f\xbb\xd3h\xc1/F\x15\x05\v\xf8eq\xb4\xdc^\xc0(\xf7\xff#\a\xfc\xa3\x95\x85>f\xef\v2a\x03\xef\x17d&\x97\'\xec\xfa2\xca\x12\x15\xb4\x80u\xa0.\v\x97\x04\xd5R;\x98\xa6\xbe\x1f\x06\xcdm\x1f\x90L\xf7\x8dg0\x81v\xa4+\xa2\xfdX%\xfd\xf8\xe0\xa62\x87\x16/<\xdd\tg\xcb$;37\x92\x85(\xa6\xaf\xe7\xc2\xeb+\xbd\x1aQ\xd4\xd3\xe8Z\x11X/\xdb\xef;u*\x1bq\x06Q\xbd\xad\x98\xbfc%;\x9c\xb7\v\xbd\xe8\xfa$\xabh;7M\xd7\xc5\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x12\xd2\x96\xb1u\xddF;f\x1f\x85#\x9b\xbf({\xb0\x0f\xdf\xc7\xcf(}\x1ey\xe7\xb8N\x9d\xa4\x1bR\x84 \x85\xc0\x11xS\x06\xb0\xf8\xb9k \x8f\"\x8bU;\xd8s\xbe') fchdir(r0) r1 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) quotactl(0x2080000202, &(0x7f0000000040)='./file1\x00', 0x0, &(0x7f0000000140)='-') [ 273.782473][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 273.788695][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 273.794972][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 273.801130][ C0] protocol 88fb is buggy, dev hsr_slave_1 02:38:05 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x1, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x7}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) 02:38:05 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) rename(&(0x7f0000000c80)='./file0\x00', &(0x7f0000000cc0)='./file0/file0\x00') [ 274.102472][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 274.108309][ C0] protocol 88fb is buggy, dev hsr_slave_1 02:38:05 executing program 5: r0 = socket$packet(0x11, 0x2000000000002, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x3}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x2000000002}, 0x3d) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x0) 02:38:05 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/stat\x00') getdents(r0, &(0x7f00000000c0)=""/143, 0x49) getdents64(r0, &(0x7f0000000000)=""/35, 0x23) 02:38:05 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/stat\x00') getdents(r0, &(0x7f00000000c0)=""/143, 0x49) getdents64(r0, &(0x7f0000000000)=""/35, 0x23) 02:38:05 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x1, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x7}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) 02:38:05 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0xc, 0x0, 0x0) 02:38:05 executing program 2: r0 = socket$packet(0x11, 0x2000000000002, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x3}, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x2000000002}, 0x3d) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x0) 02:38:05 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/stat\x00') getdents(r0, &(0x7f00000000c0)=""/143, 0x49) getdents64(r0, &(0x7f0000000000)=""/35, 0x23) 02:38:05 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/stat\x00') getdents(r0, &(0x7f00000000c0)=""/143, 0x49) getdents64(r0, &(0x7f0000000000)=""/35, 0x23) 02:38:05 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0xc, 0x0, 0x0) 02:38:05 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x1, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x7}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) 02:38:05 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/stat\x00') getdents(r0, &(0x7f00000000c0)=""/143, 0x49) getdents64(r0, &(0x7f0000000000)=""/35, 0x23) 02:38:05 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/stat\x00') getdents(r0, &(0x7f00000000c0)=""/143, 0x49) getdents64(r0, &(0x7f0000000000)=""/35, 0x23) 02:38:06 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x20001000008912, &(0x7f0000000080)="c0dc00025e0b01047be070") r1 = socket(0x1e, 0x5, 0x0) unshare(0x400) setsockopt$inet_mreqn(r1, 0x10f, 0x0, 0x0, 0x82) 02:38:06 executing program 5: r0 = socket$inet6(0xa, 0x80002, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x38, 0x0, &(0x7f0000000040)) 02:38:06 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000003c0)=@filter={'filter\x00', 0xe, 0x2, 0x1d0, [0x0, 0x20000100, 0x20000130, 0x20000200], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/464]}, 0x248) setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x81, &(0x7f0000000300)={'filter\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f0000000080), 0x0, [{}, {}]}, 0x98) 02:38:06 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0xc, 0x0, 0x0) 02:38:06 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = fanotify_init(0x0, 0x0) fanotify_mark(r1, 0x1, 0x40000010, r0, 0x0) r2 = dup2(r1, r0) ioctl$sock_inet6_udp_SIOCINQ(r2, 0x541b, &(0x7f0000000240)) 02:38:06 executing program 2: pipe(&(0x7f0000000000)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") setrlimit(0x2, &(0x7f0000000000)={0x0, 0x2000000}) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x403, 0x2000000000032, 0xffffffffffffffff, 0x0) 02:38:06 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0xc, 0x0, 0x0) 02:38:06 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000003c0)=@filter={'filter\x00', 0xe, 0x2, 0x1d0, [0x0, 0x20000100, 0x20000130, 0x20000200], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/464]}, 0x248) setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x81, &(0x7f0000000300)={'filter\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f0000000080), 0x0, [{}, {}]}, 0x98) 02:38:06 executing program 5: r0 = socket$inet6(0xa, 0x80002, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x38, 0x0, &(0x7f0000000040)) 02:38:06 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = fanotify_init(0x0, 0x0) fanotify_mark(r1, 0x1, 0x40000010, r0, 0x0) r2 = dup2(r1, r0) ioctl$sock_inet6_udp_SIOCINQ(r2, 0x541b, &(0x7f0000000240)) 02:38:06 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = fanotify_init(0x0, 0x0) fanotify_mark(r1, 0x1, 0x40000010, r0, 0x0) r2 = dup2(r1, r0) ioctl$sock_inet6_udp_SIOCINQ(r2, 0x541b, &(0x7f0000000240)) [ 274.838123][T18161] mmap: syz-executor.2 (18161): VmData 35299328 exceed data ulimit 0. Update limits or use boot option ignore_rlimit_data. 02:38:06 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000003c0)=@filter={'filter\x00', 0xe, 0x2, 0x1d0, [0x0, 0x20000100, 0x20000130, 0x20000200], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/464]}, 0x248) setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x81, &(0x7f0000000300)={'filter\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f0000000080), 0x0, [{}, {}]}, 0x98) 02:38:06 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = fanotify_init(0x0, 0x0) fanotify_mark(r1, 0x1, 0x40000010, r0, 0x0) r2 = dup2(r1, r0) ioctl$sock_inet6_udp_SIOCINQ(r2, 0x541b, &(0x7f0000000240)) 02:38:06 executing program 5: r0 = socket$inet6(0xa, 0x80002, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x38, 0x0, &(0x7f0000000040)) 02:38:06 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000003c0)=@filter={'filter\x00', 0xe, 0x2, 0x1d0, [0x0, 0x20000100, 0x20000130, 0x20000200], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/464]}, 0x248) setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x81, &(0x7f0000000300)={'filter\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f0000000080), 0x0, [{}, {}]}, 0x98) 02:38:06 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = fanotify_init(0x0, 0x0) fanotify_mark(r1, 0x1, 0x40000010, r0, 0x0) r2 = dup2(r1, r0) ioctl$sock_inet6_udp_SIOCINQ(r2, 0x541b, &(0x7f0000000240)) 02:38:06 executing program 2: pipe(&(0x7f0000000000)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") setrlimit(0x2, &(0x7f0000000000)={0x0, 0x2000000}) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x403, 0x2000000000032, 0xffffffffffffffff, 0x0) 02:38:06 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000003c0)=@filter={'filter\x00', 0xe, 0x2, 0x1d0, [0x0, 0x20000100, 0x20000130, 0x20000200], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/464]}, 0x248) setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x81, &(0x7f0000000300)={'filter\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f0000000080), 0x0, [{}, {}]}, 0x98) 02:38:06 executing program 5: r0 = socket$inet6(0xa, 0x80002, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x38, 0x0, &(0x7f0000000040)) 02:38:06 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000003c0)=@filter={'filter\x00', 0xe, 0x2, 0x1d0, [0x0, 0x20000100, 0x20000130, 0x20000200], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/464]}, 0x248) setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x81, &(0x7f0000000300)={'filter\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f0000000080), 0x0, [{}, {}]}, 0x98) 02:38:06 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = fanotify_init(0x0, 0x0) fanotify_mark(r1, 0x1, 0x40000010, r0, 0x0) r2 = dup2(r1, r0) ioctl$sock_inet6_udp_SIOCINQ(r2, 0x541b, &(0x7f0000000240)) 02:38:06 executing program 2: pipe(&(0x7f0000000000)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") setrlimit(0x2, &(0x7f0000000000)={0x0, 0x2000000}) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x403, 0x2000000000032, 0xffffffffffffffff, 0x0) 02:38:06 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = fanotify_init(0x0, 0x0) fanotify_mark(r1, 0x1, 0x40000010, r0, 0x0) r2 = dup2(r1, r0) ioctl$sock_inet6_udp_SIOCINQ(r2, 0x541b, &(0x7f0000000240)) 02:38:06 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='sysfs\x00', 0x0, 0x0) chdir(&(0x7f0000000000)='./file0\x00') rename(&(0x7f00000003c0)='./bus\x00', &(0x7f0000000400)='./file0\x00') 02:38:06 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000003c0)=@filter={'filter\x00', 0xe, 0x2, 0x1d0, [0x0, 0x20000100, 0x20000130, 0x20000200], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/464]}, 0x248) setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x81, &(0x7f0000000300)={'filter\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f0000000080), 0x0, [{}, {}]}, 0x98) 02:38:06 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout_data(r0, 0x107, 0x8, 0x0, 0x10) 02:38:06 executing program 2: pipe(&(0x7f0000000000)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") setrlimit(0x2, &(0x7f0000000000)={0x0, 0x2000000}) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x403, 0x2000000000032, 0xffffffffffffffff, 0x0) 02:38:06 executing program 0: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000331000)={0x8000000002, 0x4, 0x7, 0x4}, 0xe) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r0, &(0x7f0000000000), 0x0}, 0x18) 02:38:06 executing program 3: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000300)='/dev/sequencer2\x00', 0x0, 0x0) read$alg(r0, 0x0, 0x0) 02:38:06 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) r2 = socket(0xa, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000000040)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000002c0)={{{@in=@loopback, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@rand_addr="f74f9491a253ba506c23c1b3d444ff34"}}, 0x200003a8) 02:38:07 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout_data(r0, 0x107, 0x8, 0x0, 0x10) 02:38:07 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='sysfs\x00', 0x0, 0x0) chdir(&(0x7f0000000000)='./file0\x00') rename(&(0x7f00000003c0)='./bus\x00', &(0x7f0000000400)='./file0\x00') 02:38:07 executing program 2: write(0xffffffffffffffff, 0x0, 0x0) keyctl$clear(0x7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) socket(0x15, 0x0, 0x0) 02:38:07 executing program 3: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000300)='/dev/sequencer2\x00', 0x0, 0x0) read$alg(r0, 0x0, 0x0) 02:38:07 executing program 0: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000331000)={0x8000000002, 0x4, 0x7, 0x4}, 0xe) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r0, &(0x7f0000000000), 0x0}, 0x18) 02:38:07 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout_data(r0, 0x107, 0x8, 0x0, 0x10) 02:38:07 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) r2 = socket(0xa, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000000040)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000002c0)={{{@in=@loopback, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@rand_addr="f74f9491a253ba506c23c1b3d444ff34"}}, 0x200003a8) 02:38:07 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='sysfs\x00', 0x0, 0x0) chdir(&(0x7f0000000000)='./file0\x00') rename(&(0x7f00000003c0)='./bus\x00', &(0x7f0000000400)='./file0\x00') 02:38:07 executing program 2: write(0xffffffffffffffff, 0x0, 0x0) keyctl$clear(0x7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) socket(0x15, 0x0, 0x0) 02:38:07 executing program 3: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000300)='/dev/sequencer2\x00', 0x0, 0x0) read$alg(r0, 0x0, 0x0) 02:38:07 executing program 0: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000331000)={0x8000000002, 0x4, 0x7, 0x4}, 0xe) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r0, &(0x7f0000000000), 0x0}, 0x18) 02:38:07 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout_data(r0, 0x107, 0x8, 0x0, 0x10) 02:38:07 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) r2 = socket(0xa, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000000040)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000002c0)={{{@in=@loopback, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@rand_addr="f74f9491a253ba506c23c1b3d444ff34"}}, 0x200003a8) 02:38:07 executing program 2: write(0xffffffffffffffff, 0x0, 0x0) keyctl$clear(0x7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) socket(0x15, 0x0, 0x0) 02:38:07 executing program 0: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000331000)={0x8000000002, 0x4, 0x7, 0x4}, 0xe) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r0, &(0x7f0000000000), 0x0}, 0x18) 02:38:07 executing program 3: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000300)='/dev/sequencer2\x00', 0x0, 0x0) read$alg(r0, 0x0, 0x0) 02:38:07 executing program 4: write(0xffffffffffffffff, 0x0, 0x0) keyctl$clear(0x7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) socket(0x15, 0x0, 0x0) 02:38:07 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='sysfs\x00', 0x0, 0x0) chdir(&(0x7f0000000000)='./file0\x00') rename(&(0x7f00000003c0)='./bus\x00', &(0x7f0000000400)='./file0\x00') 02:38:07 executing program 2: write(0xffffffffffffffff, 0x0, 0x0) keyctl$clear(0x7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) socket(0x15, 0x0, 0x0) 02:38:07 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) r2 = socket(0xa, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000000040)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000002c0)={{{@in=@loopback, @in6=@remote}}, {{@in=@multicast2}, 0x0, @in6=@rand_addr="f74f9491a253ba506c23c1b3d444ff34"}}, 0x200003a8) 02:38:07 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0xff, 0x4, 0x400}, 0x3c) socket$rxrpc(0x21, 0x2, 0xa) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x4) connect$inet6(r1, &(0x7f0000000140), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0xfffffffffffffdcb) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r0, &(0x7f00000002c0), 0x0}, 0x18) 02:38:07 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, 0x0, 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge0\x00\xff\xff\xfd\xfd\x00', 0xffffffffffffffdb}) 02:38:07 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$sock_buf(r0, 0x1, 0x3b, 0x0, &(0x7f00000000c0)) 02:38:07 executing program 4: write(0xffffffffffffffff, 0x0, 0x0) keyctl$clear(0x7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) socket(0x15, 0x0, 0x0) 02:38:07 executing program 2: clock_gettime(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', 0x0, 0x0, 0x0) 02:38:07 executing program 1: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$P9_RREMOVE(r1, &(0x7f0000000280)={0x1}, 0xff7f) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r3 = open(&(0x7f0000000340)='./file0\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r3, 0x0) r4 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) write$FUSE_WRITE(r4, &(0x7f0000000080)={0x18}, 0x18) fcntl$setstatus(r2, 0x4, 0x6100) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0xf642e7e) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000200)={0x0, r1}) 02:38:07 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0xff, 0x4, 0x400}, 0x3c) socket$rxrpc(0x21, 0x2, 0xa) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x4) connect$inet6(r1, &(0x7f0000000140), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0xfffffffffffffdcb) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r0, &(0x7f00000002c0), 0x0}, 0x18) 02:38:07 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$sock_buf(r0, 0x1, 0x3b, 0x0, &(0x7f00000000c0)) 02:38:07 executing program 4: write(0xffffffffffffffff, 0x0, 0x0) keyctl$clear(0x7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) socket(0x15, 0x0, 0x0) [ 276.527060][T18305] bridge0: port 2(bridge_slave_1) entered disabled state [ 276.543218][T18305] bridge0: port 1(bridge_slave_0) entered disabled state 02:38:08 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0xff, 0x4, 0x400}, 0x3c) socket$rxrpc(0x21, 0x2, 0xa) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x4) connect$inet6(r1, &(0x7f0000000140), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0xfffffffffffffdcb) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r0, &(0x7f00000002c0), 0x0}, 0x18) 02:38:08 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$sock_buf(r0, 0x1, 0x3b, 0x0, &(0x7f00000000c0)) 02:38:08 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0xff, 0x4, 0x400}, 0x3c) socket$rxrpc(0x21, 0x2, 0xa) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x4) connect$inet6(r1, &(0x7f0000000140), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0xfffffffffffffdcb) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r0, &(0x7f00000002c0), 0x0}, 0x18) 02:38:08 executing program 2: clock_gettime(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', 0x0, 0x0, 0x0) [ 277.248233][T18311] bridge0: port 2(bridge_slave_1) entered blocking state [ 277.255964][T18311] bridge0: port 2(bridge_slave_1) entered forwarding state [ 277.263428][T18311] bridge0: port 1(bridge_slave_0) entered blocking state [ 277.276447][T18311] bridge0: port 1(bridge_slave_0) entered forwarding state [ 277.292680][T18311] device bridge0 entered promiscuous mode [ 277.311833][T18348] bridge0: port 2(bridge_slave_1) entered disabled state [ 277.319093][T18348] bridge0: port 1(bridge_slave_0) entered disabled state [ 277.327025][T18348] device bridge0 left promiscuous mode 02:38:08 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, 0x0, 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge0\x00\xff\xff\xfd\xfd\x00', 0xffffffffffffffdb}) 02:38:08 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0xff, 0x4, 0x400}, 0x3c) socket$rxrpc(0x21, 0x2, 0xa) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x4) connect$inet6(r1, &(0x7f0000000140), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0xfffffffffffffdcb) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r0, &(0x7f00000002c0), 0x0}, 0x18) 02:38:08 executing program 1: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$P9_RREMOVE(r1, &(0x7f0000000280)={0x1}, 0xff7f) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r3 = open(&(0x7f0000000340)='./file0\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r3, 0x0) r4 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) write$FUSE_WRITE(r4, &(0x7f0000000080)={0x18}, 0x18) fcntl$setstatus(r2, 0x4, 0x6100) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0xf642e7e) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000200)={0x0, r1}) 02:38:08 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0xff, 0x4, 0x400}, 0x3c) socket$rxrpc(0x21, 0x2, 0xa) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x4) connect$inet6(r1, &(0x7f0000000140), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0xfffffffffffffdcb) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r0, &(0x7f00000002c0), 0x0}, 0x18) 02:38:08 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$sock_buf(r0, 0x1, 0x3b, 0x0, &(0x7f00000000c0)) 02:38:08 executing program 2: clock_gettime(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', 0x0, 0x0, 0x0) [ 277.392897][T18349] bridge0: port 2(bridge_slave_1) entered blocking state [ 277.400030][T18349] bridge0: port 2(bridge_slave_1) entered forwarding state [ 277.407476][T18349] bridge0: port 1(bridge_slave_0) entered blocking state [ 277.414694][T18349] bridge0: port 1(bridge_slave_0) entered forwarding state [ 277.429339][T18349] device bridge0 entered promiscuous mode 02:38:08 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0xff, 0x4, 0x400}, 0x3c) socket$rxrpc(0x21, 0x2, 0xa) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x4) connect$inet6(r1, &(0x7f0000000140), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0xfffffffffffffdcb) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r0, &(0x7f00000002c0), 0x0}, 0x18) 02:38:08 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, 0x0, 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge0\x00\xff\xff\xfd\xfd\x00', 0xffffffffffffffdb}) 02:38:08 executing program 3: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$P9_RREMOVE(r1, &(0x7f0000000280)={0x1}, 0xff7f) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r3 = open(&(0x7f0000000340)='./file0\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r3, 0x0) r4 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) write$FUSE_WRITE(r4, &(0x7f0000000080)={0x18}, 0x18) fcntl$setstatus(r2, 0x4, 0x6100) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0xf642e7e) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000200)={0x0, r1}) [ 277.595295][T18361] bridge0: port 2(bridge_slave_1) entered disabled state [ 277.605782][T18361] bridge0: port 1(bridge_slave_0) entered disabled state 02:38:09 executing program 2: clock_gettime(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', 0x0, 0x0, 0x0) 02:38:09 executing program 1: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$P9_RREMOVE(r1, &(0x7f0000000280)={0x1}, 0xff7f) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r3 = open(&(0x7f0000000340)='./file0\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r3, 0x0) r4 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) write$FUSE_WRITE(r4, &(0x7f0000000080)={0x18}, 0x18) fcntl$setstatus(r2, 0x4, 0x6100) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0xf642e7e) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000200)={0x0, r1}) [ 277.667706][T18361] device bridge0 left promiscuous mode 02:38:09 executing program 4: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$P9_RREMOVE(r1, &(0x7f0000000280)={0x1}, 0xff7f) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r3 = open(&(0x7f0000000340)='./file0\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r3, 0x0) r4 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) write$FUSE_WRITE(r4, &(0x7f0000000080)={0x18}, 0x18) fcntl$setstatus(r2, 0x4, 0x6100) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0xf642e7e) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000200)={0x0, r1}) [ 278.273391][T18371] bridge0: port 2(bridge_slave_1) entered blocking state [ 278.280611][T18371] bridge0: port 2(bridge_slave_1) entered forwarding state [ 278.288110][T18371] bridge0: port 1(bridge_slave_0) entered blocking state [ 278.295281][T18371] bridge0: port 1(bridge_slave_0) entered forwarding state 02:38:09 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, 0x0, 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge0\x00\xff\xff\xfd\xfd\x00', 0xffffffffffffffdb}) 02:38:09 executing program 3: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$P9_RREMOVE(r1, &(0x7f0000000280)={0x1}, 0xff7f) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r3 = open(&(0x7f0000000340)='./file0\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r3, 0x0) r4 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) write$FUSE_WRITE(r4, &(0x7f0000000080)={0x18}, 0x18) fcntl$setstatus(r2, 0x4, 0x6100) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0xf642e7e) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000200)={0x0, r1}) 02:38:09 executing program 4: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$P9_RREMOVE(r1, &(0x7f0000000280)={0x1}, 0xff7f) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r3 = open(&(0x7f0000000340)='./file0\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r3, 0x0) r4 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) write$FUSE_WRITE(r4, &(0x7f0000000080)={0x18}, 0x18) fcntl$setstatus(r2, 0x4, 0x6100) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0xf642e7e) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000200)={0x0, r1}) 02:38:09 executing program 2: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$P9_RREMOVE(r1, &(0x7f0000000280)={0x1}, 0xff7f) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r3 = open(&(0x7f0000000340)='./file0\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r3, 0x0) r4 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) write$FUSE_WRITE(r4, &(0x7f0000000080)={0x18}, 0x18) fcntl$setstatus(r2, 0x4, 0x6100) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0xf642e7e) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000200)={0x0, r1}) 02:38:09 executing program 1: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$P9_RREMOVE(r1, &(0x7f0000000280)={0x1}, 0xff7f) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r3 = open(&(0x7f0000000340)='./file0\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r3, 0x0) r4 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) write$FUSE_WRITE(r4, &(0x7f0000000080)={0x18}, 0x18) fcntl$setstatus(r2, 0x4, 0x6100) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0xf642e7e) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000200)={0x0, r1}) [ 278.322522][T18371] device bridge0 entered promiscuous mode [ 278.338270][T18373] bridge0: port 2(bridge_slave_1) entered disabled state [ 278.351542][T18373] bridge0: port 1(bridge_slave_0) entered disabled state 02:38:09 executing program 4: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$P9_RREMOVE(r1, &(0x7f0000000280)={0x1}, 0xff7f) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r3 = open(&(0x7f0000000340)='./file0\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r3, 0x0) r4 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) write$FUSE_WRITE(r4, &(0x7f0000000080)={0x18}, 0x18) fcntl$setstatus(r2, 0x4, 0x6100) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0xf642e7e) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000200)={0x0, r1}) 02:38:09 executing program 2: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$P9_RREMOVE(r1, &(0x7f0000000280)={0x1}, 0xff7f) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r3 = open(&(0x7f0000000340)='./file0\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r3, 0x0) r4 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) write$FUSE_WRITE(r4, &(0x7f0000000080)={0x18}, 0x18) fcntl$setstatus(r2, 0x4, 0x6100) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0xf642e7e) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000200)={0x0, r1}) 02:38:10 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, 0x0, 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge0\x00\xff\xff\xfd\xfd\x00', 0xffffffffffffffdb}) 02:38:10 executing program 3: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$P9_RREMOVE(r1, &(0x7f0000000280)={0x1}, 0xff7f) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r3 = open(&(0x7f0000000340)='./file0\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r3, 0x0) r4 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) write$FUSE_WRITE(r4, &(0x7f0000000080)={0x18}, 0x18) fcntl$setstatus(r2, 0x4, 0x6100) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0xf642e7e) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000200)={0x0, r1}) 02:38:10 executing program 1: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$P9_RREMOVE(r1, &(0x7f0000000280)={0x1}, 0xff7f) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r3 = open(&(0x7f0000000340)='./file0\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r3, 0x0) r4 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) write$FUSE_WRITE(r4, &(0x7f0000000080)={0x18}, 0x18) fcntl$setstatus(r2, 0x4, 0x6100) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0xf642e7e) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000200)={0x0, r1}) 02:38:10 executing program 4: clock_gettime(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', 0x0, 0x0, 0x0) 02:38:10 executing program 2: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$P9_RREMOVE(r1, &(0x7f0000000280)={0x1}, 0xff7f) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r3 = open(&(0x7f0000000340)='./file0\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r3, 0x0) r4 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) write$FUSE_WRITE(r4, &(0x7f0000000080)={0x18}, 0x18) fcntl$setstatus(r2, 0x4, 0x6100) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0xf642e7e) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000200)={0x0, r1}) [ 278.793070][T18374] bridge0: port 2(bridge_slave_1) entered blocking state [ 278.800227][T18374] bridge0: port 2(bridge_slave_1) entered forwarding state [ 278.807653][T18374] bridge0: port 1(bridge_slave_0) entered blocking state [ 278.814764][T18374] bridge0: port 1(bridge_slave_0) entered forwarding state [ 278.823301][T18374] device bridge0 entered promiscuous mode 02:38:10 executing program 2: clock_gettime(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', 0x0, 0x0, 0x0) [ 279.167643][T18398] bridge0: port 2(bridge_slave_1) entered disabled state [ 279.177530][T18398] bridge0: port 1(bridge_slave_0) entered disabled state [ 279.211141][T18398] device bridge0 left promiscuous mode 02:38:10 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, 0x0, 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge0\x00\xff\xff\xfd\xfd\x00', 0xffffffffffffffdb}) 02:38:10 executing program 4: clock_gettime(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', 0x0, 0x0, 0x0) 02:38:10 executing program 1: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$P9_RREMOVE(r1, &(0x7f0000000280)={0x1}, 0xff7f) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r3 = open(&(0x7f0000000340)='./file0\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r3, 0x0) r4 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) write$FUSE_WRITE(r4, &(0x7f0000000080)={0x18}, 0x18) fcntl$setstatus(r2, 0x4, 0x6100) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0xf642e7e) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000200)={0x0, r1}) 02:38:10 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x11, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffffad}, [@ldst={0x3, 0x0, 0x3fe, 0xa}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) 02:38:10 executing program 2: clock_gettime(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', 0x0, 0x0, 0x0) [ 279.303800][T18400] bridge0: port 2(bridge_slave_1) entered blocking state [ 279.311508][T18400] bridge0: port 2(bridge_slave_1) entered forwarding state [ 279.318955][T18400] bridge0: port 1(bridge_slave_0) entered blocking state [ 279.326077][T18400] bridge0: port 1(bridge_slave_0) entered forwarding state [ 279.333785][T18400] device bridge0 entered promiscuous mode 02:38:10 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x11, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffffad}, [@ldst={0x3, 0x0, 0x3fe, 0xa}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) [ 279.473286][T18420] bridge0: port 2(bridge_slave_1) entered disabled state [ 279.485001][T18420] bridge0: port 1(bridge_slave_0) entered disabled state [ 279.515430][T18420] device bridge0 left promiscuous mode [ 279.809127][T18422] bridge0: port 2(bridge_slave_1) entered blocking state [ 279.816426][T18422] bridge0: port 2(bridge_slave_1) entered forwarding state [ 279.823882][T18422] bridge0: port 1(bridge_slave_0) entered blocking state [ 279.831485][T18422] bridge0: port 1(bridge_slave_0) entered forwarding state [ 279.845179][T18422] device bridge0 entered promiscuous mode 02:38:11 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, 0x0, 0x0) r0 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'bridge0\x00h\x00\x01\xd8\x00H\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'bridge0\x00\xff\xff\xfd\xfd\x00', 0xffffffffffffffdb}) 02:38:11 executing program 4: clock_gettime(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', 0x0, 0x0, 0x0) 02:38:11 executing program 2: clock_gettime(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', 0x0, 0x0, 0x0) 02:38:11 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x11, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffffad}, [@ldst={0x3, 0x0, 0x3fe, 0xa}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) 02:38:11 executing program 1: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$P9_RREMOVE(r1, &(0x7f0000000280)={0x1}, 0xff7f) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) r3 = open(&(0x7f0000000340)='./file0\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r3, 0x0) r4 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) write$FUSE_WRITE(r4, &(0x7f0000000080)={0x18}, 0x18) fcntl$setstatus(r2, 0x4, 0x6100) write$cgroup_type(r2, &(0x7f0000000200)='threaded\x00', 0xf642e7e) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000200)={0x0, r1}) [ 279.859734][T18440] bridge0: port 2(bridge_slave_1) entered disabled state [ 279.868337][T18440] bridge0: port 1(bridge_slave_0) entered disabled state [ 279.963737][T18440] device bridge0 left promiscuous mode 02:38:11 executing program 4: r0 = fsopen(&(0x7f0000000080)='cgroup2\x00', 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x7, 0x0, 0x0, 0x0) [ 280.289084][T18446] bridge0: port 2(bridge_slave_1) entered blocking state [ 280.296274][T18446] bridge0: port 2(bridge_slave_1) entered forwarding state [ 280.303726][T18446] bridge0: port 1(bridge_slave_0) entered blocking state [ 280.310847][T18446] bridge0: port 1(bridge_slave_0) entered forwarding state [ 280.325027][T18446] device bridge0 entered promiscuous mode 02:38:11 executing program 2: r0 = fsopen(&(0x7f0000000080)='cgroup2\x00', 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x7, 0x0, 0x0, 0x0) 02:38:11 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x11, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffffad}, [@ldst={0x3, 0x0, 0x3fe, 0xa}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) 02:38:11 executing program 1: setrlimit(0x400000000000007, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) 02:38:11 executing program 4: r0 = fsopen(&(0x7f0000000080)='cgroup2\x00', 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x7, 0x0, 0x0, 0x0) 02:38:11 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x8000, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000000240), 0x5c3, 0xbb8) [ 280.355019][T18463] bridge0: port 2(bridge_slave_1) entered disabled state [ 280.363539][T18463] bridge0: port 1(bridge_slave_0) entered disabled state 02:38:11 executing program 2: r0 = fsopen(&(0x7f0000000080)='cgroup2\x00', 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x7, 0x0, 0x0, 0x0) [ 280.423910][T18463] device bridge0 left promiscuous mode [ 280.760301][T18465] bridge0: port 2(bridge_slave_1) entered blocking state [ 280.767472][T18465] bridge0: port 2(bridge_slave_1) entered forwarding state [ 280.774881][T18465] bridge0: port 1(bridge_slave_0) entered blocking state [ 280.782138][T18465] bridge0: port 1(bridge_slave_0) entered forwarding state 02:38:12 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x8000, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000000240), 0x5c3, 0xbb8) 02:38:12 executing program 4: r0 = fsopen(&(0x7f0000000080)='cgroup2\x00', 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x7, 0x0, 0x0, 0x0) 02:38:12 executing program 1: setrlimit(0x400000000000007, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) 02:38:12 executing program 3: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="7f454c46000000000000000000aab40003003e000039a594349c1fd83d0000000000000000000000000000000000745a7c5f1c125ce538000304"], 0x3a) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 02:38:12 executing program 2: r0 = fsopen(&(0x7f0000000080)='cgroup2\x00', 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x7, 0x0, 0x0, 0x0) 02:38:12 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x4, [@var={0x1}]}, {0x0, [0x2e, 0x5f]}}, &(0x7f00000004c0)=""/237, 0x2c, 0xed, 0x1}, 0x20) [ 280.819005][T18465] device bridge0 entered promiscuous mode 02:38:12 executing program 2: r0 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_ENUMSTD(r0, 0xc0305615, &(0x7f0000000040)={0x0, 0x0, "756a7110abad3b83fbe79c672f40800c4c6397f2bb3ae235"}) [ 280.864845][T18497] ERROR: Domain ' /sbin/init /etc/init.d/rc /sbin/startpar /etc/init.d/ssh /sbin/start-stop-daemon /usr/sbin/sshd /usr/sbin/sshd /bin/bash /root/syz-fuzzer /root/syz-executor.3 proc:/self/fd/3' not defined. 02:38:12 executing program 4: r0 = fsopen(&(0x7f0000000080)='cgroup2\x00', 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x7, 0x0, 0x0, 0x0) 02:38:12 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x8000, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000000240), 0x5c3, 0xbb8) 02:38:12 executing program 1: setrlimit(0x400000000000007, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) 02:38:12 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x4, [@var={0x1}]}, {0x0, [0x2e, 0x5f]}}, &(0x7f00000004c0)=""/237, 0x2c, 0xed, 0x1}, 0x20) 02:38:12 executing program 2: r0 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_ENUMSTD(r0, 0xc0305615, &(0x7f0000000040)={0x0, 0x0, "756a7110abad3b83fbe79c672f40800c4c6397f2bb3ae235"}) 02:38:12 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x1) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast2, 0x9}, 0x1c) getsockopt$inet6_buf(r0, 0x29, 0x3d, &(0x7f0000000180)=""/238, &(0x7f00000000c0)=0xee) 02:38:12 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x4, [@var={0x1}]}, {0x0, [0x2e, 0x5f]}}, &(0x7f00000004c0)=""/237, 0x2c, 0xed, 0x1}, 0x20) 02:38:12 executing program 1: setrlimit(0x400000000000007, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) 02:38:12 executing program 3: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="7f454c46000000000000000000aab40003003e000039a594349c1fd83d0000000000000000000000000000000000745a7c5f1c125ce538000304"], 0x3a) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 02:38:12 executing program 2: r0 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_ENUMSTD(r0, 0xc0305615, &(0x7f0000000040)={0x0, 0x0, "756a7110abad3b83fbe79c672f40800c4c6397f2bb3ae235"}) 02:38:12 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x8000, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000000240), 0x5c3, 0xbb8) 02:38:12 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x1) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast2, 0x9}, 0x1c) getsockopt$inet6_buf(r0, 0x29, 0x3d, &(0x7f0000000180)=""/238, &(0x7f00000000c0)=0xee) 02:38:12 executing program 2: r0 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_ENUMSTD(r0, 0xc0305615, &(0x7f0000000040)={0x0, 0x0, "756a7110abad3b83fbe79c672f40800c4c6397f2bb3ae235"}) 02:38:12 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x4, [@var={0x1}]}, {0x0, [0x2e, 0x5f]}}, &(0x7f00000004c0)=""/237, 0x2c, 0xed, 0x1}, 0x20) 02:38:12 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket$inet(0x10, 0x80003, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="24000000180007041dfffd946f6105000200030a1f000003002808000800150009000300280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:38:12 executing program 3: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="7f454c46000000000000000000aab40003003e000039a594349c1fd83d0000000000000000000000000000000000745a7c5f1c125ce538000304"], 0x3a) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 02:38:12 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x1) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast2, 0x9}, 0x1c) getsockopt$inet6_buf(r0, 0x29, 0x3d, &(0x7f0000000180)=""/238, &(0x7f00000000c0)=0xee) 02:38:12 executing program 0: syz_emit_ethernet(0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="ffff03ffffffaaaaaaaaaabb080045000030"], 0x0) r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f1, &(0x7f0000000000)={'ip6gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="2e00000019000000"]}) 02:38:12 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000002780)={0x1d, 0x0, 0x0, 0x0, 0x104, 0x1, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) 02:38:12 executing program 2: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x0, 0x0) write$cgroup_pid(r0, &(0x7f0000000040), 0x12) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a04, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) clock_gettime(0x0, &(0x7f0000000380)) setpriority(0x0, 0x0, 0x0) pselect6(0x40, &(0x7f00000002c0)={0xfffffffffffff000, 0x106, 0x3, 0x7, 0x0, 0x0, 0x7ff, 0x5}, 0x0, &(0x7f0000000340)={0x0, 0xfffffffffffffed6, 0x0, 0x0, 0x0, 0x1, 0x8}, 0x0, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(0xffffffffffffffff, 0x0, 0x0) write$cgroup_pid(r2, &(0x7f00000000c0), 0x7) r3 = gettid() getpgid(r3) socket$netlink(0x10, 0x3, 0xd) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, 0x0, &(0x7f0000000580)) wait4(0x0, 0x0, 0x0, 0x0) [ 281.509181][T18557] netlink: 'syz-executor.1': attribute type 21 has an invalid length. 02:38:13 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x1) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast2, 0x9}, 0x1c) getsockopt$inet6_buf(r0, 0x29, 0x3d, &(0x7f0000000180)=""/238, &(0x7f00000000c0)=0xee) [ 281.565554][T18557] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 02:38:13 executing program 3: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_elf64(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="7f454c46000000000000000000aab40003003e000039a594349c1fd83d0000000000000000000000000000000000745a7c5f1c125ce538000304"], 0x3a) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 02:38:13 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000002780)={0x1d, 0x0, 0x0, 0x0, 0x104, 0x1, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) 02:38:13 executing program 4: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = timerfd_create(0x0, 0x0) splice(r1, 0x0, r0, 0x0, 0xffffbfffffffffff, 0x0) 02:38:13 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() 02:38:13 executing program 2: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x0, 0x0) write$cgroup_pid(r0, &(0x7f0000000040), 0x12) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a04, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) clock_gettime(0x0, &(0x7f0000000380)) setpriority(0x0, 0x0, 0x0) pselect6(0x40, &(0x7f00000002c0)={0xfffffffffffff000, 0x106, 0x3, 0x7, 0x0, 0x0, 0x7ff, 0x5}, 0x0, &(0x7f0000000340)={0x0, 0xfffffffffffffed6, 0x0, 0x0, 0x0, 0x1, 0x8}, 0x0, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(0xffffffffffffffff, 0x0, 0x0) write$cgroup_pid(r2, &(0x7f00000000c0), 0x7) r3 = gettid() getpgid(r3) socket$netlink(0x10, 0x3, 0xd) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, 0x0, &(0x7f0000000580)) wait4(0x0, 0x0, 0x0, 0x0) 02:38:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket$inet(0x10, 0x80003, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="24000000180007041dfffd946f6105000200030a1f000003002808000800150009000300280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:38:13 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000002780)={0x1d, 0x0, 0x0, 0x0, 0x104, 0x1, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) 02:38:13 executing program 4: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = timerfd_create(0x0, 0x0) splice(r1, 0x0, r0, 0x0, 0xffffbfffffffffff, 0x0) 02:38:13 executing program 2: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x0, 0x0) write$cgroup_pid(r0, &(0x7f0000000040), 0x12) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a04, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) clock_gettime(0x0, &(0x7f0000000380)) setpriority(0x0, 0x0, 0x0) pselect6(0x40, &(0x7f00000002c0)={0xfffffffffffff000, 0x106, 0x3, 0x7, 0x0, 0x0, 0x7ff, 0x5}, 0x0, &(0x7f0000000340)={0x0, 0xfffffffffffffed6, 0x0, 0x0, 0x0, 0x1, 0x8}, 0x0, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(0xffffffffffffffff, 0x0, 0x0) write$cgroup_pid(r2, &(0x7f00000000c0), 0x7) r3 = gettid() getpgid(r3) socket$netlink(0x10, 0x3, 0xd) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, 0x0, &(0x7f0000000580)) wait4(0x0, 0x0, 0x0, 0x0) 02:38:13 executing program 0: syz_emit_ethernet(0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="ffff03ffffffaaaaaaaaaabb080045000030"], 0x0) r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f1, &(0x7f0000000000)={'ip6gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="2e00000019000000"]}) 02:38:13 executing program 4: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = timerfd_create(0x0, 0x0) splice(r1, 0x0, r0, 0x0, 0xffffbfffffffffff, 0x0) 02:38:13 executing program 0: syz_emit_ethernet(0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="ffff03ffffffaaaaaaaaaabb080045000030"], 0x0) r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f1, &(0x7f0000000000)={'ip6gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="2e00000019000000"]}) 02:38:13 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000002780)={0x1d, 0x0, 0x0, 0x0, 0x104, 0x1, 0x0, [], 0x0, 0xffffffffffffff9c}, 0x3c) [ 282.407046][T18616] netlink: 'syz-executor.1': attribute type 21 has an invalid length. 02:38:13 executing program 5: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x0, 0x0) write$cgroup_pid(r0, &(0x7f0000000040), 0x12) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a04, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) clock_gettime(0x0, &(0x7f0000000380)) setpriority(0x0, 0x0, 0x0) pselect6(0x40, &(0x7f00000002c0)={0xfffffffffffff000, 0x106, 0x3, 0x7, 0x0, 0x0, 0x7ff, 0x5}, 0x0, &(0x7f0000000340)={0x0, 0xfffffffffffffed6, 0x0, 0x0, 0x0, 0x1, 0x8}, 0x0, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(0xffffffffffffffff, 0x0, 0x0) write$cgroup_pid(r2, &(0x7f00000000c0), 0x7) r3 = gettid() getpgid(r3) socket$netlink(0x10, 0x3, 0xd) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, 0x0, &(0x7f0000000580)) wait4(0x0, 0x0, 0x0, 0x0) 02:38:13 executing program 2: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x0, 0x0) write$cgroup_pid(r0, &(0x7f0000000040), 0x12) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a04, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) clock_gettime(0x0, &(0x7f0000000380)) setpriority(0x0, 0x0, 0x0) pselect6(0x40, &(0x7f00000002c0)={0xfffffffffffff000, 0x106, 0x3, 0x7, 0x0, 0x0, 0x7ff, 0x5}, 0x0, &(0x7f0000000340)={0x0, 0xfffffffffffffed6, 0x0, 0x0, 0x0, 0x1, 0x8}, 0x0, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(0xffffffffffffffff, 0x0, 0x0) write$cgroup_pid(r2, &(0x7f00000000c0), 0x7) r3 = gettid() getpgid(r3) socket$netlink(0x10, 0x3, 0xd) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, 0x0, &(0x7f0000000580)) wait4(0x0, 0x0, 0x0, 0x0) [ 282.463719][T18616] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 02:38:14 executing program 0: syz_emit_ethernet(0x1, &(0x7f0000000040)=ANY=[@ANYBLOB="ffff03ffffffaaaaaaaaaabb080045000030"], 0x0) r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f1, &(0x7f0000000000)={'ip6gre0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="2e00000019000000"]}) 02:38:14 executing program 4: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = timerfd_create(0x0, 0x0) splice(r1, 0x0, r0, 0x0, 0xffffbfffffffffff, 0x0) 02:38:14 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket$inet(0x10, 0x80003, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="24000000180007041dfffd946f6105000200030a1f000003002808000800150009000300280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:38:14 executing program 2: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x0, 0x0) write$cgroup_pid(r0, &(0x7f0000000040), 0x12) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a04, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) clock_gettime(0x0, &(0x7f0000000380)) setpriority(0x0, 0x0, 0x0) pselect6(0x40, &(0x7f00000002c0)={0xfffffffffffff000, 0x106, 0x3, 0x7, 0x0, 0x0, 0x7ff, 0x5}, 0x0, &(0x7f0000000340)={0x0, 0xfffffffffffffed6, 0x0, 0x0, 0x0, 0x1, 0x8}, 0x0, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(0xffffffffffffffff, 0x0, 0x0) write$cgroup_pid(r2, &(0x7f00000000c0), 0x7) r3 = gettid() getpgid(r3) socket$netlink(0x10, 0x3, 0xd) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, 0x0, &(0x7f0000000580)) wait4(0x0, 0x0, 0x0, 0x0) 02:38:14 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() 02:38:14 executing program 5: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x0, 0x0) write$cgroup_pid(r0, &(0x7f0000000040), 0x12) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a04, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) clock_gettime(0x0, &(0x7f0000000380)) setpriority(0x0, 0x0, 0x0) pselect6(0x40, &(0x7f00000002c0)={0xfffffffffffff000, 0x106, 0x3, 0x7, 0x0, 0x0, 0x7ff, 0x5}, 0x0, &(0x7f0000000340)={0x0, 0xfffffffffffffed6, 0x0, 0x0, 0x0, 0x1, 0x8}, 0x0, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(0xffffffffffffffff, 0x0, 0x0) write$cgroup_pid(r2, &(0x7f00000000c0), 0x7) r3 = gettid() getpgid(r3) socket$netlink(0x10, 0x3, 0xd) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, 0x0, &(0x7f0000000580)) wait4(0x0, 0x0, 0x0, 0x0) 02:38:14 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() [ 283.514821][T18643] netlink: 'syz-executor.1': attribute type 21 has an invalid length. 02:38:15 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() [ 283.587050][T18643] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 02:38:15 executing program 2: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x0, 0x0) write$cgroup_pid(r0, &(0x7f0000000040), 0x12) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a04, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) clock_gettime(0x0, &(0x7f0000000380)) setpriority(0x0, 0x0, 0x0) pselect6(0x40, &(0x7f00000002c0)={0xfffffffffffff000, 0x106, 0x3, 0x7, 0x0, 0x0, 0x7ff, 0x5}, 0x0, &(0x7f0000000340)={0x0, 0xfffffffffffffed6, 0x0, 0x0, 0x0, 0x1, 0x8}, 0x0, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(0xffffffffffffffff, 0x0, 0x0) write$cgroup_pid(r2, &(0x7f00000000c0), 0x7) r3 = gettid() getpgid(r3) socket$netlink(0x10, 0x3, 0xd) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, 0x0, &(0x7f0000000580)) wait4(0x0, 0x0, 0x0, 0x0) 02:38:15 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket$inet(0x10, 0x80003, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="24000000180007041dfffd946f6105000200030a1f000003002808000800150009000300280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 02:38:15 executing program 5: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x0, 0x0) write$cgroup_pid(r0, &(0x7f0000000040), 0x12) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a04, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) clock_gettime(0x0, &(0x7f0000000380)) setpriority(0x0, 0x0, 0x0) pselect6(0x40, &(0x7f00000002c0)={0xfffffffffffff000, 0x106, 0x3, 0x7, 0x0, 0x0, 0x7ff, 0x5}, 0x0, &(0x7f0000000340)={0x0, 0xfffffffffffffed6, 0x0, 0x0, 0x0, 0x1, 0x8}, 0x0, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(0xffffffffffffffff, 0x0, 0x0) write$cgroup_pid(r2, &(0x7f00000000c0), 0x7) r3 = gettid() getpgid(r3) socket$netlink(0x10, 0x3, 0xd) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, 0x0, &(0x7f0000000580)) wait4(0x0, 0x0, 0x0, 0x0) [ 283.923099][T18667] netlink: 'syz-executor.1': attribute type 21 has an invalid length. [ 283.952912][T18667] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 02:38:15 executing program 1: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x0, 0x0) write$cgroup_pid(r0, &(0x7f0000000040), 0x12) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a04, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) clock_gettime(0x0, &(0x7f0000000380)) setpriority(0x0, 0x0, 0x0) pselect6(0x40, &(0x7f00000002c0)={0xfffffffffffff000, 0x106, 0x3, 0x7, 0x0, 0x0, 0x7ff, 0x5}, 0x0, &(0x7f0000000340)={0x0, 0xfffffffffffffed6, 0x0, 0x0, 0x0, 0x1, 0x8}, 0x0, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(0xffffffffffffffff, 0x0, 0x0) write$cgroup_pid(r2, &(0x7f00000000c0), 0x7) r3 = gettid() getpgid(r3) socket$netlink(0x10, 0x3, 0xd) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, 0x0, &(0x7f0000000580)) wait4(0x0, 0x0, 0x0, 0x0) 02:38:15 executing program 2: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x0, 0x0) write$cgroup_pid(r0, &(0x7f0000000040), 0x12) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a04, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) clock_gettime(0x0, &(0x7f0000000380)) setpriority(0x0, 0x0, 0x0) pselect6(0x40, &(0x7f00000002c0)={0xfffffffffffff000, 0x106, 0x3, 0x7, 0x0, 0x0, 0x7ff, 0x5}, 0x0, &(0x7f0000000340)={0x0, 0xfffffffffffffed6, 0x0, 0x0, 0x0, 0x1, 0x8}, 0x0, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(0xffffffffffffffff, 0x0, 0x0) write$cgroup_pid(r2, &(0x7f00000000c0), 0x7) r3 = gettid() getpgid(r3) socket$netlink(0x10, 0x3, 0xd) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, 0x0, &(0x7f0000000580)) wait4(0x0, 0x0, 0x0, 0x0) 02:38:15 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x15}, 0x3c) r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0xc6) 02:38:15 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x15}, 0x3c) r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0xc6) 02:38:16 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x15}, 0x3c) r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0xc6) 02:38:17 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() 02:38:17 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x15}, 0x3c) r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0xc6) 02:38:17 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() 02:38:17 executing program 1: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x0, 0x0) write$cgroup_pid(r0, &(0x7f0000000040), 0x12) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a04, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) clock_gettime(0x0, &(0x7f0000000380)) setpriority(0x0, 0x0, 0x0) pselect6(0x40, &(0x7f00000002c0)={0xfffffffffffff000, 0x106, 0x3, 0x7, 0x0, 0x0, 0x7ff, 0x5}, 0x0, &(0x7f0000000340)={0x0, 0xfffffffffffffed6, 0x0, 0x0, 0x0, 0x1, 0x8}, 0x0, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(0xffffffffffffffff, 0x0, 0x0) write$cgroup_pid(r2, &(0x7f00000000c0), 0x7) r3 = gettid() getpgid(r3) socket$netlink(0x10, 0x3, 0xd) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, 0x0, &(0x7f0000000580)) wait4(0x0, 0x0, 0x0, 0x0) 02:38:17 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x15}, 0x3c) r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0xc6) 02:38:17 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x15}, 0x3c) r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0xc6) 02:38:17 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() 02:38:17 executing program 5: unshare(0x8000400) r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x3, 0x0, 0x0) 02:38:17 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x15}, 0x3c) r0 = socket$kcm(0xa, 0x3, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x14, &(0x7f0000000080), 0xc6) 02:38:18 executing program 2: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f0000000000)=0x8000000005, 0x2, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000377000/0x1000)=nil, 0x3) 02:38:18 executing program 5: unshare(0x8000400) r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x3, 0x0, 0x0) 02:38:18 executing program 1: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x0, 0x0) write$cgroup_pid(r0, &(0x7f0000000040), 0x12) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a04, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) clock_gettime(0x0, &(0x7f0000000380)) setpriority(0x0, 0x0, 0x0) pselect6(0x40, &(0x7f00000002c0)={0xfffffffffffff000, 0x106, 0x3, 0x7, 0x0, 0x0, 0x7ff, 0x5}, 0x0, &(0x7f0000000340)={0x0, 0xfffffffffffffed6, 0x0, 0x0, 0x0, 0x1, 0x8}, 0x0, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(0xffffffffffffffff, 0x0, 0x0) write$cgroup_pid(r2, &(0x7f00000000c0), 0x7) r3 = gettid() getpgid(r3) socket$netlink(0x10, 0x3, 0xd) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, 0x0, &(0x7f0000000580)) wait4(0x0, 0x0, 0x0, 0x0) 02:38:20 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() 02:38:20 executing program 2: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f0000000000)=0x8000000005, 0x2, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000377000/0x1000)=nil, 0x3) 02:38:20 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() 02:38:20 executing program 5: unshare(0x8000400) r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x3, 0x0, 0x0) 02:38:20 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x1, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2f, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153}, 0x3e) 02:38:20 executing program 2: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f0000000000)=0x8000000005, 0x2, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000377000/0x1000)=nil, 0x3) 02:38:20 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000007, 0x6031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) munlockall() 02:38:20 executing program 2: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f0000000000)=0x8000000005, 0x2, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000377000/0x1000)=nil, 0x3) 02:38:20 executing program 5: unshare(0x8000400) r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x3, 0x0, 0x0) 02:38:20 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000040)="260000001100473d4901ff00000000000000150003fcffffff000000ff00f13a05001b002fc9", 0x26) 02:38:20 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ad", 0x1) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x40002000, &(0x7f0000007880)={0x0, 0x1c9c380}) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40), 0x4}], 0x500, 0x0) 02:38:21 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x1, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2f, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153}, 0x3e) [ 289.647888][T18771] netlink: 'syz-executor.2': attribute type 27 has an invalid length. 02:38:22 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000040)="260000001100473d4901ff00000000000000150003fcffffff000000ff00f13a05001b002fc9", 0x26) 02:38:22 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ad", 0x1) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x40002000, &(0x7f0000007880)={0x0, 0x1c9c380}) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40), 0x4}], 0x500, 0x0) [ 290.955854][T18784] netlink: 'syz-executor.2': attribute type 27 has an invalid length. 02:38:22 executing program 3: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) link(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='.\x00') 02:38:22 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x1, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2f, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153}, 0x3e) 02:38:22 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000040)="260000001100473d4901ff00000000000000150003fcffffff000000ff00f13a05001b002fc9", 0x26) 02:38:22 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ad", 0x1) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x40002000, &(0x7f0000007880)={0x0, 0x1c9c380}) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40), 0x4}], 0x500, 0x0) 02:38:22 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000140)={0x4000000007fa}, 0x83) write(r1, &(0x7f0000000100)="1c0000001a009b8814e5f407000904000a0206000000000000000000", 0x1c) 02:38:22 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)="24000000180007051dfffd946f610500020080001f0000050f000800080009000400ff7e", 0x24}], 0x1}, 0x0) 02:38:22 executing program 2: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000040)="260000001100473d4901ff00000000000000150003fcffffff000000ff00f13a05001b002fc9", 0x26) [ 291.373972][T18795] netlink: 'syz-executor.2': attribute type 27 has an invalid length. 02:38:22 executing program 3: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) link(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='.\x00') 02:38:22 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x1, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2f, 0x65}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x333, &(0x7f000000d000)=""/153}, 0x3e) 02:38:22 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)="24000000180007051dfffd946f610500020080001f0000050f000800080009000400ff7e", 0x24}], 0x1}, 0x0) 02:38:22 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000140)={0x4000000007fa}, 0x83) write(r1, &(0x7f0000000100)="1c0000001a009b8814e5f407000904000a0206000000000000000000", 0x1c) 02:38:22 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ad", 0x1) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x40002000, &(0x7f0000007880)={0x0, 0x1c9c380}) sendmmsg$unix(r1, &(0x7f0000001300)=[{&(0x7f0000000980)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000dc0), 0x0, &(0x7f0000000e40), 0x4}], 0x500, 0x0) [ 291.507055][T18808] netlink: 'syz-executor.2': attribute type 27 has an invalid length. 02:38:23 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x1, 0x32, 0xffffffffffffffff, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0) futex(&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0) 02:38:23 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000140)={0x4000000007fa}, 0x83) write(r1, &(0x7f0000000100)="1c0000001a009b8814e5f407000904000a0206000000000000000000", 0x1c) 02:38:23 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xa, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x21, 0xffffffc7, 0xa}}, &(0x7f0000000180)='GPL\x00'}, 0x48) 02:38:23 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)="24000000180007051dfffd946f610500020080001f0000050f000800080009000400ff7e", 0x24}], 0x1}, 0x0) 02:38:23 executing program 3: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) link(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='.\x00') 02:38:23 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xa, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x21, 0xffffffc7, 0xa}}, &(0x7f0000000180)='GPL\x00'}, 0x48) 02:38:23 executing program 0: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)="24000000180007051dfffd946f610500020080001f0000050f000800080009000400ff7e", 0x24}], 0x1}, 0x0) 02:38:23 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000140)={0x4000000007fa}, 0x83) write(r1, &(0x7f0000000100)="1c0000001a009b8814e5f407000904000a0206000000000000000000", 0x1c) 02:38:23 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x1, 0x32, 0xffffffffffffffff, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0) futex(&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0) 02:38:23 executing program 3: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) link(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='.\x00') 02:38:23 executing program 5: r0 = socket$tipc(0x1e, 0x5, 0x0) io_setup(0x1, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1e09328e, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x7ffffffff000}]) 02:38:23 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xa, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x21, 0xffffffc7, 0xa}}, &(0x7f0000000180)='GPL\x00'}, 0x48) 02:38:23 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_RECVERR(r0, 0x114, 0x5, &(0x7f00000001c0), 0x4) 02:38:23 executing program 4: sendmmsg(0xffffffffffffffff, &(0x7f000000f380)=[{{0x0, 0x0, &(0x7f0000004000)=[{&(0x7f0000002000)="16", 0x1}], 0x1}}], 0x1, 0x0) request_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000001ffb)={'\x00\x00\x06', 0xffffffffffffffff, 0x6c00}, &(0x7f0000001fee)='R\trusB\xe3cusgrVex:1e', 0x0) 02:38:23 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x1, 0x32, 0xffffffffffffffff, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0) futex(&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0) 02:38:23 executing program 5: r0 = socket$tipc(0x1e, 0x5, 0x0) io_setup(0x1, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1e09328e, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x7ffffffff000}]) 02:38:23 executing program 3: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000580)) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000240)=@framed={{0xffffffb4, 0x6c00000000000000, 0x0, 0x0, 0x0, 0xffffffc3, 0xa, 0xff00}}, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x1, 0xc3, &(0x7f0000000000)=""/195, 0x0, 0x0, [0x0, 0x6c000000]}, 0x48) 02:38:23 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xa, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x21, 0xffffffc7, 0xa}}, &(0x7f0000000180)='GPL\x00'}, 0x48) 02:38:23 executing program 4: sendmmsg(0xffffffffffffffff, &(0x7f000000f380)=[{{0x0, 0x0, &(0x7f0000004000)=[{&(0x7f0000002000)="16", 0x1}], 0x1}}], 0x1, 0x0) request_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000001ffb)={'\x00\x00\x06', 0xffffffffffffffff, 0x6c00}, &(0x7f0000001fee)='R\trusB\xe3cusgrVex:1e', 0x0) 02:38:23 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_RECVERR(r0, 0x114, 0x5, &(0x7f00000001c0), 0x4) 02:38:23 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x1, 0x32, 0xffffffffffffffff, 0x0) lsetxattr(&(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0) futex(&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0) 02:38:23 executing program 5: r0 = socket$tipc(0x1e, 0x5, 0x0) io_setup(0x1, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1e09328e, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x7ffffffff000}]) 02:38:23 executing program 3: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000580)) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000240)=@framed={{0xffffffb4, 0x6c00000000000000, 0x0, 0x0, 0x0, 0xffffffc3, 0xa, 0xff00}}, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x1, 0xc3, &(0x7f0000000000)=""/195, 0x0, 0x0, [0x0, 0x6c000000]}, 0x48) 02:38:23 executing program 2: r0 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r0, 0x107, 0xf, &(0x7f0000000000)="a200005c", 0x4) bind(r0, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='+system\x00'}, 0x10) r1 = fcntl$dupfd(r0, 0x0, r0) write$P9_RXATTRWALK(r1, &(0x7f0000000040)={0x406}, 0xfdef) 02:38:23 executing program 4: sendmmsg(0xffffffffffffffff, &(0x7f000000f380)=[{{0x0, 0x0, &(0x7f0000004000)=[{&(0x7f0000002000)="16", 0x1}], 0x1}}], 0x1, 0x0) request_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000001ffb)={'\x00\x00\x06', 0xffffffffffffffff, 0x6c00}, &(0x7f0000001fee)='R\trusB\xe3cusgrVex:1e', 0x0) 02:38:23 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x16b, 0x11, 0x42}]}, &(0x7f0000000700)='gPL\x00', 0x4, 0x1000, &(0x7f0000001200)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0xed) 02:38:23 executing program 5: r0 = socket$tipc(0x1e, 0x5, 0x0) io_setup(0x1, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1e09328e, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x7ffffffff000}]) 02:38:23 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_RECVERR(r0, 0x114, 0x5, &(0x7f00000001c0), 0x4) 02:38:24 executing program 3: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000580)) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000240)=@framed={{0xffffffb4, 0x6c00000000000000, 0x0, 0x0, 0x0, 0xffffffc3, 0xa, 0xff00}}, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x1, 0xc3, &(0x7f0000000000)=""/195, 0x0, 0x0, [0x0, 0x6c000000]}, 0x48) 02:38:24 executing program 2: r0 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r0, 0x107, 0xf, &(0x7f0000000000)="a200005c", 0x4) bind(r0, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='+system\x00'}, 0x10) r1 = fcntl$dupfd(r0, 0x0, r0) write$P9_RXATTRWALK(r1, &(0x7f0000000040)={0x406}, 0xfdef) 02:38:24 executing program 4: sendmmsg(0xffffffffffffffff, &(0x7f000000f380)=[{{0x0, 0x0, &(0x7f0000004000)=[{&(0x7f0000002000)="16", 0x1}], 0x1}}], 0x1, 0x0) request_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000001ffb)={'\x00\x00\x06', 0xffffffffffffffff, 0x6c00}, &(0x7f0000001fee)='R\trusB\xe3cusgrVex:1e', 0x0) 02:38:24 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x16b, 0x11, 0x42}]}, &(0x7f0000000700)='gPL\x00', 0x4, 0x1000, &(0x7f0000001200)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0xed) 02:38:24 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_RECVERR(r0, 0x114, 0x5, &(0x7f00000001c0), 0x4) 02:38:24 executing program 3: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000580)) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000240)=@framed={{0xffffffb4, 0x6c00000000000000, 0x0, 0x0, 0x0, 0xffffffc3, 0xa, 0xff00}}, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x1, 0xc3, &(0x7f0000000000)=""/195, 0x0, 0x0, [0x0, 0x6c000000]}, 0x48) 02:38:24 executing program 5: r0 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r0, 0x107, 0xf, &(0x7f0000000000)="a200005c", 0x4) bind(r0, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='+system\x00'}, 0x10) r1 = fcntl$dupfd(r0, 0x0, r0) write$P9_RXATTRWALK(r1, &(0x7f0000000040)={0x406}, 0xfdef) 02:38:24 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) 02:38:24 executing program 2: r0 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r0, 0x107, 0xf, &(0x7f0000000000)="a200005c", 0x4) bind(r0, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='+system\x00'}, 0x10) r1 = fcntl$dupfd(r0, 0x0, r0) write$P9_RXATTRWALK(r1, &(0x7f0000000040)={0x406}, 0xfdef) 02:38:24 executing program 3: write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 02:38:24 executing program 5: r0 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r0, 0x107, 0xf, &(0x7f0000000000)="a200005c", 0x4) bind(r0, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='+system\x00'}, 0x10) r1 = fcntl$dupfd(r0, 0x0, r0) write$P9_RXATTRWALK(r1, &(0x7f0000000040)={0x406}, 0xfdef) 02:38:24 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x16b, 0x11, 0x42}]}, &(0x7f0000000700)='gPL\x00', 0x4, 0x1000, &(0x7f0000001200)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0xed) 02:38:24 executing program 0: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f0000000000)="1f00000010001900000007000000068100020a0009000100000000013ffe58", 0x1f}], 0x1) 02:38:24 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) 02:38:24 executing program 2: r0 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r0, 0x107, 0xf, &(0x7f0000000000)="a200005c", 0x4) bind(r0, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='+system\x00'}, 0x10) r1 = fcntl$dupfd(r0, 0x0, r0) write$P9_RXATTRWALK(r1, &(0x7f0000000040)={0x406}, 0xfdef) 02:38:24 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x16b, 0x11, 0x42}]}, &(0x7f0000000700)='gPL\x00', 0x4, 0x1000, &(0x7f0000001200)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0xed) 02:38:24 executing program 5: r0 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r0, 0x107, 0xf, &(0x7f0000000000)="a200005c", 0x4) bind(r0, &(0x7f0000000100)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='+system\x00'}, 0x10) r1 = fcntl$dupfd(r0, 0x0, r0) write$P9_RXATTRWALK(r1, &(0x7f0000000040)={0x406}, 0xfdef) [ 293.142524][T18941] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 02:38:24 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) 02:38:24 executing program 0: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f0000000000)="1f00000010001900000007000000068100020a0009000100000000013ffe58", 0x1f}], 0x1) 02:38:24 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) 02:38:24 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) [ 293.388309][T18939] hfsplus: unable to find HFS+ superblock [ 293.483439][T18964] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 293.540096][T18969] hfsplus: unable to find HFS+ superblock 02:38:25 executing program 3: write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 02:38:25 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x11f, 0x10}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 02:38:25 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) 02:38:25 executing program 0: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f0000000000)="1f00000010001900000007000000068100020a0009000100000000013ffe58", 0x1f}], 0x1) 02:38:25 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) 02:38:25 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) 02:38:25 executing program 5: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000015c0)=ANY=[@ANYBLOB='show_sys_files=no,case_sensitive=no,disable_sparse=yes,disable_sparse=no,uid=']) [ 293.727402][T18982] netlink: 'syz-executor.0': attribute type 1 has an invalid length. 02:38:25 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_int(r0, 0x84, 0x13, 0x0, 0x0) 02:38:25 executing program 0: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f0000000000)="1f00000010001900000007000000068100020a0009000100000000013ffe58", 0x1f}], 0x1) 02:38:25 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) [ 293.933204][T18995] ntfs: (device loop5): parse_options(): The uid option requires an argument. 02:38:25 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_int(r0, 0x84, 0x13, 0x0, 0x0) 02:38:25 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) [ 294.051713][T18995] ntfs: (device loop5): parse_options(): The uid option requires an argument. [ 294.068153][T19005] netlink: 'syz-executor.0': attribute type 1 has an invalid length. [ 294.165172][T18987] hfsplus: unable to find HFS+ superblock 02:38:25 executing program 3: write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 02:38:25 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14, 0xffffffffffffffff}]}}}]}, 0x3c}}, 0x0) 02:38:25 executing program 5: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000015c0)=ANY=[@ANYBLOB='show_sys_files=no,case_sensitive=no,disable_sparse=yes,disable_sparse=no,uid=']) 02:38:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@filter={'filter\x00', 0xe, 0x1, 0x180, [0x0, 0x200000c0, 0x200000f0, 0x2000023c], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000001900000000000000000076657461315f746f5f0400000000000065727370616e300000000000000000006272696466655f736c6176655f31000069653e841901e50ac9000000000000000180c2000000000000000000aaaaaaaaaa000000000000000000d4000000d40000001c010000636c75737465720000000000000000000000000000000000000000000000000010000000000000000000000000030000000000007265616c6d0000001000000000000000000000000000000000000000000000000c0000000000000000000000000000006c6f670000000000000000000000000000000000000000000000000000000000240000000046aefdc2eedaf8ff6fcbbfa67ee31e6bfa4cf9f0761ffdac96c7d300bc1d000000000000000000"]}, 0x1f8) 02:38:25 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_int(r0, 0x84, 0x13, 0x0, 0x0) 02:38:25 executing program 1: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000480)='S', 0x1, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000280)={r0, r1, r1}, &(0x7f00000000c0)=""/83, 0x53, 0x0) 02:38:25 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_int(r0, 0x84, 0x13, 0x0, 0x0) [ 294.376834][T19029] (unnamed net_device) (uninitialized): option packets_per_slave: invalid value (18446744073709551615) [ 294.391176][T19025] ntfs: (device loop5): parse_options(): The uid option requires an argument. [ 294.407978][T19029] (unnamed net_device) (uninitialized): option packets_per_slave: allowed values 0 - 65535 02:38:25 executing program 1: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000480)='S', 0x1, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000280)={r0, r1, r1}, &(0x7f00000000c0)=""/83, 0x53, 0x0) 02:38:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@filter={'filter\x00', 0xe, 0x1, 0x180, [0x0, 0x200000c0, 0x200000f0, 0x2000023c], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"]}, 0x1f8) 02:38:25 executing program 5: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000015c0)=ANY=[@ANYBLOB='show_sys_files=no,case_sensitive=no,disable_sparse=yes,disable_sparse=no,uid=']) 02:38:25 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14, 0xffffffffffffffff}]}}}]}, 0x3c}}, 0x0) 02:38:26 executing program 4: socketpair(0x3, 0x800, 0x2, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000440)={0x0, 0x3, 0x3c, 0x3f9, 0x9, 0x9}, &(0x7f0000000480)=0x14) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000680)={0x2, [0x5, 0x8]}, 0x8) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r1, 0x84, 0x79, &(0x7f0000000600)={r3, 0x101, 0x100}, 0x8) ioctl(r2, 0x1000008912, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, 0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) r4 = add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)="612759b3a88fde133914d7855ab9b0d2fa746851f38267b1b23920fea9d6190b3a933e2e3e7937f63fb618b6db0855cdc6a5d48c47ebfaed41cfd9222b50e7df178776543ffcddd563e7f83501d8db35239c6d3d167dc9782c0dd523296e25bf2072b1727453da12b7719176206d0c71", 0x70, 0xfffffffffffffffe) request_key(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000280)='keyring\x00', r4) r5 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f0000000040)="b3", 0x1, r5) request_key(&(0x7f0000000180)='user\x00\xd2HO\x96\xdd\xa6VA/\xd2\xfaQ\xdd4\xa5\xab\t\v\xd0\x8c\x90\xb1\xfc\a\xeb\b(\xbcG\x0fv\xe6f\x00\xed-\xe1\xc9\r8\xc2Z\xb5\xd6,\xb2\xb67\x8f\xc6\x9a\xf3F\xf9\'\xbc\xb4\xc1\"\xd3;\xc8\xa1xT\xfa1{`\x93\x9f\xde\x04\x1a\xc7\x8b\x86\xa0\rK&k\x04-\xea_%t\xf8\xf0\xa9\xb0\xfb\x81\x12\x02\xb9L\x86\xf7\xd8FF\xd0\x19\xf8\r\\(S\xb7\x9c\xc0\xea\xe7\xe4\xfa\xac\xd8\xd6o\b\xbf1$ \xb8\xfa%\x8e\xc9\xb8\x18\xe6\x12r,Y\x02\xc3\xadU\xeb\xa4\xe8\x06\xc9\xee4\xf9\x94\x1du\x8d\x97\xed\x97xc\xca\x8c\xbf>\x98\xfe9+|\x85\x8fnw(\xb3;\xc9\xdc\x82\xb9\xf4|?g\xfcz6\x1a\xe1\x0eB\xc8D|\xe7\xd3\x94\x97\xba\xa64\xb5\x0f8\x03K', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0) [ 294.666560][T19050] ntfs: (device loop5): parse_options(): The uid option requires an argument. [ 294.726608][T19057] (unnamed net_device) (uninitialized): option packets_per_slave: invalid value (18446744073709551615) [ 294.756334][T19057] (unnamed net_device) (uninitialized): option packets_per_slave: allowed values 0 - 65535 [ 294.832834][T19037] hfsplus: unable to find HFS+ superblock 02:38:26 executing program 3: write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 02:38:26 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@filter={'filter\x00', 0xe, 0x1, 0x180, [0x0, 0x200000c0, 0x200000f0, 0x2000023c], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"]}, 0x1f8) 02:38:26 executing program 1: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000480)='S', 0x1, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000280)={r0, r1, r1}, &(0x7f00000000c0)=""/83, 0x53, 0x0) 02:38:26 executing program 4: socketpair(0x3, 0x800, 0x2, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000440)={0x0, 0x3, 0x3c, 0x3f9, 0x9, 0x9}, &(0x7f0000000480)=0x14) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000680)={0x2, [0x5, 0x8]}, 0x8) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r1, 0x84, 0x79, &(0x7f0000000600)={r3, 0x101, 0x100}, 0x8) ioctl(r2, 0x1000008912, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, 0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) r4 = add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)="612759b3a88fde133914d7855ab9b0d2fa746851f38267b1b23920fea9d6190b3a933e2e3e7937f63fb618b6db0855cdc6a5d48c47ebfaed41cfd9222b50e7df178776543ffcddd563e7f83501d8db35239c6d3d167dc9782c0dd523296e25bf2072b1727453da12b7719176206d0c71", 0x70, 0xfffffffffffffffe) request_key(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000280)='keyring\x00', r4) r5 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f0000000040)="b3", 0x1, r5) request_key(&(0x7f0000000180)='user\x00\xd2HO\x96\xdd\xa6VA/\xd2\xfaQ\xdd4\xa5\xab\t\v\xd0\x8c\x90\xb1\xfc\a\xeb\b(\xbcG\x0fv\xe6f\x00\xed-\xe1\xc9\r8\xc2Z\xb5\xd6,\xb2\xb67\x8f\xc6\x9a\xf3F\xf9\'\xbc\xb4\xc1\"\xd3;\xc8\xa1xT\xfa1{`\x93\x9f\xde\x04\x1a\xc7\x8b\x86\xa0\rK&k\x04-\xea_%t\xf8\xf0\xa9\xb0\xfb\x81\x12\x02\xb9L\x86\xf7\xd8FF\xd0\x19\xf8\r\\(S\xb7\x9c\xc0\xea\xe7\xe4\xfa\xac\xd8\xd6o\b\xbf1$ \xb8\xfa%\x8e\xc9\xb8\x18\xe6\x12r,Y\x02\xc3\xadU\xeb\xa4\xe8\x06\xc9\xee4\xf9\x94\x1du\x8d\x97\xed\x97xc\xca\x8c\xbf>\x98\xfe9+|\x85\x8fnw(\xb3;\xc9\xdc\x82\xb9\xf4|?g\xfcz6\x1a\xe1\x0eB\xc8D|\xe7\xd3\x94\x97\xba\xa64\xb5\x0f8\x03K', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0) 02:38:26 executing program 5: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000015c0)=ANY=[@ANYBLOB='show_sys_files=no,case_sensitive=no,disable_sparse=yes,disable_sparse=no,uid=']) 02:38:26 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14, 0xffffffffffffffff}]}}}]}, 0x3c}}, 0x0) [ 295.008583][T19072] (unnamed net_device) (uninitialized): option packets_per_slave: invalid value (18446744073709551615) [ 295.041206][T19076] ntfs: (device loop5): parse_options(): The uid option requires an argument. 02:38:26 executing program 4: socketpair(0x3, 0x800, 0x2, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000440)={0x0, 0x3, 0x3c, 0x3f9, 0x9, 0x9}, &(0x7f0000000480)=0x14) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000680)={0x2, [0x5, 0x8]}, 0x8) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r1, 0x84, 0x79, &(0x7f0000000600)={r3, 0x101, 0x100}, 0x8) ioctl(r2, 0x1000008912, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, 0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) r4 = add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)="612759b3a88fde133914d7855ab9b0d2fa746851f38267b1b23920fea9d6190b3a933e2e3e7937f63fb618b6db0855cdc6a5d48c47ebfaed41cfd9222b50e7df178776543ffcddd563e7f83501d8db35239c6d3d167dc9782c0dd523296e25bf2072b1727453da12b7719176206d0c71", 0x70, 0xfffffffffffffffe) request_key(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000280)='keyring\x00', r4) r5 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f0000000040)="b3", 0x1, r5) request_key(&(0x7f0000000180)='user\x00\xd2HO\x96\xdd\xa6VA/\xd2\xfaQ\xdd4\xa5\xab\t\v\xd0\x8c\x90\xb1\xfc\a\xeb\b(\xbcG\x0fv\xe6f\x00\xed-\xe1\xc9\r8\xc2Z\xb5\xd6,\xb2\xb67\x8f\xc6\x9a\xf3F\xf9\'\xbc\xb4\xc1\"\xd3;\xc8\xa1xT\xfa1{`\x93\x9f\xde\x04\x1a\xc7\x8b\x86\xa0\rK&k\x04-\xea_%t\xf8\xf0\xa9\xb0\xfb\x81\x12\x02\xb9L\x86\xf7\xd8FF\xd0\x19\xf8\r\\(S\xb7\x9c\xc0\xea\xe7\xe4\xfa\xac\xd8\xd6o\b\xbf1$ \xb8\xfa%\x8e\xc9\xb8\x18\xe6\x12r,Y\x02\xc3\xadU\xeb\xa4\xe8\x06\xc9\xee4\xf9\x94\x1du\x8d\x97\xed\x97xc\xca\x8c\xbf>\x98\xfe9+|\x85\x8fnw(\xb3;\xc9\xdc\x82\xb9\xf4|?g\xfcz6\x1a\xe1\x0eB\xc8D|\xe7\xd3\x94\x97\xba\xa64\xb5\x0f8\x03K', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0) 02:38:26 executing program 1: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000480)='S', 0x1, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000280)={r0, r1, r1}, &(0x7f00000000c0)=""/83, 0x53, 0x0) 02:38:26 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000280)=@filter={'filter\x00', 0xe, 0x1, 0x180, [0x0, 0x200000c0, 0x200000f0, 0x2000023c], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"]}, 0x1f8) 02:38:26 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14, 0xffffffffffffffff}]}}}]}, 0x3c}}, 0x0) [ 295.060941][T19072] (unnamed net_device) (uninitialized): option packets_per_slave: allowed values 0 - 65535 02:38:26 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x10, 0x8c}, [@ldst={0x3, 0x0, 0x6}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) [ 295.208022][T19092] (unnamed net_device) (uninitialized): option packets_per_slave: invalid value (18446744073709551615) 02:38:26 executing program 5: r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r1}, &(0x7f0000000600)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f0000000080)={'sha224\x00'}}) [ 295.303371][T19092] (unnamed net_device) (uninitialized): option packets_per_slave: allowed values 0 - 65535 [ 295.359350][T19079] hfsplus: unable to find HFS+ superblock 02:38:26 executing program 1: keyctl$set_reqkey_keyring(0x10, 0xffffffffffffffff) 02:38:26 executing program 4: socketpair(0x3, 0x800, 0x2, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000440)={0x0, 0x3, 0x3c, 0x3f9, 0x9, 0x9}, &(0x7f0000000480)=0x14) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000680)={0x2, [0x5, 0x8]}, 0x8) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r1, 0x84, 0x79, &(0x7f0000000600)={r3, 0x101, 0x100}, 0x8) ioctl(r2, 0x1000008912, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, 0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) r4 = add_key(&(0x7f0000000340)='ceph\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)="612759b3a88fde133914d7855ab9b0d2fa746851f38267b1b23920fea9d6190b3a933e2e3e7937f63fb618b6db0855cdc6a5d48c47ebfaed41cfd9222b50e7df178776543ffcddd563e7f83501d8db35239c6d3d167dc9782c0dd523296e25bf2072b1727453da12b7719176206d0c71", 0x70, 0xfffffffffffffffe) request_key(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000280)='keyring\x00', r4) r5 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f0000000040)="b3", 0x1, r5) request_key(&(0x7f0000000180)='user\x00\xd2HO\x96\xdd\xa6VA/\xd2\xfaQ\xdd4\xa5\xab\t\v\xd0\x8c\x90\xb1\xfc\a\xeb\b(\xbcG\x0fv\xe6f\x00\xed-\xe1\xc9\r8\xc2Z\xb5\xd6,\xb2\xb67\x8f\xc6\x9a\xf3F\xf9\'\xbc\xb4\xc1\"\xd3;\xc8\xa1xT\xfa1{`\x93\x9f\xde\x04\x1a\xc7\x8b\x86\xa0\rK&k\x04-\xea_%t\xf8\xf0\xa9\xb0\xfb\x81\x12\x02\xb9L\x86\xf7\xd8FF\xd0\x19\xf8\r\\(S\xb7\x9c\xc0\xea\xe7\xe4\xfa\xac\xd8\xd6o\b\xbf1$ \xb8\xfa%\x8e\xc9\xb8\x18\xe6\x12r,Y\x02\xc3\xadU\xeb\xa4\xe8\x06\xc9\xee4\xf9\x94\x1du\x8d\x97\xed\x97xc\xca\x8c\xbf>\x98\xfe9+|\x85\x8fnw(\xb3;\xc9\xdc\x82\xb9\xf4|?g\xfcz6\x1a\xe1\x0eB\xc8D|\xe7\xd3\x94\x97\xba\xa64\xb5\x0f8\x03K', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0) 02:38:26 executing program 2: syz_emit_ethernet(0x381, &(0x7f0000000040)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x3, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x5, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 02:38:26 executing program 5: r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r1}, &(0x7f0000000600)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f0000000080)={'sha224\x00'}}) 02:38:26 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x10, 0x8c}, [@ldst={0x3, 0x0, 0x6}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) 02:38:26 executing program 3: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d],],0::0:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 02:38:27 executing program 1: keyctl$set_reqkey_keyring(0x10, 0xffffffffffffffff) 02:38:27 executing program 2: syz_emit_ethernet(0x381, &(0x7f0000000040)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x3, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x5, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 02:38:27 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x10, 0x8c}, [@ldst={0x3, 0x0, 0x6}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) 02:38:27 executing program 5: r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r1}, &(0x7f0000000600)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f0000000080)={'sha224\x00'}}) 02:38:27 executing program 4: clock_gettime(0xfffffffffffffff7, 0x0) [ 295.670210][T19119] libceph: resolve 'd' (ret=-3): failed [ 295.691312][T19119] libceph: parse_ips bad ip '[d],],0::0' 02:38:27 executing program 2: syz_emit_ethernet(0x381, &(0x7f0000000040)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x3, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x5, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 02:38:27 executing program 3: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d],],0::0:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 02:38:27 executing program 1: keyctl$set_reqkey_keyring(0x10, 0xffffffffffffffff) 02:38:27 executing program 5: r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r1}, &(0x7f0000000600)=""/243, 0xf3, &(0x7f0000000240)={&(0x7f0000000080)={'sha224\x00'}}) 02:38:27 executing program 4: clock_gettime(0xfffffffffffffff7, 0x0) 02:38:27 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x10, 0x8c}, [@ldst={0x3, 0x0, 0x6}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) 02:38:27 executing program 2: syz_emit_ethernet(0x381, &(0x7f0000000040)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x3, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x5, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 02:38:27 executing program 4: clock_gettime(0xfffffffffffffff7, 0x0) [ 295.963510][T19145] libceph: resolve 'd' (ret=-3): failed [ 295.983636][T19145] libceph: parse_ips bad ip '[d],],0::0' 02:38:27 executing program 1: keyctl$set_reqkey_keyring(0x10, 0xffffffffffffffff) 02:38:27 executing program 5: r0 = socket$tipc(0x1e, 0x5, 0x0) getsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, 0x0, &(0x7f0000000180)=0x271) 02:38:27 executing program 3: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d],],0::0:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 02:38:27 executing program 0: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x00\x00?)\x00\xfc\x00', @ifru_flags=0x14}) 02:38:27 executing program 4: clock_gettime(0xfffffffffffffff7, 0x0) 02:38:27 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x4) chmod(&(0x7f0000000080)='./file0\x00', 0x0) 02:38:27 executing program 5: r0 = socket$tipc(0x1e, 0x5, 0x0) getsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, 0x0, &(0x7f0000000180)=0x271) 02:38:27 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x80000000000000d, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x163, 0x11, 0xa4}]}, &(0x7f0000000080)='gPL\x00', 0x4, 0x1000, &(0x7f0000001200)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 296.217620][T19166] libceph: resolve 'd' (ret=-3): failed 02:38:27 executing program 0: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x00\x00?)\x00\xfc\x00', @ifru_flags=0x14}) [ 296.271734][T19166] libceph: parse_ips bad ip '[d],],0::0' 02:38:27 executing program 4: r0 = socket(0x10, 0x20001000000003, 0x0) write(r0, &(0x7f0000000100)="220000001400910500e82e0a974c070002080300240200000800020041221e22f054", 0x22) 02:38:27 executing program 3: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d],],0::0:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 02:38:27 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x4) chmod(&(0x7f0000000080)='./file0\x00', 0x0) 02:38:27 executing program 5: r0 = socket$tipc(0x1e, 0x5, 0x0) getsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, 0x0, &(0x7f0000000180)=0x271) 02:38:27 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x80000000000000d, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x163, 0x11, 0xa4}]}, &(0x7f0000000080)='gPL\x00', 0x4, 0x1000, &(0x7f0000001200)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 296.449326][T19188] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.4'. 02:38:27 executing program 4: r0 = socket(0x10, 0x20001000000003, 0x0) write(r0, &(0x7f0000000100)="220000001400910500e82e0a974c070002080300240200000800020041221e22f054", 0x22) [ 296.507054][T19191] libceph: resolve 'd' (ret=-3): failed [ 296.546394][T19191] libceph: parse_ips bad ip '[d],],0::0' 02:38:28 executing program 5: r0 = socket$tipc(0x1e, 0x5, 0x0) getsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, 0x0, &(0x7f0000000180)=0x271) 02:38:28 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ifreq(r0, 0x89fb, &(0x7f0000000000)={'sit0\x00\x00\x00\x04\x00', @ifru_flags}) 02:38:28 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x80000000000000d, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x163, 0x11, 0xa4}]}, &(0x7f0000000080)='gPL\x00', 0x4, 0x1000, &(0x7f0000001200)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 02:38:28 executing program 0: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x00\x00?)\x00\xfc\x00', @ifru_flags=0x14}) 02:38:28 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x4) chmod(&(0x7f0000000080)='./file0\x00', 0x0) [ 296.674468][T19202] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.4'. 02:38:28 executing program 4: r0 = socket(0x10, 0x20001000000003, 0x0) write(r0, &(0x7f0000000100)="220000001400910500e82e0a974c070002080300240200000800020041221e22f054", 0x22) 02:38:28 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x80000000000000d, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x163, 0x11, 0xa4}]}, &(0x7f0000000080)='gPL\x00', 0x4, 0x1000, &(0x7f0000001200)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 02:38:28 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002) 02:38:28 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ifreq(r0, 0x89fb, &(0x7f0000000000)={'sit0\x00\x00\x00\x04\x00', @ifru_flags}) 02:38:28 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x4) chmod(&(0x7f0000000080)='./file0\x00', 0x0) [ 296.874856][T19219] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.4'. 02:38:28 executing program 0: sysinfo(&(0x7f0000000000)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x00\x00?)\x00\xfc\x00', @ifru_flags=0x14}) 02:38:28 executing program 4: r0 = socket(0x10, 0x20001000000003, 0x0) write(r0, &(0x7f0000000100)="220000001400910500e82e0a974c070002080300240200000800020041221e22f054", 0x22) 02:38:28 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$unix(0x1, 0x0, 0x0) r0 = socket$unix(0x1, 0x800000000001, 0x0) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f00000001c0)) [ 296.991909][T19226] mmap: syz-executor.5 (19226) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. 02:38:28 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ifreq(r0, 0x89fb, &(0x7f0000000000)={'sit0\x00\x00\x00\x04\x00', @ifru_flags}) [ 297.064002][T19234] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.4'. 02:38:28 executing program 0: creat(&(0x7f0000000180)='./bus\x00', 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f00000002c0)='./bus\x00', &(0x7f0000000340)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) setxattr$trusted_overlay_redirect(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000240)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) 02:38:28 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1={0xff, 0x300}, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x60}}, 0xb8}}, 0x0) 02:38:28 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$unix(0x1, 0x0, 0x0) r0 = socket$unix(0x1, 0x800000000001, 0x0) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f00000001c0)) 02:38:28 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$unix(0x1, 0x0, 0x0) r0 = socket$unix(0x1, 0x800000000001, 0x0) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f00000001c0)) 02:38:28 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ifreq(r0, 0x89fb, &(0x7f0000000000)={'sit0\x00\x00\x00\x04\x00', @ifru_flags}) 02:38:29 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002) 02:38:29 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1={0xff, 0x300}, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x60}}, 0xb8}}, 0x0) 02:38:29 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$unix(0x1, 0x0, 0x0) r0 = socket$unix(0x1, 0x800000000001, 0x0) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f00000001c0)) 02:38:29 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$unix(0x1, 0x0, 0x0) r0 = socket$unix(0x1, 0x800000000001, 0x0) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f00000001c0)) 02:38:29 executing program 0: creat(&(0x7f0000000180)='./bus\x00', 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f00000002c0)='./bus\x00', &(0x7f0000000340)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) setxattr$trusted_overlay_redirect(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000240)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) 02:38:29 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$unix(0x1, 0x0, 0x0) r0 = socket$unix(0x1, 0x800000000001, 0x0) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f00000001c0)) 02:38:29 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$unix(0x1, 0x0, 0x0) r0 = socket$unix(0x1, 0x800000000001, 0x0) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f00000001c0)) 02:38:29 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$unix(0x1, 0x0, 0x0) r0 = socket$unix(0x1, 0x800000000001, 0x0) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f00000001c0)) 02:38:29 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$unix(0x1, 0x0, 0x0) r0 = socket$unix(0x1, 0x800000000001, 0x0) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f00000001c0)) 02:38:29 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1={0xff, 0x300}, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x60}}, 0xb8}}, 0x0) 02:38:29 executing program 0: creat(&(0x7f0000000180)='./bus\x00', 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f00000002c0)='./bus\x00', &(0x7f0000000340)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) setxattr$trusted_overlay_redirect(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000240)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) 02:38:29 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002) 02:38:30 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002) 02:38:30 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002) 02:38:30 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$unix(0x1, 0x0, 0x0) r0 = socket$unix(0x1, 0x800000000001, 0x0) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f00000001c0)) 02:38:30 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1={0xff, 0x300}, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x60}}, 0xb8}}, 0x0) 02:38:30 executing program 0: creat(&(0x7f0000000180)='./bus\x00', 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f00000002c0)='./bus\x00', &(0x7f0000000340)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) setxattr$trusted_overlay_redirect(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000240)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) 02:38:30 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002) 02:38:30 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x2bcf) shutdown(r0, 0x1) syz_open_dev$dmmidi(0x0, 0x7, 0x200000) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f00000000c0)={0x0, 0x0}) recvmsg(r0, &(0x7f0000000140)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa47475}, 0x100) 02:38:30 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004440)=[{{&(0x7f00000002c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @remote}}, 0x1c, 0x0}}, {{&(0x7f00000009c0)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c, 0x0}}], 0x2, 0x0) 02:38:30 executing program 0: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x3, 0x5c831, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x7) madvise(&(0x7f0000779000/0x600000)=nil, 0x600000, 0x1000000000009) 02:38:30 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004440)=[{{&(0x7f00000002c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @remote}}, 0x1c, 0x0}}, {{&(0x7f00000009c0)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c, 0x0}}], 0x2, 0x0) 02:38:30 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004440)=[{{&(0x7f00000002c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @remote}}, 0x1c, 0x0}}, {{&(0x7f00000009c0)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c, 0x0}}], 0x2, 0x0) 02:38:30 executing program 0: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x3, 0x5c831, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x7) madvise(&(0x7f0000779000/0x600000)=nil, 0x600000, 0x1000000000009) 02:38:30 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002) 02:38:31 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002) 02:38:31 executing program 0: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x3, 0x5c831, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x7) madvise(&(0x7f0000779000/0x600000)=nil, 0x600000, 0x1000000000009) 02:38:31 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004440)=[{{&(0x7f00000002c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @remote}}, 0x1c, 0x0}}, {{&(0x7f00000009c0)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c, 0x0}}], 0x2, 0x0) 02:38:31 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x2bcf) shutdown(r0, 0x1) syz_open_dev$dmmidi(0x0, 0x7, 0x200000) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f00000000c0)={0x0, 0x0}) recvmsg(r0, &(0x7f0000000140)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa47475}, 0x100) 02:38:31 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002) 02:38:31 executing program 0: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x3, 0x5c831, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x7) madvise(&(0x7f0000779000/0x600000)=nil, 0x600000, 0x1000000000009) 02:38:31 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x2bcf) shutdown(r0, 0x1) syz_open_dev$dmmidi(0x0, 0x7, 0x200000) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f00000000c0)={0x0, 0x0}) recvmsg(r0, &(0x7f0000000140)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa47475}, 0x100) 02:38:31 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x2bcf) shutdown(r0, 0x1) syz_open_dev$dmmidi(0x0, 0x7, 0x200000) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f00000000c0)={0x0, 0x0}) recvmsg(r0, &(0x7f0000000140)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa47475}, 0x100) 02:38:32 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x2bcf) shutdown(r0, 0x1) syz_open_dev$dmmidi(0x0, 0x7, 0x200000) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f00000000c0)={0x0, 0x0}) recvmsg(r0, &(0x7f0000000140)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa47475}, 0x100) 02:38:32 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x2bcf) shutdown(r0, 0x1) syz_open_dev$dmmidi(0x0, 0x7, 0x200000) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f00000000c0)={0x0, 0x0}) recvmsg(r0, &(0x7f0000000140)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa47475}, 0x100) 02:38:32 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x2bcf) shutdown(r0, 0x1) syz_open_dev$dmmidi(0x0, 0x7, 0x200000) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f00000000c0)={0x0, 0x0}) recvmsg(r0, &(0x7f0000000140)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa47475}, 0x100) 02:38:32 executing program 5: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x3, 0x5c831, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x7) madvise(&(0x7f0000779000/0x600000)=nil, 0x600000, 0x1000000000009) 02:38:32 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x2bcf) shutdown(r0, 0x1) syz_open_dev$dmmidi(0x0, 0x7, 0x200000) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f00000000c0)={0x0, 0x0}) recvmsg(r0, &(0x7f0000000140)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa47475}, 0x100) 02:38:32 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002) 02:38:32 executing program 5: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x3, 0x5c831, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x7) madvise(&(0x7f0000779000/0x600000)=nil, 0x600000, 0x1000000000009) 02:38:32 executing program 5: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x3, 0x5c831, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x7) madvise(&(0x7f0000779000/0x600000)=nil, 0x600000, 0x1000000000009) 02:38:33 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004440)=[{{&(0x7f00000002c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @remote}}, 0x1c, 0x0}}, {{&(0x7f00000009c0)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c, 0x0}}], 0x2, 0x0) 02:38:33 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x2bcf) shutdown(r0, 0x1) syz_open_dev$dmmidi(0x0, 0x7, 0x200000) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f00000000c0)={0x0, 0x0}) recvmsg(r0, &(0x7f0000000140)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa47475}, 0x100) 02:38:33 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x2bcf) shutdown(r0, 0x1) syz_open_dev$dmmidi(0x0, 0x7, 0x200000) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f00000000c0)={0x0, 0x0}) recvmsg(r0, &(0x7f0000000140)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0xf7e9}], 0x1, 0x0, 0xff96ce4aaaa47475}, 0x100) 02:38:33 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000100)={@local, 0x0, 0x0, 0x1, 0x1}, 0x20) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x380000, @empty}, 0x1c) 02:38:33 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004440)=[{{&(0x7f00000002c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @remote}}, 0x1c, 0x0}}, {{&(0x7f00000009c0)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c, 0x0}}], 0x2, 0x0) 02:38:33 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000100)={@local, 0x0, 0x0, 0x1, 0x1}, 0x20) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x380000, @empty}, 0x1c) 02:38:33 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000100)={@local, 0x0, 0x0, 0x1, 0x1}, 0x20) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x380000, @empty}, 0x1c) 02:38:33 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004440)=[{{&(0x7f00000002c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @remote}}, 0x1c, 0x0}}, {{&(0x7f00000009c0)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c, 0x0}}], 0x2, 0x0) 02:38:33 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000100)={@local, 0x0, 0x0, 0x1, 0x1}, 0x20) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x380000, @empty}, 0x1c) 02:38:34 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r0, 0xc0405519, &(0x7f0000000040)={0x3}) 02:38:34 executing program 5: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="ff010000000000000000000000000001e0103ae4c7fe88000000000000000040000000000100400040000000007f000000ffffff0000000000000075e36d1f03b5fd6bced749052ea4460000ffffff00ffffffff6e"], 0x1) 02:38:34 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000100)={@local, 0x0, 0x0, 0x1, 0x1}, 0x20) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x380000, @empty}, 0x1c) 02:38:34 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000100)={@local, 0x0, 0x0, 0x1, 0x1}, 0x20) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x380000, @empty}, 0x1c) 02:38:34 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x16, 0x0, 0x37, 0x5, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 02:38:34 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r0, 0xc0405519, &(0x7f0000000040)={0x3}) 02:38:34 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x4, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x1c, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x7, 0x1ab, &(0x7f000000cf3d)=""/195}, 0x48) 02:38:34 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x16, 0x0, 0x37, 0x5, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 02:38:34 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000280)=0x583, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000b85fe4)={0xa, 0x4e24, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0x31, &(0x7f0000000240)=0x8, 0x4) recvmsg(r1, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=""/36, 0x19}, 0x80000020002000) sendmmsg(r0, &(0x7f00000002c0), 0x40000000000001c, 0x0) 02:38:34 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000100)={@local, 0x0, 0x0, 0x1, 0x1}, 0x20) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x380000, @empty}, 0x1c) 02:38:34 executing program 5: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="ff010000000000000000000000000001e0103ae4c7fe88000000000000000040000000000100400040000000007f000000ffffff0000000000000075e36d1f03b5fd6bced749052ea4460000ffffff00ffffffff6e"], 0x1) 02:38:34 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r0, 0xc0405519, &(0x7f0000000040)={0x3}) 02:38:34 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x16, 0x0, 0x37, 0x5, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 02:38:34 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x4, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x1c, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x7, 0x1ab, &(0x7f000000cf3d)=""/195}, 0x48) 02:38:34 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000740)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80) clock_gettime(0x0, &(0x7f0000000000)={0x0}) sendmsg$can_bcm(r0, &(0x7f00000000c0)={0x0, 0x1d0, &(0x7f0000000080)={&(0x7f0000000200)={0x2000000000005, 0xfffffffffffffbff, 0x0, {0x0, 0x2710}, {r1}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "d8b3a472a7515f51b54eb96e36ee804340a050a04c8027f4489dd4999d64fb4fcac85e2e7aa611b37765d70da2088756ad067fe5500fea9e7861f0109e087194"}}, 0x80}}, 0x0) 02:38:34 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000280)=0x583, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000b85fe4)={0xa, 0x4e24, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0x31, &(0x7f0000000240)=0x8, 0x4) recvmsg(r1, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=""/36, 0x19}, 0x80000020002000) sendmmsg(r0, &(0x7f00000002c0), 0x40000000000001c, 0x0) 02:38:34 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r0, 0xc0405519, &(0x7f0000000040)={0x3}) 02:38:34 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000740)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80) clock_gettime(0x0, &(0x7f0000000000)={0x0}) sendmsg$can_bcm(r0, &(0x7f00000000c0)={0x0, 0x1d0, &(0x7f0000000080)={&(0x7f0000000200)={0x2000000000005, 0xfffffffffffffbff, 0x0, {0x0, 0x2710}, {r1}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "d8b3a472a7515f51b54eb96e36ee804340a050a04c8027f4489dd4999d64fb4fcac85e2e7aa611b37765d70da2088756ad067fe5500fea9e7861f0109e087194"}}, 0x80}}, 0x0) 02:38:34 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x4, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x1c, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x7, 0x1ab, &(0x7f000000cf3d)=""/195}, 0x48) 02:38:34 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000280)=0x583, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000b85fe4)={0xa, 0x4e24, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0x31, &(0x7f0000000240)=0x8, 0x4) recvmsg(r1, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=""/36, 0x19}, 0x80000020002000) sendmmsg(r0, &(0x7f00000002c0), 0x40000000000001c, 0x0) 02:38:34 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x16, 0x0, 0x37, 0x5, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) 02:38:34 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000280)=0x583, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000b85fe4)={0xa, 0x4e24, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0x31, &(0x7f0000000240)=0x8, 0x4) recvmsg(r1, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=""/36, 0x19}, 0x80000020002000) sendmmsg(r0, &(0x7f00000002c0), 0x40000000000001c, 0x0) 02:38:34 executing program 5: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="ff010000000000000000000000000001e0103ae4c7fe88000000000000000040000000000100400040000000007f000000ffffff0000000000000075e36d1f03b5fd6bced749052ea4460000ffffff00ffffffff6e"], 0x1) 02:38:34 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000740)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80) clock_gettime(0x0, &(0x7f0000000000)={0x0}) sendmsg$can_bcm(r0, &(0x7f00000000c0)={0x0, 0x1d0, &(0x7f0000000080)={&(0x7f0000000200)={0x2000000000005, 0xfffffffffffffbff, 0x0, {0x0, 0x2710}, {r1}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "d8b3a472a7515f51b54eb96e36ee804340a050a04c8027f4489dd4999d64fb4fcac85e2e7aa611b37765d70da2088756ad067fe5500fea9e7861f0109e087194"}}, 0x80}}, 0x0) 02:38:34 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x4, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x1c, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x7, 0x1ab, &(0x7f000000cf3d)=""/195}, 0x48) 02:38:35 executing program 3: r0 = socket(0x40000000000010, 0x2, 0x0) write(r0, &(0x7f0000000140)="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", 0xfc) 02:38:35 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000280)=0x583, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000b85fe4)={0xa, 0x4e24, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0x31, &(0x7f0000000240)=0x8, 0x4) recvmsg(r1, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=""/36, 0x19}, 0x80000020002000) sendmmsg(r0, &(0x7f00000002c0), 0x40000000000001c, 0x0) 02:38:35 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 303.740101][T19492] netlink: 188 bytes leftover after parsing attributes in process `syz-executor.3'. 02:38:35 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000740)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80) clock_gettime(0x0, &(0x7f0000000000)={0x0}) sendmsg$can_bcm(r0, &(0x7f00000000c0)={0x0, 0x1d0, &(0x7f0000000080)={&(0x7f0000000200)={0x2000000000005, 0xfffffffffffffbff, 0x0, {0x0, 0x2710}, {r1}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "d8b3a472a7515f51b54eb96e36ee804340a050a04c8027f4489dd4999d64fb4fcac85e2e7aa611b37765d70da2088756ad067fe5500fea9e7861f0109e087194"}}, 0x80}}, 0x0) 02:38:35 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000280)=0x583, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000b85fe4)={0xa, 0x4e24, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0x31, &(0x7f0000000240)=0x8, 0x4) recvmsg(r1, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=""/36, 0x19}, 0x80000020002000) sendmmsg(r0, &(0x7f00000002c0), 0x40000000000001c, 0x0) 02:38:35 executing program 3: r0 = socket(0x40000000000010, 0x2, 0x0) write(r0, &(0x7f0000000140)="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", 0xfc) 02:38:35 executing program 5: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=ANY=[@ANYBLOB="ff010000000000000000000000000001e0103ae4c7fe88000000000000000040000000000100400040000000007f000000ffffff0000000000000075e36d1f03b5fd6bced749052ea4460000ffffff00ffffffff6e"], 0x1) 02:38:35 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000280)=0x583, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000b85fe4)={0xa, 0x4e24, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0x31, &(0x7f0000000240)=0x8, 0x4) recvmsg(r1, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=""/36, 0x19}, 0x80000020002000) sendmmsg(r0, &(0x7f00000002c0), 0x40000000000001c, 0x0) 02:38:35 executing program 0: syz_emit_ethernet(0x140, &(0x7f0000000000)={@link_local, @broadcast, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x1, @dev, @empty=0xac141400, @random="eb5de09d9520", @dev}}}}, 0x0) 02:38:35 executing program 4: mkdir(&(0x7f0000000640)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getxattr(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)=@known='security.capability\x00', 0x0, 0x0) 02:38:35 executing program 2: clock_settime(0xe1cc463c9d56d42c, &(0x7f0000000100)) [ 304.011408][T19508] netlink: 188 bytes leftover after parsing attributes in process `syz-executor.3'. 02:38:35 executing program 3: r0 = socket(0x40000000000010, 0x2, 0x0) write(r0, &(0x7f0000000140)="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", 0xfc) 02:38:35 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 02:38:35 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 02:38:35 executing program 4: mkdir(&(0x7f0000000640)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getxattr(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)=@known='security.capability\x00', 0x0, 0x0) 02:38:35 executing program 2: clock_settime(0xe1cc463c9d56d42c, &(0x7f0000000100)) [ 304.232433][T19530] netlink: 188 bytes leftover after parsing attributes in process `syz-executor.3'. 02:38:35 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="c0dca5055e0bcfec7be070") r1 = socket(0x10, 0x8000000000000003, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="140000000312ff8fbe00cef656eb653375376c3e"], 0x14}}, 0x0) sendmmsg(r1, &(0x7f0000000000), 0x40000000000024a, 0x0) 02:38:35 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 02:38:35 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 02:38:35 executing program 4: mkdir(&(0x7f0000000640)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getxattr(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)=@known='security.capability\x00', 0x0, 0x0) 02:38:35 executing program 3: r0 = socket(0x40000000000010, 0x2, 0x0) write(r0, &(0x7f0000000140)="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", 0xfc) 02:38:35 executing program 2: clock_settime(0xe1cc463c9d56d42c, &(0x7f0000000100)) 02:38:35 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="c0dca5055e0bcfec7be070") r1 = socket(0x10, 0x8000000000000003, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="140000000312ff8fbe00cef656eb653375376c3e"], 0x14}}, 0x0) sendmmsg(r1, &(0x7f0000000000), 0x40000000000024a, 0x0) 02:38:36 executing program 2: clock_settime(0xe1cc463c9d56d42c, &(0x7f0000000100)) [ 304.531532][T19556] netlink: 188 bytes leftover after parsing attributes in process `syz-executor.3'. 02:38:36 executing program 4: mkdir(&(0x7f0000000640)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getxattr(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000380)=@known='security.capability\x00', 0x0, 0x0) 02:38:36 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 02:38:36 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='rpc_pipefs\x00', 0x0, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 02:38:36 executing program 3: setresuid(0x0, 0xee01, 0x0) syz_open_dev$swradio(&(0x7f0000000300)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) 02:38:36 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="c0dca5055e0bcfec7be070") r1 = socket(0x10, 0x8000000000000003, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="140000000312ff8fbe00cef656eb653375376c3e"], 0x14}}, 0x0) sendmmsg(r1, &(0x7f0000000000), 0x40000000000024a, 0x0) 02:38:36 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x2, 0x0, 0x63, 0xa, 0xff00}}, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x2, 0xfd13, &(0x7f0000000000)=""/195}, 0x48) 02:38:36 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execve(&(0x7f0000f8aff8)='./file0\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000200)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000100), 0x1c) madvise(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0xf) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='pagemap\x00m\xb6\x05\x89\xa0\xe8\xed\xadL>\xde\xbaz\\\xa5K\x7f\x99\x8e\x7fi\xb1\xf5N\xd3Z\xa8\xdc\xcfV\x86\x9f\xf5\"Q\xf8\xaeB\xbfy\xdcqDd\xbd3S;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`]\xb8\x85hiu)?\x90\xa9\x10t\x1a;\xbb<\xab\x1d}\x89\xbb\xd5|\xc5\xce\x06\xb4g\x14') sendfile(r0, r1, &(0x7f0000000000)=0x100f00, 0x10000) 02:38:36 executing program 3: setresuid(0x0, 0xee01, 0x0) syz_open_dev$swradio(&(0x7f0000000300)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) 02:38:36 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="c0dca5055e0bcfec7be070") r1 = socket(0x10, 0x8000000000000003, 0xc) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="140000000312ff8fbe00cef656eb653375376c3e"], 0x14}}, 0x0) sendmmsg(r1, &(0x7f0000000000), 0x40000000000024a, 0x0) 02:38:36 executing program 1: r0 = getpgrp(0x0) r1 = getpid() kcmp(r0, r1, 0xfffffffffffffffe, 0xffffffffffffffff, 0xffffffffffffffff) 02:38:36 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x2, 0x0, 0x63, 0xa, 0xff00}}, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x2, 0xfd13, &(0x7f0000000000)=""/195}, 0x48) 02:38:36 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x11, 0x2, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x41, &(0x7f0000000100)=r0, 0x4) sendmsg$kcm(r1, &(0x7f0000000640)={&(0x7f0000000040)=@caif=@rfm={0x25, 0x1f, "35b0d04845eddb3bc5582e88086d0216"}, 0x80, 0x0}, 0x0) recvmsg(r1, &(0x7f000000cd00)={0x0, 0x0, 0x0}, 0x2000) 02:38:36 executing program 3: setresuid(0x0, 0xee01, 0x0) syz_open_dev$swradio(&(0x7f0000000300)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) 02:38:36 executing program 5: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000a83000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @rand_addr="f63520eb829cc1685532999832404e46"}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x40000002b, &(0x7f0000000080)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) 02:38:36 executing program 1: r0 = getpgrp(0x0) r1 = getpid() kcmp(r0, r1, 0xfffffffffffffffe, 0xffffffffffffffff, 0xffffffffffffffff) 02:38:36 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x2, 0x0, 0x63, 0xa, 0xff00}}, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x2, 0xfd13, &(0x7f0000000000)=""/195}, 0x48) 02:38:36 executing program 3: setresuid(0x0, 0xee01, 0x0) syz_open_dev$swradio(&(0x7f0000000300)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) 02:38:36 executing program 5: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000a83000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @rand_addr="f63520eb829cc1685532999832404e46"}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x40000002b, &(0x7f0000000080)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) 02:38:37 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execve(&(0x7f0000f8aff8)='./file0\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000200)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000100), 0x1c) madvise(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0xf) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='pagemap\x00m\xb6\x05\x89\xa0\xe8\xed\xadL>\xde\xbaz\\\xa5K\x7f\x99\x8e\x7fi\xb1\xf5N\xd3Z\xa8\xdc\xcfV\x86\x9f\xf5\"Q\xf8\xaeB\xbfy\xdcqDd\xbd3S;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`]\xb8\x85hiu)?\x90\xa9\x10t\x1a;\xbb<\xab\x1d}\x89\xbb\xd5|\xc5\xce\x06\xb4g\x14') sendfile(r0, r1, &(0x7f0000000000)=0x100f00, 0x10000) 02:38:37 executing program 1: r0 = getpgrp(0x0) r1 = getpid() kcmp(r0, r1, 0xfffffffffffffffe, 0xffffffffffffffff, 0xffffffffffffffff) 02:38:37 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x11, 0x2, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x41, &(0x7f0000000100)=r0, 0x4) sendmsg$kcm(r1, &(0x7f0000000640)={&(0x7f0000000040)=@caif=@rfm={0x25, 0x1f, "35b0d04845eddb3bc5582e88086d0216"}, 0x80, 0x0}, 0x0) recvmsg(r1, &(0x7f000000cd00)={0x0, 0x0, 0x0}, 0x2000) 02:38:37 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x2, 0x0, 0x63, 0xa, 0xff00}}, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x2, 0xfd13, &(0x7f0000000000)=""/195}, 0x48) 02:38:37 executing program 5: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000a83000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @rand_addr="f63520eb829cc1685532999832404e46"}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x40000002b, &(0x7f0000000080)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) 02:38:37 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x11, 0x2, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x41, &(0x7f0000000100)=r0, 0x4) sendmsg$kcm(r1, &(0x7f0000000640)={&(0x7f0000000040)=@caif=@rfm={0x25, 0x1f, "35b0d04845eddb3bc5582e88086d0216"}, 0x80, 0x0}, 0x0) recvmsg(r1, &(0x7f000000cd00)={0x0, 0x0, 0x0}, 0x2000) 02:38:37 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execve(&(0x7f0000f8aff8)='./file0\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000200)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000100), 0x1c) madvise(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0xf) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='pagemap\x00m\xb6\x05\x89\xa0\xe8\xed\xadL>\xde\xbaz\\\xa5K\x7f\x99\x8e\x7fi\xb1\xf5N\xd3Z\xa8\xdc\xcfV\x86\x9f\xf5\"Q\xf8\xaeB\xbfy\xdcqDd\xbd3S;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`]\xb8\x85hiu)?\x90\xa9\x10t\x1a;\xbb<\xab\x1d}\x89\xbb\xd5|\xc5\xce\x06\xb4g\x14') sendfile(r0, r1, &(0x7f0000000000)=0x100f00, 0x10000) 02:38:37 executing program 1: r0 = getpgrp(0x0) r1 = getpid() kcmp(r0, r1, 0xfffffffffffffffe, 0xffffffffffffffff, 0xffffffffffffffff) 02:38:37 executing program 5: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000a83000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @rand_addr="f63520eb829cc1685532999832404e46"}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x40000002b, &(0x7f0000000080)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) 02:38:37 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x11, 0x2, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x41, &(0x7f0000000100)=r0, 0x4) sendmsg$kcm(r1, &(0x7f0000000640)={&(0x7f0000000040)=@caif=@rfm={0x25, 0x1f, "35b0d04845eddb3bc5582e88086d0216"}, 0x80, 0x0}, 0x0) recvmsg(r1, &(0x7f000000cd00)={0x0, 0x0, 0x0}, 0x2000) 02:38:37 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x11, 0x2, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x41, &(0x7f0000000100)=r0, 0x4) sendmsg$kcm(r1, &(0x7f0000000640)={&(0x7f0000000040)=@caif=@rfm={0x25, 0x1f, "35b0d04845eddb3bc5582e88086d0216"}, 0x80, 0x0}, 0x0) recvmsg(r1, &(0x7f000000cd00)={0x0, 0x0, 0x0}, 0x2000) 02:38:37 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x11, 0x2, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x41, &(0x7f0000000100)=r0, 0x4) sendmsg$kcm(r1, &(0x7f0000000640)={&(0x7f0000000040)=@caif=@rfm={0x25, 0x1f, "35b0d04845eddb3bc5582e88086d0216"}, 0x80, 0x0}, 0x0) recvmsg(r1, &(0x7f000000cd00)={0x0, 0x0, 0x0}, 0x2000) 02:38:38 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execve(&(0x7f0000f8aff8)='./file0\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000200)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000100), 0x1c) madvise(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0xf) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='pagemap\x00m\xb6\x05\x89\xa0\xe8\xed\xadL>\xde\xbaz\\\xa5K\x7f\x99\x8e\x7fi\xb1\xf5N\xd3Z\xa8\xdc\xcfV\x86\x9f\xf5\"Q\xf8\xaeB\xbfy\xdcqDd\xbd3S;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`]\xb8\x85hiu)?\x90\xa9\x10t\x1a;\xbb<\xab\x1d}\x89\xbb\xd5|\xc5\xce\x06\xb4g\x14') sendfile(r0, r1, &(0x7f0000000000)=0x100f00, 0x10000) 02:38:38 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x11, 0x2, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x41, &(0x7f0000000100)=r0, 0x4) sendmsg$kcm(r1, &(0x7f0000000640)={&(0x7f0000000040)=@caif=@rfm={0x25, 0x1f, "35b0d04845eddb3bc5582e88086d0216"}, 0x80, 0x0}, 0x0) recvmsg(r1, &(0x7f000000cd00)={0x0, 0x0, 0x0}, 0x2000) 02:38:38 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execve(&(0x7f0000f8aff8)='./file0\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000200)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000100), 0x1c) madvise(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0xf) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='pagemap\x00m\xb6\x05\x89\xa0\xe8\xed\xadL>\xde\xbaz\\\xa5K\x7f\x99\x8e\x7fi\xb1\xf5N\xd3Z\xa8\xdc\xcfV\x86\x9f\xf5\"Q\xf8\xaeB\xbfy\xdcqDd\xbd3S;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`]\xb8\x85hiu)?\x90\xa9\x10t\x1a;\xbb<\xab\x1d}\x89\xbb\xd5|\xc5\xce\x06\xb4g\x14') sendfile(r0, r1, &(0x7f0000000000)=0x100f00, 0x10000) 02:38:38 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execve(&(0x7f0000f8aff8)='./file0\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000200)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000100), 0x1c) madvise(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0xf) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='pagemap\x00m\xb6\x05\x89\xa0\xe8\xed\xadL>\xde\xbaz\\\xa5K\x7f\x99\x8e\x7fi\xb1\xf5N\xd3Z\xa8\xdc\xcfV\x86\x9f\xf5\"Q\xf8\xaeB\xbfy\xdcqDd\xbd3S;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`]\xb8\x85hiu)?\x90\xa9\x10t\x1a;\xbb<\xab\x1d}\x89\xbb\xd5|\xc5\xce\x06\xb4g\x14') sendfile(r0, r1, &(0x7f0000000000)=0x100f00, 0x10000) 02:38:38 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x11, 0x2, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x41, &(0x7f0000000100)=r0, 0x4) sendmsg$kcm(r1, &(0x7f0000000640)={&(0x7f0000000040)=@caif=@rfm={0x25, 0x1f, "35b0d04845eddb3bc5582e88086d0216"}, 0x80, 0x0}, 0x0) recvmsg(r1, &(0x7f000000cd00)={0x0, 0x0, 0x0}, 0x2000) 02:38:38 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x11, 0x2, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x41, &(0x7f0000000100)=r0, 0x4) sendmsg$kcm(r1, &(0x7f0000000640)={&(0x7f0000000040)=@caif=@rfm={0x25, 0x1f, "35b0d04845eddb3bc5582e88086d0216"}, 0x80, 0x0}, 0x0) recvmsg(r1, &(0x7f000000cd00)={0x0, 0x0, 0x0}, 0x2000) 02:38:38 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execve(&(0x7f0000f8aff8)='./file0\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000200)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000100), 0x1c) madvise(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0xf) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='pagemap\x00m\xb6\x05\x89\xa0\xe8\xed\xadL>\xde\xbaz\\\xa5K\x7f\x99\x8e\x7fi\xb1\xf5N\xd3Z\xa8\xdc\xcfV\x86\x9f\xf5\"Q\xf8\xaeB\xbfy\xdcqDd\xbd3S;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`]\xb8\x85hiu)?\x90\xa9\x10t\x1a;\xbb<\xab\x1d}\x89\xbb\xd5|\xc5\xce\x06\xb4g\x14') sendfile(r0, r1, &(0x7f0000000000)=0x100f00, 0x10000) 02:38:38 executing program 3: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000a83000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @rand_addr="f63520eb829cc1685532999832404e46"}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x40000002b, &(0x7f0000000080)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) 02:38:38 executing program 3: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000a83000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @rand_addr="f63520eb829cc1685532999832404e46"}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x40000002b, &(0x7f0000000080)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) 02:38:38 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x11, 0x2, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x41, &(0x7f0000000100)=r0, 0x4) sendmsg$kcm(r1, &(0x7f0000000640)={&(0x7f0000000040)=@caif=@rfm={0x25, 0x1f, "35b0d04845eddb3bc5582e88086d0216"}, 0x80, 0x0}, 0x0) recvmsg(r1, &(0x7f000000cd00)={0x0, 0x0, 0x0}, 0x2000) 02:38:38 executing program 0: openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x0, 0x0) sigaltstack(&(0x7f0000000000/0x4000)=nil, 0x0) 02:38:38 executing program 3: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000a83000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @rand_addr="f63520eb829cc1685532999832404e46"}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x40000002b, &(0x7f0000000080)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) 02:38:38 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execve(&(0x7f0000f8aff8)='./file0\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000200)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000100), 0x1c) madvise(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0xf) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='pagemap\x00m\xb6\x05\x89\xa0\xe8\xed\xadL>\xde\xbaz\\\xa5K\x7f\x99\x8e\x7fi\xb1\xf5N\xd3Z\xa8\xdc\xcfV\x86\x9f\xf5\"Q\xf8\xaeB\xbfy\xdcqDd\xbd3S;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`]\xb8\x85hiu)?\x90\xa9\x10t\x1a;\xbb<\xab\x1d}\x89\xbb\xd5|\xc5\xce\x06\xb4g\x14') sendfile(r0, r1, &(0x7f0000000000)=0x100f00, 0x10000) 02:38:38 executing program 0: openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x0, 0x0) sigaltstack(&(0x7f0000000000/0x4000)=nil, 0x0) 02:38:38 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f00000003c0)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000340)='./file1\x00', 0x0) move_mount(r0, &(0x7f0000000080)='./file0\x00', r0, &(0x7f0000000100)='./file1\x00', 0x0) 02:38:38 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execve(&(0x7f0000f8aff8)='./file0\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000200)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000100), 0x1c) madvise(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0xf) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='pagemap\x00m\xb6\x05\x89\xa0\xe8\xed\xadL>\xde\xbaz\\\xa5K\x7f\x99\x8e\x7fi\xb1\xf5N\xd3Z\xa8\xdc\xcfV\x86\x9f\xf5\"Q\xf8\xaeB\xbfy\xdcqDd\xbd3S;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`]\xb8\x85hiu)?\x90\xa9\x10t\x1a;\xbb<\xab\x1d}\x89\xbb\xd5|\xc5\xce\x06\xb4g\x14') sendfile(r0, r1, &(0x7f0000000000)=0x100f00, 0x10000) 02:38:38 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execve(&(0x7f0000f8aff8)='./file0\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000200)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000100), 0x1c) madvise(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0xf) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='pagemap\x00m\xb6\x05\x89\xa0\xe8\xed\xadL>\xde\xbaz\\\xa5K\x7f\x99\x8e\x7fi\xb1\xf5N\xd3Z\xa8\xdc\xcfV\x86\x9f\xf5\"Q\xf8\xaeB\xbfy\xdcqDd\xbd3S;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`]\xb8\x85hiu)?\x90\xa9\x10t\x1a;\xbb<\xab\x1d}\x89\xbb\xd5|\xc5\xce\x06\xb4g\x14') sendfile(r0, r1, &(0x7f0000000000)=0x100f00, 0x10000) 02:38:39 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f00000003c0)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000340)='./file1\x00', 0x0) move_mount(r0, &(0x7f0000000080)='./file0\x00', r0, &(0x7f0000000100)='./file1\x00', 0x0) 02:38:39 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execve(&(0x7f0000f8aff8)='./file0\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000200)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000100), 0x1c) madvise(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0xf) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='pagemap\x00m\xb6\x05\x89\xa0\xe8\xed\xadL>\xde\xbaz\\\xa5K\x7f\x99\x8e\x7fi\xb1\xf5N\xd3Z\xa8\xdc\xcfV\x86\x9f\xf5\"Q\xf8\xaeB\xbfy\xdcqDd\xbd3S;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`]\xb8\x85hiu)?\x90\xa9\x10t\x1a;\xbb<\xab\x1d}\x89\xbb\xd5|\xc5\xce\x06\xb4g\x14') sendfile(r0, r1, &(0x7f0000000000)=0x100f00, 0x10000) 02:38:39 executing program 0: openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x0, 0x0) sigaltstack(&(0x7f0000000000/0x4000)=nil, 0x0) 02:38:39 executing program 0: openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x0, 0x0) sigaltstack(&(0x7f0000000000/0x4000)=nil, 0x0) 02:38:39 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f00000003c0)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000340)='./file1\x00', 0x0) move_mount(r0, &(0x7f0000000080)='./file0\x00', r0, &(0x7f0000000100)='./file1\x00', 0x0) 02:38:39 executing program 0: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file1\x00', 0x40) mknod(&(0x7f0000000440)='./file0/file1\x00', 0x0, 0x0) 02:38:39 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='tmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f00000003c0)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000340)='./file1\x00', 0x0) move_mount(r0, &(0x7f0000000080)='./file0\x00', r0, &(0x7f0000000100)='./file1\x00', 0x0) 02:38:39 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execve(&(0x7f0000f8aff8)='./file0\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000200)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000100), 0x1c) madvise(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0xf) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='pagemap\x00m\xb6\x05\x89\xa0\xe8\xed\xadL>\xde\xbaz\\\xa5K\x7f\x99\x8e\x7fi\xb1\xf5N\xd3Z\xa8\xdc\xcfV\x86\x9f\xf5\"Q\xf8\xaeB\xbfy\xdcqDd\xbd3S;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`]\xb8\x85hiu)?\x90\xa9\x10t\x1a;\xbb<\xab\x1d}\x89\xbb\xd5|\xc5\xce\x06\xb4g\x14') sendfile(r0, r1, &(0x7f0000000000)=0x100f00, 0x10000) 02:38:39 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=@newqdisc={0x24, 0x5e, 0x7, 0x0, 0x0, {0x0, r1, {0xa}}}, 0x24}}, 0x0) 02:38:39 executing program 3: keyctl$dh_compute(0x17, &(0x7f00000010c0), 0x0, 0x0, &(0x7f00000011c0)={&(0x7f0000001180)={'cmac(des3_ede)\x00'}}) 02:38:39 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execve(&(0x7f0000f8aff8)='./file0\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000200)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000100), 0x1c) madvise(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0xf) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='pagemap\x00m\xb6\x05\x89\xa0\xe8\xed\xadL>\xde\xbaz\\\xa5K\x7f\x99\x8e\x7fi\xb1\xf5N\xd3Z\xa8\xdc\xcfV\x86\x9f\xf5\"Q\xf8\xaeB\xbfy\xdcqDd\xbd3S;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`]\xb8\x85hiu)?\x90\xa9\x10t\x1a;\xbb<\xab\x1d}\x89\xbb\xd5|\xc5\xce\x06\xb4g\x14') sendfile(r0, r1, &(0x7f0000000000)=0x100f00, 0x10000) 02:38:39 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x14, &(0x7f0000001080)={0x0, 0x7}, 0x8) 02:38:39 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=@newqdisc={0x24, 0x5e, 0x7, 0x0, 0x0, {0x0, r1, {0xa}}}, 0x24}}, 0x0) 02:38:40 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=@newqdisc={0x24, 0x5e, 0x7, 0x0, 0x0, {0x0, r1, {0xa}}}, 0x24}}, 0x0) 02:38:40 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x14, &(0x7f0000001080)={0x0, 0x7}, 0x8) 02:38:40 executing program 3: keyctl$dh_compute(0x17, &(0x7f00000010c0), 0x0, 0x0, &(0x7f00000011c0)={&(0x7f0000001180)={'cmac(des3_ede)\x00'}}) 02:38:40 executing program 2: accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) memfd_create(0x0, 0x0) pipe(&(0x7f0000000340)) write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffffffffffe94) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000700)={'yam0\x00', {0x2, 0x4e23, @remote}}) sendmsg$TIPC_CMD_SET_LINK_TOL(0xffffffffffffffff, 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, &(0x7f0000000e80), 0x0) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f00000004c0)=ANY=[@ANYBLOB="105cdcf349fa12aad7d7a2d2403368a108384df8c0de42cd0327542ebf0eefd2b449207a41af6c80b7ab0bd4c171f292"], 0x0) clone(0x100020040004104, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 02:38:40 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=@newqdisc={0x24, 0x5e, 0x7, 0x0, 0x0, {0x0, r1, {0xa}}}, 0x24}}, 0x0) 02:38:40 executing program 3: keyctl$dh_compute(0x17, &(0x7f00000010c0), 0x0, 0x0, &(0x7f00000011c0)={&(0x7f0000001180)={'cmac(des3_ede)\x00'}}) [ 308.740031][T19755] IPVS: ftp: loaded support on port[0] = 21 [ 308.910801][T19766] IPVS: ftp: loaded support on port[0] = 21 [ 309.142481][ C0] net_ratelimit: 4 callbacks suppressed [ 309.142490][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 309.154200][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 309.160040][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 309.165817][ C0] protocol 88fb is buggy, dev hsr_slave_1 02:38:40 executing program 2: accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) memfd_create(0x0, 0x0) pipe(&(0x7f0000000340)) write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffffffffffe94) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000700)={'yam0\x00', {0x2, 0x4e23, @remote}}) sendmsg$TIPC_CMD_SET_LINK_TOL(0xffffffffffffffff, 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, &(0x7f0000000e80), 0x0) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f00000004c0)=ANY=[@ANYBLOB="105cdcf349fa12aad7d7a2d2403368a108384df8c0de42cd0327542ebf0eefd2b449207a41af6c80b7ab0bd4c171f292"], 0x0) clone(0x100020040004104, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 02:38:40 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x14, &(0x7f0000001080)={0x0, 0x7}, 0x8) 02:38:40 executing program 5: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x70}}, @icmp=@parameter_prob={0x5, 0x0, 0x0, 0x0, 0x0, 0x6, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}}}}}}, 0x0) 02:38:40 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x3, 0x3, &(0x7f0000000040)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2e, 0x25, 0xa}}, &(0x7f0000000080)='GPL\x00\x8d\at\xce\xb0\xac\xe42\x0f\xd3\x86\x92\xcd\xc9\x82SO \x8b(\x0eB\xca\x940\xb19\xd4\x17;WK\x87y\x91L\xb2\xaaR\xdb\xeaqm&\xc9Zl\xa4\x16\xdf\x9d\xeao$\x84\xc66\xe1\xd3\xf6\xeca\xc0&uCY\x9c#\xe7\x16=]\x91Q\x8d\xe4\x8e\xf9]0\x11\xfa\xb6\xdd\x9a\x9c \xda\x17\x84l\xf6\xdd\x18H-^y\xd3ke\x81\xa4-Kp\xd1\xa9/l\x10R\xdaS\xcb\x0f\\\vs,\xa8\x88H\x1c\x85\x93\xfc\xf0\t\x95\xb4\xf9%\xf3\x1f+\xc9\x13\xe2\xfb', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 02:38:40 executing program 3: keyctl$dh_compute(0x17, &(0x7f00000010c0), 0x0, 0x0, &(0x7f00000011c0)={&(0x7f0000001180)={'cmac(des3_ede)\x00'}}) 02:38:40 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000002c0)='(\xcf\x11\x16\xc0\x83\xceC\xcc-\xcff\xbb\"\xca\xcf\xd9v\xd0\xe7\xb4h8\xc9\xfb#\x16)\xf0\xc3\n\x86\xf1\"\xe9\xabHe+\x9c]8}2\xc34h\x13\x15R\ax\x9e\x15b\xa2\x94T\x01!\x11\xb1\xa9\x9f<\xf8e\xf7\xfd3\xb3\xa2\x95\xfa\xf1\x13\xfe\x9f\xf3\xa0\x87@f\xa29?\x8bl\x15\x15\xed\xc8\x8cj\xa96\x19:\x1b\xab\x16\xab\xce\x1b\xbf\x14\xc5\x83[\x8d\xf6\xbf\x81\xe1m\x83\xfb\xac6RI\x0e[-\xff\x00$\xdc\xe1\xe6\xe3\xfb0\xc9\xe2\x0f\xe6\x97o\x7fl1\x8d\xb4m\xeb\x0eP\xdc)\xb0\x99P\xd4\xd3u7W\x12\x00\x86\x95\r$\xf9E\x00\x00\x00\x00\x00\x00\x00\x00n\xa6m>|\xfa\xd4V7\xb2\x18\x86\xcd\xd9X\x88\xa0\x81/\xd0|\x18\x16C\xbb\xbfN\xff\xf0\xde\x11\xa8i\xb6<_\x9c\x88Il;\xeb\x12\xcc\xc7\xc4\xcd\xe5\xeb\xd6\xaa5\x96M\x1b\x11j\xfe\xf2\xd28\xa4\xf258\x9f\xab\xcd\xcf]9G\xe2\x04k\xa54fQ\x907\xd6\xf2qb\xbe\x00\x00\x00\x00\x00\x00\x00\b\xc2vpB\x90\xa53\xc9\xdff\x19G\x17f}\xfe\xb0\xd2\x89\x0e9*\xe5q\xd5\xa9\xc0T\x85\xf0\xb0\x86\\\x8f\xa7|\xfa\v]\x89\xb9oJ\xd6\x85\xf4\x15\xb5\xa6\xd7\xb3\xc6\x95 \xd0\xd7\xf9X\xbe\xb1\xdf\xb9\xd9b\x8ay\xd4\xc2\xb9\x1fs\"o\xa7W\x1c\xc4\xc2k\xc8\xc0,${?\x84\xbb\xb1i\ab\xe8\x00e\xacZH^\xe8\x91\xae\v*j\x90\x1dA\'\xf3\x8e\x84\xaa\xf92,\x8e\x0e\'\x86\xe3\xbe\x9f\x83]\xa2w&\x87\xf84\x9eM\x87\x1d\x00'/415) 02:38:40 executing program 5: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x70}}, @icmp=@parameter_prob={0x5, 0x0, 0x0, 0x0, 0x0, 0x6, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}}}}}}, 0x0) 02:38:40 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x14, &(0x7f0000001080)={0x0, 0x7}, 0x8) [ 309.308694][T19772] IPVS: ftp: loaded support on port[0] = 21 02:38:40 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x3, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x3f000000, 0x40000000000000}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x34}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffe8b}, 0x48) 02:38:40 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000002c0)='(\xcf\x11\x16\xc0\x83\xceC\xcc-\xcff\xbb\"\xca\xcf\xd9v\xd0\xe7\xb4h8\xc9\xfb#\x16)\xf0\xc3\n\x86\xf1\"\xe9\xabHe+\x9c]8}2\xc34h\x13\x15R\ax\x9e\x15b\xa2\x94T\x01!\x11\xb1\xa9\x9f<\xf8e\xf7\xfd3\xb3\xa2\x95\xfa\xf1\x13\xfe\x9f\xf3\xa0\x87@f\xa29?\x8bl\x15\x15\xed\xc8\x8cj\xa96\x19:\x1b\xab\x16\xab\xce\x1b\xbf\x14\xc5\x83[\x8d\xf6\xbf\x81\xe1m\x83\xfb\xac6RI\x0e[-\xff\x00$\xdc\xe1\xe6\xe3\xfb0\xc9\xe2\x0f\xe6\x97o\x7fl1\x8d\xb4m\xeb\x0eP\xdc)\xb0\x99P\xd4\xd3u7W\x12\x00\x86\x95\r$\xf9E\x00\x00\x00\x00\x00\x00\x00\x00n\xa6m>|\xfa\xd4V7\xb2\x18\x86\xcd\xd9X\x88\xa0\x81/\xd0|\x18\x16C\xbb\xbfN\xff\xf0\xde\x11\xa8i\xb6<_\x9c\x88Il;\xeb\x12\xcc\xc7\xc4\xcd\xe5\xeb\xd6\xaa5\x96M\x1b\x11j\xfe\xf2\xd28\xa4\xf258\x9f\xab\xcd\xcf]9G\xe2\x04k\xa54fQ\x907\xd6\xf2qb\xbe\x00\x00\x00\x00\x00\x00\x00\b\xc2vpB\x90\xa53\xc9\xdff\x19G\x17f}\xfe\xb0\xd2\x89\x0e9*\xe5q\xd5\xa9\xc0T\x85\xf0\xb0\x86\\\x8f\xa7|\xfa\v]\x89\xb9oJ\xd6\x85\xf4\x15\xb5\xa6\xd7\xb3\xc6\x95 \xd0\xd7\xf9X\xbe\xb1\xdf\xb9\xd9b\x8ay\xd4\xc2\xb9\x1fs\"o\xa7W\x1c\xc4\xc2k\xc8\xc0,${?\x84\xbb\xb1i\ab\xe8\x00e\xacZH^\xe8\x91\xae\v*j\x90\x1dA\'\xf3\x8e\x84\xaa\xf92,\x8e\x0e\'\x86\xe3\xbe\x9f\x83]\xa2w&\x87\xf84\x9eM\x87\x1d\x00'/415) 02:38:40 executing program 5: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x70}}, @icmp=@parameter_prob={0x5, 0x0, 0x0, 0x0, 0x0, 0x6, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}}}}}}, 0x0) [ 309.462397][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 309.468338][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 309.474229][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 309.480012][ C0] protocol 88fb is buggy, dev hsr_slave_1 02:38:40 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x3, 0x3, &(0x7f0000000040)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2e, 0x25, 0xa}}, &(0x7f0000000080)='GPL\x00\x8d\at\xce\xb0\xac\xe42\x0f\xd3\x86\x92\xcd\xc9\x82SO \x8b(\x0eB\xca\x940\xb19\xd4\x17;WK\x87y\x91L\xb2\xaaR\xdb\xeaqm&\xc9Zl\xa4\x16\xdf\x9d\xeao$\x84\xc66\xe1\xd3\xf6\xeca\xc0&uCY\x9c#\xe7\x16=]\x91Q\x8d\xe4\x8e\xf9]0\x11\xfa\xb6\xdd\x9a\x9c \xda\x17\x84l\xf6\xdd\x18H-^y\xd3ke\x81\xa4-Kp\xd1\xa9/l\x10R\xdaS\xcb\x0f\\\vs,\xa8\x88H\x1c\x85\x93\xfc\xf0\t\x95\xb4\xf9%\xf3\x1f+\xc9\x13\xe2\xfb', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 309.542408][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 309.548302][ C0] protocol 88fb is buggy, dev hsr_slave_1 02:38:41 executing program 2: accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) memfd_create(0x0, 0x0) pipe(&(0x7f0000000340)) write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffffffffffe94) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000700)={'yam0\x00', {0x2, 0x4e23, @remote}}) sendmsg$TIPC_CMD_SET_LINK_TOL(0xffffffffffffffff, 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, &(0x7f0000000e80), 0x0) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f00000004c0)=ANY=[@ANYBLOB="105cdcf349fa12aad7d7a2d2403368a108384df8c0de42cd0327542ebf0eefd2b449207a41af6c80b7ab0bd4c171f292"], 0x0) clone(0x100020040004104, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 02:38:41 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 02:38:41 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x3, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x3f000000, 0x40000000000000}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x34}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffe8b}, 0x48) 02:38:41 executing program 5: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x70}}, @icmp=@parameter_prob={0x5, 0x0, 0x0, 0x0, 0x0, 0x6, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}}}}}}, 0x0) 02:38:41 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x3, 0x3, &(0x7f0000000040)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2e, 0x25, 0xa}}, &(0x7f0000000080)='GPL\x00\x8d\at\xce\xb0\xac\xe42\x0f\xd3\x86\x92\xcd\xc9\x82SO \x8b(\x0eB\xca\x940\xb19\xd4\x17;WK\x87y\x91L\xb2\xaaR\xdb\xeaqm&\xc9Zl\xa4\x16\xdf\x9d\xeao$\x84\xc66\xe1\xd3\xf6\xeca\xc0&uCY\x9c#\xe7\x16=]\x91Q\x8d\xe4\x8e\xf9]0\x11\xfa\xb6\xdd\x9a\x9c \xda\x17\x84l\xf6\xdd\x18H-^y\xd3ke\x81\xa4-Kp\xd1\xa9/l\x10R\xdaS\xcb\x0f\\\vs,\xa8\x88H\x1c\x85\x93\xfc\xf0\t\x95\xb4\xf9%\xf3\x1f+\xc9\x13\xe2\xfb', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 02:38:41 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000002c0)='(\xcf\x11\x16\xc0\x83\xceC\xcc-\xcff\xbb\"\xca\xcf\xd9v\xd0\xe7\xb4h8\xc9\xfb#\x16)\xf0\xc3\n\x86\xf1\"\xe9\xabHe+\x9c]8}2\xc34h\x13\x15R\ax\x9e\x15b\xa2\x94T\x01!\x11\xb1\xa9\x9f<\xf8e\xf7\xfd3\xb3\xa2\x95\xfa\xf1\x13\xfe\x9f\xf3\xa0\x87@f\xa29?\x8bl\x15\x15\xed\xc8\x8cj\xa96\x19:\x1b\xab\x16\xab\xce\x1b\xbf\x14\xc5\x83[\x8d\xf6\xbf\x81\xe1m\x83\xfb\xac6RI\x0e[-\xff\x00$\xdc\xe1\xe6\xe3\xfb0\xc9\xe2\x0f\xe6\x97o\x7fl1\x8d\xb4m\xeb\x0eP\xdc)\xb0\x99P\xd4\xd3u7W\x12\x00\x86\x95\r$\xf9E\x00\x00\x00\x00\x00\x00\x00\x00n\xa6m>|\xfa\xd4V7\xb2\x18\x86\xcd\xd9X\x88\xa0\x81/\xd0|\x18\x16C\xbb\xbfN\xff\xf0\xde\x11\xa8i\xb6<_\x9c\x88Il;\xeb\x12\xcc\xc7\xc4\xcd\xe5\xeb\xd6\xaa5\x96M\x1b\x11j\xfe\xf2\xd28\xa4\xf258\x9f\xab\xcd\xcf]9G\xe2\x04k\xa54fQ\x907\xd6\xf2qb\xbe\x00\x00\x00\x00\x00\x00\x00\b\xc2vpB\x90\xa53\xc9\xdff\x19G\x17f}\xfe\xb0\xd2\x89\x0e9*\xe5q\xd5\xa9\xc0T\x85\xf0\xb0\x86\\\x8f\xa7|\xfa\v]\x89\xb9oJ\xd6\x85\xf4\x15\xb5\xa6\xd7\xb3\xc6\x95 \xd0\xd7\xf9X\xbe\xb1\xdf\xb9\xd9b\x8ay\xd4\xc2\xb9\x1fs\"o\xa7W\x1c\xc4\xc2k\xc8\xc0,${?\x84\xbb\xb1i\ab\xe8\x00e\xacZH^\xe8\x91\xae\v*j\x90\x1dA\'\xf3\x8e\x84\xaa\xf92,\x8e\x0e\'\x86\xe3\xbe\x9f\x83]\xa2w&\x87\xf84\x9eM\x87\x1d\x00'/415) 02:38:41 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x3, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x3f000000, 0x40000000000000}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x34}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffe8b}, 0x48) 02:38:41 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x3, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x3f000000, 0x40000000000000}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x34}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffe8b}, 0x48) 02:38:41 executing program 4: r0 = socket$inet6(0xa, 0x800000003, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x2, 0x4) connect$inet6(r0, &(0x7f0000000000), 0x1c) recvmsg(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000003500)=[{&(0x7f00000000c0)=""/170, 0xaa}], 0x1}, 0x0) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x0, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x563, 0x0) 02:38:41 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x3, 0x3, &(0x7f0000000040)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2e, 0x25, 0xa}}, &(0x7f0000000080)='GPL\x00\x8d\at\xce\xb0\xac\xe42\x0f\xd3\x86\x92\xcd\xc9\x82SO \x8b(\x0eB\xca\x940\xb19\xd4\x17;WK\x87y\x91L\xb2\xaaR\xdb\xeaqm&\xc9Zl\xa4\x16\xdf\x9d\xeao$\x84\xc66\xe1\xd3\xf6\xeca\xc0&uCY\x9c#\xe7\x16=]\x91Q\x8d\xe4\x8e\xf9]0\x11\xfa\xb6\xdd\x9a\x9c \xda\x17\x84l\xf6\xdd\x18H-^y\xd3ke\x81\xa4-Kp\xd1\xa9/l\x10R\xdaS\xcb\x0f\\\vs,\xa8\x88H\x1c\x85\x93\xfc\xf0\t\x95\xb4\xf9%\xf3\x1f+\xc9\x13\xe2\xfb', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 309.917043][T19820] IPVS: ftp: loaded support on port[0] = 21 02:38:41 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000002c0)='(\xcf\x11\x16\xc0\x83\xceC\xcc-\xcff\xbb\"\xca\xcf\xd9v\xd0\xe7\xb4h8\xc9\xfb#\x16)\xf0\xc3\n\x86\xf1\"\xe9\xabHe+\x9c]8}2\xc34h\x13\x15R\ax\x9e\x15b\xa2\x94T\x01!\x11\xb1\xa9\x9f<\xf8e\xf7\xfd3\xb3\xa2\x95\xfa\xf1\x13\xfe\x9f\xf3\xa0\x87@f\xa29?\x8bl\x15\x15\xed\xc8\x8cj\xa96\x19:\x1b\xab\x16\xab\xce\x1b\xbf\x14\xc5\x83[\x8d\xf6\xbf\x81\xe1m\x83\xfb\xac6RI\x0e[-\xff\x00$\xdc\xe1\xe6\xe3\xfb0\xc9\xe2\x0f\xe6\x97o\x7fl1\x8d\xb4m\xeb\x0eP\xdc)\xb0\x99P\xd4\xd3u7W\x12\x00\x86\x95\r$\xf9E\x00\x00\x00\x00\x00\x00\x00\x00n\xa6m>|\xfa\xd4V7\xb2\x18\x86\xcd\xd9X\x88\xa0\x81/\xd0|\x18\x16C\xbb\xbfN\xff\xf0\xde\x11\xa8i\xb6<_\x9c\x88Il;\xeb\x12\xcc\xc7\xc4\xcd\xe5\xeb\xd6\xaa5\x96M\x1b\x11j\xfe\xf2\xd28\xa4\xf258\x9f\xab\xcd\xcf]9G\xe2\x04k\xa54fQ\x907\xd6\xf2qb\xbe\x00\x00\x00\x00\x00\x00\x00\b\xc2vpB\x90\xa53\xc9\xdff\x19G\x17f}\xfe\xb0\xd2\x89\x0e9*\xe5q\xd5\xa9\xc0T\x85\xf0\xb0\x86\\\x8f\xa7|\xfa\v]\x89\xb9oJ\xd6\x85\xf4\x15\xb5\xa6\xd7\xb3\xc6\x95 \xd0\xd7\xf9X\xbe\xb1\xdf\xb9\xd9b\x8ay\xd4\xc2\xb9\x1fs\"o\xa7W\x1c\xc4\xc2k\xc8\xc0,${?\x84\xbb\xb1i\ab\xe8\x00e\xacZH^\xe8\x91\xae\v*j\x90\x1dA\'\xf3\x8e\x84\xaa\xf92,\x8e\x0e\'\x86\xe3\xbe\x9f\x83]\xa2w&\x87\xf84\x9eM\x87\x1d\x00'/415) 02:38:41 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x3, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x3f000000, 0x40000000000000}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x34}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffe8b}, 0x48) 02:38:41 executing program 2: accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) memfd_create(0x0, 0x0) pipe(&(0x7f0000000340)) write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffffffffffe94) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000700)={'yam0\x00', {0x2, 0x4e23, @remote}}) sendmsg$TIPC_CMD_SET_LINK_TOL(0xffffffffffffffff, 0x0, 0x0) accept4$unix(0xffffffffffffffff, 0x0, &(0x7f0000000e80), 0x0) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f00000004c0)=ANY=[@ANYBLOB="105cdcf349fa12aad7d7a2d2403368a108384df8c0de42cd0327542ebf0eefd2b449207a41af6c80b7ab0bd4c171f292"], 0x0) clone(0x100020040004104, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 02:38:41 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x3, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x3f000000, 0x40000000000000}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x34}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffe8b}, 0x48) 02:38:41 executing program 0: capset(&(0x7f0000000380)={0x19980330}, &(0x7f0000000140)={0x20000fffffff9, 0xfbffffffffffffff}) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000080)='./file1\x00', 0x141) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 02:38:41 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x3, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x3f000000, 0x40000000000000}, [@alu={0x8000000201a7fe3, 0x0, 0x200003e6, 0x61, 0x0, 0x34}]}, &(0x7f0000000000)='(9+\xee\xe4\xfc\x7f\xf7\x8f\xe8\xc4E\x1c \x03\xa1V\tO<\xa0\xf4\xbc\x8cg_[\xe6\x0f\x8bq\xce?\x92[\xeds\xe1)\xd8\xd3\xeae~\aKp\xc7\xb6o\xe4\xbf\x9b~\xff\xfd;\x12\\\x03\xb0z6\xeeY\xae\xd4\xa8\xf51\xe1\x89H\\F7\x04', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffe8b}, 0x48) 02:38:41 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000100)) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000180)={0xffffffffffffffff}, 0x4, {0xa, 0x4e20, 0xfffffffffffffc01, @empty, 0x8}}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000200)={0x11, 0x10, 0xfa00, {&(0x7f0000000140), r1}}, 0x18) ioctl$BLKGETSIZE64(r0, 0x80041272, 0x0) symlink(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$TIOCNXCL(r0, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$clear(0x7, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) timer_create(0x0, 0x0, 0x0) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r0, 0x110, 0x5, &(0x7f0000000380)=[0x1, 0x6], 0xa7) getpgrp(0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000001a00)) ioctl$SG_GET_PACK_ID(r0, 0x227c, &(0x7f00000002c0)) ioctl$UDMABUF_CREATE(0xffffffffffffffff, 0x40187542, 0x0) fcntl$setlease(r0, 0x400, 0x0) 02:38:41 executing program 3: set_mempolicy(0x4002, &(0x7f0000000280)=0x2, 0x5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0xfd87}], 0x0, 0x0) 02:38:41 executing program 0: capset(&(0x7f0000000380)={0x19980330}, &(0x7f0000000140)={0x20000fffffff9, 0xfbffffffffffffff}) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000080)='./file1\x00', 0x141) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 310.345512][T19850] overlayfs: failed to create directory ./file1\/work (errno: 13); mounting read-only [ 310.350902][T19851] IPVS: ftp: loaded support on port[0] = 21 [ 310.368806][T19850] overlayfs: lowerdir is in-use as upperdir/workdir 02:38:41 executing program 1: prlimit64(0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) [ 310.581072][T19863] overlayfs: failed to create directory ./file1\/work (errno: 13); mounting read-only [ 310.681739][T19863] overlayfs: lowerdir is in-use as upperdir/workdir 02:38:42 executing program 4: set_mempolicy(0x4002, &(0x7f0000000280)=0x2, 0x5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0xfd87}], 0x0, 0x0) 02:38:42 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0x2, 0x800000101, 0x10000000005, 0x0, 0x1}, 0x12) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x2077fffb, 0x0, 0x10020000002, 0x0}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r0, 0x0, &(0x7f0000000180)=""/76}, 0x18) 02:38:42 executing program 0: capset(&(0x7f0000000380)={0x19980330}, &(0x7f0000000140)={0x20000fffffff9, 0xfbffffffffffffff}) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000080)='./file1\x00', 0x141) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 02:38:42 executing program 1: prlimit64(0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) 02:38:42 executing program 3: set_mempolicy(0x4002, &(0x7f0000000280)=0x2, 0x5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0xfd87}], 0x0, 0x0) 02:38:42 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000100)) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000180)={0xffffffffffffffff}, 0x4, {0xa, 0x4e20, 0xfffffffffffffc01, @empty, 0x8}}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000200)={0x11, 0x10, 0xfa00, {&(0x7f0000000140), r1}}, 0x18) ioctl$BLKGETSIZE64(r0, 0x80041272, 0x0) symlink(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$TIOCNXCL(r0, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$clear(0x7, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) timer_create(0x0, 0x0, 0x0) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r0, 0x110, 0x5, &(0x7f0000000380)=[0x1, 0x6], 0xa7) getpgrp(0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000001a00)) ioctl$SG_GET_PACK_ID(r0, 0x227c, &(0x7f00000002c0)) ioctl$UDMABUF_CREATE(0xffffffffffffffff, 0x40187542, 0x0) fcntl$setlease(r0, 0x400, 0x0) 02:38:42 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0x2, 0x800000101, 0x10000000005, 0x0, 0x1}, 0x12) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x2077fffb, 0x0, 0x10020000002, 0x0}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r0, 0x0, &(0x7f0000000180)=""/76}, 0x18) [ 311.165394][T19875] overlayfs: failed to create directory ./file1\/work (errno: 13); mounting read-only 02:38:42 executing program 1: prlimit64(0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) 02:38:42 executing program 4: set_mempolicy(0x4002, &(0x7f0000000280)=0x2, 0x5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0xfd87}], 0x0, 0x0) [ 311.259487][T19875] overlayfs: lowerdir is in-use as upperdir/workdir 02:38:42 executing program 3: set_mempolicy(0x4002, &(0x7f0000000280)=0x2, 0x5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0xfd87}], 0x0, 0x0) 02:38:42 executing program 1: prlimit64(0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) 02:38:42 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0x2, 0x800000101, 0x10000000005, 0x0, 0x1}, 0x12) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x2077fffb, 0x0, 0x10020000002, 0x0}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r0, 0x0, &(0x7f0000000180)=""/76}, 0x18) 02:38:42 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000100)) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000180)={0xffffffffffffffff}, 0x4, {0xa, 0x4e20, 0xfffffffffffffc01, @empty, 0x8}}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000200)={0x11, 0x10, 0xfa00, {&(0x7f0000000140), r1}}, 0x18) ioctl$BLKGETSIZE64(r0, 0x80041272, 0x0) symlink(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$TIOCNXCL(r0, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$clear(0x7, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) timer_create(0x0, 0x0, 0x0) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r0, 0x110, 0x5, &(0x7f0000000380)=[0x1, 0x6], 0xa7) getpgrp(0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000001a00)) ioctl$SG_GET_PACK_ID(r0, 0x227c, &(0x7f00000002c0)) ioctl$UDMABUF_CREATE(0xffffffffffffffff, 0x40187542, 0x0) fcntl$setlease(r0, 0x400, 0x0) 02:38:43 executing program 0: capset(&(0x7f0000000380)={0x19980330}, &(0x7f0000000140)={0x20000fffffff9, 0xfbffffffffffffff}) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000080)='./file1\x00', 0x141) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 02:38:43 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0x2, 0x800000101, 0x10000000005, 0x0, 0x1}, 0x12) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x2077fffb, 0x0, 0x10020000002, 0x0}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r0, 0x0, &(0x7f0000000180)=""/76}, 0x18) 02:38:43 executing program 3: set_mempolicy(0x4002, &(0x7f0000000280)=0x2, 0x5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0xfd87}], 0x0, 0x0) 02:38:43 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0x2, 0x800000101, 0x10000000005, 0x0, 0x1}, 0x12) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x2077fffb, 0x0, 0x10020000002, 0x0}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r0, 0x0, &(0x7f0000000180)=""/76}, 0x18) 02:38:43 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000100)) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000180)={0xffffffffffffffff}, 0x4, {0xa, 0x4e20, 0xfffffffffffffc01, @empty, 0x8}}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000200)={0x11, 0x10, 0xfa00, {&(0x7f0000000140), r1}}, 0x18) ioctl$BLKGETSIZE64(r0, 0x80041272, 0x0) symlink(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$TIOCNXCL(r0, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$clear(0x7, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) timer_create(0x0, 0x0, 0x0) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r0, 0x110, 0x5, &(0x7f0000000380)=[0x1, 0x6], 0xa7) getpgrp(0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000001a00)) ioctl$SG_GET_PACK_ID(r0, 0x227c, &(0x7f00000002c0)) ioctl$UDMABUF_CREATE(0xffffffffffffffff, 0x40187542, 0x0) fcntl$setlease(r0, 0x400, 0x0) 02:38:43 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000100)) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000180)={0xffffffffffffffff}, 0x4, {0xa, 0x4e20, 0xfffffffffffffc01, @empty, 0x8}}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000200)={0x11, 0x10, 0xfa00, {&(0x7f0000000140), r1}}, 0x18) ioctl$BLKGETSIZE64(r0, 0x80041272, 0x0) symlink(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$TIOCNXCL(r0, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$clear(0x7, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) timer_create(0x0, 0x0, 0x0) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r0, 0x110, 0x5, &(0x7f0000000380)=[0x1, 0x6], 0xa7) getpgrp(0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000001a00)) ioctl$SG_GET_PACK_ID(r0, 0x227c, &(0x7f00000002c0)) ioctl$UDMABUF_CREATE(0xffffffffffffffff, 0x40187542, 0x0) fcntl$setlease(r0, 0x400, 0x0) [ 311.877547][T19916] overlayfs: failed to create directory ./file1\/work (errno: 13); mounting read-only [ 311.889283][T19916] overlayfs: lowerdir is in-use as upperdir/workdir 02:38:43 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000100)) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000180)={0xffffffffffffffff}, 0x4, {0xa, 0x4e20, 0xfffffffffffffc01, @empty, 0x8}}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000200)={0x11, 0x10, 0xfa00, {&(0x7f0000000140), r1}}, 0x18) ioctl$BLKGETSIZE64(r0, 0x80041272, 0x0) symlink(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$TIOCNXCL(r0, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$clear(0x7, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) timer_create(0x0, 0x0, 0x0) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r0, 0x110, 0x5, &(0x7f0000000380)=[0x1, 0x6], 0xa7) getpgrp(0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000001a00)) ioctl$SG_GET_PACK_ID(r0, 0x227c, &(0x7f00000002c0)) ioctl$UDMABUF_CREATE(0xffffffffffffffff, 0x40187542, 0x0) fcntl$setlease(r0, 0x400, 0x0) [ 312.881090][T19946] IPVS: ftp: loaded support on port[0] = 21 [ 312.991395][T19946] chnl_net:caif_netlink_parms(): no params data found [ 313.075229][T19946] bridge0: port 1(bridge_slave_0) entered blocking state [ 313.084529][T19946] bridge0: port 1(bridge_slave_0) entered disabled state [ 313.094120][T19946] device bridge_slave_0 entered promiscuous mode [ 313.102082][T19946] bridge0: port 2(bridge_slave_1) entered blocking state [ 313.109287][T19946] bridge0: port 2(bridge_slave_1) entered disabled state [ 313.116975][T19946] device bridge_slave_1 entered promiscuous mode [ 313.187678][T19946] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 313.199221][T19946] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 313.213631][T11598] IPVS: stopping backup sync thread 13985 ... [ 313.227144][T19946] team0: Port device team_slave_0 added [ 313.234680][T19946] team0: Port device team_slave_1 added [ 313.282752][T11598] device hsr_slave_0 left promiscuous mode [ 313.322725][T11598] device hsr_slave_1 left promiscuous mode [ 313.434190][T11598] device bridge_slave_1 left promiscuous mode [ 313.441855][T11598] bridge0: port 2(bridge_slave_1) entered disabled state [ 313.484899][T11598] device bridge_slave_0 left promiscuous mode [ 313.491200][T11598] bridge0: port 1(bridge_slave_0) entered disabled state [ 314.978414][T11598] team0 (unregistering): Port device team_slave_1 removed [ 314.995245][T11598] team0 (unregistering): Port device team_slave_0 removed [ 315.008113][T11598] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 315.057299][T11598] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 315.146552][T11598] bond0 (unregistering): Released all slaves [ 315.324380][T19946] device hsr_slave_0 entered promiscuous mode [ 315.392535][ C0] net_ratelimit: 24 callbacks suppressed [ 315.392543][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 315.404508][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 315.410471][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 315.412815][T19946] device hsr_slave_1 entered promiscuous mode [ 315.416487][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 315.520200][T19946] 8021q: adding VLAN 0 to HW filter on device bond0 [ 315.553007][ T8185] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 315.561393][ T8185] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 315.578753][T19946] 8021q: adding VLAN 0 to HW filter on device team0 [ 315.591017][ T8185] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 315.605943][ T8185] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 315.618884][ T8185] bridge0: port 1(bridge_slave_0) entered blocking state [ 315.627757][ T8185] bridge0: port 1(bridge_slave_0) entered forwarding state [ 315.657501][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 315.668068][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 315.681701][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 315.698711][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 315.706699][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 315.712402][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 315.723064][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 315.723240][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 315.753808][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 315.780462][T19946] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 315.793749][T19946] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 315.802485][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 315.809458][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 315.813290][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 315.824407][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 315.849001][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 315.858937][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 315.876156][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 315.891990][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 315.910246][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 315.919982][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 315.947109][ T8185] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 315.958222][ T8185] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 315.981620][T19946] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 316.012456][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 316.019808][ C1] protocol 88fb is buggy, dev hsr_slave_1 02:38:47 executing program 3: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000100)) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000180)={0xffffffffffffffff}, 0x4, {0xa, 0x4e20, 0xfffffffffffffc01, @empty, 0x8}}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000200)={0x11, 0x10, 0xfa00, {&(0x7f0000000140), r1}}, 0x18) ioctl$BLKGETSIZE64(r0, 0x80041272, 0x0) symlink(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$TIOCNXCL(r0, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$clear(0x7, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) timer_create(0x0, 0x0, 0x0) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r0, 0x110, 0x5, &(0x7f0000000380)=[0x1, 0x6], 0xa7) getpgrp(0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000001a00)) ioctl$SG_GET_PACK_ID(r0, 0x227c, &(0x7f00000002c0)) ioctl$UDMABUF_CREATE(0xffffffffffffffff, 0x40187542, 0x0) fcntl$setlease(r0, 0x400, 0x0) 02:38:47 executing program 4: set_mempolicy(0x4002, &(0x7f0000000280)=0x2, 0x5) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0xfd87}], 0x0, 0x0) 02:38:47 executing program 5: connect$inet(0xffffffffffffffff, &(0x7f0000000700)={0x2, 0x0, @empty}, 0x10) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x0, 0x0) keyctl$join(0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) socket$inet(0x2, 0xa, 0x1000) fchdir(r1) io_setup(0x0, 0x0) r2 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r2, 0x0, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000180)={0x0}}, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(0xffffffffffffffff, 0x404c534a, 0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) getpid() sendto$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 02:38:47 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000100)) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000180)={0xffffffffffffffff}, 0x4, {0xa, 0x4e20, 0xfffffffffffffc01, @empty, 0x8}}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000200)={0x11, 0x10, 0xfa00, {&(0x7f0000000140), r1}}, 0x18) ioctl$BLKGETSIZE64(r0, 0x80041272, 0x0) symlink(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$TIOCNXCL(r0, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$clear(0x7, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) timer_create(0x0, 0x0, 0x0) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r0, 0x110, 0x5, &(0x7f0000000380)=[0x1, 0x6], 0xa7) getpgrp(0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000001a00)) ioctl$SG_GET_PACK_ID(r0, 0x227c, &(0x7f00000002c0)) ioctl$UDMABUF_CREATE(0xffffffffffffffff, 0x40187542, 0x0) fcntl$setlease(r0, 0x400, 0x0) 02:38:47 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000100)) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000180)={0xffffffffffffffff}, 0x4, {0xa, 0x4e20, 0xfffffffffffffc01, @empty, 0x8}}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000200)={0x11, 0x10, 0xfa00, {&(0x7f0000000140), r1}}, 0x18) ioctl$BLKGETSIZE64(r0, 0x80041272, 0x0) symlink(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$TIOCNXCL(r0, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$clear(0x7, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) timer_create(0x0, 0x0, 0x0) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r0, 0x110, 0x5, &(0x7f0000000380)=[0x1, 0x6], 0xa7) getpgrp(0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000001a00)) ioctl$SG_GET_PACK_ID(r0, 0x227c, &(0x7f00000002c0)) ioctl$UDMABUF_CREATE(0xffffffffffffffff, 0x40187542, 0x0) fcntl$setlease(r0, 0x400, 0x0) 02:38:47 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0x2, 0x800000101, 0x10000000005, 0x0, 0x1}, 0x12) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x2077fffb, 0x0, 0x10020000002, 0x0}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r0, 0x0, &(0x7f0000000180)=""/76}, 0x18) 02:38:47 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x5, 0x2, 0x800000101, 0x10000000005, 0x0, 0x1}, 0x12) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x2077fffb, 0x0, 0x10020000002, 0x0}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000280)={r0, 0x0, &(0x7f0000000180)=""/76}, 0x18) [ 316.240474][T19962] syz-executor.5 uses obsolete (PF_INET,SOCK_PACKET) 02:38:47 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000100)) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000180)={0xffffffffffffffff}, 0x4, {0xa, 0x4e20, 0xfffffffffffffc01, @empty, 0x8}}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000200)={0x11, 0x10, 0xfa00, {&(0x7f0000000140), r1}}, 0x18) ioctl$BLKGETSIZE64(r0, 0x80041272, 0x0) symlink(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$TIOCNXCL(r0, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$clear(0x7, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) timer_create(0x0, 0x0, 0x0) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r0, 0x110, 0x5, &(0x7f0000000380)=[0x1, 0x6], 0xa7) getpgrp(0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000001a00)) ioctl$SG_GET_PACK_ID(r0, 0x227c, &(0x7f00000002c0)) ioctl$UDMABUF_CREATE(0xffffffffffffffff, 0x40187542, 0x0) fcntl$setlease(r0, 0x400, 0x0) 02:38:48 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x00\x00\x00\x00\x00') openat$cgroup_ro(r0, &(0x7f0000000380)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd0\xf2KX\xca\xc5\x14\x03\xcf\xcd\xef%\xd4h\xe7\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed<\xca\xff\x96\x9a}+Q\xd2\xd9{\xca\x86Vh\xde\xb3\x86\x91\xfd\xb5p\xdb$ k\xfb\xf8\xedw\xf4\x161a.\xc7\n\xe0X?\xc4\xf4B\fV\x1b|A)\xb8NP\x1c\x9d\x93#V\x9f\"v\x19n{\x96\xaa\xbd0\x8ef\x9d\xb88CP(}w\x8c\xbb\xdc%\ax \x10\xd1\n(\xa8=\xf54\xa9\xcb\xe9\x97T\xcf\xcf\x87tr\x9d\xfd9\xfeu\xb2\xc1\x8e\xc2\xa61d\xc5k\xd1{\xfd\x02E!-\xc5\xdf@\xfc\xccea.B\xd9\\\xa3:\xa1\xfbWj\xab\xc0\xf3^@\x81\x13\x9e\x98\xd0\xa7\xe3\xe8O\xed\xa9\a\x96\xcc\xd0\x9f\xde\x06b\x06/\xf1\x1b4[\x83S\x89\x802\xb9\xe6\x95@\xf0\xde\x9d\xe9\xa5\x04A\xda\xfc0\\\x8ci8\x98\x03\x96\x80\xbaI\xd0k\xf0\xd9\x1cD\x91H\xd4*\xf9\a\f\x10\x8b\xeay\xee\xdaY\xbem\xdb\x7f\xe1-frvM{\xbd\xe0\xb0\xbb\xdep', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') lseek(r1, 0xfffffffffffffffb, 0x0) write$UHID_DESTROY(r1, &(0x7f0000000000), 0x4) 02:38:48 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000100)) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000180)={0xffffffffffffffff}, 0x4, {0xa, 0x4e20, 0xfffffffffffffc01, @empty, 0x8}}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000200)={0x11, 0x10, 0xfa00, {&(0x7f0000000140), r1}}, 0x18) ioctl$BLKGETSIZE64(r0, 0x80041272, 0x0) symlink(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$TIOCNXCL(r0, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$clear(0x7, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) timer_create(0x0, 0x0, 0x0) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r0, 0x110, 0x5, &(0x7f0000000380)=[0x1, 0x6], 0xa7) getpgrp(0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000001a00)) ioctl$SG_GET_PACK_ID(r0, 0x227c, &(0x7f00000002c0)) ioctl$UDMABUF_CREATE(0xffffffffffffffff, 0x40187542, 0x0) fcntl$setlease(r0, 0x400, 0x0) 02:38:48 executing program 3: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000100)) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000180)={0xffffffffffffffff}, 0x4, {0xa, 0x4e20, 0xfffffffffffffc01, @empty, 0x8}}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000200)={0x11, 0x10, 0xfa00, {&(0x7f0000000140), r1}}, 0x18) ioctl$BLKGETSIZE64(r0, 0x80041272, 0x0) symlink(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$TIOCNXCL(r0, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$clear(0x7, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) timer_create(0x0, 0x0, 0x0) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r0, 0x110, 0x5, &(0x7f0000000380)=[0x1, 0x6], 0xa7) getpgrp(0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000001a00)) ioctl$SG_GET_PACK_ID(r0, 0x227c, &(0x7f00000002c0)) ioctl$UDMABUF_CREATE(0xffffffffffffffff, 0x40187542, 0x0) fcntl$setlease(r0, 0x400, 0x0) 02:38:48 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="4c000000140081f87059ae08060c04000aff0f02000000000000018701546fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82a02000000461eb886a5e54e8ff5314461", 0x4c}], 0x1}, 0x0) 02:38:48 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x00\x00\x00\x00\x00') openat$cgroup_ro(r0, &(0x7f0000000380)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd0\xf2KX\xca\xc5\x14\x03\xcf\xcd\xef%\xd4h\xe7\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed<\xca\xff\x96\x9a}+Q\xd2\xd9{\xca\x86Vh\xde\xb3\x86\x91\xfd\xb5p\xdb$ k\xfb\xf8\xedw\xf4\x161a.\xc7\n\xe0X?\xc4\xf4B\fV\x1b|A)\xb8NP\x1c\x9d\x93#V\x9f\"v\x19n{\x96\xaa\xbd0\x8ef\x9d\xb88CP(}w\x8c\xbb\xdc%\ax \x10\xd1\n(\xa8=\xf54\xa9\xcb\xe9\x97T\xcf\xcf\x87tr\x9d\xfd9\xfeu\xb2\xc1\x8e\xc2\xa61d\xc5k\xd1{\xfd\x02E!-\xc5\xdf@\xfc\xccea.B\xd9\\\xa3:\xa1\xfbWj\xab\xc0\xf3^@\x81\x13\x9e\x98\xd0\xa7\xe3\xe8O\xed\xa9\a\x96\xcc\xd0\x9f\xde\x06b\x06/\xf1\x1b4[\x83S\x89\x802\xb9\xe6\x95@\xf0\xde\x9d\xe9\xa5\x04A\xda\xfc0\\\x8ci8\x98\x03\x96\x80\xbaI\xd0k\xf0\xd9\x1cD\x91H\xd4*\xf9\a\f\x10\x8b\xeay\xee\xdaY\xbem\xdb\x7f\xe1-frvM{\xbd\xe0\xb0\xbb\xdep', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') lseek(r1, 0xfffffffffffffffb, 0x0) write$UHID_DESTROY(r1, &(0x7f0000000000), 0x4) 02:38:48 executing program 0: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x8003, &(0x7f0000000000)=0x3, 0x8, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f00001aa000/0x3000)=nil, 0x3) 02:38:49 executing program 5: connect$inet(0xffffffffffffffff, &(0x7f0000000700)={0x2, 0x0, @empty}, 0x10) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x0, 0x0) keyctl$join(0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) socket$inet(0x2, 0xa, 0x1000) fchdir(r1) io_setup(0x0, 0x0) r2 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r2, 0x0, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000180)={0x0}}, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(0xffffffffffffffff, 0x404c534a, 0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) getpid() sendto$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 02:38:49 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xe, 0x4, &(0x7f0000000040)=@framed={{}, [@call={0x163, 0x11, 0x9}]}, &(0x7f00000000c0)='GPL\x00', 0x3, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x66) 02:38:49 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x00\x00\x00\x00\x00') openat$cgroup_ro(r0, &(0x7f0000000380)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd0\xf2KX\xca\xc5\x14\x03\xcf\xcd\xef%\xd4h\xe7\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed<\xca\xff\x96\x9a}+Q\xd2\xd9{\xca\x86Vh\xde\xb3\x86\x91\xfd\xb5p\xdb$ k\xfb\xf8\xedw\xf4\x161a.\xc7\n\xe0X?\xc4\xf4B\fV\x1b|A)\xb8NP\x1c\x9d\x93#V\x9f\"v\x19n{\x96\xaa\xbd0\x8ef\x9d\xb88CP(}w\x8c\xbb\xdc%\ax \x10\xd1\n(\xa8=\xf54\xa9\xcb\xe9\x97T\xcf\xcf\x87tr\x9d\xfd9\xfeu\xb2\xc1\x8e\xc2\xa61d\xc5k\xd1{\xfd\x02E!-\xc5\xdf@\xfc\xccea.B\xd9\\\xa3:\xa1\xfbWj\xab\xc0\xf3^@\x81\x13\x9e\x98\xd0\xa7\xe3\xe8O\xed\xa9\a\x96\xcc\xd0\x9f\xde\x06b\x06/\xf1\x1b4[\x83S\x89\x802\xb9\xe6\x95@\xf0\xde\x9d\xe9\xa5\x04A\xda\xfc0\\\x8ci8\x98\x03\x96\x80\xbaI\xd0k\xf0\xd9\x1cD\x91H\xd4*\xf9\a\f\x10\x8b\xeay\xee\xdaY\xbem\xdb\x7f\xe1-frvM{\xbd\xe0\xb0\xbb\xdep', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') lseek(r1, 0xfffffffffffffffb, 0x0) write$UHID_DESTROY(r1, &(0x7f0000000000), 0x4) 02:38:49 executing program 3: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000100)) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000180)={0xffffffffffffffff}, 0x4, {0xa, 0x4e20, 0xfffffffffffffc01, @empty, 0x8}}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000200)={0x11, 0x10, 0xfa00, {&(0x7f0000000140), r1}}, 0x18) ioctl$BLKGETSIZE64(r0, 0x80041272, 0x0) symlink(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$TIOCNXCL(r0, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$clear(0x7, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) timer_create(0x0, 0x0, 0x0) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r0, 0x110, 0x5, &(0x7f0000000380)=[0x1, 0x6], 0xa7) getpgrp(0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000001a00)) ioctl$SG_GET_PACK_ID(r0, 0x227c, &(0x7f00000002c0)) ioctl$UDMABUF_CREATE(0xffffffffffffffff, 0x40187542, 0x0) fcntl$setlease(r0, 0x400, 0x0) 02:38:49 executing program 0: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x8003, &(0x7f0000000000)=0x3, 0x8, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f00001aa000/0x3000)=nil, 0x3) 02:38:49 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="4c000000140081f87059ae08060c04000aff0f02000000000000018701546fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82a02000000461eb886a5e54e8ff5314461", 0x4c}], 0x1}, 0x0) 02:38:49 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x00\x00\x00\x00\x00') openat$cgroup_ro(r0, &(0x7f0000000380)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd0\xf2KX\xca\xc5\x14\x03\xcf\xcd\xef%\xd4h\xe7\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed<\xca\xff\x96\x9a}+Q\xd2\xd9{\xca\x86Vh\xde\xb3\x86\x91\xfd\xb5p\xdb$ k\xfb\xf8\xedw\xf4\x161a.\xc7\n\xe0X?\xc4\xf4B\fV\x1b|A)\xb8NP\x1c\x9d\x93#V\x9f\"v\x19n{\x96\xaa\xbd0\x8ef\x9d\xb88CP(}w\x8c\xbb\xdc%\ax \x10\xd1\n(\xa8=\xf54\xa9\xcb\xe9\x97T\xcf\xcf\x87tr\x9d\xfd9\xfeu\xb2\xc1\x8e\xc2\xa61d\xc5k\xd1{\xfd\x02E!-\xc5\xdf@\xfc\xccea.B\xd9\\\xa3:\xa1\xfbWj\xab\xc0\xf3^@\x81\x13\x9e\x98\xd0\xa7\xe3\xe8O\xed\xa9\a\x96\xcc\xd0\x9f\xde\x06b\x06/\xf1\x1b4[\x83S\x89\x802\xb9\xe6\x95@\xf0\xde\x9d\xe9\xa5\x04A\xda\xfc0\\\x8ci8\x98\x03\x96\x80\xbaI\xd0k\xf0\xd9\x1cD\x91H\xd4*\xf9\a\f\x10\x8b\xeay\xee\xdaY\xbem\xdb\x7f\xe1-frvM{\xbd\xe0\xb0\xbb\xdep', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fd/4\x00') lseek(r1, 0xfffffffffffffffb, 0x0) write$UHID_DESTROY(r1, &(0x7f0000000000), 0x4) 02:38:49 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xe, 0x4, &(0x7f0000000040)=@framed={{}, [@call={0x163, 0x11, 0x9}]}, &(0x7f00000000c0)='GPL\x00', 0x3, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x66) 02:38:49 executing program 0: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x8003, &(0x7f0000000000)=0x3, 0x8, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f00001aa000/0x3000)=nil, 0x3) 02:38:49 executing program 0: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x8003, &(0x7f0000000000)=0x3, 0x8, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f00001aa000/0x3000)=nil, 0x3) 02:38:49 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xe, 0x4, &(0x7f0000000040)=@framed={{}, [@call={0x163, 0x11, 0x9}]}, &(0x7f00000000c0)='GPL\x00', 0x3, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x66) 02:38:49 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="4c000000140081f87059ae08060c04000aff0f02000000000000018701546fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82a02000000461eb886a5e54e8ff5314461", 0x4c}], 0x1}, 0x0) 02:38:49 executing program 5: connect$inet(0xffffffffffffffff, &(0x7f0000000700)={0x2, 0x0, @empty}, 0x10) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x0, 0x0) keyctl$join(0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) socket$inet(0x2, 0xa, 0x1000) fchdir(r1) io_setup(0x0, 0x0) r2 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r2, 0x0, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000180)={0x0}}, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(0xffffffffffffffff, 0x404c534a, 0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) getpid() sendto$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 02:38:49 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xe, 0x4, &(0x7f0000000040)=@framed={{}, [@call={0x163, 0x11, 0x9}]}, &(0x7f00000000c0)='GPL\x00', 0x3, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x66) 02:38:49 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="4c000000140081f87059ae08060c04000aff0f02000000000000018701546fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82a02000000461eb886a5e54e8ff5314461", 0x4c}], 0x1}, 0x0) 02:38:49 executing program 1: connect$inet(0xffffffffffffffff, &(0x7f0000000700)={0x2, 0x0, @empty}, 0x10) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x0, 0x0) keyctl$join(0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) socket$inet(0x2, 0xa, 0x1000) fchdir(r1) io_setup(0x0, 0x0) r2 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r2, 0x0, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000180)={0x0}}, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(0xffffffffffffffff, 0x404c534a, 0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) getpid() sendto$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 02:38:49 executing program 0: connect$inet(0xffffffffffffffff, &(0x7f0000000700)={0x2, 0x0, @empty}, 0x10) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x0, 0x0) keyctl$join(0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) socket$inet(0x2, 0xa, 0x1000) fchdir(r1) io_setup(0x0, 0x0) r2 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r2, 0x0, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000180)={0x0}}, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(0xffffffffffffffff, 0x404c534a, 0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) getpid() sendto$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 02:38:49 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="4c000000140081f87059ae08060c04000aff0f02000000000000018701546fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82a02000000461eb886a5e54e8ff5314461", 0x4c}], 0x1}, 0x0) 02:38:49 executing program 2: connect$inet(0xffffffffffffffff, &(0x7f0000000700)={0x2, 0x0, @empty}, 0x10) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x0, 0x0) keyctl$join(0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) socket$inet(0x2, 0xa, 0x1000) fchdir(r1) io_setup(0x0, 0x0) r2 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r2, 0x0, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000180)={0x0}}, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(0xffffffffffffffff, 0x404c534a, 0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) getpid() sendto$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 02:38:49 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="4c000000140081f87059ae08060c04000aff0f02000000000000018701546fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82a02000000461eb886a5e54e8ff5314461", 0x4c}], 0x1}, 0x0) 02:38:50 executing program 4: connect$inet(0xffffffffffffffff, &(0x7f0000000700)={0x2, 0x0, @empty}, 0x10) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x0, 0x0) keyctl$join(0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) socket$inet(0x2, 0xa, 0x1000) fchdir(r1) io_setup(0x0, 0x0) r2 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r2, 0x0, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000180)={0x0}}, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(0xffffffffffffffff, 0x404c534a, 0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) getpid() sendto$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 02:38:50 executing program 5: connect$inet(0xffffffffffffffff, &(0x7f0000000700)={0x2, 0x0, @empty}, 0x10) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x0, 0x0) keyctl$join(0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) socket$inet(0x2, 0xa, 0x1000) fchdir(r1) io_setup(0x0, 0x0) r2 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r2, 0x0, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000180)={0x0}}, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(0xffffffffffffffff, 0x404c534a, 0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) getpid() sendto$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 02:38:50 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="4c000000140081f87059ae08060c04000aff0f02000000000000018701546fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82a02000000461eb886a5e54e8ff5314461", 0x4c}], 0x1}, 0x0) 02:38:50 executing program 3: connect$inet(0xffffffffffffffff, &(0x7f0000000700)={0x2, 0x0, @empty}, 0x10) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x0, 0x0) keyctl$join(0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) socket$inet(0x2, 0xa, 0x1000) fchdir(r1) io_setup(0x0, 0x0) r2 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r2, 0x0, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000180)={0x0}}, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(0xffffffffffffffff, 0x404c534a, 0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) getpid() sendto$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 02:38:50 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40810, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x60, 0x0, 0x0, 0x0, 0x446}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 02:38:50 executing program 1: connect$inet(0xffffffffffffffff, &(0x7f0000000700)={0x2, 0x0, @empty}, 0x10) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x0, 0x0) keyctl$join(0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) socket$inet(0x2, 0xa, 0x1000) fchdir(r1) io_setup(0x0, 0x0) r2 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r2, 0x0, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000180)={0x0}}, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(0xffffffffffffffff, 0x404c534a, 0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) getpid() sendto$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 02:38:50 executing program 0: connect$inet(0xffffffffffffffff, &(0x7f0000000700)={0x2, 0x0, @empty}, 0x10) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x0, 0x0) keyctl$join(0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) socket$inet(0x2, 0xa, 0x1000) fchdir(r1) io_setup(0x0, 0x0) r2 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r2, 0x0, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000180)={0x0}}, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(0xffffffffffffffff, 0x404c534a, 0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) getpid() sendto$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 02:38:50 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40810, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x60, 0x0, 0x0, 0x0, 0x446}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 02:38:50 executing program 2: connect$inet(0xffffffffffffffff, &(0x7f0000000700)={0x2, 0x0, @empty}, 0x10) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x0, 0x0) keyctl$join(0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) socket$inet(0x2, 0xa, 0x1000) fchdir(r1) io_setup(0x0, 0x0) r2 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r2, 0x0, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000180)={0x0}}, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(0xffffffffffffffff, 0x404c534a, 0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) getpid() sendto$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 02:38:50 executing program 4: connect$inet(0xffffffffffffffff, &(0x7f0000000700)={0x2, 0x0, @empty}, 0x10) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x0, 0x0) keyctl$join(0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) socket$inet(0x2, 0xa, 0x1000) fchdir(r1) io_setup(0x0, 0x0) r2 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r2, 0x0, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000180)={0x0}}, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(0xffffffffffffffff, 0x404c534a, 0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) getpid() sendto$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 02:38:51 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40810, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x60, 0x0, 0x0, 0x0, 0x446}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 02:38:51 executing program 0: connect$inet(0xffffffffffffffff, &(0x7f0000000700)={0x2, 0x0, @empty}, 0x10) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x0, 0x0) keyctl$join(0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) socket$inet(0x2, 0xa, 0x1000) fchdir(r1) io_setup(0x0, 0x0) r2 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r2, 0x0, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000180)={0x0}}, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(0xffffffffffffffff, 0x404c534a, 0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) getpid() sendto$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 02:38:51 executing program 1: connect$inet(0xffffffffffffffff, &(0x7f0000000700)={0x2, 0x0, @empty}, 0x10) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x0, 0x0) keyctl$join(0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) socket$inet(0x2, 0xa, 0x1000) fchdir(r1) io_setup(0x0, 0x0) r2 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r2, 0x0, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000180)={0x0}}, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(0xffffffffffffffff, 0x404c534a, 0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) getpid() sendto$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 02:38:51 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40810, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x60, 0x0, 0x0, 0x0, 0x446}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 02:38:51 executing program 2: connect$inet(0xffffffffffffffff, &(0x7f0000000700)={0x2, 0x0, @empty}, 0x10) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x0, 0x0) keyctl$join(0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) socket$inet(0x2, 0xa, 0x1000) fchdir(r1) io_setup(0x0, 0x0) r2 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r2, 0x0, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000180)={0x0}}, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(0xffffffffffffffff, 0x404c534a, 0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) getpid() sendto$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 02:38:51 executing program 3: connect$inet(0xffffffffffffffff, &(0x7f0000000700)={0x2, 0x0, @empty}, 0x10) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x0, 0x0) keyctl$join(0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) socket$inet(0x2, 0xa, 0x1000) fchdir(r1) io_setup(0x0, 0x0) r2 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r2, 0x0, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000180)={0x0}}, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(0xffffffffffffffff, 0x404c534a, 0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) getpid() sendto$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 02:38:51 executing program 4: connect$inet(0xffffffffffffffff, &(0x7f0000000700)={0x2, 0x0, @empty}, 0x10) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x0, 0x0) keyctl$join(0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) socket$inet(0x2, 0xa, 0x1000) fchdir(r1) io_setup(0x0, 0x0) r2 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r2, 0x0, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000180)={0x0}}, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(0xffffffffffffffff, 0x404c534a, 0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) getpid() sendto$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 02:38:51 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) shutdown(r0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000040)=[@in={0x2, 0x0, @remote}], 0x10) 02:38:51 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0xe, 0x0, &(0x7f0000000280)) 02:38:51 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r1, r0, 0x0) read(r1, &(0x7f0000000000)=""/15, 0xf) [ 320.371027][T20179] sock: process `syz-executor.0' is using obsolete getsockopt SO_BSDCOMPAT 02:38:51 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0xe, 0x0, &(0x7f0000000280)) 02:38:51 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) shutdown(r0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000040)=[@in={0x2, 0x0, @remote}], 0x10) 02:38:51 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r1, r0, 0x0) read(r1, &(0x7f0000000000)=""/15, 0xf) 02:38:51 executing program 2: syz_emit_ethernet(0xe9, &(0x7f0000000100)={@link_local={0x1, 0x80, 0xc2, 0xf5ffffff}, @random="029cce98941b", [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0xffffffffffffffff, @remote={0xfe, 0x80, [0x29c, 0x0, 0x700, 0x5], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff88, 0x0, 0x0, 0x0, [0x7, 0x3], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x3], 0x8200}, @mcast2}}}}}}}, 0x0) [ 320.502456][ C1] net_ratelimit: 30 callbacks suppressed [ 320.502465][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 320.514025][ C1] protocol 88fb is buggy, dev hsr_slave_1 02:38:52 executing program 3: connect$inet(0xffffffffffffffff, &(0x7f0000000700)={0x2, 0x0, @empty}, 0x10) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x0, 0x0) keyctl$join(0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) socket$inet(0x2, 0xa, 0x1000) fchdir(r1) io_setup(0x0, 0x0) r2 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r2, 0x0, 0x0) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000180)={0x0}}, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(0xffffffffffffffff, 0x404c534a, 0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x4) getpid() sendto$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 02:38:52 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0xe, 0x0, &(0x7f0000000280)) 02:38:52 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000000)=@fragment, 0x8) getsockopt$inet6_opts(r0, 0x29, 0x39, 0x0, &(0x7f0000000100)) 02:38:52 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r1, r0, 0x0) read(r1, &(0x7f0000000000)=""/15, 0xf) 02:38:52 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) shutdown(r0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000040)=[@in={0x2, 0x0, @remote}], 0x10) 02:38:52 executing program 2: syz_emit_ethernet(0xe9, &(0x7f0000000100)={@link_local={0x1, 0x80, 0xc2, 0xf5ffffff}, @random="029cce98941b", [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0xffffffffffffffff, @remote={0xfe, 0x80, [0x29c, 0x0, 0x700, 0x5], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff88, 0x0, 0x0, 0x0, [0x7, 0x3], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x3], 0x8200}, @mcast2}}}}}}}, 0x0) 02:38:52 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000000)=@fragment, 0x8) getsockopt$inet6_opts(r0, 0x29, 0x39, 0x0, &(0x7f0000000100)) 02:38:52 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) shutdown(r0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000040)=[@in={0x2, 0x0, @remote}], 0x10) 02:38:52 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r1, r0, 0x0) read(r1, &(0x7f0000000000)=""/15, 0xf) 02:38:52 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0xe, 0x0, &(0x7f0000000280)) 02:38:52 executing program 2: syz_emit_ethernet(0xe9, &(0x7f0000000100)={@link_local={0x1, 0x80, 0xc2, 0xf5ffffff}, @random="029cce98941b", [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0xffffffffffffffff, @remote={0xfe, 0x80, [0x29c, 0x0, 0x700, 0x5], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff88, 0x0, 0x0, 0x0, [0x7, 0x3], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x3], 0x8200}, @mcast2}}}}}}}, 0x0) 02:38:52 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000000)=@fragment, 0x8) getsockopt$inet6_opts(r0, 0x29, 0x39, 0x0, &(0x7f0000000100)) 02:38:52 executing program 2: syz_emit_ethernet(0xe9, &(0x7f0000000100)={@link_local={0x1, 0x80, 0xc2, 0xf5ffffff}, @random="029cce98941b", [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x30, 0x3a, 0xffffffffffffffff, @remote={0xfe, 0x80, [0x29c, 0x0, 0x700, 0x5], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@dest_unreach={0xffffff88, 0x0, 0x0, 0x0, [0x7, 0x3], {0x0, 0x6, "c5961e", 0x0, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, 0x0, 0x0, 0x3], 0x8200}, @mcast2}}}}}}}, 0x0) 02:38:52 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000000)=@fragment, 0x8) getsockopt$inet6_opts(r0, 0x29, 0x39, 0x0, &(0x7f0000000100)) 02:38:52 executing program 5: process_vm_readv(0x0, &(0x7f0000000380)=[{&(0x7f00000003c0)=""/61, 0x3d}], 0x33b, &(0x7f0000000080)=[{&(0x7f0000000000)=""/45}, {&(0x7f0000000040)=""/6}, {&(0x7f0000000140)=""/240, 0xfffffffffffffe00}, {&(0x7f0000000240)=""/239}], 0x1000000000000348, 0x0) 02:38:52 executing program 0: clock_gettime(0x3, &(0x7f0000000000)) 02:38:52 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0xc0ffffff, 0xffffffd5}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0x44e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffe64}, 0x48) 02:38:52 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000003440)=[{{&(0x7f00000000c0)={0xa, 0x4e24, 0x0, @dev}, 0x1c, 0x0, 0x0, &(0x7f0000000200)=[@dontfrag={{0x14}}, @dstopts={{0x18}}], 0x30}}, {{&(0x7f0000000380)={0xa, 0x4e24, 0x0, @initdev}, 0x1c, 0x0, 0x0, &(0x7f0000000600)=[@hopopts_2292={{0x18}}, @dontfrag={{0x14, 0x29, 0x3e, 0x200}}], 0x30}}], 0x2, 0x0) 02:38:53 executing program 4: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x801, 0x0) r1 = syz_open_dev$swradio(&(0x7f0000000200)='/dev/swradio#\x00', 0x1, 0x2) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f0000000500)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x19}}, 0x10) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340)) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@ipv4={[], [], @broadcast}, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f00000004c0)=0xe8) fchown(r2, r3, 0x0) getresuid(0x0, 0x0, 0x0) r4 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x4200, 0x0) r5 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x40000, 0x0) getsockopt$bt_BT_SECURITY(r4, 0x112, 0x4, &(0x7f0000000040), 0x2) r6 = open(&(0x7f0000000100)='./bus\x00', 0x141045, 0x0) ioctl$FIDEDUPERANGE(r5, 0xc0189436, &(0x7f0000000540)={0x9, 0x460, 0x2, 0x0, 0x0, [{r4, 0x0, 0x100000000}, {r6, 0x0, 0x9}]}) ftruncate(r6, 0x0) 02:38:53 executing program 5: process_vm_readv(0x0, &(0x7f0000000380)=[{&(0x7f00000003c0)=""/61, 0x3d}], 0x33b, &(0x7f0000000080)=[{&(0x7f0000000000)=""/45}, {&(0x7f0000000040)=""/6}, {&(0x7f0000000140)=""/240, 0xfffffffffffffe00}, {&(0x7f0000000240)=""/239}], 0x1000000000000348, 0x0) 02:38:53 executing program 0: clock_gettime(0x3, &(0x7f0000000000)) 02:38:53 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0xf}, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000419000)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x700000000000000], 0xf}}, 0x1c) 02:38:53 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0xc0ffffff, 0xffffffd5}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0x44e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffe64}, 0x48) [ 321.622388][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 321.628595][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 321.634469][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 321.640248][ C0] protocol 88fb is buggy, dev hsr_slave_1 02:38:53 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000003440)=[{{&(0x7f00000000c0)={0xa, 0x4e24, 0x0, @dev}, 0x1c, 0x0, 0x0, &(0x7f0000000200)=[@dontfrag={{0x14}}, @dstopts={{0x18}}], 0x30}}, {{&(0x7f0000000380)={0xa, 0x4e24, 0x0, @initdev}, 0x1c, 0x0, 0x0, &(0x7f0000000600)=[@hopopts_2292={{0x18}}, @dontfrag={{0x14, 0x29, 0x3e, 0x200}}], 0x30}}], 0x2, 0x0) 02:38:53 executing program 5: process_vm_readv(0x0, &(0x7f0000000380)=[{&(0x7f00000003c0)=""/61, 0x3d}], 0x33b, &(0x7f0000000080)=[{&(0x7f0000000000)=""/45}, {&(0x7f0000000040)=""/6}, {&(0x7f0000000140)=""/240, 0xfffffffffffffe00}, {&(0x7f0000000240)=""/239}], 0x1000000000000348, 0x0) 02:38:53 executing program 0: clock_gettime(0x3, &(0x7f0000000000)) 02:38:53 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0xf}, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000419000)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x700000000000000], 0xf}}, 0x1c) 02:38:53 executing program 5: process_vm_readv(0x0, &(0x7f0000000380)=[{&(0x7f00000003c0)=""/61, 0x3d}], 0x33b, &(0x7f0000000080)=[{&(0x7f0000000000)=""/45}, {&(0x7f0000000040)=""/6}, {&(0x7f0000000140)=""/240, 0xfffffffffffffe00}, {&(0x7f0000000240)=""/239}], 0x1000000000000348, 0x0) 02:38:53 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0xc0ffffff, 0xffffffd5}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0x44e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffe64}, 0x48) 02:38:53 executing program 0: clock_gettime(0x3, &(0x7f0000000000)) [ 321.942403][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 321.948246][ C0] protocol 88fb is buggy, dev hsr_slave_1 02:38:53 executing program 4: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x801, 0x0) r1 = syz_open_dev$swradio(&(0x7f0000000200)='/dev/swradio#\x00', 0x1, 0x2) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f0000000500)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x19}}, 0x10) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340)) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@ipv4={[], [], @broadcast}, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f00000004c0)=0xe8) fchown(r2, r3, 0x0) getresuid(0x0, 0x0, 0x0) r4 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x4200, 0x0) r5 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x40000, 0x0) getsockopt$bt_BT_SECURITY(r4, 0x112, 0x4, &(0x7f0000000040), 0x2) r6 = open(&(0x7f0000000100)='./bus\x00', 0x141045, 0x0) ioctl$FIDEDUPERANGE(r5, 0xc0189436, &(0x7f0000000540)={0x9, 0x460, 0x2, 0x0, 0x0, [{r4, 0x0, 0x100000000}, {r6, 0x0, 0x9}]}) ftruncate(r6, 0x0) 02:38:53 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000003440)=[{{&(0x7f00000000c0)={0xa, 0x4e24, 0x0, @dev}, 0x1c, 0x0, 0x0, &(0x7f0000000200)=[@dontfrag={{0x14}}, @dstopts={{0x18}}], 0x30}}, {{&(0x7f0000000380)={0xa, 0x4e24, 0x0, @initdev}, 0x1c, 0x0, 0x0, &(0x7f0000000600)=[@hopopts_2292={{0x18}}, @dontfrag={{0x14, 0x29, 0x3e, 0x200}}], 0x30}}], 0x2, 0x0) [ 322.022378][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 322.028857][ C0] protocol 88fb is buggy, dev hsr_slave_1 02:38:53 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0xc0ffffff, 0xffffffd5}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0x44e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffe64}, 0x48) 02:38:53 executing program 0: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x801, 0x0) r1 = syz_open_dev$swradio(&(0x7f0000000200)='/dev/swradio#\x00', 0x1, 0x2) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f0000000500)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x19}}, 0x10) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340)) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@ipv4={[], [], @broadcast}, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f00000004c0)=0xe8) fchown(r2, r3, 0x0) getresuid(0x0, 0x0, 0x0) r4 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x4200, 0x0) r5 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x40000, 0x0) getsockopt$bt_BT_SECURITY(r4, 0x112, 0x4, &(0x7f0000000040), 0x2) r6 = open(&(0x7f0000000100)='./bus\x00', 0x141045, 0x0) ioctl$FIDEDUPERANGE(r5, 0xc0189436, &(0x7f0000000540)={0x9, 0x460, 0x2, 0x0, 0x0, [{r4, 0x0, 0x100000000}, {r6, 0x0, 0x9}]}) ftruncate(r6, 0x0) 02:38:53 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0xf}, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000419000)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x700000000000000], 0xf}}, 0x1c) 02:38:53 executing program 5: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x801, 0x0) r1 = syz_open_dev$swradio(&(0x7f0000000200)='/dev/swradio#\x00', 0x1, 0x2) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f0000000500)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x19}}, 0x10) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340)) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@ipv4={[], [], @broadcast}, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f00000004c0)=0xe8) fchown(r2, r3, 0x0) getresuid(0x0, 0x0, 0x0) r4 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x4200, 0x0) r5 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x40000, 0x0) getsockopt$bt_BT_SECURITY(r4, 0x112, 0x4, &(0x7f0000000040), 0x2) r6 = open(&(0x7f0000000100)='./bus\x00', 0x141045, 0x0) ioctl$FIDEDUPERANGE(r5, 0xc0189436, &(0x7f0000000540)={0x9, 0x460, 0x2, 0x0, 0x0, [{r4, 0x0, 0x100000000}, {r6, 0x0, 0x9}]}) ftruncate(r6, 0x0) 02:38:53 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x801, 0x0) r1 = syz_open_dev$swradio(&(0x7f0000000200)='/dev/swradio#\x00', 0x1, 0x2) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f0000000500)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x19}}, 0x10) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340)) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@ipv4={[], [], @broadcast}, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f00000004c0)=0xe8) fchown(r2, r3, 0x0) getresuid(0x0, 0x0, 0x0) r4 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x4200, 0x0) r5 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x40000, 0x0) getsockopt$bt_BT_SECURITY(r4, 0x112, 0x4, &(0x7f0000000040), 0x2) r6 = open(&(0x7f0000000100)='./bus\x00', 0x141045, 0x0) ioctl$FIDEDUPERANGE(r5, 0xc0189436, &(0x7f0000000540)={0x9, 0x460, 0x2, 0x0, 0x0, [{r4, 0x0, 0x100000000}, {r6, 0x0, 0x9}]}) ftruncate(r6, 0x0) 02:38:53 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000003440)=[{{&(0x7f00000000c0)={0xa, 0x4e24, 0x0, @dev}, 0x1c, 0x0, 0x0, &(0x7f0000000200)=[@dontfrag={{0x14}}, @dstopts={{0x18}}], 0x30}}, {{&(0x7f0000000380)={0xa, 0x4e24, 0x0, @initdev}, 0x1c, 0x0, 0x0, &(0x7f0000000600)=[@hopopts_2292={{0x18}}, @dontfrag={{0x14, 0x29, 0x3e, 0x200}}], 0x30}}], 0x2, 0x0) 02:38:53 executing program 4: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x801, 0x0) r1 = syz_open_dev$swradio(&(0x7f0000000200)='/dev/swradio#\x00', 0x1, 0x2) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f0000000500)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x19}}, 0x10) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340)) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@ipv4={[], [], @broadcast}, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f00000004c0)=0xe8) fchown(r2, r3, 0x0) getresuid(0x0, 0x0, 0x0) r4 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x4200, 0x0) r5 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x40000, 0x0) getsockopt$bt_BT_SECURITY(r4, 0x112, 0x4, &(0x7f0000000040), 0x2) r6 = open(&(0x7f0000000100)='./bus\x00', 0x141045, 0x0) ioctl$FIDEDUPERANGE(r5, 0xc0189436, &(0x7f0000000540)={0x9, 0x460, 0x2, 0x0, 0x0, [{r4, 0x0, 0x100000000}, {r6, 0x0, 0x9}]}) ftruncate(r6, 0x0) 02:38:53 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0xf}, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000419000)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x700000000000000], 0xf}}, 0x1c) 02:38:53 executing program 0: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x801, 0x0) r1 = syz_open_dev$swradio(&(0x7f0000000200)='/dev/swradio#\x00', 0x1, 0x2) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f0000000500)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x19}}, 0x10) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340)) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@ipv4={[], [], @broadcast}, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f00000004c0)=0xe8) fchown(r2, r3, 0x0) getresuid(0x0, 0x0, 0x0) r4 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x4200, 0x0) r5 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x40000, 0x0) getsockopt$bt_BT_SECURITY(r4, 0x112, 0x4, &(0x7f0000000040), 0x2) r6 = open(&(0x7f0000000100)='./bus\x00', 0x141045, 0x0) ioctl$FIDEDUPERANGE(r5, 0xc0189436, &(0x7f0000000540)={0x9, 0x460, 0x2, 0x0, 0x0, [{r4, 0x0, 0x100000000}, {r6, 0x0, 0x9}]}) ftruncate(r6, 0x0) 02:38:54 executing program 3: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x801, 0x0) r1 = syz_open_dev$swradio(&(0x7f0000000200)='/dev/swradio#\x00', 0x1, 0x2) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f0000000500)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x19}}, 0x10) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340)) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@ipv4={[], [], @broadcast}, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f00000004c0)=0xe8) fchown(r2, r3, 0x0) getresuid(0x0, 0x0, 0x0) r4 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x4200, 0x0) r5 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x40000, 0x0) getsockopt$bt_BT_SECURITY(r4, 0x112, 0x4, &(0x7f0000000040), 0x2) r6 = open(&(0x7f0000000100)='./bus\x00', 0x141045, 0x0) ioctl$FIDEDUPERANGE(r5, 0xc0189436, &(0x7f0000000540)={0x9, 0x460, 0x2, 0x0, 0x0, [{r4, 0x0, 0x100000000}, {r6, 0x0, 0x9}]}) ftruncate(r6, 0x0) 02:38:54 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0xf}, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000419000)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x700000000000000], 0xf}}, 0x1c) 02:38:54 executing program 5: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x801, 0x0) r1 = syz_open_dev$swradio(&(0x7f0000000200)='/dev/swradio#\x00', 0x1, 0x2) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f0000000500)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x19}}, 0x10) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340)) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@ipv4={[], [], @broadcast}, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f00000004c0)=0xe8) fchown(r2, r3, 0x0) getresuid(0x0, 0x0, 0x0) r4 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x4200, 0x0) r5 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x40000, 0x0) getsockopt$bt_BT_SECURITY(r4, 0x112, 0x4, &(0x7f0000000040), 0x2) r6 = open(&(0x7f0000000100)='./bus\x00', 0x141045, 0x0) ioctl$FIDEDUPERANGE(r5, 0xc0189436, &(0x7f0000000540)={0x9, 0x460, 0x2, 0x0, 0x0, [{r4, 0x0, 0x100000000}, {r6, 0x0, 0x9}]}) ftruncate(r6, 0x0) 02:38:54 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x801, 0x0) r1 = syz_open_dev$swradio(&(0x7f0000000200)='/dev/swradio#\x00', 0x1, 0x2) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f0000000500)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x19}}, 0x10) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340)) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@ipv4={[], [], @broadcast}, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f00000004c0)=0xe8) fchown(r2, r3, 0x0) getresuid(0x0, 0x0, 0x0) r4 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x4200, 0x0) r5 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x40000, 0x0) getsockopt$bt_BT_SECURITY(r4, 0x112, 0x4, &(0x7f0000000040), 0x2) r6 = open(&(0x7f0000000100)='./bus\x00', 0x141045, 0x0) ioctl$FIDEDUPERANGE(r5, 0xc0189436, &(0x7f0000000540)={0x9, 0x460, 0x2, 0x0, 0x0, [{r4, 0x0, 0x100000000}, {r6, 0x0, 0x9}]}) ftruncate(r6, 0x0) 02:38:54 executing program 4: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x801, 0x0) r1 = syz_open_dev$swradio(&(0x7f0000000200)='/dev/swradio#\x00', 0x1, 0x2) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f0000000500)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x19}}, 0x10) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340)) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@ipv4={[], [], @broadcast}, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f00000004c0)=0xe8) fchown(r2, r3, 0x0) getresuid(0x0, 0x0, 0x0) r4 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x4200, 0x0) r5 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x40000, 0x0) getsockopt$bt_BT_SECURITY(r4, 0x112, 0x4, &(0x7f0000000040), 0x2) r6 = open(&(0x7f0000000100)='./bus\x00', 0x141045, 0x0) ioctl$FIDEDUPERANGE(r5, 0xc0189436, &(0x7f0000000540)={0x9, 0x460, 0x2, 0x0, 0x0, [{r4, 0x0, 0x100000000}, {r6, 0x0, 0x9}]}) ftruncate(r6, 0x0) 02:38:54 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0xf}, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000419000)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x700000000000000], 0xf}}, 0x1c) 02:38:54 executing program 0: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x801, 0x0) r1 = syz_open_dev$swradio(&(0x7f0000000200)='/dev/swradio#\x00', 0x1, 0x2) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f0000000500)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x19}}, 0x10) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340)) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@ipv4={[], [], @broadcast}, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f00000004c0)=0xe8) fchown(r2, r3, 0x0) getresuid(0x0, 0x0, 0x0) r4 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x4200, 0x0) r5 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x40000, 0x0) getsockopt$bt_BT_SECURITY(r4, 0x112, 0x4, &(0x7f0000000040), 0x2) r6 = open(&(0x7f0000000100)='./bus\x00', 0x141045, 0x0) ioctl$FIDEDUPERANGE(r5, 0xc0189436, &(0x7f0000000540)={0x9, 0x460, 0x2, 0x0, 0x0, [{r4, 0x0, 0x100000000}, {r6, 0x0, 0x9}]}) ftruncate(r6, 0x0) 02:38:54 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x801, 0x0) r1 = syz_open_dev$swradio(&(0x7f0000000200)='/dev/swradio#\x00', 0x1, 0x2) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f0000000500)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x19}}, 0x10) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340)) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@ipv4={[], [], @broadcast}, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f00000004c0)=0xe8) fchown(r2, r3, 0x0) getresuid(0x0, 0x0, 0x0) r4 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x4200, 0x0) r5 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x40000, 0x0) getsockopt$bt_BT_SECURITY(r4, 0x112, 0x4, &(0x7f0000000040), 0x2) r6 = open(&(0x7f0000000100)='./bus\x00', 0x141045, 0x0) ioctl$FIDEDUPERANGE(r5, 0xc0189436, &(0x7f0000000540)={0x9, 0x460, 0x2, 0x0, 0x0, [{r4, 0x0, 0x100000000}, {r6, 0x0, 0x9}]}) ftruncate(r6, 0x0) 02:38:54 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0xf}, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000419000)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [0x700000000000000], 0xf}}, 0x1c) 02:38:54 executing program 3: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x801, 0x0) r1 = syz_open_dev$swradio(&(0x7f0000000200)='/dev/swradio#\x00', 0x1, 0x2) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f0000000500)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x19}}, 0x10) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340)) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@ipv4={[], [], @broadcast}, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f00000004c0)=0xe8) fchown(r2, r3, 0x0) getresuid(0x0, 0x0, 0x0) r4 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x4200, 0x0) r5 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x40000, 0x0) getsockopt$bt_BT_SECURITY(r4, 0x112, 0x4, &(0x7f0000000040), 0x2) r6 = open(&(0x7f0000000100)='./bus\x00', 0x141045, 0x0) ioctl$FIDEDUPERANGE(r5, 0xc0189436, &(0x7f0000000540)={0x9, 0x460, 0x2, 0x0, 0x0, [{r4, 0x0, 0x100000000}, {r6, 0x0, 0x9}]}) ftruncate(r6, 0x0) 02:38:54 executing program 5: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x801, 0x0) r1 = syz_open_dev$swradio(&(0x7f0000000200)='/dev/swradio#\x00', 0x1, 0x2) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f0000000500)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x19}}, 0x10) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340)) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@ipv4={[], [], @broadcast}, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f00000004c0)=0xe8) fchown(r2, r3, 0x0) getresuid(0x0, 0x0, 0x0) r4 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x4200, 0x0) r5 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x40000, 0x0) getsockopt$bt_BT_SECURITY(r4, 0x112, 0x4, &(0x7f0000000040), 0x2) r6 = open(&(0x7f0000000100)='./bus\x00', 0x141045, 0x0) ioctl$FIDEDUPERANGE(r5, 0xc0189436, &(0x7f0000000540)={0x9, 0x460, 0x2, 0x0, 0x0, [{r4, 0x0, 0x100000000}, {r6, 0x0, 0x9}]}) ftruncate(r6, 0x0) 02:38:54 executing program 2: unshare(0x8000400) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) lseek(r1, 0xffffffff00000000, 0x0) 02:38:54 executing program 4: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r1 = fanotify_init(0x200, 0x0) fanotify_mark(r1, 0x5, 0x1e, r0, 0x0) fanotify_mark(r1, 0x80, 0x0, 0xffffffffffffffff, 0x0) 02:38:54 executing program 3: r0 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x801, 0x0) r1 = syz_open_dev$swradio(&(0x7f0000000200)='/dev/swradio#\x00', 0x1, 0x2) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f0000000500)={0xf, 0x8, 0xfa00, {0xffffffffffffffff, 0x19}}, 0x10) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(&(0x7f0000000300)='./bus\x00', &(0x7f0000000340)) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@ipv4={[], [], @broadcast}, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@broadcast}}, &(0x7f00000004c0)=0xe8) fchown(r2, r3, 0x0) getresuid(0x0, 0x0, 0x0) r4 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x4200, 0x0) r5 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x40000, 0x0) getsockopt$bt_BT_SECURITY(r4, 0x112, 0x4, &(0x7f0000000040), 0x2) r6 = open(&(0x7f0000000100)='./bus\x00', 0x141045, 0x0) ioctl$FIDEDUPERANGE(r5, 0xc0189436, &(0x7f0000000540)={0x9, 0x460, 0x2, 0x0, 0x0, [{r4, 0x0, 0x100000000}, {r6, 0x0, 0x9}]}) ftruncate(r6, 0x0) 02:38:54 executing program 0: openat$vhci(0xffffffffffffff9c, &(0x7f0000000800)='/dev/vhci\x00', 0x0) pipe2(&(0x7f00000009c0), 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000a00)) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/ashmem\x00', 0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000fc0)='/dev/snd/seq\x00', 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001000)='fd\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_netfilter(0x10, 0x3, 0xc) openat$urandom(0xffffffffffffff9c, &(0x7f0000001100)='/dev/urandom\x00', 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet_udplite(0x2, 0x2, 0x88) signalfd4(0xffffffffffffffff, &(0x7f00000042c0), 0x8, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000004300)='/dev/zero\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$sndseq(0x0, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$sndtimer(0x0, 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) openat$ashmem(0xffffffffffffff9c, &(0x7f00000045c0)='/dev/ashmem\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000004800)='/proc/thread-self/attr/current\x00', 0x2, 0x0) inotify_init() openat$tun(0xffffffffffffff9c, &(0x7f0000004840)='/dev/net/tun\x00', 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000004880)='/dev/loop-control\x00', 0x0, 0x0) creat(&(0x7f00000048c0)='./file0\x00', 0x0) inotify_init() socket$key(0xf, 0x3, 0x2) socket$key(0xf, 0x3, 0x2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000004b40)) socket$nl_netfilter(0x10, 0x3, 0xc) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_open_dev$vcsa(0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f00000070c0)='/dev/uinput\x00', 0x0, 0x0) epoll_create1(0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe(&(0x7f0000008540)) socket$packet(0x11, 0x3, 0x300) openat$dir(0xffffffffffffff9c, &(0x7f0000008580)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_open_dev$rtc(0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) open(&(0x7f00000086c0)='./file0\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) pipe(&(0x7f00000088c0)) socket$inet6_udplite(0xa, 0x2, 0x88) openat$fuse(0xffffffffffffff9c, &(0x7f0000008900)='/dev/fuse\x00', 0x2, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000008940)='/proc/self/attr/current\x00', 0x2, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet_icmp_raw(0x2, 0x3, 0x1) pipe(&(0x7f0000008a80)) 02:38:54 executing program 4: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r1 = fanotify_init(0x200, 0x0) fanotify_mark(r1, 0x5, 0x1e, r0, 0x0) fanotify_mark(r1, 0x80, 0x0, 0xffffffffffffffff, 0x0) 02:38:55 executing program 2: unshare(0x8000400) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) lseek(r1, 0xffffffff00000000, 0x0) 02:38:55 executing program 1: unshare(0x8000400) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) lseek(r1, 0xffffffff00000000, 0x0) 02:38:55 executing program 5: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r1 = fanotify_init(0x200, 0x0) fanotify_mark(r1, 0x5, 0x1e, r0, 0x0) fanotify_mark(r1, 0x80, 0x0, 0xffffffffffffffff, 0x0) [ 323.774673][ T26] audit: type=1804 audit(1562899135.190:34): pid=20398 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir153010333/syzkaller.CSHwOy/616/file0" dev="sda1" ino=17137 res=1 02:38:55 executing program 4: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r1 = fanotify_init(0x200, 0x0) fanotify_mark(r1, 0x5, 0x1e, r0, 0x0) fanotify_mark(r1, 0x80, 0x0, 0xffffffffffffffff, 0x0) [ 323.881258][ T26] audit: type=1804 audit(1562899135.240:35): pid=20398 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir153010333/syzkaller.CSHwOy/616/file0" dev="sda1" ino=17137 res=1 02:38:55 executing program 1: unshare(0x8000400) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) lseek(r1, 0xffffffff00000000, 0x0) 02:38:55 executing program 2: unshare(0x8000400) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) lseek(r1, 0xffffffff00000000, 0x0) 02:38:55 executing program 5: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r1 = fanotify_init(0x200, 0x0) fanotify_mark(r1, 0x5, 0x1e, r0, 0x0) fanotify_mark(r1, 0x80, 0x0, 0xffffffffffffffff, 0x0) 02:38:55 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000240)="c0dca5055e0bcfec7be070") r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$TIPC_NL_MEDIA_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={0x0}}, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x18, r2, 0x439, 0x0, 0x0, {0xa}, [@IPVS_CMD_ATTR_DAEMON={0x4}]}, 0x18}}, 0x0) 02:38:55 executing program 4: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r1 = fanotify_init(0x200, 0x0) fanotify_mark(r1, 0x5, 0x1e, r0, 0x0) fanotify_mark(r1, 0x80, 0x0, 0xffffffffffffffff, 0x0) [ 324.057507][ T26] audit: type=1804 audit(1562899135.340:36): pid=20408 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir153010333/syzkaller.CSHwOy/616/file0" dev="sda1" ino=17137 res=1 02:38:55 executing program 5: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r1 = fanotify_init(0x200, 0x0) fanotify_mark(r1, 0x5, 0x1e, r0, 0x0) fanotify_mark(r1, 0x80, 0x0, 0xffffffffffffffff, 0x0) [ 324.139258][ T26] audit: type=1804 audit(1562899135.360:37): pid=20408 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir153010333/syzkaller.CSHwOy/616/file0" dev="sda1" ino=17137 res=1 [ 324.201139][ T26] audit: type=1804 audit(1562899135.380:38): pid=20408 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir153010333/syzkaller.CSHwOy/616/file0" dev="sda1" ino=17137 res=1 02:38:55 executing program 0: openat$vhci(0xffffffffffffff9c, &(0x7f0000000800)='/dev/vhci\x00', 0x0) pipe2(&(0x7f00000009c0), 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000a00)) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/ashmem\x00', 0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000fc0)='/dev/snd/seq\x00', 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001000)='fd\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_netfilter(0x10, 0x3, 0xc) openat$urandom(0xffffffffffffff9c, &(0x7f0000001100)='/dev/urandom\x00', 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet_udplite(0x2, 0x2, 0x88) signalfd4(0xffffffffffffffff, &(0x7f00000042c0), 0x8, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000004300)='/dev/zero\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$sndseq(0x0, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$sndtimer(0x0, 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) openat$ashmem(0xffffffffffffff9c, &(0x7f00000045c0)='/dev/ashmem\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000004800)='/proc/thread-self/attr/current\x00', 0x2, 0x0) inotify_init() openat$tun(0xffffffffffffff9c, &(0x7f0000004840)='/dev/net/tun\x00', 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000004880)='/dev/loop-control\x00', 0x0, 0x0) creat(&(0x7f00000048c0)='./file0\x00', 0x0) inotify_init() socket$key(0xf, 0x3, 0x2) socket$key(0xf, 0x3, 0x2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000004b40)) socket$nl_netfilter(0x10, 0x3, 0xc) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_open_dev$vcsa(0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f00000070c0)='/dev/uinput\x00', 0x0, 0x0) epoll_create1(0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe(&(0x7f0000008540)) socket$packet(0x11, 0x3, 0x300) openat$dir(0xffffffffffffff9c, &(0x7f0000008580)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_open_dev$rtc(0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) open(&(0x7f00000086c0)='./file0\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) pipe(&(0x7f00000088c0)) socket$inet6_udplite(0xa, 0x2, 0x88) openat$fuse(0xffffffffffffff9c, &(0x7f0000008900)='/dev/fuse\x00', 0x2, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000008940)='/proc/self/attr/current\x00', 0x2, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet_icmp_raw(0x2, 0x3, 0x1) pipe(&(0x7f0000008a80)) 02:38:55 executing program 1: unshare(0x8000400) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) lseek(r1, 0xffffffff00000000, 0x0) 02:38:55 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000240)="c0dca5055e0bcfec7be070") r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$TIPC_NL_MEDIA_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={0x0}}, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x18, r2, 0x439, 0x0, 0x0, {0xa}, [@IPVS_CMD_ATTR_DAEMON={0x4}]}, 0x18}}, 0x0) 02:38:55 executing program 2: unshare(0x8000400) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='rpc_pipefs\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) lseek(r1, 0xffffffff00000000, 0x0) 02:38:55 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="8500000007000000d4000000400000009500000000000000"], &(0x7f0000000240)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x1, 0x348, &(0x7f0000000480)=""/195}, 0x48) 02:38:55 executing program 5: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002) 02:38:55 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="8500000007000000d4000000400000009500000000000000"], &(0x7f0000000240)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x1, 0x348, &(0x7f0000000480)=""/195}, 0x48) 02:38:55 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000240)="c0dca5055e0bcfec7be070") r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$TIPC_NL_MEDIA_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={0x0}}, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x18, r2, 0x439, 0x0, 0x0, {0xa}, [@IPVS_CMD_ATTR_DAEMON={0x4}]}, 0x18}}, 0x0) 02:38:56 executing program 2: openat$vhci(0xffffffffffffff9c, &(0x7f0000000800)='/dev/vhci\x00', 0x0) pipe2(&(0x7f00000009c0), 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000a00)) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/ashmem\x00', 0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000fc0)='/dev/snd/seq\x00', 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001000)='fd\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_netfilter(0x10, 0x3, 0xc) openat$urandom(0xffffffffffffff9c, &(0x7f0000001100)='/dev/urandom\x00', 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet_udplite(0x2, 0x2, 0x88) signalfd4(0xffffffffffffffff, &(0x7f00000042c0), 0x8, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000004300)='/dev/zero\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$sndseq(0x0, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$sndtimer(0x0, 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) openat$ashmem(0xffffffffffffff9c, &(0x7f00000045c0)='/dev/ashmem\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000004800)='/proc/thread-self/attr/current\x00', 0x2, 0x0) inotify_init() openat$tun(0xffffffffffffff9c, &(0x7f0000004840)='/dev/net/tun\x00', 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000004880)='/dev/loop-control\x00', 0x0, 0x0) creat(&(0x7f00000048c0)='./file0\x00', 0x0) inotify_init() socket$key(0xf, 0x3, 0x2) socket$key(0xf, 0x3, 0x2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000004b40)) socket$nl_netfilter(0x10, 0x3, 0xc) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_open_dev$vcsa(0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f00000070c0)='/dev/uinput\x00', 0x0, 0x0) epoll_create1(0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe(&(0x7f0000008540)) socket$packet(0x11, 0x3, 0x300) openat$dir(0xffffffffffffff9c, &(0x7f0000008580)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_open_dev$rtc(0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) open(&(0x7f00000086c0)='./file0\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) pipe(&(0x7f00000088c0)) socket$inet6_udplite(0xa, 0x2, 0x88) openat$fuse(0xffffffffffffff9c, &(0x7f0000008900)='/dev/fuse\x00', 0x2, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000008940)='/proc/self/attr/current\x00', 0x2, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet_icmp_raw(0x2, 0x3, 0x1) pipe(&(0x7f0000008a80)) 02:38:56 executing program 1: openat$vhci(0xffffffffffffff9c, &(0x7f0000000800)='/dev/vhci\x00', 0x0) pipe2(&(0x7f00000009c0), 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000a00)) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/ashmem\x00', 0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000fc0)='/dev/snd/seq\x00', 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001000)='fd\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_netfilter(0x10, 0x3, 0xc) openat$urandom(0xffffffffffffff9c, &(0x7f0000001100)='/dev/urandom\x00', 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet_udplite(0x2, 0x2, 0x88) signalfd4(0xffffffffffffffff, &(0x7f00000042c0), 0x8, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000004300)='/dev/zero\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$sndseq(0x0, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$sndtimer(0x0, 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) openat$ashmem(0xffffffffffffff9c, &(0x7f00000045c0)='/dev/ashmem\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000004800)='/proc/thread-self/attr/current\x00', 0x2, 0x0) inotify_init() openat$tun(0xffffffffffffff9c, &(0x7f0000004840)='/dev/net/tun\x00', 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000004880)='/dev/loop-control\x00', 0x0, 0x0) creat(&(0x7f00000048c0)='./file0\x00', 0x0) inotify_init() socket$key(0xf, 0x3, 0x2) socket$key(0xf, 0x3, 0x2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000004b40)) socket$nl_netfilter(0x10, 0x3, 0xc) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_open_dev$vcsa(0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f00000070c0)='/dev/uinput\x00', 0x0, 0x0) epoll_create1(0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe(&(0x7f0000008540)) socket$packet(0x11, 0x3, 0x300) openat$dir(0xffffffffffffff9c, &(0x7f0000008580)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_open_dev$rtc(0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) open(&(0x7f00000086c0)='./file0\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) pipe(&(0x7f00000088c0)) socket$inet6_udplite(0xa, 0x2, 0x88) openat$fuse(0xffffffffffffff9c, &(0x7f0000008900)='/dev/fuse\x00', 0x2, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000008940)='/proc/self/attr/current\x00', 0x2, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet_icmp_raw(0x2, 0x3, 0x1) pipe(&(0x7f0000008a80)) 02:38:56 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000240)="c0dca5055e0bcfec7be070") r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$TIPC_NL_MEDIA_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={0x0}}, 0x0) sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)={0x18, r2, 0x439, 0x0, 0x0, {0xa}, [@IPVS_CMD_ATTR_DAEMON={0x4}]}, 0x18}}, 0x0) 02:38:56 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="8500000007000000d4000000400000009500000000000000"], &(0x7f0000000240)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x1, 0x348, &(0x7f0000000480)=""/195}, 0x48) [ 324.740889][ T26] audit: type=1804 audit(1562899136.150:39): pid=20452 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir153010333/syzkaller.CSHwOy/617/file0" dev="sda1" ino=16515 res=1 [ 324.883391][ T26] audit: type=1804 audit(1562899136.210:40): pid=20452 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir153010333/syzkaller.CSHwOy/617/file0" dev="sda1" ino=16515 res=1 [ 324.984683][ T26] audit: type=1804 audit(1562899136.250:41): pid=20463 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir756065275/syzkaller.metoZ2/595/file0" dev="sda1" ino=16577 res=1 [ 325.036137][ T26] audit: type=1804 audit(1562899136.260:42): pid=20463 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir756065275/syzkaller.metoZ2/595/file0" dev="sda1" ino=16577 res=1 02:38:56 executing program 0: openat$vhci(0xffffffffffffff9c, &(0x7f0000000800)='/dev/vhci\x00', 0x0) pipe2(&(0x7f00000009c0), 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000a00)) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/ashmem\x00', 0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000fc0)='/dev/snd/seq\x00', 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001000)='fd\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_netfilter(0x10, 0x3, 0xc) openat$urandom(0xffffffffffffff9c, &(0x7f0000001100)='/dev/urandom\x00', 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet_udplite(0x2, 0x2, 0x88) signalfd4(0xffffffffffffffff, &(0x7f00000042c0), 0x8, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000004300)='/dev/zero\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$sndseq(0x0, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$sndtimer(0x0, 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) openat$ashmem(0xffffffffffffff9c, &(0x7f00000045c0)='/dev/ashmem\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000004800)='/proc/thread-self/attr/current\x00', 0x2, 0x0) inotify_init() openat$tun(0xffffffffffffff9c, &(0x7f0000004840)='/dev/net/tun\x00', 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000004880)='/dev/loop-control\x00', 0x0, 0x0) creat(&(0x7f00000048c0)='./file0\x00', 0x0) inotify_init() socket$key(0xf, 0x3, 0x2) socket$key(0xf, 0x3, 0x2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000004b40)) socket$nl_netfilter(0x10, 0x3, 0xc) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_open_dev$vcsa(0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f00000070c0)='/dev/uinput\x00', 0x0, 0x0) epoll_create1(0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe(&(0x7f0000008540)) socket$packet(0x11, 0x3, 0x300) openat$dir(0xffffffffffffff9c, &(0x7f0000008580)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_open_dev$rtc(0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) open(&(0x7f00000086c0)='./file0\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) pipe(&(0x7f00000088c0)) socket$inet6_udplite(0xa, 0x2, 0x88) openat$fuse(0xffffffffffffff9c, &(0x7f0000008900)='/dev/fuse\x00', 0x2, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000008940)='/proc/self/attr/current\x00', 0x2, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet_icmp_raw(0x2, 0x3, 0x1) pipe(&(0x7f0000008a80)) 02:38:56 executing program 3: openat$vhci(0xffffffffffffff9c, &(0x7f0000000800)='/dev/vhci\x00', 0x0) pipe2(&(0x7f00000009c0), 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000a00)) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/ashmem\x00', 0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000fc0)='/dev/snd/seq\x00', 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001000)='fd\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_netfilter(0x10, 0x3, 0xc) openat$urandom(0xffffffffffffff9c, &(0x7f0000001100)='/dev/urandom\x00', 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet_udplite(0x2, 0x2, 0x88) signalfd4(0xffffffffffffffff, &(0x7f00000042c0), 0x8, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000004300)='/dev/zero\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$sndseq(0x0, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$sndtimer(0x0, 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) openat$ashmem(0xffffffffffffff9c, &(0x7f00000045c0)='/dev/ashmem\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000004800)='/proc/thread-self/attr/current\x00', 0x2, 0x0) inotify_init() openat$tun(0xffffffffffffff9c, &(0x7f0000004840)='/dev/net/tun\x00', 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000004880)='/dev/loop-control\x00', 0x0, 0x0) creat(&(0x7f00000048c0)='./file0\x00', 0x0) inotify_init() socket$key(0xf, 0x3, 0x2) socket$key(0xf, 0x3, 0x2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000004b40)) socket$nl_netfilter(0x10, 0x3, 0xc) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_open_dev$vcsa(0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f00000070c0)='/dev/uinput\x00', 0x0, 0x0) epoll_create1(0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe(&(0x7f0000008540)) socket$packet(0x11, 0x3, 0x300) openat$dir(0xffffffffffffff9c, &(0x7f0000008580)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_open_dev$rtc(0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) open(&(0x7f00000086c0)='./file0\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) pipe(&(0x7f00000088c0)) socket$inet6_udplite(0xa, 0x2, 0x88) openat$fuse(0xffffffffffffff9c, &(0x7f0000008900)='/dev/fuse\x00', 0x2, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000008940)='/proc/self/attr/current\x00', 0x2, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet_icmp_raw(0x2, 0x3, 0x1) pipe(&(0x7f0000008a80)) 02:38:56 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="8500000007000000d4000000400000009500000000000000"], &(0x7f0000000240)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x1, 0x348, &(0x7f0000000480)=""/195}, 0x48) 02:38:56 executing program 5: openat$vhci(0xffffffffffffff9c, &(0x7f0000000800)='/dev/vhci\x00', 0x0) pipe2(&(0x7f00000009c0), 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000a00)) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/ashmem\x00', 0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000fc0)='/dev/snd/seq\x00', 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001000)='fd\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_netfilter(0x10, 0x3, 0xc) openat$urandom(0xffffffffffffff9c, &(0x7f0000001100)='/dev/urandom\x00', 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet_udplite(0x2, 0x2, 0x88) signalfd4(0xffffffffffffffff, &(0x7f00000042c0), 0x8, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000004300)='/dev/zero\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$sndseq(0x0, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$sndtimer(0x0, 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) openat$ashmem(0xffffffffffffff9c, &(0x7f00000045c0)='/dev/ashmem\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000004800)='/proc/thread-self/attr/current\x00', 0x2, 0x0) inotify_init() openat$tun(0xffffffffffffff9c, &(0x7f0000004840)='/dev/net/tun\x00', 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000004880)='/dev/loop-control\x00', 0x0, 0x0) creat(&(0x7f00000048c0)='./file0\x00', 0x0) inotify_init() socket$key(0xf, 0x3, 0x2) socket$key(0xf, 0x3, 0x2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000004b40)) socket$nl_netfilter(0x10, 0x3, 0xc) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_open_dev$vcsa(0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f00000070c0)='/dev/uinput\x00', 0x0, 0x0) epoll_create1(0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe(&(0x7f0000008540)) socket$packet(0x11, 0x3, 0x300) openat$dir(0xffffffffffffff9c, &(0x7f0000008580)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_open_dev$rtc(0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) open(&(0x7f00000086c0)='./file0\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) pipe(&(0x7f00000088c0)) socket$inet6_udplite(0xa, 0x2, 0x88) openat$fuse(0xffffffffffffff9c, &(0x7f0000008900)='/dev/fuse\x00', 0x2, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000008940)='/proc/self/attr/current\x00', 0x2, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet_icmp_raw(0x2, 0x3, 0x1) pipe(&(0x7f0000008a80)) 02:38:56 executing program 2: openat$vhci(0xffffffffffffff9c, &(0x7f0000000800)='/dev/vhci\x00', 0x0) pipe2(&(0x7f00000009c0), 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000a00)) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/ashmem\x00', 0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000fc0)='/dev/snd/seq\x00', 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001000)='fd\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_netfilter(0x10, 0x3, 0xc) openat$urandom(0xffffffffffffff9c, &(0x7f0000001100)='/dev/urandom\x00', 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet_udplite(0x2, 0x2, 0x88) signalfd4(0xffffffffffffffff, &(0x7f00000042c0), 0x8, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000004300)='/dev/zero\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$sndseq(0x0, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$sndtimer(0x0, 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) openat$ashmem(0xffffffffffffff9c, &(0x7f00000045c0)='/dev/ashmem\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000004800)='/proc/thread-self/attr/current\x00', 0x2, 0x0) inotify_init() openat$tun(0xffffffffffffff9c, &(0x7f0000004840)='/dev/net/tun\x00', 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000004880)='/dev/loop-control\x00', 0x0, 0x0) creat(&(0x7f00000048c0)='./file0\x00', 0x0) inotify_init() socket$key(0xf, 0x3, 0x2) socket$key(0xf, 0x3, 0x2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000004b40)) socket$nl_netfilter(0x10, 0x3, 0xc) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_open_dev$vcsa(0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f00000070c0)='/dev/uinput\x00', 0x0, 0x0) epoll_create1(0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe(&(0x7f0000008540)) socket$packet(0x11, 0x3, 0x300) openat$dir(0xffffffffffffff9c, &(0x7f0000008580)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_open_dev$rtc(0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) open(&(0x7f00000086c0)='./file0\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) pipe(&(0x7f00000088c0)) socket$inet6_udplite(0xa, 0x2, 0x88) openat$fuse(0xffffffffffffff9c, &(0x7f0000008900)='/dev/fuse\x00', 0x2, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000008940)='/proc/self/attr/current\x00', 0x2, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet_icmp_raw(0x2, 0x3, 0x1) pipe(&(0x7f0000008a80)) [ 325.070549][ T26] audit: type=1804 audit(1562899136.320:43): pid=20465 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir344181463/syzkaller.gr6veI/550/file0" dev="sda1" ino=16609 res=1 02:38:56 executing program 1: openat$vhci(0xffffffffffffff9c, &(0x7f0000000800)='/dev/vhci\x00', 0x0) pipe2(&(0x7f00000009c0), 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000a00)) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/ashmem\x00', 0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000fc0)='/dev/snd/seq\x00', 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001000)='fd\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_netfilter(0x10, 0x3, 0xc) openat$urandom(0xffffffffffffff9c, &(0x7f0000001100)='/dev/urandom\x00', 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet_udplite(0x2, 0x2, 0x88) signalfd4(0xffffffffffffffff, &(0x7f00000042c0), 0x8, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000004300)='/dev/zero\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$sndseq(0x0, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$sndtimer(0x0, 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) openat$ashmem(0xffffffffffffff9c, &(0x7f00000045c0)='/dev/ashmem\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000004800)='/proc/thread-self/attr/current\x00', 0x2, 0x0) inotify_init() openat$tun(0xffffffffffffff9c, &(0x7f0000004840)='/dev/net/tun\x00', 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000004880)='/dev/loop-control\x00', 0x0, 0x0) creat(&(0x7f00000048c0)='./file0\x00', 0x0) inotify_init() socket$key(0xf, 0x3, 0x2) socket$key(0xf, 0x3, 0x2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000004b40)) socket$nl_netfilter(0x10, 0x3, 0xc) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_open_dev$vcsa(0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f00000070c0)='/dev/uinput\x00', 0x0, 0x0) epoll_create1(0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe(&(0x7f0000008540)) socket$packet(0x11, 0x3, 0x300) openat$dir(0xffffffffffffff9c, &(0x7f0000008580)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_open_dev$rtc(0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) open(&(0x7f00000086c0)='./file0\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) pipe(&(0x7f00000088c0)) socket$inet6_udplite(0xa, 0x2, 0x88) openat$fuse(0xffffffffffffff9c, &(0x7f0000008900)='/dev/fuse\x00', 0x2, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000008940)='/proc/self/attr/current\x00', 0x2, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet_icmp_raw(0x2, 0x3, 0x1) pipe(&(0x7f0000008a80)) 02:38:56 executing program 4: openat$vhci(0xffffffffffffff9c, &(0x7f0000000800)='/dev/vhci\x00', 0x0) pipe2(&(0x7f00000009c0), 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000a00)) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/ashmem\x00', 0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000fc0)='/dev/snd/seq\x00', 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001000)='fd\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_netfilter(0x10, 0x3, 0xc) openat$urandom(0xffffffffffffff9c, &(0x7f0000001100)='/dev/urandom\x00', 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet_udplite(0x2, 0x2, 0x88) signalfd4(0xffffffffffffffff, &(0x7f00000042c0), 0x8, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000004300)='/dev/zero\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$sndseq(0x0, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$sndtimer(0x0, 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) openat$ashmem(0xffffffffffffff9c, &(0x7f00000045c0)='/dev/ashmem\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000004800)='/proc/thread-self/attr/current\x00', 0x2, 0x0) inotify_init() openat$tun(0xffffffffffffff9c, &(0x7f0000004840)='/dev/net/tun\x00', 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000004880)='/dev/loop-control\x00', 0x0, 0x0) creat(&(0x7f00000048c0)='./file0\x00', 0x0) inotify_init() socket$key(0xf, 0x3, 0x2) socket$key(0xf, 0x3, 0x2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000004b40)) socket$nl_netfilter(0x10, 0x3, 0xc) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_open_dev$vcsa(0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f00000070c0)='/dev/uinput\x00', 0x0, 0x0) epoll_create1(0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe(&(0x7f0000008540)) socket$packet(0x11, 0x3, 0x300) openat$dir(0xffffffffffffff9c, &(0x7f0000008580)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_open_dev$rtc(0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) open(&(0x7f00000086c0)='./file0\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) pipe(&(0x7f00000088c0)) socket$inet6_udplite(0xa, 0x2, 0x88) openat$fuse(0xffffffffffffff9c, &(0x7f0000008900)='/dev/fuse\x00', 0x2, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000008940)='/proc/self/attr/current\x00', 0x2, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet_icmp_raw(0x2, 0x3, 0x1) pipe(&(0x7f0000008a80)) 02:38:56 executing program 2: openat$vhci(0xffffffffffffff9c, &(0x7f0000000800)='/dev/vhci\x00', 0x0) pipe2(&(0x7f00000009c0), 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000a00)) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/ashmem\x00', 0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000fc0)='/dev/snd/seq\x00', 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001000)='fd\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_netfilter(0x10, 0x3, 0xc) openat$urandom(0xffffffffffffff9c, &(0x7f0000001100)='/dev/urandom\x00', 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet_udplite(0x2, 0x2, 0x88) signalfd4(0xffffffffffffffff, &(0x7f00000042c0), 0x8, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000004300)='/dev/zero\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$sndseq(0x0, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$sndtimer(0x0, 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) openat$ashmem(0xffffffffffffff9c, &(0x7f00000045c0)='/dev/ashmem\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000004800)='/proc/thread-self/attr/current\x00', 0x2, 0x0) inotify_init() openat$tun(0xffffffffffffff9c, &(0x7f0000004840)='/dev/net/tun\x00', 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000004880)='/dev/loop-control\x00', 0x0, 0x0) creat(&(0x7f00000048c0)='./file0\x00', 0x0) inotify_init() socket$key(0xf, 0x3, 0x2) socket$key(0xf, 0x3, 0x2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000004b40)) socket$nl_netfilter(0x10, 0x3, 0xc) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_open_dev$vcsa(0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f00000070c0)='/dev/uinput\x00', 0x0, 0x0) epoll_create1(0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe(&(0x7f0000008540)) socket$packet(0x11, 0x3, 0x300) openat$dir(0xffffffffffffff9c, &(0x7f0000008580)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_open_dev$rtc(0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) open(&(0x7f00000086c0)='./file0\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) pipe(&(0x7f00000088c0)) socket$inet6_udplite(0xa, 0x2, 0x88) openat$fuse(0xffffffffffffff9c, &(0x7f0000008900)='/dev/fuse\x00', 0x2, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000008940)='/proc/self/attr/current\x00', 0x2, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet_icmp_raw(0x2, 0x3, 0x1) pipe(&(0x7f0000008a80)) 02:38:56 executing program 5: openat$vhci(0xffffffffffffff9c, &(0x7f0000000800)='/dev/vhci\x00', 0x0) pipe2(&(0x7f00000009c0), 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000a00)) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/ashmem\x00', 0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000fc0)='/dev/snd/seq\x00', 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001000)='fd\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_netfilter(0x10, 0x3, 0xc) openat$urandom(0xffffffffffffff9c, &(0x7f0000001100)='/dev/urandom\x00', 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet_udplite(0x2, 0x2, 0x88) signalfd4(0xffffffffffffffff, &(0x7f00000042c0), 0x8, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000004300)='/dev/zero\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$sndseq(0x0, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$sndtimer(0x0, 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) openat$ashmem(0xffffffffffffff9c, &(0x7f00000045c0)='/dev/ashmem\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000004800)='/proc/thread-self/attr/current\x00', 0x2, 0x0) inotify_init() openat$tun(0xffffffffffffff9c, &(0x7f0000004840)='/dev/net/tun\x00', 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000004880)='/dev/loop-control\x00', 0x0, 0x0) creat(&(0x7f00000048c0)='./file0\x00', 0x0) inotify_init() socket$key(0xf, 0x3, 0x2) socket$key(0xf, 0x3, 0x2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000004b40)) socket$nl_netfilter(0x10, 0x3, 0xc) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_open_dev$vcsa(0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f00000070c0)='/dev/uinput\x00', 0x0, 0x0) epoll_create1(0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe(&(0x7f0000008540)) socket$packet(0x11, 0x3, 0x300) openat$dir(0xffffffffffffff9c, &(0x7f0000008580)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_open_dev$rtc(0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) open(&(0x7f00000086c0)='./file0\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) pipe(&(0x7f00000088c0)) socket$inet6_udplite(0xa, 0x2, 0x88) openat$fuse(0xffffffffffffff9c, &(0x7f0000008900)='/dev/fuse\x00', 0x2, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000008940)='/proc/self/attr/current\x00', 0x2, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet_icmp_raw(0x2, 0x3, 0x1) pipe(&(0x7f0000008a80)) 02:38:57 executing program 3: openat$vhci(0xffffffffffffff9c, &(0x7f0000000800)='/dev/vhci\x00', 0x0) pipe2(&(0x7f00000009c0), 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000a00)) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/ashmem\x00', 0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000fc0)='/dev/snd/seq\x00', 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001000)='fd\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_netfilter(0x10, 0x3, 0xc) openat$urandom(0xffffffffffffff9c, &(0x7f0000001100)='/dev/urandom\x00', 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet_udplite(0x2, 0x2, 0x88) signalfd4(0xffffffffffffffff, &(0x7f00000042c0), 0x8, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000004300)='/dev/zero\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$sndseq(0x0, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$sndtimer(0x0, 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) openat$ashmem(0xffffffffffffff9c, &(0x7f00000045c0)='/dev/ashmem\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000004800)='/proc/thread-self/attr/current\x00', 0x2, 0x0) inotify_init() openat$tun(0xffffffffffffff9c, &(0x7f0000004840)='/dev/net/tun\x00', 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000004880)='/dev/loop-control\x00', 0x0, 0x0) creat(&(0x7f00000048c0)='./file0\x00', 0x0) inotify_init() socket$key(0xf, 0x3, 0x2) socket$key(0xf, 0x3, 0x2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000004b40)) socket$nl_netfilter(0x10, 0x3, 0xc) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_open_dev$vcsa(0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f00000070c0)='/dev/uinput\x00', 0x0, 0x0) epoll_create1(0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe(&(0x7f0000008540)) socket$packet(0x11, 0x3, 0x300) openat$dir(0xffffffffffffff9c, &(0x7f0000008580)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_open_dev$rtc(0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) open(&(0x7f00000086c0)='./file0\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) pipe(&(0x7f00000088c0)) socket$inet6_udplite(0xa, 0x2, 0x88) openat$fuse(0xffffffffffffff9c, &(0x7f0000008900)='/dev/fuse\x00', 0x2, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000008940)='/proc/self/attr/current\x00', 0x2, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet_icmp_raw(0x2, 0x3, 0x1) pipe(&(0x7f0000008a80)) 02:38:57 executing program 0: openat$vhci(0xffffffffffffff9c, &(0x7f0000000800)='/dev/vhci\x00', 0x0) pipe2(&(0x7f00000009c0), 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000a00)) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/ashmem\x00', 0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000fc0)='/dev/snd/seq\x00', 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001000)='fd\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_netfilter(0x10, 0x3, 0xc) openat$urandom(0xffffffffffffff9c, &(0x7f0000001100)='/dev/urandom\x00', 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet_udplite(0x2, 0x2, 0x88) signalfd4(0xffffffffffffffff, &(0x7f00000042c0), 0x8, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000004300)='/dev/zero\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$sndseq(0x0, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$sndtimer(0x0, 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) openat$ashmem(0xffffffffffffff9c, &(0x7f00000045c0)='/dev/ashmem\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000004800)='/proc/thread-self/attr/current\x00', 0x2, 0x0) inotify_init() openat$tun(0xffffffffffffff9c, &(0x7f0000004840)='/dev/net/tun\x00', 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000004880)='/dev/loop-control\x00', 0x0, 0x0) creat(&(0x7f00000048c0)='./file0\x00', 0x0) inotify_init() socket$key(0xf, 0x3, 0x2) socket$key(0xf, 0x3, 0x2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000004b40)) socket$nl_netfilter(0x10, 0x3, 0xc) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_open_dev$vcsa(0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f00000070c0)='/dev/uinput\x00', 0x0, 0x0) epoll_create1(0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe(&(0x7f0000008540)) socket$packet(0x11, 0x3, 0x300) openat$dir(0xffffffffffffff9c, &(0x7f0000008580)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_open_dev$rtc(0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) open(&(0x7f00000086c0)='./file0\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) pipe(&(0x7f00000088c0)) socket$inet6_udplite(0xa, 0x2, 0x88) openat$fuse(0xffffffffffffff9c, &(0x7f0000008900)='/dev/fuse\x00', 0x2, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000008940)='/proc/self/attr/current\x00', 0x2, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet_icmp_raw(0x2, 0x3, 0x1) pipe(&(0x7f0000008a80)) 02:38:57 executing program 1: openat$vhci(0xffffffffffffff9c, &(0x7f0000000800)='/dev/vhci\x00', 0x0) pipe2(&(0x7f00000009c0), 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000a00)) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/ashmem\x00', 0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000fc0)='/dev/snd/seq\x00', 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001000)='fd\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_netfilter(0x10, 0x3, 0xc) openat$urandom(0xffffffffffffff9c, &(0x7f0000001100)='/dev/urandom\x00', 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet_udplite(0x2, 0x2, 0x88) signalfd4(0xffffffffffffffff, &(0x7f00000042c0), 0x8, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000004300)='/dev/zero\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$sndseq(0x0, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$sndtimer(0x0, 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) openat$ashmem(0xffffffffffffff9c, &(0x7f00000045c0)='/dev/ashmem\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000004800)='/proc/thread-self/attr/current\x00', 0x2, 0x0) inotify_init() openat$tun(0xffffffffffffff9c, &(0x7f0000004840)='/dev/net/tun\x00', 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000004880)='/dev/loop-control\x00', 0x0, 0x0) creat(&(0x7f00000048c0)='./file0\x00', 0x0) inotify_init() socket$key(0xf, 0x3, 0x2) socket$key(0xf, 0x3, 0x2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000004b40)) socket$nl_netfilter(0x10, 0x3, 0xc) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_open_dev$vcsa(0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f00000070c0)='/dev/uinput\x00', 0x0, 0x0) epoll_create1(0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe(&(0x7f0000008540)) socket$packet(0x11, 0x3, 0x300) openat$dir(0xffffffffffffff9c, &(0x7f0000008580)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_open_dev$rtc(0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) open(&(0x7f00000086c0)='./file0\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) pipe(&(0x7f00000088c0)) socket$inet6_udplite(0xa, 0x2, 0x88) openat$fuse(0xffffffffffffff9c, &(0x7f0000008900)='/dev/fuse\x00', 0x2, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000008940)='/proc/self/attr/current\x00', 0x2, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet_icmp_raw(0x2, 0x3, 0x1) pipe(&(0x7f0000008a80)) 02:38:57 executing program 4: openat$vhci(0xffffffffffffff9c, &(0x7f0000000800)='/dev/vhci\x00', 0x0) pipe2(&(0x7f00000009c0), 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000a00)) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/ashmem\x00', 0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000fc0)='/dev/snd/seq\x00', 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001000)='fd\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_netfilter(0x10, 0x3, 0xc) openat$urandom(0xffffffffffffff9c, &(0x7f0000001100)='/dev/urandom\x00', 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet_udplite(0x2, 0x2, 0x88) signalfd4(0xffffffffffffffff, &(0x7f00000042c0), 0x8, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000004300)='/dev/zero\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$sndseq(0x0, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$sndtimer(0x0, 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) openat$ashmem(0xffffffffffffff9c, &(0x7f00000045c0)='/dev/ashmem\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000004800)='/proc/thread-self/attr/current\x00', 0x2, 0x0) inotify_init() openat$tun(0xffffffffffffff9c, &(0x7f0000004840)='/dev/net/tun\x00', 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000004880)='/dev/loop-control\x00', 0x0, 0x0) creat(&(0x7f00000048c0)='./file0\x00', 0x0) inotify_init() socket$key(0xf, 0x3, 0x2) socket$key(0xf, 0x3, 0x2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000004b40)) socket$nl_netfilter(0x10, 0x3, 0xc) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_open_dev$vcsa(0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f00000070c0)='/dev/uinput\x00', 0x0, 0x0) epoll_create1(0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe(&(0x7f0000008540)) socket$packet(0x11, 0x3, 0x300) openat$dir(0xffffffffffffff9c, &(0x7f0000008580)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_open_dev$rtc(0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) open(&(0x7f00000086c0)='./file0\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) pipe(&(0x7f00000088c0)) socket$inet6_udplite(0xa, 0x2, 0x88) openat$fuse(0xffffffffffffff9c, &(0x7f0000008900)='/dev/fuse\x00', 0x2, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000008940)='/proc/self/attr/current\x00', 0x2, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet_icmp_raw(0x2, 0x3, 0x1) pipe(&(0x7f0000008a80)) [ 325.792438][ C0] net_ratelimit: 16 callbacks suppressed [ 325.792447][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 325.806641][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 325.813787][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 325.820073][ C0] protocol 88fb is buggy, dev hsr_slave_1 02:38:57 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, 0x0, 0x0) getsockopt$netlink(r0, 0x10e, 0x1000008000000009, &(0x7f0000000000)=""/4, &(0x7f0000000040)=0x1d5) 02:38:57 executing program 5: openat$vhci(0xffffffffffffff9c, &(0x7f0000000800)='/dev/vhci\x00', 0x0) pipe2(&(0x7f00000009c0), 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000a00)) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/ashmem\x00', 0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000fc0)='/dev/snd/seq\x00', 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001000)='fd\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_netfilter(0x10, 0x3, 0xc) openat$urandom(0xffffffffffffff9c, &(0x7f0000001100)='/dev/urandom\x00', 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet_udplite(0x2, 0x2, 0x88) signalfd4(0xffffffffffffffff, &(0x7f00000042c0), 0x8, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000004300)='/dev/zero\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$sndseq(0x0, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$sndtimer(0x0, 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) openat$ashmem(0xffffffffffffff9c, &(0x7f00000045c0)='/dev/ashmem\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000004800)='/proc/thread-self/attr/current\x00', 0x2, 0x0) inotify_init() openat$tun(0xffffffffffffff9c, &(0x7f0000004840)='/dev/net/tun\x00', 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000004880)='/dev/loop-control\x00', 0x0, 0x0) creat(&(0x7f00000048c0)='./file0\x00', 0x0) inotify_init() socket$key(0xf, 0x3, 0x2) socket$key(0xf, 0x3, 0x2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000004b40)) socket$nl_netfilter(0x10, 0x3, 0xc) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_open_dev$vcsa(0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f00000070c0)='/dev/uinput\x00', 0x0, 0x0) epoll_create1(0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe(&(0x7f0000008540)) socket$packet(0x11, 0x3, 0x300) openat$dir(0xffffffffffffff9c, &(0x7f0000008580)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_open_dev$rtc(0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) open(&(0x7f00000086c0)='./file0\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) pipe(&(0x7f00000088c0)) socket$inet6_udplite(0xa, 0x2, 0x88) openat$fuse(0xffffffffffffff9c, &(0x7f0000008900)='/dev/fuse\x00', 0x2, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000008940)='/proc/self/attr/current\x00', 0x2, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet_icmp_raw(0x2, 0x3, 0x1) pipe(&(0x7f0000008a80)) 02:38:57 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, 0x0, 0x0) getsockopt$netlink(r0, 0x10e, 0x1000008000000009, &(0x7f0000000000)=""/4, &(0x7f0000000040)=0x1d5) 02:38:57 executing program 3: openat$vhci(0xffffffffffffff9c, &(0x7f0000000800)='/dev/vhci\x00', 0x0) pipe2(&(0x7f00000009c0), 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000a00)) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/ashmem\x00', 0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000fc0)='/dev/snd/seq\x00', 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001000)='fd\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_netfilter(0x10, 0x3, 0xc) openat$urandom(0xffffffffffffff9c, &(0x7f0000001100)='/dev/urandom\x00', 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet_udplite(0x2, 0x2, 0x88) signalfd4(0xffffffffffffffff, &(0x7f00000042c0), 0x8, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000004300)='/dev/zero\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$sndseq(0x0, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$sndtimer(0x0, 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) openat$ashmem(0xffffffffffffff9c, &(0x7f00000045c0)='/dev/ashmem\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000004800)='/proc/thread-self/attr/current\x00', 0x2, 0x0) inotify_init() openat$tun(0xffffffffffffff9c, &(0x7f0000004840)='/dev/net/tun\x00', 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000004880)='/dev/loop-control\x00', 0x0, 0x0) creat(&(0x7f00000048c0)='./file0\x00', 0x0) inotify_init() socket$key(0xf, 0x3, 0x2) socket$key(0xf, 0x3, 0x2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000004b40)) socket$nl_netfilter(0x10, 0x3, 0xc) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_open_dev$vcsa(0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f00000070c0)='/dev/uinput\x00', 0x0, 0x0) epoll_create1(0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe(&(0x7f0000008540)) socket$packet(0x11, 0x3, 0x300) openat$dir(0xffffffffffffff9c, &(0x7f0000008580)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_open_dev$rtc(0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) open(&(0x7f00000086c0)='./file0\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) pipe(&(0x7f00000088c0)) socket$inet6_udplite(0xa, 0x2, 0x88) openat$fuse(0xffffffffffffff9c, &(0x7f0000008900)='/dev/fuse\x00', 0x2, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000008940)='/proc/self/attr/current\x00', 0x2, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet_icmp_raw(0x2, 0x3, 0x1) pipe(&(0x7f0000008a80)) 02:38:57 executing program 4: openat$vhci(0xffffffffffffff9c, &(0x7f0000000800)='/dev/vhci\x00', 0x0) pipe2(&(0x7f00000009c0), 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000a00)) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/ashmem\x00', 0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000fc0)='/dev/snd/seq\x00', 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001000)='fd\x00') socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_netfilter(0x10, 0x3, 0xc) openat$urandom(0xffffffffffffff9c, &(0x7f0000001100)='/dev/urandom\x00', 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socket$inet_udplite(0x2, 0x2, 0x88) signalfd4(0xffffffffffffffff, &(0x7f00000042c0), 0x8, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000004300)='/dev/zero\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$sndseq(0x0, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$sndtimer(0x0, 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) openat$ashmem(0xffffffffffffff9c, &(0x7f00000045c0)='/dev/ashmem\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000004800)='/proc/thread-self/attr/current\x00', 0x2, 0x0) inotify_init() openat$tun(0xffffffffffffff9c, &(0x7f0000004840)='/dev/net/tun\x00', 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000004880)='/dev/loop-control\x00', 0x0, 0x0) creat(&(0x7f00000048c0)='./file0\x00', 0x0) inotify_init() socket$key(0xf, 0x3, 0x2) socket$key(0xf, 0x3, 0x2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000004b40)) socket$nl_netfilter(0x10, 0x3, 0xc) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_open_dev$vcsa(0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$uinput(0xffffffffffffff9c, &(0x7f00000070c0)='/dev/uinput\x00', 0x0, 0x0) epoll_create1(0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pipe(&(0x7f0000008540)) socket$packet(0x11, 0x3, 0x300) openat$dir(0xffffffffffffff9c, &(0x7f0000008580)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_open_dev$rtc(0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) open(&(0x7f00000086c0)='./file0\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) pipe(&(0x7f00000088c0)) socket$inet6_udplite(0xa, 0x2, 0x88) openat$fuse(0xffffffffffffff9c, &(0x7f0000008900)='/dev/fuse\x00', 0x2, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000008940)='/proc/self/attr/current\x00', 0x2, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet_icmp_raw(0x2, 0x3, 0x1) pipe(&(0x7f0000008a80)) 02:38:57 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="850000002a00000017000000ffffffff950000000000000077a5ddf76f71d45cd2c554c0ff1d563688115b14dbea6cad0a79d145b1ea169814b9797f712c827bd35535ef8ab6d44ec58577141112d076e31bea55bce9038b9df09ea5b7bdeeed9ffea70b51cd5d3375ab2d6886d8768be8ffcf57fe973dccaedd420f4b5c906c5c0603a48883bfe339077f0eeb19450a9755e2d0e136a1c0b1859f3379e9"], &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2'}, 0x48) 02:38:57 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0xc0ffffff, 0x4d}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xff67, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 02:38:57 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, 0x0, 0x0) getsockopt$netlink(r0, 0x10e, 0x1000008000000009, &(0x7f0000000000)=""/4, &(0x7f0000000040)=0x1d5) [ 326.102461][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 326.109574][ C0] protocol 88fb is buggy, dev hsr_slave_1 02:38:57 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="850000002a00000017000000ffffffff950000000000000077a5ddf76f71d45cd2c554c0ff1d563688115b14dbea6cad0a79d145b1ea169814b9797f712c827bd35535ef8ab6d44ec58577141112d076e31bea55bce9038b9df09ea5b7bdeeed9ffea70b51cd5d3375ab2d6886d8768be8ffcf57fe973dccaedd420f4b5c906c5c0603a48883bfe339077f0eeb19450a9755e2d0e136a1c0b1859f3379e9"], &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2'}, 0x48) [ 326.182374][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 326.189726][ C0] protocol 88fb is buggy, dev hsr_slave_1 02:38:57 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, 0x0, 0x0) getsockopt$netlink(r0, 0x10e, 0x1000008000000009, &(0x7f0000000000)=""/4, &(0x7f0000000040)=0x1d5) 02:38:57 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0xc0ffffff, 0x4d}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xff67, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 02:38:57 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, 0x84) 02:38:57 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x13, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x1a, 0x65}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000)={0x4c5047}}, 0x48) 02:38:57 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="850000002a00000017000000ffffffff950000000000000077a5ddf76f71d45cd2c554c0ff1d563688115b14dbea6cad0a79d145b1ea169814b9797f712c827bd35535ef8ab6d44ec58577141112d076e31bea55bce9038b9df09ea5b7bdeeed9ffea70b51cd5d3375ab2d6886d8768be8ffcf57fe973dccaedd420f4b5c906c5c0603a48883bfe339077f0eeb19450a9755e2d0e136a1c0b1859f3379e9"], &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2'}, 0x48) 02:38:57 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000400)='./file1\x00', 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, &(0x7f0000000600)={0x0, @in={{0x2, 0x4e20, @empty}}, 0x5, 0xffffffffffffffc8}, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000300)={0x0, 0xa71, 0x81, 0xfffffffffffffff7, 0x100000000, 0x5}, 0x14) vmsplice(0xffffffffffffffff, &(0x7f0000000580)=[{&(0x7f0000002800)="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", 0xf7f}, {&(0x7f00000007c0)="ea39baeaef2ed624a994f965a8064293c9e00f4fabd6f84fe1f6be4779a93b499a30d94c389dd75a29703a482398c6d735a61aced2a6f0d03b4d28b0525f9139baa99281adfad20d98a16caa8f92cc8ff5442ce0de2f", 0x56}], 0x2, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x400006, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) syz_mount_image$ext4(&(0x7f0000000440)='ext2\x00', &(0x7f0000001780)='./file0\x00', 0x0, 0x2, &(0x7f0000000540)=[{&(0x7f00000017c0), 0x0, 0x7ff}, {&(0x7f00000004c0), 0x0, 0x3}], 0x20, &(0x7f0000002780)=ANY=[@ANYBLOB='prjquota,fowner>', @ANYBLOB="2c736d61636b6673646566db"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f0000000480)) socket$nl_generic(0x10, 0x3, 0x10) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001740)='/dev/ubi_ctrl\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000001680)={0x0, @in6={{0xa, 0x4e22, 0x0, @rand_addr="753900737f2708d40abf862e7985f23f"}}, 0x3f}, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x400000, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f00000005c0)={0x0, 0x8, 0xfffffffffffffffc, 0xffffffffffffff80}) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, &(0x7f0000000840)={0x0, 0x200, 0xd6, "938c92658c43114e49cdcfe723cf36b9279c5599dfde9f9f6be1b9b2565ed600beda58fd474e4c30d16ddfc9eb0b08f81911b982c0d63ab698eb68de05afbc5b3ba01edc1192a88ea78ae8cc46b6d80795bbae465b534ceb331eee93b24fbcf9c2b99d7ad9ed08046692906b8fda5b369044c8d155ff7c7b0c3ba4884e4c9d042ffb7c49be17ccc0af357a71b1ce9da26c264e46641a375379c7746b2fd382eab950273f87a89dbedb15b4883d77bfc054466ea988ebeda7d9d5923dcafb5f6cc5b18a398f0fbae3d16defdaed908978ef5fe752f818"}, 0xde) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000200)={0x5, 0x800c}, &(0x7f0000000340)=0x10) 02:38:57 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0xc0ffffff, 0x4d}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xff67, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 02:38:57 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$iso9660(&(0x7f0000000040)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 326.502397][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 326.508653][ C1] protocol 88fb is buggy, dev hsr_slave_1 02:38:58 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, 0x84) 02:38:58 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="850000002a00000017000000ffffffff950000000000000077a5ddf76f71d45cd2c554c0ff1d563688115b14dbea6cad0a79d145b1ea169814b9797f712c827bd35535ef8ab6d44ec58577141112d076e31bea55bce9038b9df09ea5b7bdeeed9ffea70b51cd5d3375ab2d6886d8768be8ffcf57fe973dccaedd420f4b5c906c5c0603a48883bfe339077f0eeb19450a9755e2d0e136a1c0b1859f3379e9"], &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2'}, 0x48) 02:38:58 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x13, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x1a, 0x65}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000)={0x4c5047}}, 0x48) 02:38:58 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, 0x84) 02:38:58 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0xc0ffffff, 0x4d}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xff67, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 02:38:58 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x13, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x1a, 0x65}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000)={0x4c5047}}, 0x48) 02:38:58 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@nat={'nat\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x19, 0x2, 0x2e0, [0x20000740, 0x0, 0x0, 0x20000770, 0x200009f0], 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"]}, 0x358) 02:38:58 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x0, @local}}}, 0x84) 02:38:58 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x13, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x1a, 0x65}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000)={0x4c5047}}, 0x48) [ 327.136611][T20570] overlayfs: workdir and upperdir must reside under the same mount 02:38:58 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)="390000001300091668fe07feffffff000018ff3f2800000045000107000100141900020007000a00550e69330f4de502000080000000000000", 0x39}], 0x1) 02:38:58 executing program 1: prctl$PR_SET_SECCOMP(0x1e, 0x0, 0x0) [ 327.447151][T20562] ISOFS: Unable to identify CD-ROM format. 02:38:58 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000400)='./file1\x00', 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, &(0x7f0000000600)={0x0, @in={{0x2, 0x4e20, @empty}}, 0x5, 0xffffffffffffffc8}, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000300)={0x0, 0xa71, 0x81, 0xfffffffffffffff7, 0x100000000, 0x5}, 0x14) vmsplice(0xffffffffffffffff, &(0x7f0000000580)=[{&(0x7f0000002800)="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", 0xf7f}, {&(0x7f00000007c0)="ea39baeaef2ed624a994f965a8064293c9e00f4fabd6f84fe1f6be4779a93b499a30d94c389dd75a29703a482398c6d735a61aced2a6f0d03b4d28b0525f9139baa99281adfad20d98a16caa8f92cc8ff5442ce0de2f", 0x56}], 0x2, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x400006, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) syz_mount_image$ext4(&(0x7f0000000440)='ext2\x00', &(0x7f0000001780)='./file0\x00', 0x0, 0x2, &(0x7f0000000540)=[{&(0x7f00000017c0), 0x0, 0x7ff}, {&(0x7f00000004c0), 0x0, 0x3}], 0x20, &(0x7f0000002780)=ANY=[@ANYBLOB='prjquota,fowner>', @ANYBLOB="2c736d61636b6673646566db"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f0000000480)) socket$nl_generic(0x10, 0x3, 0x10) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001740)='/dev/ubi_ctrl\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000001680)={0x0, @in6={{0xa, 0x4e22, 0x0, @rand_addr="753900737f2708d40abf862e7985f23f"}}, 0x3f}, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x400000, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f00000005c0)={0x0, 0x8, 0xfffffffffffffffc, 0xffffffffffffff80}) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, &(0x7f0000000840)={0x0, 0x200, 0xd6, "938c92658c43114e49cdcfe723cf36b9279c5599dfde9f9f6be1b9b2565ed600beda58fd474e4c30d16ddfc9eb0b08f81911b982c0d63ab698eb68de05afbc5b3ba01edc1192a88ea78ae8cc46b6d80795bbae465b534ceb331eee93b24fbcf9c2b99d7ad9ed08046692906b8fda5b369044c8d155ff7c7b0c3ba4884e4c9d042ffb7c49be17ccc0af357a71b1ce9da26c264e46641a375379c7746b2fd382eab950273f87a89dbedb15b4883d77bfc054466ea988ebeda7d9d5923dcafb5f6cc5b18a398f0fbae3d16defdaed908978ef5fe752f818"}, 0xde) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000200)={0x5, 0x800c}, &(0x7f0000000340)=0x10) 02:38:58 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@nat={'nat\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x19, 0x2, 0x2e0, [0x20000740, 0x0, 0x0, 0x20000770, 0x200009f0], 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"]}, 0x358) 02:38:58 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, &(0x7f0000000080), 0x0}, 0x18) 02:38:58 executing program 1: prctl$PR_SET_SECCOMP(0x1e, 0x0, 0x0) 02:38:58 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$iso9660(&(0x7f0000000040)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 02:38:58 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)="390000001300091668fe07feffffff000018ff3f2800000045000107000100141900020007000a00550e69330f4de502000080000000000000", 0x39}], 0x1) 02:38:59 executing program 1: prctl$PR_SET_SECCOMP(0x1e, 0x0, 0x0) 02:38:59 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, &(0x7f0000000080), 0x0}, 0x18) 02:38:59 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@nat={'nat\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x19, 0x2, 0x2e0, [0x20000740, 0x0, 0x0, 0x20000770, 0x200009f0], 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="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"]}, 0x358) 02:38:59 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)="390000001300091668fe07feffffff000018ff3f2800000045000107000100141900020007000a00550e69330f4de502000080000000000000", 0x39}], 0x1) 02:38:59 executing program 1: prctl$PR_SET_SECCOMP(0x1e, 0x0, 0x0) [ 327.693420][T20620] overlayfs: workdir and upperdir must reside under the same mount 02:38:59 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000400)='./file1\x00', 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, &(0x7f0000000600)={0x0, @in={{0x2, 0x4e20, @empty}}, 0x5, 0xffffffffffffffc8}, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000300)={0x0, 0xa71, 0x81, 0xfffffffffffffff7, 0x100000000, 0x5}, 0x14) vmsplice(0xffffffffffffffff, &(0x7f0000000580)=[{&(0x7f0000002800)="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", 0xf7f}, {&(0x7f00000007c0)="ea39baeaef2ed624a994f965a8064293c9e00f4fabd6f84fe1f6be4779a93b499a30d94c389dd75a29703a482398c6d735a61aced2a6f0d03b4d28b0525f9139baa99281adfad20d98a16caa8f92cc8ff5442ce0de2f", 0x56}], 0x2, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x400006, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) syz_mount_image$ext4(&(0x7f0000000440)='ext2\x00', &(0x7f0000001780)='./file0\x00', 0x0, 0x2, &(0x7f0000000540)=[{&(0x7f00000017c0), 0x0, 0x7ff}, {&(0x7f00000004c0), 0x0, 0x3}], 0x20, &(0x7f0000002780)=ANY=[@ANYBLOB='prjquota,fowner>', @ANYBLOB="2c736d61636b6673646566db"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f0000000480)) socket$nl_generic(0x10, 0x3, 0x10) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001740)='/dev/ubi_ctrl\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000001680)={0x0, @in6={{0xa, 0x4e22, 0x0, @rand_addr="753900737f2708d40abf862e7985f23f"}}, 0x3f}, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x400000, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f00000005c0)={0x0, 0x8, 0xfffffffffffffffc, 0xffffffffffffff80}) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, &(0x7f0000000840)={0x0, 0x200, 0xd6, "938c92658c43114e49cdcfe723cf36b9279c5599dfde9f9f6be1b9b2565ed600beda58fd474e4c30d16ddfc9eb0b08f81911b982c0d63ab698eb68de05afbc5b3ba01edc1192a88ea78ae8cc46b6d80795bbae465b534ceb331eee93b24fbcf9c2b99d7ad9ed08046692906b8fda5b369044c8d155ff7c7b0c3ba4884e4c9d042ffb7c49be17ccc0af357a71b1ce9da26c264e46641a375379c7746b2fd382eab950273f87a89dbedb15b4883d77bfc054466ea988ebeda7d9d5923dcafb5f6cc5b18a398f0fbae3d16defdaed908978ef5fe752f818"}, 0xde) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000200)={0x5, 0x800c}, &(0x7f0000000340)=0x10) 02:38:59 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)="390000001300091668fe07feffffff000018ff3f2800000045000107000100141900020007000a00550e69330f4de502000080000000000000", 0x39}], 0x1) 02:38:59 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@nat={'nat\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x19, 0x2, 0x2e0, [0x20000740, 0x0, 0x0, 0x20000770, 0x200009f0], 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff00ff000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff020000000900000040000000803574756e6c3000000000000000000000006c6170623000000000000000000000007465616d30000000000000000000000000000000000000000000000000000000ffffffffffffffffffff00ffffffeeffffffffff00ffffff0000d0000000d00000000801000061727000000000000000000000000000000000000000000000000000000000003800000000000000033f0600000a000000000004000000ffac14141a000000ff0180c200000e0000ffffffffaaaaaaaaaaaaff00ffffff00a001000000000000736e6174000000000000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaaaa0000ffffffff000000000500000061000000000069706464703000000000000000000000687372300000000000000000000000006c6f000000000000000000000000000076657468305f746f5f6272696467650000000000000000ff00ffffffffffffffffffffe7ffff00000000a00000001001000048010000706b747479706500000000000000000000000000000000000000000000000000080000000000000007010000000000006172707265706c790000000000f2ffffff0000000000000000000000000000001000000000000000ffffffffffff0000ffffffff000000006172707265706c79ded522f742294e7f000000000000000000000000000000001000000000000000aaaaaaaaaabb0000fcffffff00000000736e6174000000000000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaabb0000fdffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000002000000ffffffff00000000"]}, 0x358) 02:38:59 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, &(0x7f0000000080), 0x0}, 0x18) 02:38:59 executing program 1: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x28, 0x4) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000469ffc)=0x7fe, 0x4) [ 328.366777][T20632] ISOFS: Unable to identify CD-ROM format. 02:38:59 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$iso9660(&(0x7f0000000040)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 02:38:59 executing program 0: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000000c0)) ioctl$UFFDIO_REGISTER(r0, 0x8010aa02, &(0x7f0000000000)={{&(0x7f000080c000/0x4000)=nil, 0x300}}) 02:38:59 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_emit_ethernet(0x36, &(0x7f00000001c0)={@local, @random="ba4b976fff68", [], {@ipv4={0x800, {{0x9, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x3a, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xffffff86, 0x9}}}}}, 0x0) 02:38:59 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, &(0x7f0000000080), 0x0}, 0x18) 02:38:59 executing program 1: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x28, 0x4) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000469ffc)=0x7fe, 0x4) 02:38:59 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000400)='./file1\x00', 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000380)) openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, &(0x7f0000000600)={0x0, @in={{0x2, 0x4e20, @empty}}, 0x5, 0xffffffffffffffc8}, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000300)={0x0, 0xa71, 0x81, 0xfffffffffffffff7, 0x100000000, 0x5}, 0x14) vmsplice(0xffffffffffffffff, &(0x7f0000000580)=[{&(0x7f0000002800)="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", 0xf7f}, {&(0x7f00000007c0)="ea39baeaef2ed624a994f965a8064293c9e00f4fabd6f84fe1f6be4779a93b499a30d94c389dd75a29703a482398c6d735a61aced2a6f0d03b4d28b0525f9139baa99281adfad20d98a16caa8f92cc8ff5442ce0de2f", 0x56}], 0x2, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x400006, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) syz_mount_image$ext4(&(0x7f0000000440)='ext2\x00', &(0x7f0000001780)='./file0\x00', 0x0, 0x2, &(0x7f0000000540)=[{&(0x7f00000017c0), 0x0, 0x7ff}, {&(0x7f00000004c0), 0x0, 0x3}], 0x20, &(0x7f0000002780)=ANY=[@ANYBLOB='prjquota,fowner>', @ANYBLOB="2c736d61636b6673646566db"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, &(0x7f0000000480)) socket$nl_generic(0x10, 0x3, 0x10) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001740)='/dev/ubi_ctrl\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000001680)={0x0, @in6={{0xa, 0x4e22, 0x0, @rand_addr="753900737f2708d40abf862e7985f23f"}}, 0x3f}, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x400000, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f00000005c0)={0x0, 0x8, 0xfffffffffffffffc, 0xffffffffffffff80}) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, &(0x7f0000000840)={0x0, 0x200, 0xd6, "938c92658c43114e49cdcfe723cf36b9279c5599dfde9f9f6be1b9b2565ed600beda58fd474e4c30d16ddfc9eb0b08f81911b982c0d63ab698eb68de05afbc5b3ba01edc1192a88ea78ae8cc46b6d80795bbae465b534ceb331eee93b24fbcf9c2b99d7ad9ed08046692906b8fda5b369044c8d155ff7c7b0c3ba4884e4c9d042ffb7c49be17ccc0af357a71b1ce9da26c264e46641a375379c7746b2fd382eab950273f87a89dbedb15b4883d77bfc054466ea988ebeda7d9d5923dcafb5f6cc5b18a398f0fbae3d16defdaed908978ef5fe752f818"}, 0xde) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000200)={0x5, 0x800c}, &(0x7f0000000340)=0x10) 02:38:59 executing program 5: r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xa, 0x40000) r1 = syz_open_dev$dspn(0x0, 0x3, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, 0x0, 0x4008014) eventfd2(0x5d, 0x80000) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000340)) r2 = fcntl$dupfd(0xffffffffffffffff, 0x402, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000280), 0x4) r3 = semget$private(0x0, 0x3, 0x0) semctl$IPC_RMID(r3, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0xf, 0x0, &(0x7f0000000080)) ioctl$FICLONERANGE(r0, 0x4020940d, 0x0) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(0xffffffffffffffff, 0x111, 0x2, 0x0, 0x4) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000002680)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008aec1, 0x0) getpgid(0x0) socket$inet6(0xa, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000180)=0x2, 0x4) fcntl$setown(r6, 0x8, 0x0) r7 = creat(0x0, 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@empty, @in=@empty}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f0000000140)=0xe8) syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) 02:39:00 executing program 0: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000000c0)) ioctl$UFFDIO_REGISTER(r0, 0x8010aa02, &(0x7f0000000000)={{&(0x7f000080c000/0x4000)=nil, 0x300}}) 02:39:00 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_emit_ethernet(0x36, &(0x7f00000001c0)={@local, @random="ba4b976fff68", [], {@ipv4={0x800, {{0x9, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x3a, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xffffff86, 0x9}}}}}, 0x0) 02:39:00 executing program 1: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x28, 0x4) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000469ffc)=0x7fe, 0x4) 02:39:00 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_emit_ethernet(0x36, &(0x7f00000001c0)={@local, @random="ba4b976fff68", [], {@ipv4={0x800, {{0x9, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x3a, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xffffff86, 0x9}}}}}, 0x0) 02:39:00 executing program 1: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x28, 0x4) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000469ffc)=0x7fe, 0x4) [ 329.315794][T20685] ISOFS: Unable to identify CD-ROM format. 02:39:00 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$iso9660(&(0x7f0000000040)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 02:39:00 executing program 0: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000000c0)) ioctl$UFFDIO_REGISTER(r0, 0x8010aa02, &(0x7f0000000000)={{&(0x7f000080c000/0x4000)=nil, 0x300}}) 02:39:00 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") syz_emit_ethernet(0x36, &(0x7f00000001c0)={@local, @random="ba4b976fff68", [], {@ipv4={0x800, {{0x9, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x3a, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xffffff86, 0x9}}}}}, 0x0) 02:39:00 executing program 5: r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xa, 0x40000) r1 = syz_open_dev$dspn(0x0, 0x3, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, 0x0, 0x4008014) eventfd2(0x5d, 0x80000) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000340)) r2 = fcntl$dupfd(0xffffffffffffffff, 0x402, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000280), 0x4) r3 = semget$private(0x0, 0x3, 0x0) semctl$IPC_RMID(r3, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0xf, 0x0, &(0x7f0000000080)) ioctl$FICLONERANGE(r0, 0x4020940d, 0x0) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(0xffffffffffffffff, 0x111, 0x2, 0x0, 0x4) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000002680)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008aec1, 0x0) getpgid(0x0) socket$inet6(0xa, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000180)=0x2, 0x4) fcntl$setown(r6, 0x8, 0x0) r7 = creat(0x0, 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@empty, @in=@empty}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f0000000140)=0xe8) syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) 02:39:00 executing program 1: r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xa, 0x40000) r1 = syz_open_dev$dspn(0x0, 0x3, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, 0x0, 0x4008014) eventfd2(0x5d, 0x80000) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000340)) r2 = fcntl$dupfd(0xffffffffffffffff, 0x402, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000280), 0x4) r3 = semget$private(0x0, 0x3, 0x0) semctl$IPC_RMID(r3, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0xf, 0x0, &(0x7f0000000080)) ioctl$FICLONERANGE(r0, 0x4020940d, 0x0) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(0xffffffffffffffff, 0x111, 0x2, 0x0, 0x4) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000002680)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008aec1, 0x0) getpgid(0x0) socket$inet6(0xa, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000180)=0x2, 0x4) fcntl$setown(r6, 0x8, 0x0) r7 = creat(0x0, 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@empty, @in=@empty}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f0000000140)=0xe8) syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) 02:39:00 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xa, 0x40000) r1 = syz_open_dev$dspn(0x0, 0x3, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, 0x0, 0x4008014) eventfd2(0x5d, 0x80000) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000340)) r2 = fcntl$dupfd(0xffffffffffffffff, 0x402, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000280), 0x4) r3 = semget$private(0x0, 0x3, 0x0) semctl$IPC_RMID(r3, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0xf, 0x0, &(0x7f0000000080)) ioctl$FICLONERANGE(r0, 0x4020940d, 0x0) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(0xffffffffffffffff, 0x111, 0x2, 0x0, 0x4) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000002680)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008aec1, 0x0) getpgid(0x0) socket$inet6(0xa, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000180)=0x2, 0x4) fcntl$setown(r6, 0x8, 0x0) r7 = creat(0x0, 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@empty, @in=@empty}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f0000000140)=0xe8) syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) 02:39:00 executing program 0: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000000c0)) ioctl$UFFDIO_REGISTER(r0, 0x8010aa02, &(0x7f0000000000)={{&(0x7f000080c000/0x4000)=nil, 0x300}}) 02:39:01 executing program 2: r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xa, 0x40000) r1 = syz_open_dev$dspn(0x0, 0x3, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, 0x0, 0x4008014) eventfd2(0x5d, 0x80000) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000340)) r2 = fcntl$dupfd(0xffffffffffffffff, 0x402, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000280), 0x4) r3 = semget$private(0x0, 0x3, 0x0) semctl$IPC_RMID(r3, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0xf, 0x0, &(0x7f0000000080)) ioctl$FICLONERANGE(r0, 0x4020940d, 0x0) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(0xffffffffffffffff, 0x111, 0x2, 0x0, 0x4) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000002680)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008aec1, 0x0) getpgid(0x0) socket$inet6(0xa, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000180)=0x2, 0x4) fcntl$setown(r6, 0x8, 0x0) r7 = creat(0x0, 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@empty, @in=@empty}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f0000000140)=0xe8) syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) 02:39:01 executing program 5: r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xa, 0x40000) r1 = syz_open_dev$dspn(0x0, 0x3, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, 0x0, 0x4008014) eventfd2(0x5d, 0x80000) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000340)) r2 = fcntl$dupfd(0xffffffffffffffff, 0x402, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000280), 0x4) r3 = semget$private(0x0, 0x3, 0x0) semctl$IPC_RMID(r3, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0xf, 0x0, &(0x7f0000000080)) ioctl$FICLONERANGE(r0, 0x4020940d, 0x0) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(0xffffffffffffffff, 0x111, 0x2, 0x0, 0x4) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000002680)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008aec1, 0x0) getpgid(0x0) socket$inet6(0xa, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000180)=0x2, 0x4) fcntl$setown(r6, 0x8, 0x0) r7 = creat(0x0, 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@empty, @in=@empty}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f0000000140)=0xe8) syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) 02:39:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="e1dca5055e0bcfec7be070") bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x61, 0x10, 0x4}, [@ldst={0x4}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) 02:39:01 executing program 1: r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xa, 0x40000) r1 = syz_open_dev$dspn(0x0, 0x3, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, 0x0, 0x4008014) eventfd2(0x5d, 0x80000) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000340)) r2 = fcntl$dupfd(0xffffffffffffffff, 0x402, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000280), 0x4) r3 = semget$private(0x0, 0x3, 0x0) semctl$IPC_RMID(r3, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0xf, 0x0, &(0x7f0000000080)) ioctl$FICLONERANGE(r0, 0x4020940d, 0x0) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(0xffffffffffffffff, 0x111, 0x2, 0x0, 0x4) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000002680)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008aec1, 0x0) getpgid(0x0) socket$inet6(0xa, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000180)=0x2, 0x4) fcntl$setown(r6, 0x8, 0x0) r7 = creat(0x0, 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@empty, @in=@empty}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f0000000140)=0xe8) syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) 02:39:01 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xa, 0x40000) r1 = syz_open_dev$dspn(0x0, 0x3, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, 0x0, 0x4008014) eventfd2(0x5d, 0x80000) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000340)) r2 = fcntl$dupfd(0xffffffffffffffff, 0x402, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000280), 0x4) r3 = semget$private(0x0, 0x3, 0x0) semctl$IPC_RMID(r3, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0xf, 0x0, &(0x7f0000000080)) ioctl$FICLONERANGE(r0, 0x4020940d, 0x0) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(0xffffffffffffffff, 0x111, 0x2, 0x0, 0x4) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000002680)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008aec1, 0x0) getpgid(0x0) socket$inet6(0xa, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000180)=0x2, 0x4) fcntl$setown(r6, 0x8, 0x0) r7 = creat(0x0, 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@empty, @in=@empty}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f0000000140)=0xe8) syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) [ 330.433029][T20734] ISOFS: Unable to identify CD-ROM format. 02:39:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="e1dca5055e0bcfec7be070") bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x61, 0x10, 0x4}, [@ldst={0x4}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) 02:39:01 executing program 2: r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xa, 0x40000) r1 = syz_open_dev$dspn(0x0, 0x3, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, 0x0, 0x4008014) eventfd2(0x5d, 0x80000) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000340)) r2 = fcntl$dupfd(0xffffffffffffffff, 0x402, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000280), 0x4) r3 = semget$private(0x0, 0x3, 0x0) semctl$IPC_RMID(r3, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0xf, 0x0, &(0x7f0000000080)) ioctl$FICLONERANGE(r0, 0x4020940d, 0x0) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(0xffffffffffffffff, 0x111, 0x2, 0x0, 0x4) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000002680)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008aec1, 0x0) getpgid(0x0) socket$inet6(0xa, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000180)=0x2, 0x4) fcntl$setown(r6, 0x8, 0x0) r7 = creat(0x0, 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@empty, @in=@empty}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f0000000140)=0xe8) syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) 02:39:01 executing program 5: r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xa, 0x40000) r1 = syz_open_dev$dspn(0x0, 0x3, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, 0x0, 0x4008014) eventfd2(0x5d, 0x80000) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000340)) r2 = fcntl$dupfd(0xffffffffffffffff, 0x402, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000280), 0x4) r3 = semget$private(0x0, 0x3, 0x0) semctl$IPC_RMID(r3, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0xf, 0x0, &(0x7f0000000080)) ioctl$FICLONERANGE(r0, 0x4020940d, 0x0) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(0xffffffffffffffff, 0x111, 0x2, 0x0, 0x4) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000002680)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008aec1, 0x0) getpgid(0x0) socket$inet6(0xa, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000180)=0x2, 0x4) fcntl$setown(r6, 0x8, 0x0) r7 = creat(0x0, 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@empty, @in=@empty}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f0000000140)=0xe8) syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) 02:39:01 executing program 4: mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) open(&(0x7f0000003e40)='./file0\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0xff00, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) 02:39:01 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xa, 0x40000) r1 = syz_open_dev$dspn(0x0, 0x3, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, 0x0, 0x4008014) eventfd2(0x5d, 0x80000) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000340)) r2 = fcntl$dupfd(0xffffffffffffffff, 0x402, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000280), 0x4) r3 = semget$private(0x0, 0x3, 0x0) semctl$IPC_RMID(r3, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0xf, 0x0, &(0x7f0000000080)) ioctl$FICLONERANGE(r0, 0x4020940d, 0x0) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(0xffffffffffffffff, 0x111, 0x2, 0x0, 0x4) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000002680)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008aec1, 0x0) getpgid(0x0) socket$inet6(0xa, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000180)=0x2, 0x4) fcntl$setown(r6, 0x8, 0x0) r7 = creat(0x0, 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@empty, @in=@empty}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f0000000140)=0xe8) syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) 02:39:02 executing program 1: r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xa, 0x40000) r1 = syz_open_dev$dspn(0x0, 0x3, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, 0x0, 0x4008014) eventfd2(0x5d, 0x80000) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000340)) r2 = fcntl$dupfd(0xffffffffffffffff, 0x402, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000280), 0x4) r3 = semget$private(0x0, 0x3, 0x0) semctl$IPC_RMID(r3, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0xf, 0x0, &(0x7f0000000080)) ioctl$FICLONERANGE(r0, 0x4020940d, 0x0) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(0xffffffffffffffff, 0x111, 0x2, 0x0, 0x4) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000002680)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008aec1, 0x0) getpgid(0x0) socket$inet6(0xa, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000180)=0x2, 0x4) fcntl$setown(r6, 0x8, 0x0) r7 = creat(0x0, 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@empty, @in=@empty}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f0000000140)=0xe8) syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) 02:39:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="e1dca5055e0bcfec7be070") bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x61, 0x10, 0x4}, [@ldst={0x4}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) 02:39:02 executing program 4: mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) open(&(0x7f0000003e40)='./file0\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0xff00, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) 02:39:02 executing program 2: r0 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xa, 0x40000) r1 = syz_open_dev$dspn(0x0, 0x3, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, 0x0, 0x4008014) eventfd2(0x5d, 0x80000) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000340)) r2 = fcntl$dupfd(0xffffffffffffffff, 0x402, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000280), 0x4) r3 = semget$private(0x0, 0x3, 0x0) semctl$IPC_RMID(r3, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0xf, 0x0, &(0x7f0000000080)) ioctl$FICLONERANGE(r0, 0x4020940d, 0x0) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(0xffffffffffffffff, 0x111, 0x2, 0x0, 0x4) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000002680)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008aec1, 0x0) getpgid(0x0) socket$inet6(0xa, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000180)=0x2, 0x4) fcntl$setown(r6, 0x8, 0x0) r7 = creat(0x0, 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000040)={{{@in6=@empty, @in=@empty}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f0000000140)=0xe8) syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) [ 330.902383][ C1] net_ratelimit: 24 callbacks suppressed [ 330.902391][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 330.913883][ C1] protocol 88fb is buggy, dev hsr_slave_1 02:39:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="e1dca5055e0bcfec7be070") bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x61, 0x10, 0x4}, [@ldst={0x4}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) 02:39:02 executing program 5: mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) open(&(0x7f0000003e40)='./file0\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0xff00, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) 02:39:02 executing program 4: mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) open(&(0x7f0000003e40)='./file0\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0xff00, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) 02:39:02 executing program 1: getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000640)=ANY=[@ANYBLOB="70000000b27edcc7c642439433b23b0a71018a25ca1970cb122e73301f05d711dc05143afe958d6db19eb1f72d74c61566905dc0fe5631790a9ed26c274b06eaab044219f8c54e8ac92ee10e781dc0364b101dc7d698ecbf0dcc0200000052265e0d4d2011a5da2917b2e36a16000000"], 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000380)={0x0, 0x7ff}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x4e21, 0xe, @initdev={0xfe, 0x88, [], 0x1, 0x0}}}, 0x0, 0x7, 0x80000000, 0x5, 0xa6}, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x400, 0x16480) ioctl$VIDIOC_ENUM_FRAMESIZES(0xffffffffffffffff, 0xc02c564a, &(0x7f0000000000)={0x3, 0x0, 0x2, @discrete={0x98b2, 0xffffffffffff022d}}) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e21, @multicast2}}}, 0x84) gettid() sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) mkdirat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x9) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 02:39:02 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) r2 = socket$xdp(0x2c, 0x3, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f00000000c0)=0x4, 0x1fe) setsockopt$XDP_UMEM_REG(r2, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x10000, 0x1000}, 0x12) setsockopt$XDP_UMEM_FILL_RING(r2, 0x11b, 0x5, &(0x7f0000000180)=0x8, 0x4) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f00000002c0)=0x80, 0x4) bind$xdp(r2, &(0x7f0000000300)={0x2c, 0x0, r1}, 0x10) 02:39:02 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0xc0ffffff, 0x2e}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xff67, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 02:39:02 executing program 5: mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) open(&(0x7f0000003e40)='./file0\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0xff00, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) 02:39:02 executing program 4: mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) open(&(0x7f0000003e40)='./file0\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0xff00, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) 02:39:02 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) r2 = socket$xdp(0x2c, 0x3, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f00000000c0)=0x4, 0x1fe) setsockopt$XDP_UMEM_REG(r2, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x10000, 0x1000}, 0x12) setsockopt$XDP_UMEM_FILL_RING(r2, 0x11b, 0x5, &(0x7f0000000180)=0x8, 0x4) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f00000002c0)=0x80, 0x4) bind$xdp(r2, &(0x7f0000000300)={0x2c, 0x0, r1}, 0x10) 02:39:02 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) r2 = socket$xdp(0x2c, 0x3, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f00000000c0)=0x4, 0x1fe) setsockopt$XDP_UMEM_REG(r2, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x10000, 0x1000}, 0x12) setsockopt$XDP_UMEM_FILL_RING(r2, 0x11b, 0x5, &(0x7f0000000180)=0x8, 0x4) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f00000002c0)=0x80, 0x4) bind$xdp(r2, &(0x7f0000000300)={0x2c, 0x0, r1}, 0x10) 02:39:02 executing program 5: mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) open(&(0x7f0000003e40)='./file0\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0xff00, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) 02:39:02 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0xc0ffffff, 0x2e}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xff67, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 02:39:02 executing program 1: getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000640)=ANY=[@ANYBLOB="70000000b27edcc7c642439433b23b0a71018a25ca1970cb122e73301f05d711dc05143afe958d6db19eb1f72d74c61566905dc0fe5631790a9ed26c274b06eaab044219f8c54e8ac92ee10e781dc0364b101dc7d698ecbf0dcc0200000052265e0d4d2011a5da2917b2e36a16000000"], 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000380)={0x0, 0x7ff}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x4e21, 0xe, @initdev={0xfe, 0x88, [], 0x1, 0x0}}}, 0x0, 0x7, 0x80000000, 0x5, 0xa6}, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x400, 0x16480) ioctl$VIDIOC_ENUM_FRAMESIZES(0xffffffffffffffff, 0xc02c564a, &(0x7f0000000000)={0x3, 0x0, 0x2, @discrete={0x98b2, 0xffffffffffff022d}}) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e21, @multicast2}}}, 0x84) gettid() sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) mkdirat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x9) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 02:39:03 executing program 4: getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000640)=ANY=[@ANYBLOB="70000000b27edcc7c642439433b23b0a71018a25ca1970cb122e73301f05d711dc05143afe958d6db19eb1f72d74c61566905dc0fe5631790a9ed26c274b06eaab044219f8c54e8ac92ee10e781dc0364b101dc7d698ecbf0dcc0200000052265e0d4d2011a5da2917b2e36a16000000"], 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000380)={0x0, 0x7ff}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x4e21, 0xe, @initdev={0xfe, 0x88, [], 0x1, 0x0}}}, 0x0, 0x7, 0x80000000, 0x5, 0xa6}, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x400, 0x16480) ioctl$VIDIOC_ENUM_FRAMESIZES(0xffffffffffffffff, 0xc02c564a, &(0x7f0000000000)={0x3, 0x0, 0x2, @discrete={0x98b2, 0xffffffffffff022d}}) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e21, @multicast2}}}, 0x84) gettid() sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) mkdirat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x9) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 02:39:03 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) r2 = socket$xdp(0x2c, 0x3, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f00000000c0)=0x4, 0x1fe) setsockopt$XDP_UMEM_REG(r2, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x10000, 0x1000}, 0x12) setsockopt$XDP_UMEM_FILL_RING(r2, 0x11b, 0x5, &(0x7f0000000180)=0x8, 0x4) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f00000002c0)=0x80, 0x4) bind$xdp(r2, &(0x7f0000000300)={0x2c, 0x0, r1}, 0x10) 02:39:03 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) r2 = socket$xdp(0x2c, 0x3, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f00000000c0)=0x4, 0x1fe) setsockopt$XDP_UMEM_REG(r2, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x10000, 0x1000}, 0x12) setsockopt$XDP_UMEM_FILL_RING(r2, 0x11b, 0x5, &(0x7f0000000180)=0x8, 0x4) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f00000002c0)=0x80, 0x4) bind$xdp(r2, &(0x7f0000000300)={0x2c, 0x0, r1}, 0x10) 02:39:03 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0xc0ffffff, 0x2e}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xff67, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 02:39:03 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) r2 = socket$xdp(0x2c, 0x3, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f00000000c0)=0x4, 0x1fe) setsockopt$XDP_UMEM_REG(r2, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x10000, 0x1000}, 0x12) setsockopt$XDP_UMEM_FILL_RING(r2, 0x11b, 0x5, &(0x7f0000000180)=0x8, 0x4) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f00000002c0)=0x80, 0x4) bind$xdp(r2, &(0x7f0000000300)={0x2c, 0x0, r1}, 0x10) 02:39:03 executing program 1: getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000640)=ANY=[@ANYBLOB="70000000b27edcc7c642439433b23b0a71018a25ca1970cb122e73301f05d711dc05143afe958d6db19eb1f72d74c61566905dc0fe5631790a9ed26c274b06eaab044219f8c54e8ac92ee10e781dc0364b101dc7d698ecbf0dcc0200000052265e0d4d2011a5da2917b2e36a16000000"], 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000380)={0x0, 0x7ff}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x4e21, 0xe, @initdev={0xfe, 0x88, [], 0x1, 0x0}}}, 0x0, 0x7, 0x80000000, 0x5, 0xa6}, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x400, 0x16480) ioctl$VIDIOC_ENUM_FRAMESIZES(0xffffffffffffffff, 0xc02c564a, &(0x7f0000000000)={0x3, 0x0, 0x2, @discrete={0x98b2, 0xffffffffffff022d}}) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e21, @multicast2}}}, 0x84) gettid() sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) mkdirat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x9) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 02:39:03 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) r2 = socket$xdp(0x2c, 0x3, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f00000000c0)=0x4, 0x1fe) setsockopt$XDP_UMEM_REG(r2, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x10000, 0x1000}, 0x12) setsockopt$XDP_UMEM_FILL_RING(r2, 0x11b, 0x5, &(0x7f0000000180)=0x8, 0x4) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f00000002c0)=0x80, 0x4) bind$xdp(r2, &(0x7f0000000300)={0x2c, 0x0, r1}, 0x10) 02:39:03 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0xc0ffffff, 0x2e}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xff67, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [0xb0ffffff], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 02:39:03 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) r2 = socket$xdp(0x2c, 0x3, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f00000000c0)=0x4, 0x1fe) setsockopt$XDP_UMEM_REG(r2, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x10000, 0x1000}, 0x12) setsockopt$XDP_UMEM_FILL_RING(r2, 0x11b, 0x5, &(0x7f0000000180)=0x8, 0x4) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f00000002c0)=0x80, 0x4) bind$xdp(r2, &(0x7f0000000300)={0x2c, 0x0, r1}, 0x10) 02:39:03 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) r2 = socket$xdp(0x2c, 0x3, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f00000000c0)=0x4, 0x1fe) setsockopt$XDP_UMEM_REG(r2, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x10000, 0x1000}, 0x12) setsockopt$XDP_UMEM_FILL_RING(r2, 0x11b, 0x5, &(0x7f0000000180)=0x8, 0x4) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f00000002c0)=0x80, 0x4) bind$xdp(r2, &(0x7f0000000300)={0x2c, 0x0, r1}, 0x10) [ 332.022369][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 332.028267][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 332.034146][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 332.039942][ C0] protocol 88fb is buggy, dev hsr_slave_1 02:39:03 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x108, 0x4, 0x400, 0x0, 0x1}, 0x3c) socket$rxrpc(0x21, 0x2, 0xa) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x4) connect$inet6(r1, &(0x7f0000000140), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r0, &(0x7f00000002c0), 0x0}, 0x18) 02:39:03 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)="2e00000029008151e01080ecdb4cb904014865161a000400050005000089a108b555e75486cd5edc2976d153b4b6", 0x2e}], 0x1}, 0x0) 02:39:03 executing program 4: getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000640)=ANY=[@ANYBLOB="70000000b27edcc7c642439433b23b0a71018a25ca1970cb122e73301f05d711dc05143afe958d6db19eb1f72d74c61566905dc0fe5631790a9ed26c274b06eaab044219f8c54e8ac92ee10e781dc0364b101dc7d698ecbf0dcc0200000052265e0d4d2011a5da2917b2e36a16000000"], 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000380)={0x0, 0x7ff}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x4e21, 0xe, @initdev={0xfe, 0x88, [], 0x1, 0x0}}}, 0x0, 0x7, 0x80000000, 0x5, 0xa6}, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x400, 0x16480) ioctl$VIDIOC_ENUM_FRAMESIZES(0xffffffffffffffff, 0xc02c564a, &(0x7f0000000000)={0x3, 0x0, 0x2, @discrete={0x98b2, 0xffffffffffff022d}}) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e21, @multicast2}}}, 0x84) gettid() sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) mkdirat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x9) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 02:39:03 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000200)={'vcan0\x00', 0x0}) r2 = socket$xdp(0x2c, 0x3, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f00000000c0)=0x4, 0x1fe) setsockopt$XDP_UMEM_REG(r2, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x10000, 0x1000}, 0x12) setsockopt$XDP_UMEM_FILL_RING(r2, 0x11b, 0x5, &(0x7f0000000180)=0x8, 0x4) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f00000002c0)=0x80, 0x4) bind$xdp(r2, &(0x7f0000000300)={0x2c, 0x0, r1}, 0x10) [ 332.256389][T20929] netlink: 'syz-executor.2': attribute type 4 has an invalid length. 02:39:03 executing program 3: r0 = io_uring_setup(0x118, &(0x7f0000000080)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x2012, r0, 0x0) 02:39:03 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x108, 0x4, 0x400, 0x0, 0x1}, 0x3c) socket$rxrpc(0x21, 0x2, 0xa) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x4) connect$inet6(r1, &(0x7f0000000140), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r0, &(0x7f00000002c0), 0x0}, 0x18) 02:39:03 executing program 1: getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000640)=ANY=[@ANYBLOB="70000000b27edcc7c642439433b23b0a71018a25ca1970cb122e73301f05d711dc05143afe958d6db19eb1f72d74c61566905dc0fe5631790a9ed26c274b06eaab044219f8c54e8ac92ee10e781dc0364b101dc7d698ecbf0dcc0200000052265e0d4d2011a5da2917b2e36a16000000"], 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000380)={0x0, 0x7ff}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x4e21, 0xe, @initdev={0xfe, 0x88, [], 0x1, 0x0}}}, 0x0, 0x7, 0x80000000, 0x5, 0xa6}, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x400, 0x16480) ioctl$VIDIOC_ENUM_FRAMESIZES(0xffffffffffffffff, 0xc02c564a, &(0x7f0000000000)={0x3, 0x0, 0x2, @discrete={0x98b2, 0xffffffffffff022d}}) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e21, @multicast2}}}, 0x84) gettid() sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) mkdirat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x9) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 02:39:03 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)="2e00000029008151e01080ecdb4cb904014865161a000400050005000089a108b555e75486cd5edc2976d153b4b6", 0x2e}], 0x1}, 0x0) [ 332.352367][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 332.358183][ C0] protocol 88fb is buggy, dev hsr_slave_1 02:39:03 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x108, 0x4, 0x400, 0x0, 0x1}, 0x3c) socket$rxrpc(0x21, 0x2, 0xa) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x4) connect$inet6(r1, &(0x7f0000000140), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r0, &(0x7f00000002c0), 0x0}, 0x18) [ 332.424123][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 332.429969][ C0] protocol 88fb is buggy, dev hsr_slave_1 02:39:04 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x108, 0x4, 0x400, 0x0, 0x1}, 0x3c) socket$rxrpc(0x21, 0x2, 0xa) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x4) connect$inet6(r1, &(0x7f0000000140), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r0, &(0x7f00000002c0), 0x0}, 0x18) 02:39:04 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)="2e00000029008151e01080ecdb4cb904014865161a000400050005000089a108b555e75486cd5edc2976d153b4b6", 0x2e}], 0x1}, 0x0) 02:39:04 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x108, 0x4, 0x400, 0x0, 0x1}, 0x3c) socket$rxrpc(0x21, 0x2, 0xa) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x4) connect$inet6(r1, &(0x7f0000000140), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r0, &(0x7f00000002c0), 0x0}, 0x18) 02:39:04 executing program 3: r0 = io_uring_setup(0x118, &(0x7f0000000080)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x2012, r0, 0x0) 02:39:04 executing program 4: getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000640)=ANY=[@ANYBLOB="70000000b27edcc7c642439433b23b0a71018a25ca1970cb122e73301f05d711dc05143afe958d6db19eb1f72d74c61566905dc0fe5631790a9ed26c274b06eaab044219f8c54e8ac92ee10e781dc0364b101dc7d698ecbf0dcc0200000052265e0d4d2011a5da2917b2e36a16000000"], 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000380)={0x0, 0x7ff}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000940)={0x0, @in6={{0xa, 0x4e21, 0xe, @initdev={0xfe, 0x88, [], 0x1, 0x0}}}, 0x0, 0x7, 0x80000000, 0x5, 0xa6}, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x400, 0x16480) ioctl$VIDIOC_ENUM_FRAMESIZES(0xffffffffffffffff, 0xc02c564a, &(0x7f0000000000)={0x3, 0x0, 0x2, @discrete={0x98b2, 0xffffffffffff022d}}) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e21, @multicast2}}}, 0x84) gettid() sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) mkdirat(0xffffffffffffffff, &(0x7f00000002c0)='./file1\x00', 0x9) open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) clone(0x4007fc, 0x0, 0xfffffffffffffffe, &(0x7f0000000280), 0xffffffffffffffff) execve(&(0x7f0000000440)='./file0\x00', &(0x7f00000006c0)=[&(0x7f0000000580)='wlan1\x00', &(0x7f0000000600)='security.capability\x00'], &(0x7f0000000780)=[&(0x7f0000000700)='proc\x00', &(0x7f0000000740)='!\x00']) 02:39:04 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x108, 0x4, 0x400, 0x0, 0x1}, 0x3c) socket$rxrpc(0x21, 0x2, 0xa) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x4) connect$inet6(r1, &(0x7f0000000140), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r0, &(0x7f00000002c0), 0x0}, 0x18) 02:39:04 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x108, 0x4, 0x400, 0x0, 0x1}, 0x3c) socket$rxrpc(0x21, 0x2, 0xa) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x4) connect$inet6(r1, &(0x7f0000000140), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r0, &(0x7f00000002c0), 0x0}, 0x18) [ 332.757518][T20966] netlink: 'syz-executor.2': attribute type 4 has an invalid length. 02:39:04 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x7b, &(0x7f0000000100)={0x0, 0xffe0}, 0x8) 02:39:04 executing program 3: r0 = io_uring_setup(0x118, &(0x7f0000000080)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x2012, r0, 0x0) 02:39:04 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)="2e00000029008151e01080ecdb4cb904014865161a000400050005000089a108b555e75486cd5edc2976d153b4b6", 0x2e}], 0x1}, 0x0) 02:39:04 executing program 4: r0 = socket(0xa, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'sit0\x00', &(0x7f0000000000)=@ethtool_gstrings={0x19, 0x5}}) 02:39:04 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x7e}, 0x2c) r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x60, &(0x7f0000000000)={'security\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8d\xa2\x00', 0x6}, 0x28) 02:39:04 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x7b, &(0x7f0000000100)={0x0, 0xffe0}, 0x8) 02:39:04 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x80}, 0x14) 02:39:04 executing program 3: r0 = io_uring_setup(0x118, &(0x7f0000000080)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x2012, r0, 0x0) 02:39:04 executing program 4: r0 = socket(0xa, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'sit0\x00', &(0x7f0000000000)=@ethtool_gstrings={0x19, 0x5}}) [ 333.129286][T20993] netlink: 'syz-executor.2': attribute type 4 has an invalid length. 02:39:04 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x80}, 0x14) 02:39:04 executing program 2: r0 = socket(0x200000000000011, 0x80000000000003, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'ip6_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f000000a680)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f00000068c0)=[{&(0x7f000000b7c0)="448f8896fccb4e370b26f6a711f2c145c14d773266d5843693d5a32bb36a4e5f82d1afc3dea78113d8e70ab686ecb414a92e923457f06b9ec2ce039ab26351ff72fbe0a1ce2357248e21c579d84fe8c065dc7a28baa6d617fbdc294c30ad0a73b177bfcc216ec7b5d9dfb1ea1a537f68cde8fcc3b9f4468dde2f59e6c4091d3d27ce86ece82d84e52994167ecba30d85be03379d4fe5b898bf91c1ac1f61b9ec4176d87867be999e3d40052a08b5a75057323395a1a776dbff2b48f4fb7d3a3c5cfc428870548fc99f9168e6c02b42f8ae38b61aeac1b2f6cba0e0158d9b64402c9b54b18dc973548a2daf640eb5ea7d267cbe91da77a1c53853d51b0bec5e1a5fb6daf1e45c0d975649bd8ed759122abad60cb45f1a01cb54be62e52291b0c1fb367d6e1fd79e5f319dc43955dbfa931da8debf0ee7a411250f5bc7566d5a19d62072cfbabb9328d944c7d4b05871d2b209739c15212a36224fa3da1d612621c0e1460485142f9dcacc2da4827db9d05f4734fa19fa889fc629af424c4f6c3e1b834ca6bd080dfad6aa3c468c3032298fbb895179e303840d60298656cb3db6d6fe83c3c5e9dc934a9a9bbd1c56280704539a61b5d386c9ec2317fe21b47d34d16fe57dddb6ea5d9766079f81e6a3bc1ecbe6e8622a46b7158cced3b471bee3451488764c78b0efe51a6af5ca7ed68dc4ded512b2778cad3b177ca64e7c31120cdcdc7a45d9794d51bd08c9229f86be89fe09c73d1fd70f61751f8152350d9334f956da3a954be4c8a0506933aee5dd07c67431abdf924a003032be55538be746706dd5fbe463863a81ba8a0b5f89fb821ec23808f0c1e73cec310e0f5748b5613b9f6f676359365c19f7b5ccdea6e76f3813acd90a4ac2726df7e10fd0dd3ca20e0a12a29a0d6187d0df362f0163156dadb8a49728a7cfc8da44efaade30a4246f5d5775d00792a5d3da02d63f8ca39350273d6a9b01d77073e7cb6b27c9da7ec31fbbcf7d8860a89d0e3152a01c4a1cce329f722443c88df04ccca99e24ca8ba4b8ce16e60f6f4c2b0a9977c1f77ce67db2d75b04116f81a7c68a57846b18039d573cd14c16c9ee4041845cf5cc894540717e21bbb5787899b203475ddce2bbcc86791ccce877a1c95bdfac942dbcccea13419bec8b1785a8b6dd0498ef12795c7801fb1f341d77af95407440d1b2640401484d9ca99bda0f9dc676697ae8b15d0fa79415881831fa7b09682182038b6eefff8a682eadf5beff19477ca0a21deca63384786a7b5f36a74dbc0964fae481ce19fa46ac3370e29835a38a1b3936e07d725f2b50811490aef5471bb0e2ad980b72799f0629e249adf763fc604c84da54ad529939cca39d18694925f72921b2be39b5571c4e8a58e05a80bede38cd6975efa87f1f1a72c936d9fcdbc8b38614f631b2196b1dd075b26165b578cd7b694078c137985c091c64e2e07f8b6f6c9dfe0c10581502ed053f6238d9299ef82bbd4f340b194dde803934e9ea1afbaea1b4e8a46284fd036f9d0f516b7772d154615fb94bdc7131f09e815cdb25b3f04e6e2a7987cd6f34f356e3bda552dd8e417e4721c6e9fa59e2d9c065fc2804e6ba254cc66c25e98d507ccd3e76b5b6fce1482995d64df74e452832c82c5aa769921e521217c26aac91f5fca048f0aa6a5257c9fd5dcde6b52a6ca3952d859d58f918866321128d6d459fbd4d8fd0121d4d0873d6d3d66343d9ff7ad50ae4cf8597862eb79c5bab3a9b7f273926619a382cc560d4c3b8a31f698e0f5ce4d44ce6860d0c17504fe7f4b7b8e0b72c7fed22e46c6b02b9ac11f0aa7788a0f1580b1ea2a7aa14c30f09d0f1e7d009aa5909328c59cd8a98b9bd9ffb3791035523466d2aca2f73", 0x535}], 0x1}}], 0x2, 0x0) 02:39:04 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x7b, &(0x7f0000000100)={0x0, 0xffe0}, 0x8) 02:39:04 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x7e}, 0x2c) r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x60, &(0x7f0000000000)={'security\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8d\xa2\x00', 0x6}, 0x28) 02:39:04 executing program 4: r0 = socket(0xa, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'sit0\x00', &(0x7f0000000000)=@ethtool_gstrings={0x19, 0x5}}) 02:39:04 executing program 3: r0 = memfd_create(&(0x7f0000000300)='security\xd2\xackeyring\x00', 0x4) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x805011, r0, 0x0) ftruncate(r0, 0x1000000) 02:39:04 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x80}, 0x14) 02:39:04 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x7b, &(0x7f0000000100)={0x0, 0xffe0}, 0x8) 02:39:04 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x7e}, 0x2c) r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x60, &(0x7f0000000000)={'security\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8d\xa2\x00', 0x6}, 0x28) 02:39:04 executing program 3: r0 = memfd_create(&(0x7f0000000300)='security\xd2\xackeyring\x00', 0x4) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x805011, r0, 0x0) ftruncate(r0, 0x1000000) 02:39:04 executing program 2: r0 = socket(0x200000000000011, 0x80000000000003, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'ip6_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f000000a680)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f00000068c0)=[{&(0x7f000000b7c0)="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", 0x535}], 0x1}}], 0x2, 0x0) 02:39:04 executing program 4: r0 = socket(0xa, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'sit0\x00', &(0x7f0000000000)=@ethtool_gstrings={0x19, 0x5}}) 02:39:05 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x80}, 0x14) 02:39:05 executing program 1: r0 = memfd_create(&(0x7f0000000300)='security\xd2\xackeyring\x00', 0x4) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x805011, r0, 0x0) ftruncate(r0, 0x1000000) 02:39:05 executing program 2: r0 = socket(0x200000000000011, 0x80000000000003, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'ip6_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f000000a680)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f00000068c0)=[{&(0x7f000000b7c0)="448f8896fccb4e370b26f6a711f2c145c14d773266d5843693d5a32bb36a4e5f82d1afc3dea78113d8e70ab686ecb414a92e923457f06b9ec2ce039ab26351ff72fbe0a1ce2357248e21c579d84fe8c065dc7a28baa6d617fbdc294c30ad0a73b177bfcc216ec7b5d9dfb1ea1a537f68cde8fcc3b9f4468dde2f59e6c4091d3d27ce86ece82d84e52994167ecba30d85be03379d4fe5b898bf91c1ac1f61b9ec4176d87867be999e3d40052a08b5a75057323395a1a776dbff2b48f4fb7d3a3c5cfc428870548fc99f9168e6c02b42f8ae38b61aeac1b2f6cba0e0158d9b64402c9b54b18dc973548a2daf640eb5ea7d267cbe91da77a1c53853d51b0bec5e1a5fb6daf1e45c0d975649bd8ed759122abad60cb45f1a01cb54be62e52291b0c1fb367d6e1fd79e5f319dc43955dbfa931da8debf0ee7a411250f5bc7566d5a19d62072cfbabb9328d944c7d4b05871d2b209739c15212a36224fa3da1d612621c0e1460485142f9dcacc2da4827db9d05f4734fa19fa889fc629af424c4f6c3e1b834ca6bd080dfad6aa3c468c3032298fbb895179e303840d60298656cb3db6d6fe83c3c5e9dc934a9a9bbd1c56280704539a61b5d386c9ec2317fe21b47d34d16fe57dddb6ea5d9766079f81e6a3bc1ecbe6e8622a46b7158cced3b471bee3451488764c78b0efe51a6af5ca7ed68dc4ded512b2778cad3b177ca64e7c31120cdcdc7a45d9794d51bd08c9229f86be89fe09c73d1fd70f61751f8152350d9334f956da3a954be4c8a0506933aee5dd07c67431abdf924a003032be55538be746706dd5fbe463863a81ba8a0b5f89fb821ec23808f0c1e73cec310e0f5748b5613b9f6f676359365c19f7b5ccdea6e76f3813acd90a4ac2726df7e10fd0dd3ca20e0a12a29a0d6187d0df362f0163156dadb8a49728a7cfc8da44efaade30a4246f5d5775d00792a5d3da02d63f8ca39350273d6a9b01d77073e7cb6b27c9da7ec31fbbcf7d8860a89d0e3152a01c4a1cce329f722443c88df04ccca99e24ca8ba4b8ce16e60f6f4c2b0a9977c1f77ce67db2d75b04116f81a7c68a57846b18039d573cd14c16c9ee4041845cf5cc894540717e21bbb5787899b203475ddce2bbcc86791ccce877a1c95bdfac942dbcccea13419bec8b1785a8b6dd0498ef12795c7801fb1f341d77af95407440d1b2640401484d9ca99bda0f9dc676697ae8b15d0fa79415881831fa7b09682182038b6eefff8a682eadf5beff19477ca0a21deca63384786a7b5f36a74dbc0964fae481ce19fa46ac3370e29835a38a1b3936e07d725f2b50811490aef5471bb0e2ad980b72799f0629e249adf763fc604c84da54ad529939cca39d18694925f72921b2be39b5571c4e8a58e05a80bede38cd6975efa87f1f1a72c936d9fcdbc8b38614f631b2196b1dd075b26165b578cd7b694078c137985c091c64e2e07f8b6f6c9dfe0c10581502ed053f6238d9299ef82bbd4f340b194dde803934e9ea1afbaea1b4e8a46284fd036f9d0f516b7772d154615fb94bdc7131f09e815cdb25b3f04e6e2a7987cd6f34f356e3bda552dd8e417e4721c6e9fa59e2d9c065fc2804e6ba254cc66c25e98d507ccd3e76b5b6fce1482995d64df74e452832c82c5aa769921e521217c26aac91f5fca048f0aa6a5257c9fd5dcde6b52a6ca3952d859d58f918866321128d6d459fbd4d8fd0121d4d0873d6d3d66343d9ff7ad50ae4cf8597862eb79c5bab3a9b7f273926619a382cc560d4c3b8a31f698e0f5ce4d44ce6860d0c17504fe7f4b7b8e0b72c7fed22e46c6b02b9ac11f0aa7788a0f1580b1ea2a7aa14c30f09d0f1e7d009aa5909328c59cd8a98b9bd9ffb3791035523466d2aca2f73", 0x535}], 0x1}}], 0x2, 0x0) 02:39:05 executing program 4: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000000c0)=0x8) r1 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) ftruncate(r1, 0x8007ffc) write$cgroup_type(r0, &(0x7f0000000240)='threaded\x00', 0xf96d) fallocate(r0, 0x3, 0x2c000, 0x8000fff5) 02:39:05 executing program 3: r0 = memfd_create(&(0x7f0000000300)='security\xd2\xackeyring\x00', 0x4) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x805011, r0, 0x0) ftruncate(r0, 0x1000000) 02:39:05 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x7e}, 0x2c) r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x60, &(0x7f0000000000)={'security\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8d\xa2\x00', 0x6}, 0x28) 02:39:05 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e0000002f008163e400000000000000050f0000000000bc4cc91b4dd65b2f0d80c37023072a556d1c958c000000", 0x2e}], 0x1}, 0x0) 02:39:05 executing program 0: add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000140)="0100000001000000000000000041fc8cd97893961adc2d60", 0x18, 0xfffffffffffffffe) 02:39:05 executing program 1: r0 = memfd_create(&(0x7f0000000300)='security\xd2\xackeyring\x00', 0x4) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x805011, r0, 0x0) ftruncate(r0, 0x1000000) 02:39:05 executing program 3: r0 = memfd_create(&(0x7f0000000300)='security\xd2\xackeyring\x00', 0x4) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x805011, r0, 0x0) ftruncate(r0, 0x1000000) 02:39:05 executing program 2: r0 = socket(0x200000000000011, 0x80000000000003, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'ip6_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000100)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r0, &(0x7f000000a680)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f00000068c0)=[{&(0x7f000000b7c0)="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", 0x535}], 0x1}}], 0x2, 0x0) 02:39:05 executing program 4: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000000c0)=0x8) r1 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) ftruncate(r1, 0x8007ffc) write$cgroup_type(r0, &(0x7f0000000240)='threaded\x00', 0xf96d) fallocate(r0, 0x3, 0x2c000, 0x8000fff5) 02:39:05 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e0000002f008163e400000000000000050f0000000000bc4cc91b4dd65b2f0d80c37023072a556d1c958c000000", 0x2e}], 0x1}, 0x0) 02:39:05 executing program 0: add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000140)="0100000001000000000000000041fc8cd97893961adc2d60", 0x18, 0xfffffffffffffffe) 02:39:05 executing program 2: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000000c0)=0x8) r1 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) ftruncate(r1, 0x8007ffc) write$cgroup_type(r0, &(0x7f0000000240)='threaded\x00', 0xf96d) fallocate(r0, 0x3, 0x2c000, 0x8000fff5) 02:39:05 executing program 3: r0 = mq_open(&(0x7f0000000180)='g\b\xd4\x00\x05\x00 \x00', 0x42, 0x0, 0x0) mq_timedsend(r0, 0x0, 0x2000, 0x0, 0x0) 02:39:05 executing program 1: r0 = memfd_create(&(0x7f0000000300)='security\xd2\xackeyring\x00', 0x4) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x805011, r0, 0x0) ftruncate(r0, 0x1000000) 02:39:05 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e0000002f008163e400000000000000050f0000000000bc4cc91b4dd65b2f0d80c37023072a556d1c958c000000", 0x2e}], 0x1}, 0x0) 02:39:05 executing program 4: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000000c0)=0x8) r1 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) ftruncate(r1, 0x8007ffc) write$cgroup_type(r0, &(0x7f0000000240)='threaded\x00', 0xf96d) fallocate(r0, 0x3, 0x2c000, 0x8000fff5) 02:39:05 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e0000002f008163e400000000000000050f0000000000bc4cc91b4dd65b2f0d80c37023072a556d1c958c000000", 0x2e}], 0x1}, 0x0) 02:39:05 executing program 0: add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000140)="0100000001000000000000000041fc8cd97893961adc2d60", 0x18, 0xfffffffffffffffe) 02:39:05 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x4000001000008912, &(0x7f00000000c0)="11dca5055e0bcfec7be070") clock_gettime(0x0, &(0x7f0000000200)={0x0}) setitimer(0x1, &(0x7f0000000240)={{}, {r1}}, 0x0) setitimer(0x1, &(0x7f0000034000)={{}, {0x77359400}}, 0x0) 02:39:05 executing program 2: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000000c0)=0x8) r1 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) ftruncate(r1, 0x8007ffc) write$cgroup_type(r0, &(0x7f0000000240)='threaded\x00', 0xf96d) fallocate(r0, 0x3, 0x2c000, 0x8000fff5) 02:39:05 executing program 3: r0 = mq_open(&(0x7f0000000180)='g\b\xd4\x00\x05\x00 \x00', 0x42, 0x0, 0x0) mq_timedsend(r0, 0x0, 0x2000, 0x0, 0x0) 02:39:05 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000000040)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x68}}, &(0x7f0000000080)='GPL\x04\x9c5\x14\xbfw-\xa0z\xe8.vY\n6\xf6I>\xc1\xab\x91\xb3\x97\xe4*\xbf\x1e\xa6\xcd\x8c\xd7t\'\xfc\x9a\x9e+qe\xf5+A\a\xbf\bP\xd8\x99\xdcR\xd0\x13\x17]\xdb\x1b/F <*\x05\xb7\"\xe3>Uo\xb2\xe3\xf3\x9a<\xde\x1f\xcaSd\x037\xec\x95aF\xbd\xbf\xcb\x11Pp\x19V1\xde]!\xa5\xea\x9ec\x8c+\xdbx\xa5\x01\xcaKn\xa3\x13\xd8%h\xf98,,?o\xab\xa6\xb4\xeeTy;N\xd2m\xae>R\"P)\xbb*\xc0\x00\x7fwuL?#\xce\xda\x98\t\xb9\xa9hJ\x94\n\xbc\xaa\x8c\xfc\xc7\x13>\xc4\"\xe9\xc88\x881\x8dA\xe9\xa4\x93\xf0\x19_\xe2Y\x96Q\xb8\x95\x04\xf5\xdb\xa1F%\xce#f\xf3=\x95\xdb\xa9/\x86ry\xca\xbfJ\xce\xdd\xc8Z\x8a\xf7\xa0\xfah\xd7g\xceQ6\xb9\xd0\xd1\x96lI\x9c\xb6\xbf4\xc2\x7f\x00'/248}, 0x48) 02:39:05 executing program 0: add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000140)="0100000001000000000000000041fc8cd97893961adc2d60", 0x18, 0xfffffffffffffffe) 02:39:05 executing program 4: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000000c0)=0x8) r1 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) ftruncate(r1, 0x8007ffc) write$cgroup_type(r0, &(0x7f0000000240)='threaded\x00', 0xf96d) fallocate(r0, 0x3, 0x2c000, 0x8000fff5) 02:39:05 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x4000001000008912, &(0x7f00000000c0)="11dca5055e0bcfec7be070") clock_gettime(0x0, &(0x7f0000000200)={0x0}) setitimer(0x1, &(0x7f0000000240)={{}, {r1}}, 0x0) setitimer(0x1, &(0x7f0000034000)={{}, {0x77359400}}, 0x0) 02:39:06 executing program 2: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000000c0)=0x8) r1 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) ftruncate(r1, 0x8007ffc) write$cgroup_type(r0, &(0x7f0000000240)='threaded\x00', 0xf96d) fallocate(r0, 0x3, 0x2c000, 0x8000fff5) 02:39:06 executing program 3: r0 = mq_open(&(0x7f0000000180)='g\b\xd4\x00\x05\x00 \x00', 0x42, 0x0, 0x0) mq_timedsend(r0, 0x0, 0x2000, 0x0, 0x0) 02:39:06 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000000040)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x68}}, &(0x7f0000000080)='GPL\x04\x9c5\x14\xbfw-\xa0z\xe8.vY\n6\xf6I>\xc1\xab\x91\xb3\x97\xe4*\xbf\x1e\xa6\xcd\x8c\xd7t\'\xfc\x9a\x9e+qe\xf5+A\a\xbf\bP\xd8\x99\xdcR\xd0\x13\x17]\xdb\x1b/F <*\x05\xb7\"\xe3>Uo\xb2\xe3\xf3\x9a<\xde\x1f\xcaSd\x037\xec\x95aF\xbd\xbf\xcb\x11Pp\x19V1\xde]!\xa5\xea\x9ec\x8c+\xdbx\xa5\x01\xcaKn\xa3\x13\xd8%h\xf98,,?o\xab\xa6\xb4\xeeTy;N\xd2m\xae>R\"P)\xbb*\xc0\x00\x7fwuL?#\xce\xda\x98\t\xb9\xa9hJ\x94\n\xbc\xaa\x8c\xfc\xc7\x13>\xc4\"\xe9\xc88\x881\x8dA\xe9\xa4\x93\xf0\x19_\xe2Y\x96Q\xb8\x95\x04\xf5\xdb\xa1F%\xce#f\xf3=\x95\xdb\xa9/\x86ry\xca\xbfJ\xce\xdd\xc8Z\x8a\xf7\xa0\xfah\xd7g\xceQ6\xb9\xd0\xd1\x96lI\x9c\xb6\xbf4\xc2\x7f\x00'/248}, 0x48) 02:39:06 executing program 0: r0 = memfd_create(&(0x7f0000000040)='security\x9e\x00', 0x5) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x4d091, r0, 0x0) 02:39:06 executing program 4: futex(&(0x7f000000cffc)=0x4, 0xb, 0x4, &(0x7f000000b000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, 0x0, &(0x7f0000048000), 0x0) 02:39:06 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x4000001000008912, &(0x7f00000000c0)="11dca5055e0bcfec7be070") clock_gettime(0x0, &(0x7f0000000200)={0x0}) setitimer(0x1, &(0x7f0000000240)={{}, {r1}}, 0x0) setitimer(0x1, &(0x7f0000034000)={{}, {0x77359400}}, 0x0) 02:39:06 executing program 3: r0 = mq_open(&(0x7f0000000180)='g\b\xd4\x00\x05\x00 \x00', 0x42, 0x0, 0x0) mq_timedsend(r0, 0x0, 0x2000, 0x0, 0x0) 02:39:06 executing program 0: r0 = memfd_create(&(0x7f0000000040)='security\x9e\x00', 0x5) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x4d091, r0, 0x0) 02:39:06 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000000040)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x68}}, &(0x7f0000000080)='GPL\x04\x9c5\x14\xbfw-\xa0z\xe8.vY\n6\xf6I>\xc1\xab\x91\xb3\x97\xe4*\xbf\x1e\xa6\xcd\x8c\xd7t\'\xfc\x9a\x9e+qe\xf5+A\a\xbf\bP\xd8\x99\xdcR\xd0\x13\x17]\xdb\x1b/F <*\x05\xb7\"\xe3>Uo\xb2\xe3\xf3\x9a<\xde\x1f\xcaSd\x037\xec\x95aF\xbd\xbf\xcb\x11Pp\x19V1\xde]!\xa5\xea\x9ec\x8c+\xdbx\xa5\x01\xcaKn\xa3\x13\xd8%h\xf98,,?o\xab\xa6\xb4\xeeTy;N\xd2m\xae>R\"P)\xbb*\xc0\x00\x7fwuL?#\xce\xda\x98\t\xb9\xa9hJ\x94\n\xbc\xaa\x8c\xfc\xc7\x13>\xc4\"\xe9\xc88\x881\x8dA\xe9\xa4\x93\xf0\x19_\xe2Y\x96Q\xb8\x95\x04\xf5\xdb\xa1F%\xce#f\xf3=\x95\xdb\xa9/\x86ry\xca\xbfJ\xce\xdd\xc8Z\x8a\xf7\xa0\xfah\xd7g\xceQ6\xb9\xd0\xd1\x96lI\x9c\xb6\xbf4\xc2\x7f\x00'/248}, 0x48) 02:39:06 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x4, 0x4, 0x4, 0x3}, 0x3c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 02:39:06 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x4000001000008912, &(0x7f00000000c0)="11dca5055e0bcfec7be070") clock_gettime(0x0, &(0x7f0000000200)={0x0}) setitimer(0x1, &(0x7f0000000240)={{}, {r1}}, 0x0) setitimer(0x1, &(0x7f0000034000)={{}, {0x77359400}}, 0x0) 02:39:06 executing program 3: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000440)='X', 0x1, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) 02:39:06 executing program 4: futex(&(0x7f000000cffc)=0x4, 0xb, 0x4, &(0x7f000000b000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, 0x0, &(0x7f0000048000), 0x0) 02:39:06 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000000040)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x68}}, &(0x7f0000000080)='GPL\x04\x9c5\x14\xbfw-\xa0z\xe8.vY\n6\xf6I>\xc1\xab\x91\xb3\x97\xe4*\xbf\x1e\xa6\xcd\x8c\xd7t\'\xfc\x9a\x9e+qe\xf5+A\a\xbf\bP\xd8\x99\xdcR\xd0\x13\x17]\xdb\x1b/F <*\x05\xb7\"\xe3>Uo\xb2\xe3\xf3\x9a<\xde\x1f\xcaSd\x037\xec\x95aF\xbd\xbf\xcb\x11Pp\x19V1\xde]!\xa5\xea\x9ec\x8c+\xdbx\xa5\x01\xcaKn\xa3\x13\xd8%h\xf98,,?o\xab\xa6\xb4\xeeTy;N\xd2m\xae>R\"P)\xbb*\xc0\x00\x7fwuL?#\xce\xda\x98\t\xb9\xa9hJ\x94\n\xbc\xaa\x8c\xfc\xc7\x13>\xc4\"\xe9\xc88\x881\x8dA\xe9\xa4\x93\xf0\x19_\xe2Y\x96Q\xb8\x95\x04\xf5\xdb\xa1F%\xce#f\xf3=\x95\xdb\xa9/\x86ry\xca\xbfJ\xce\xdd\xc8Z\x8a\xf7\xa0\xfah\xd7g\xceQ6\xb9\xd0\xd1\x96lI\x9c\xb6\xbf4\xc2\x7f\x00'/248}, 0x48) 02:39:06 executing program 0: r0 = memfd_create(&(0x7f0000000040)='security\x9e\x00', 0x5) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x4d091, r0, 0x0) 02:39:06 executing program 1: futex(&(0x7f000000cffc)=0x4, 0xb, 0x4, &(0x7f000000b000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, 0x0, &(0x7f0000048000), 0x0) 02:39:06 executing program 4: futex(&(0x7f000000cffc)=0x4, 0xb, 0x4, &(0x7f000000b000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, 0x0, &(0x7f0000048000), 0x0) 02:39:06 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xa, 0xb, 0x6d, 0x8000000000000005, 0x0, 0x0}, 0x3c) r0 = bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0}, 0x2c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x41000008912, &(0x7f00000000c0)="11dca5055e0bcfec7be070") bpf$MAP_CREATE(0x4, &(0x7f0000000040)={0x3, 0x0, 0x403618, 0x0, 0x20820000, r0}, 0x2c) 02:39:06 executing program 0: r0 = memfd_create(&(0x7f0000000040)='security\x9e\x00', 0x5) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x4d091, r0, 0x0) 02:39:06 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x4, 0x4, 0x4, 0x3}, 0x3c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 02:39:06 executing program 3: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000440)='X', 0x1, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) 02:39:06 executing program 1: futex(&(0x7f000000cffc)=0x4, 0xb, 0x4, &(0x7f000000b000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, 0x0, &(0x7f0000048000), 0x0) 02:39:06 executing program 4: futex(&(0x7f000000cffc)=0x4, 0xb, 0x4, &(0x7f000000b000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, 0x0, &(0x7f0000048000), 0x0) 02:39:06 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xa, 0xb, 0x6d, 0x8000000000000005, 0x0, 0x0}, 0x3c) r0 = bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0}, 0x2c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x41000008912, &(0x7f00000000c0)="11dca5055e0bcfec7be070") bpf$MAP_CREATE(0x4, &(0x7f0000000040)={0x3, 0x0, 0x403618, 0x0, 0x20820000, r0}, 0x2c) 02:39:06 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x4, 0x4, 0x4, 0x3}, 0x3c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 02:39:06 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xa, 0xb, 0x6d, 0x8000000000000005, 0x0, 0x0}, 0x3c) r0 = bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0}, 0x2c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x41000008912, &(0x7f00000000c0)="11dca5055e0bcfec7be070") bpf$MAP_CREATE(0x4, &(0x7f0000000040)={0x3, 0x0, 0x403618, 0x0, 0x20820000, r0}, 0x2c) 02:39:07 executing program 3: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000440)='X', 0x1, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) 02:39:07 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xa, 0xb, 0x6d, 0x8000000000000005, 0x0, 0x0}, 0x3c) r0 = bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0}, 0x2c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x41000008912, &(0x7f00000000c0)="11dca5055e0bcfec7be070") bpf$MAP_CREATE(0x4, &(0x7f0000000040)={0x3, 0x0, 0x403618, 0x0, 0x20820000, r0}, 0x2c) 02:39:07 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xa, 0xb, 0x6d, 0x8000000000000005, 0x0, 0x0}, 0x3c) r0 = bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0}, 0x2c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x41000008912, &(0x7f00000000c0)="11dca5055e0bcfec7be070") bpf$MAP_CREATE(0x4, &(0x7f0000000040)={0x3, 0x0, 0x403618, 0x0, 0x20820000, r0}, 0x2c) 02:39:07 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x4, 0x4, 0x4, 0x3}, 0x3c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 02:39:07 executing program 4: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000440)='X', 0x1, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) 02:39:07 executing program 1: futex(&(0x7f000000cffc)=0x4, 0xb, 0x4, &(0x7f000000b000)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, 0x0, &(0x7f0000048000), 0x0) 02:39:07 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xa, 0xb, 0x6d, 0x8000000000000005, 0x0, 0x0}, 0x3c) r0 = bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0}, 0x2c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x41000008912, &(0x7f00000000c0)="11dca5055e0bcfec7be070") bpf$MAP_CREATE(0x4, &(0x7f0000000040)={0x3, 0x0, 0x403618, 0x0, 0x20820000, r0}, 0x2c) 02:39:07 executing program 3: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000440)='X', 0x1, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) 02:39:07 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0xa, 0xb, 0x6d, 0x8000000000000005, 0x0, 0x0}, 0x3c) r0 = bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0}, 0x2c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x41000008912, &(0x7f00000000c0)="11dca5055e0bcfec7be070") bpf$MAP_CREATE(0x4, &(0x7f0000000040)={0x3, 0x0, 0x403618, 0x0, 0x20820000, r0}, 0x2c) 02:39:07 executing program 4: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000440)='X', 0x1, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) 02:39:07 executing program 2: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000440)='X', 0x1, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) 02:39:07 executing program 1: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000440)='X', 0x1, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) 02:39:07 executing program 5: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000440)='X', 0x1, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) [ 336.182374][ C0] net_ratelimit: 16 callbacks suppressed [ 336.182382][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 336.193941][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 336.199891][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 336.205810][ C0] protocol 88fb is buggy, dev hsr_slave_1 02:39:07 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") prctl$PR_SET_MM_MAP(0x35, 0xe, &(0x7f0000000080)={&(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0}, 0x68) 02:39:07 executing program 2: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000440)='X', 0x1, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) 02:39:07 executing program 4: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000440)='X', 0x1, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) 02:39:07 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockname$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @local}, &(0x7f0000000140)=0x1c) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) msgsnd(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="03000000000000faa8c90000000000000000ff79"], 0x1, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb], 0x8000}) ioctl$KVM_RUN(r3, 0xae80, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000100)={'IDLETIMER\x00'}, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)) ioctl$KVM_RUN(r3, 0xae80, 0x0) 02:39:07 executing program 1: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000440)='X', 0x1, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) 02:39:07 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") prctl$PR_SET_MM_MAP(0x35, 0xe, &(0x7f0000000080)={&(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0}, 0x68) 02:39:07 executing program 5: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000440)='X', 0x1, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) [ 336.512395][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 336.518243][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 336.582375][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 336.588350][ C0] protocol 88fb is buggy, dev hsr_slave_1 02:39:08 executing program 2: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000440)='X', 0x1, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) 02:39:08 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") prctl$PR_SET_MM_MAP(0x35, 0xe, &(0x7f0000000080)={&(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0}, 0x68) 02:39:08 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000600)={0x26, 'hash\x00', 0x0, 0x0, 'streebog256-generic\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$inet6(r2, &(0x7f0000000b80)=[{{&(0x7f0000000000)={0xa, 0x4e24, 0x3, @ipv4={[], [], @multicast1}, 0x5}, 0x1c, 0x0}}, {{0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000680)="fd0f2523d1ec08acf3e6995e03d6e517760e541922d6c536cf978a67e11573cb2e15f283a316cb61ae72c469b57cd2121ee60ce802825a62703db743dfe8d91380535e5b5a107ba02a8b56ee7a926280255cb584bb24626a295a29cd51861a223d5d249825c1a889f3ec5627b2e147", 0x6f}], 0x1}}], 0x2, 0x0) 02:39:08 executing program 1: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000440)='X', 0x1, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) 02:39:08 executing program 5: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0x2a, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000440)='X', 0x1, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r2) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) [ 336.902386][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 336.909119][ C1] protocol 88fb is buggy, dev hsr_slave_1 02:39:08 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000000040)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x67}}, &(0x7f0000000080)='GPL\x04\x9c5\x14\xbfw-\xa0z\xe8.vY\n6\xf6I>\xc1\xab\x91\xb3\x97\xe4*\xbf\x1e\xa6\xcd\x8c\xd7t\'\xfc\x9a\x9e+qe\xf5+A\a\xbf\bP\xd8\x99\xdcR\xd0\x13\x17]\xdb\x1b/F <*\x05\xb7\"\xe3>Uo\xb2\xe3\xf3\x9a<\xde\x1f\xcaSd\x037\xec\x95aF\xbd\xbf\xcb\x11Pp\x19V1\xde]!\xa5\xea\x9ec\x8c+\xdbx\xa5\x01\xcaKn\xa3\x13\xd8%h\xf98,,?o\xab\xa6\xb4\xeeTy;N\xd2m\xae>R\"P)\xbb*\xc0\x00\x7fwuL?#\xce\xda\x98\t\xb9\xa9hJ\x94\n\xbc\xaa\x8c\xfc\xc7\x13>\xc4\"\xe9\xc88\x881\x8dA\xe9\xa4\x93\xf0\x19_\xe2Y\x96Q\xb8\x95\x04\xf5\xdb\xa1F%\xce#f\xf3=\x95\xdb\xa9/\x86ry\xca\xbfJ\xce\xdd\xc8Z\x8a\xf7\xa0\xfah\xd7g\xceQ6\xb9\xd0\xd1\x96lI\x9c\xb6\xbf4\xc2\x98\x86f\x97\x00'/248, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x14) 02:39:08 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockname$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @local}, &(0x7f0000000140)=0x1c) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) msgsnd(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="03000000000000faa8c90000000000000000ff79"], 0x1, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb], 0x8000}) ioctl$KVM_RUN(r3, 0xae80, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000100)={'IDLETIMER\x00'}, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)) ioctl$KVM_RUN(r3, 0xae80, 0x0) 02:39:08 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") prctl$PR_SET_MM_MAP(0x35, 0xe, &(0x7f0000000080)={&(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0}, 0x68) 02:39:08 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000600)={0x26, 'hash\x00', 0x0, 0x0, 'streebog256-generic\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$inet6(r2, &(0x7f0000000b80)=[{{&(0x7f0000000000)={0xa, 0x4e24, 0x3, @ipv4={[], [], @multicast1}, 0x5}, 0x1c, 0x0}}, {{0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000680)="fd0f2523d1ec08acf3e6995e03d6e517760e541922d6c536cf978a67e11573cb2e15f283a316cb61ae72c469b57cd2121ee60ce802825a62703db743dfe8d91380535e5b5a107ba02a8b56ee7a926280255cb584bb24626a295a29cd51861a223d5d249825c1a889f3ec5627b2e147", 0x6f}], 0x1}}], 0x2, 0x0) 02:39:08 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000000040)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x67}}, &(0x7f0000000080)='GPL\x04\x9c5\x14\xbfw-\xa0z\xe8.vY\n6\xf6I>\xc1\xab\x91\xb3\x97\xe4*\xbf\x1e\xa6\xcd\x8c\xd7t\'\xfc\x9a\x9e+qe\xf5+A\a\xbf\bP\xd8\x99\xdcR\xd0\x13\x17]\xdb\x1b/F <*\x05\xb7\"\xe3>Uo\xb2\xe3\xf3\x9a<\xde\x1f\xcaSd\x037\xec\x95aF\xbd\xbf\xcb\x11Pp\x19V1\xde]!\xa5\xea\x9ec\x8c+\xdbx\xa5\x01\xcaKn\xa3\x13\xd8%h\xf98,,?o\xab\xa6\xb4\xeeTy;N\xd2m\xae>R\"P)\xbb*\xc0\x00\x7fwuL?#\xce\xda\x98\t\xb9\xa9hJ\x94\n\xbc\xaa\x8c\xfc\xc7\x13>\xc4\"\xe9\xc88\x881\x8dA\xe9\xa4\x93\xf0\x19_\xe2Y\x96Q\xb8\x95\x04\xf5\xdb\xa1F%\xce#f\xf3=\x95\xdb\xa9/\x86ry\xca\xbfJ\xce\xdd\xc8Z\x8a\xf7\xa0\xfah\xd7g\xceQ6\xb9\xd0\xd1\x96lI\x9c\xb6\xbf4\xc2\x98\x86f\x97\x00'/248, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x14) 02:39:08 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockname$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @local}, &(0x7f0000000140)=0x1c) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) msgsnd(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="03000000000000faa8c90000000000000000ff79"], 0x1, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb], 0x8000}) ioctl$KVM_RUN(r3, 0xae80, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000100)={'IDLETIMER\x00'}, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)) ioctl$KVM_RUN(r3, 0xae80, 0x0) 02:39:08 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockname$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @local}, &(0x7f0000000140)=0x1c) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) msgsnd(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="03000000000000faa8c90000000000000000ff79"], 0x1, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb], 0x8000}) ioctl$KVM_RUN(r3, 0xae80, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000100)={'IDLETIMER\x00'}, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)) ioctl$KVM_RUN(r3, 0xae80, 0x0) 02:39:08 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000000040)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x67}}, &(0x7f0000000080)='GPL\x04\x9c5\x14\xbfw-\xa0z\xe8.vY\n6\xf6I>\xc1\xab\x91\xb3\x97\xe4*\xbf\x1e\xa6\xcd\x8c\xd7t\'\xfc\x9a\x9e+qe\xf5+A\a\xbf\bP\xd8\x99\xdcR\xd0\x13\x17]\xdb\x1b/F <*\x05\xb7\"\xe3>Uo\xb2\xe3\xf3\x9a<\xde\x1f\xcaSd\x037\xec\x95aF\xbd\xbf\xcb\x11Pp\x19V1\xde]!\xa5\xea\x9ec\x8c+\xdbx\xa5\x01\xcaKn\xa3\x13\xd8%h\xf98,,?o\xab\xa6\xb4\xeeTy;N\xd2m\xae>R\"P)\xbb*\xc0\x00\x7fwuL?#\xce\xda\x98\t\xb9\xa9hJ\x94\n\xbc\xaa\x8c\xfc\xc7\x13>\xc4\"\xe9\xc88\x881\x8dA\xe9\xa4\x93\xf0\x19_\xe2Y\x96Q\xb8\x95\x04\xf5\xdb\xa1F%\xce#f\xf3=\x95\xdb\xa9/\x86ry\xca\xbfJ\xce\xdd\xc8Z\x8a\xf7\xa0\xfah\xd7g\xceQ6\xb9\xd0\xd1\x96lI\x9c\xb6\xbf4\xc2\x98\x86f\x97\x00'/248, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x14) 02:39:08 executing program 0: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000000)={0x4}, 0x10) write(r0, &(0x7f0000000080)="1c0000001a005f0214f9f407000904008100000f0000000000000000", 0x1c) 02:39:08 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000600)={0x26, 'hash\x00', 0x0, 0x0, 'streebog256-generic\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$inet6(r2, &(0x7f0000000b80)=[{{&(0x7f0000000000)={0xa, 0x4e24, 0x3, @ipv4={[], [], @multicast1}, 0x5}, 0x1c, 0x0}}, {{0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000680)="fd0f2523d1ec08acf3e6995e03d6e517760e541922d6c536cf978a67e11573cb2e15f283a316cb61ae72c469b57cd2121ee60ce802825a62703db743dfe8d91380535e5b5a107ba02a8b56ee7a926280255cb584bb24626a295a29cd51861a223d5d249825c1a889f3ec5627b2e147", 0x6f}], 0x1}}], 0x2, 0x0) 02:39:08 executing program 0: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000000)={0x4}, 0x10) write(r0, &(0x7f0000000080)="1c0000001a005f0214f9f407000904008100000f0000000000000000", 0x1c) 02:39:08 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000000040)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x10, 0x67}}, &(0x7f0000000080)='GPL\x04\x9c5\x14\xbfw-\xa0z\xe8.vY\n6\xf6I>\xc1\xab\x91\xb3\x97\xe4*\xbf\x1e\xa6\xcd\x8c\xd7t\'\xfc\x9a\x9e+qe\xf5+A\a\xbf\bP\xd8\x99\xdcR\xd0\x13\x17]\xdb\x1b/F <*\x05\xb7\"\xe3>Uo\xb2\xe3\xf3\x9a<\xde\x1f\xcaSd\x037\xec\x95aF\xbd\xbf\xcb\x11Pp\x19V1\xde]!\xa5\xea\x9ec\x8c+\xdbx\xa5\x01\xcaKn\xa3\x13\xd8%h\xf98,,?o\xab\xa6\xb4\xeeTy;N\xd2m\xae>R\"P)\xbb*\xc0\x00\x7fwuL?#\xce\xda\x98\t\xb9\xa9hJ\x94\n\xbc\xaa\x8c\xfc\xc7\x13>\xc4\"\xe9\xc88\x881\x8dA\xe9\xa4\x93\xf0\x19_\xe2Y\x96Q\xb8\x95\x04\xf5\xdb\xa1F%\xce#f\xf3=\x95\xdb\xa9/\x86ry\xca\xbfJ\xce\xdd\xc8Z\x8a\xf7\xa0\xfah\xd7g\xceQ6\xb9\xd0\xd1\x96lI\x9c\xb6\xbf4\xc2\x98\x86f\x97\x00'/248, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x14) 02:39:08 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000600)={0x26, 'hash\x00', 0x0, 0x0, 'streebog256-generic\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg$inet6(r2, &(0x7f0000000b80)=[{{&(0x7f0000000000)={0xa, 0x4e24, 0x3, @ipv4={[], [], @multicast1}, 0x5}, 0x1c, 0x0}}, {{0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000680)="fd0f2523d1ec08acf3e6995e03d6e517760e541922d6c536cf978a67e11573cb2e15f283a316cb61ae72c469b57cd2121ee60ce802825a62703db743dfe8d91380535e5b5a107ba02a8b56ee7a926280255cb584bb24626a295a29cd51861a223d5d249825c1a889f3ec5627b2e147", 0x6f}], 0x1}}], 0x2, 0x0) 02:39:08 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockname$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @local}, &(0x7f0000000140)=0x1c) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) msgsnd(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="03000000000000faa8c90000000000000000ff79"], 0x1, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb], 0x8000}) ioctl$KVM_RUN(r3, 0xae80, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000100)={'IDLETIMER\x00'}, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)) ioctl$KVM_RUN(r3, 0xae80, 0x0) 02:39:08 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockname$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @local}, &(0x7f0000000140)=0x1c) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) msgsnd(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="03000000000000faa8c90000000000000000ff79"], 0x1, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb], 0x8000}) ioctl$KVM_RUN(r3, 0xae80, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000100)={'IDLETIMER\x00'}, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)) ioctl$KVM_RUN(r3, 0xae80, 0x0) 02:39:09 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x74, 0x0, 0x0) madvise(&(0x7f000079c000/0x800000)=nil, 0x800000, 0xc) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x3, &(0x7f00008ca000/0x4000)=nil) madvise(&(0x7f00002f8000/0xc00000)=nil, 0xc00000, 0xd) 02:39:09 executing program 0: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000000)={0x4}, 0x10) write(r0, &(0x7f0000000080)="1c0000001a005f0214f9f407000904008100000f0000000000000000", 0x1c) 02:39:09 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x17, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x6}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 02:39:09 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockname$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @local}, &(0x7f0000000140)=0x1c) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) msgsnd(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="03000000000000faa8c90000000000000000ff79"], 0x1, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb], 0x8000}) ioctl$KVM_RUN(r3, 0xae80, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000100)={'IDLETIMER\x00'}, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)) ioctl$KVM_RUN(r3, 0xae80, 0x0) 02:39:09 executing program 0: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000000)={0x4}, 0x10) write(r0, &(0x7f0000000080)="1c0000001a005f0214f9f407000904008100000f0000000000000000", 0x1c) [ 337.860786][T21377] [ 337.870649][T21377] ********************************************************** 02:39:09 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x74, 0x0, 0x0) madvise(&(0x7f000079c000/0x800000)=nil, 0x800000, 0xc) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x3, &(0x7f00008ca000/0x4000)=nil) madvise(&(0x7f00002f8000/0xc00000)=nil, 0xc00000, 0xd) [ 337.954895][T21377] ** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE ** [ 337.970759][T21377] ** ** 02:39:09 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x74, 0x0, 0x0) madvise(&(0x7f000079c000/0x800000)=nil, 0x800000, 0xc) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x3, &(0x7f00008ca000/0x4000)=nil) madvise(&(0x7f00002f8000/0xc00000)=nil, 0xc00000, 0xd) 02:39:09 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockname$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @local}, &(0x7f0000000140)=0x1c) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) msgsnd(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="03000000000000faa8c90000000000000000ff79"], 0x1, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb], 0x8000}) ioctl$KVM_RUN(r3, 0xae80, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000100)={'IDLETIMER\x00'}, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 338.011163][T21377] ** trace_printk() being used. Allocating extra memory. ** [ 338.048345][T21377] ** ** 02:39:09 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockname$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @local}, &(0x7f0000000140)=0x1c) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) msgsnd(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="03000000000000faa8c90000000000000000ff79"], 0x1, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb], 0x8000}) ioctl$KVM_RUN(r3, 0xae80, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000100)={'IDLETIMER\x00'}, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 338.092725][T21377] ** This means that this is a DEBUG kernel and it is ** 02:39:09 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x74, 0x0, 0x0) madvise(&(0x7f000079c000/0x800000)=nil, 0x800000, 0xc) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x3, &(0x7f00008ca000/0x4000)=nil) madvise(&(0x7f00002f8000/0xc00000)=nil, 0xc00000, 0xd) 02:39:09 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x74, 0x0, 0x0) madvise(&(0x7f000079c000/0x800000)=nil, 0x800000, 0xc) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x3, &(0x7f00008ca000/0x4000)=nil) madvise(&(0x7f00002f8000/0xc00000)=nil, 0xc00000, 0xd) [ 338.137830][T21377] ** unsafe for production use. ** [ 338.169152][T21377] ** ** [ 338.202140][T21377] ** If you see this message and you are not debugging ** [ 338.228993][T21377] ** the kernel, report this immediately to your vendor! ** 02:39:09 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockname$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @local}, &(0x7f0000000140)=0x1c) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) msgsnd(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="03000000000000faa8c90000000000000000ff79"], 0x1, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb], 0x8000}) ioctl$KVM_RUN(r3, 0xae80, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000100)={'IDLETIMER\x00'}, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 338.310570][T21377] ** ** [ 338.322832][T21377] ** NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE NOTICE ** 02:39:09 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x74, 0x0, 0x0) madvise(&(0x7f000079c000/0x800000)=nil, 0x800000, 0xc) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x3, &(0x7f00008ca000/0x4000)=nil) madvise(&(0x7f00002f8000/0xc00000)=nil, 0xc00000, 0xd) [ 338.392360][T21377] ********************************************************** 02:39:09 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x74, 0x0, 0x0) madvise(&(0x7f000079c000/0x800000)=nil, 0x800000, 0xc) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x3, &(0x7f00008ca000/0x4000)=nil) madvise(&(0x7f00002f8000/0xc00000)=nil, 0xc00000, 0xd) 02:39:10 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x17, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x6}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 02:39:10 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x74, 0x0, 0x0) madvise(&(0x7f000079c000/0x800000)=nil, 0x800000, 0xc) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x3, &(0x7f00008ca000/0x4000)=nil) madvise(&(0x7f00002f8000/0xc00000)=nil, 0xc00000, 0xd) 02:39:10 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2d, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x7, 0x1ab, &(0x7f000000cf3d)=""/195}, 0x48) 02:39:10 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB=',max_read=0x0']) 02:39:10 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2d, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x7, 0x1ab, &(0x7f000000cf3d)=""/195}, 0x48) 02:39:10 executing program 0: syz_emit_ethernet(0x3e, &(0x7f0000000240)={@local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x70}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x6, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @dev}}}}}}, 0x0) 02:39:10 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB=',max_read=0x0']) 02:39:10 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x74, 0x0, 0x0) madvise(&(0x7f000079c000/0x800000)=nil, 0x800000, 0xc) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x3, &(0x7f00008ca000/0x4000)=nil) madvise(&(0x7f00002f8000/0xc00000)=nil, 0xc00000, 0xd) 02:39:10 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x17, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x6}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 02:39:10 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00004da000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000007affc), 0x4) close(r0) 02:39:10 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2d, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x7, 0x1ab, &(0x7f000000cf3d)=""/195}, 0x48) 02:39:10 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000009c0)={0x14, 0x0, 0x6}, 0x14}}, 0x0) 02:39:10 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x17, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x6}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 02:39:10 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB=',max_read=0x0']) 02:39:10 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x74, 0x0, 0x0) madvise(&(0x7f000079c000/0x800000)=nil, 0x800000, 0xc) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x3, &(0x7f00008ca000/0x4000)=nil) madvise(&(0x7f00002f8000/0xc00000)=nil, 0xc00000, 0xd) 02:39:10 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000009c0)={0x14, 0x0, 0x6}, 0x14}}, 0x0) 02:39:10 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2d, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x7, 0x1ab, &(0x7f000000cf3d)=""/195}, 0x48) 02:39:10 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)="2e00000010008151e00f80ecdb4cb904034865161a0001004000000000c9a108b555bbc09e1a615e3857d153b4b6", 0x2e}], 0x1, 0x0, 0x0, 0x7a00}, 0x0) 02:39:10 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00004da000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000007affc), 0x4) close(r0) 02:39:10 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB=',max_read=0x0']) 02:39:10 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000009c0)={0x14, 0x0, 0x6}, 0x14}}, 0x0) [ 339.284068][T21465] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 02:39:10 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00004da000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000007affc), 0x4) close(r0) 02:39:10 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000600)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendto$unix(r1, &(0x7f0000000200)='i', 0x1, 0x0, 0x0, 0x0) recvfrom(r1, &(0x7f0000001240)=""/4096, 0xffffff7e, 0x0, 0x0, 0x0) 02:39:10 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)="2e00000010008151e00f80ecdb4cb904034865161a0001004000000000c9a108b555bbc09e1a615e3857d153b4b6", 0x2e}], 0x1, 0x0, 0x0, 0x7a00}, 0x0) 02:39:10 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000a40)='ramfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000100)='./file0/file1\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file1/file0\x00', 0x0) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000140)='./file0/file1\x00') 02:39:10 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00004da000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000007affc), 0x4) close(r0) 02:39:10 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000009c0)={0x14, 0x0, 0x6}, 0x14}}, 0x0) 02:39:11 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000600)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendto$unix(r1, &(0x7f0000000200)='i', 0x1, 0x0, 0x0, 0x0) recvfrom(r1, &(0x7f0000001240)=""/4096, 0xffffff7e, 0x0, 0x0, 0x0) [ 339.566926][T21489] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 02:39:11 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00004da000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000007affc), 0x4) close(r0) 02:39:11 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000a40)='ramfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000100)='./file0/file1\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file1/file0\x00', 0x0) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000140)='./file0/file1\x00') 02:39:11 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00004da000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000007affc), 0x4) close(r0) 02:39:11 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)="2e00000010008151e00f80ecdb4cb904034865161a0001004000000000c9a108b555bbc09e1a615e3857d153b4b6", 0x2e}], 0x1, 0x0, 0x0, 0x7a00}, 0x0) 02:39:11 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x8) 02:39:11 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000600)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendto$unix(r1, &(0x7f0000000200)='i', 0x1, 0x0, 0x0, 0x0) recvfrom(r1, &(0x7f0000001240)=""/4096, 0xffffff7e, 0x0, 0x0, 0x0) 02:39:11 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00004da000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f000007affc), 0x4) close(r0) [ 339.805540][T21508] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 02:39:11 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000a40)='ramfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000100)='./file0/file1\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file1/file0\x00', 0x0) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000140)='./file0/file1\x00') 02:39:11 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000600)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendto$unix(r1, &(0x7f0000000200)='i', 0x1, 0x0, 0x0, 0x0) recvfrom(r1, &(0x7f0000001240)=""/4096, 0xffffff7e, 0x0, 0x0, 0x0) 02:39:11 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x81) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@dev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}, {{@in=@remote}, 0x0, @in6=@dev}}, 0x116) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) 02:39:11 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)="2e00000010008151e00f80ecdb4cb904034865161a0001004000000000c9a108b555bbc09e1a615e3857d153b4b6", 0x2e}], 0x1, 0x0, 0x0, 0x7a00}, 0x0) 02:39:11 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x8) 02:39:11 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x8) 02:39:11 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000a40)='ramfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000100)='./file0/file1\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file1/file0\x00', 0x0) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000140)='./file0/file1\x00') [ 340.042919][T21527] netlink: 'syz-executor.4': attribute type 1 has an invalid length. 02:39:11 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x81) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@dev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}, {{@in=@remote}, 0x0, @in6=@dev}}, 0x116) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) 02:39:11 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xa, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x20000000000000, 0x700, 0x0, 0x0, 0x4e}, [@ldst={0x3, 0x2, 0x3, 0x1c10a1, 0x0, 0x37}]}, &(0x7f0000003ff6)='G\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) 02:39:11 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") ioprio_set$pid(0x2, 0x0, 0x2000) 02:39:11 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x81) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@dev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}, {{@in=@remote}, 0x0, @in6=@dev}}, 0x116) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) 02:39:11 executing program 2: r0 = socket$rxrpc(0x21, 0x2, 0x2) setsockopt$RXRPC_SECURITY_KEYRING(r0, 0x110, 0x5, 0x0, 0x4) 02:39:11 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x8) 02:39:11 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") ioprio_set$pid(0x2, 0x0, 0x2000) 02:39:11 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x8) 02:39:11 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x81) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@dev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0xa0}}, {{@in=@remote}, 0x0, @in6=@dev}}, 0x116) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) 02:39:11 executing program 2: r0 = socket$rxrpc(0x21, 0x2, 0x2) setsockopt$RXRPC_SECURITY_KEYRING(r0, 0x110, 0x5, 0x0, 0x4) 02:39:12 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") ioprio_set$pid(0x2, 0x0, 0x2000) 02:39:12 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xa, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x20000000000000, 0x700, 0x0, 0x0, 0x4e}, [@ldst={0x3, 0x2, 0x3, 0x1c10a1, 0x0, 0x37}]}, &(0x7f0000003ff6)='G\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) 02:39:12 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x8) 02:39:12 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="e1dca5055e0bcfec7be070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0, 0xffffffffffffff44}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="020100090e000000030000000000000405000600000000000a0000000000000400000000000000000000002100000000000100000000000002000100010000000000000200fd000005000500000000000a004872bbb6896209000055781309e339be593f7710aa000001001700410000"], 0x70}}, 0x0) sendmmsg(r1, &(0x7f0000000180), 0x3ef, 0x0) 02:39:12 executing program 2: r0 = socket$rxrpc(0x21, 0x2, 0x2) setsockopt$RXRPC_SECURITY_KEYRING(r0, 0x110, 0x5, 0x0, 0x4) 02:39:12 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xa, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x20000000000000, 0x700, 0x0, 0x0, 0x4e}, [@ldst={0x3, 0x2, 0x3, 0x1c10a1, 0x0, 0x37}]}, &(0x7f0000003ff6)='G\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) 02:39:12 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x8) 02:39:12 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") ioprio_set$pid(0x2, 0x0, 0x2000) 02:39:12 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0xb, 0x8, 0x400, 0x5, 0x1, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffffd}, 0x3c) 02:39:12 executing program 2: r0 = socket$rxrpc(0x21, 0x2, 0x2) setsockopt$RXRPC_SECURITY_KEYRING(r0, 0x110, 0x5, 0x0, 0x4) 02:39:12 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xa, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x20000000000000, 0x700, 0x0, 0x0, 0x4e}, [@ldst={0x3, 0x2, 0x3, 0x1c10a1, 0x0, 0x37}]}, &(0x7f0000003ff6)='G\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) 02:39:12 executing program 5: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000480)='map\x00\x02N\xd1\x1de\xf2-R\xc6\f\x86\xdf\xc9\xfc\x8c]\x02\xc3B\vg\x8f\xa5\x04\x00\x00\x00\xd8\x00\xb2a\xf0\xfa\xcb\xa03\x15\xcd\a\xfb\x140\x12\xd4z\x1b-\xcb&\xdcY\x92\xf6j\xae\x80\x0f\x836\xaf\xd3g\xf8Z\x19\x96o\x9c\xe8\v\xcf\xd6\x9c\'f\xc9\xb3\f\xf8n:\x16!e\x83\xa8\xde\x11~\xf3\xa8\x05\xbc\x14{\xa8\x03\x04\xb1\xcb\aV\x83\xf5\xcd)Z\x05\x98\xd1\n\xf7\x88\x0f\xc40\x1b\xa6\xce\xff\xf6=D\x05\x8bC\xd5\x12\x02\x00\x00\xa7\xedW\xba?M\xdeuir\xaa@M\x9b\xee\"\xff\xe9t\xef\xbc\xce\x8d\xa6\xae\xa6&\x8c\x96\xfb\xce\xc2W\xf3\xa5j{G\xa8d2\x87#\xd4Q\xb6u\x8dT(\xc0\x00\x00\x00\x00\xe3\x00\x00\x00\xec\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x002!\xd7c=\x1d\xc0\x06\x18\xb6/\r\xf9\x95D\x18\xe3\xe6!I\x81\xe39\xe8\x0ez\x95n\xd8\x93\xf9\xcbt\xedF\xaf\xb1\x02\x11u{q\xf2\x13;\x83\x00'/271}, 0x10) 02:39:12 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004380)={{{@in6=@initdev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, 0x0) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, 0x0, 0x0) connect$llc(0xffffffffffffffff, &(0x7f0000000000)={0x1a, 0x0, 0x0, 0x0, 0x7ff}, 0x10) setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, @in6=@rand_addr="8f876edb307f60ae5978424a0fac8b51", 0x4e22, 0x20, 0x4e23, 0x0, 0xa, 0x80, 0x20, 0x0, r2}, {0x2, 0x401, 0x5, 0x3, 0x5, 0xfffffffeffffffff, 0x4, 0x80000001}, {0x0, 0x20, 0x0, 0x9}, 0x1, 0x6e6bb9, 0x2, 0x1, 0x1, 0x3}, {{@in=@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4d3, 0x2b}, 0xa, @in=@empty, 0x3505, 0x3, 0x2, 0x0, 0xb7c, 0x5b3}}, 0xe8) setsockopt$RXRPC_UPGRADEABLE_SERVICE(0xffffffffffffffff, 0x110, 0x5, 0x0, 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000500)) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000b00)='/group.sta\x9f\xd4t\x00+\x96FR\bR\t\x12\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0W\xdfuE\xfe\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6J\x81W!\xf0\\\xa1O\x9f\x93\x19C\xceQCV\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1fM\xeba_\xa9\xcd\x10\xcd\x0e~\xc6\xed\xb6\x82\xf6\xee\x9aK\xdd\x86\xf8\x0f\x15Y-\xb8A1\x1bb\xff\xf0\xd2M\xf7)\xaa\x8a\x18\xb9_\x83>\xeb\xfc\xc18^\x1d\xb3Y\xdc#\xde\xdb\x89\x90L\x99o\x02\xb6\x98e\xc6b\xce\xb7\x99k3&\xaf\v\xc6\x80\xff\xdb\xb7\x0e\xb4K\xf8\x17\xba\xf8\xee\fe\xed]\x93\x13\xbc\xf5\xe2<\xa2\xaf\x83\xa3\xaabc\x95\x00\t:\xcc\xe1\t]\x84\x90\x17l\xd3\xa7M\xdb\x02J\x90\xe8\xe8\xb3\xc9\xf6\xea\xb2\xdeI\xe4\x0f\xd4\xca(\xcd\xfa\xb2\xb8@\xca\x17u\x02Rb\xad\xd0\xf7\x9bz#\xb8\x1d\x88\xf6?3,\x89\xb1-p\x8a\r\xdb\xd6,\xa4\x01y\x1bc\xb7\x19\xcey\xb5\xae\xc4\xe3\xc4\xe9=\x1e\x8c\xec\xfe\x05b\x7f`Y k\xc4\xa8 \xc3\x9b\v\xbbE\x8c\xb8\xe6\x8a\xa0s\b\xcb\xbb\xfa\xde\xf0\n`\x8az<\f\xf1\xbe\x85\xd1Wk\x17\xbc1q\x8b\x93Y|\x9e\xe2\xc9Ms/A\x98\xf2\x88\n\x92?7\xb1\xe0\xee\xe8yo\xb7\xb2p\xc5O~\x87\x17F\b\xb5\xd6\xdc\xe4u:$>\xd1\xaf\x1a\xcb\x18\x8a\x0e$\xbd\x94N\xc84}_\x06\x11\xd2\xdd7\xe0\b\x0f\xd0\xb0WZ\xfc\xb1\xc3\tS\x13\a6\xc0\xbc\vG\xe4p\x1b\xee\x89_=\xb8\x12\xddpk\x860\x03\xfd\xde\x0f\x9c\xc2\xe5.\xfe\xaf\x8f\xe2\x16\x8c\xdbS\xe6\xc26\xde\xf4I\x9f\x003P\xb5\x9fg\x82!\xf2\x82 \xc1Os\xd7C\\\xad\xb3n}t\xba|\x10\x05,rk\xd1\t|\x1e\x00\x9e\xfa\"\x85\xdd\xb7O\a\xfc\x14\xa8\x00\x1f6M\xb00\xbd\xb7\xd6\xa8\xffe\xb2\xcb\'', 0x2761, 0x0) write$P9_RCLUNK(r3, &(0x7f0000000040)={0x7, 0x79, 0x1}, 0x7) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001880)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000000)) io_setup(0x0, 0x0) r4 = fcntl$getown(r0, 0x9) sched_getparam(r4, &(0x7f0000000100)) 02:39:12 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)={0x14, r1, 0x5, 0x0, 0x0, {0x4}}, 0x14}, 0x1, 0x6c}, 0x0) 02:39:12 executing program 2: add_key(&(0x7f0000000bc0)='asymmetric\x00', 0x0, &(0x7f0000000c40)="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", 0x401, 0xfffffffffffffffc) 02:39:12 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x10, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x161, 0x11, 0x5f5e0ff}]}, &(0x7f00000000c0)='GPL\x00', 0x6, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 02:39:12 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="11dca5055e0bcfec7be070") r1 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000140)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4ffffff]}}, 0x31) 02:39:12 executing program 5: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000480)='map\x00\x02N\xd1\x1de\xf2-R\xc6\f\x86\xdf\xc9\xfc\x8c]\x02\xc3B\vg\x8f\xa5\x04\x00\x00\x00\xd8\x00\xb2a\xf0\xfa\xcb\xa03\x15\xcd\a\xfb\x140\x12\xd4z\x1b-\xcb&\xdcY\x92\xf6j\xae\x80\x0f\x836\xaf\xd3g\xf8Z\x19\x96o\x9c\xe8\v\xcf\xd6\x9c\'f\xc9\xb3\f\xf8n:\x16!e\x83\xa8\xde\x11~\xf3\xa8\x05\xbc\x14{\xa8\x03\x04\xb1\xcb\aV\x83\xf5\xcd)Z\x05\x98\xd1\n\xf7\x88\x0f\xc40\x1b\xa6\xce\xff\xf6=D\x05\x8bC\xd5\x12\x02\x00\x00\xa7\xedW\xba?M\xdeuir\xaa@M\x9b\xee\"\xff\xe9t\xef\xbc\xce\x8d\xa6\xae\xa6&\x8c\x96\xfb\xce\xc2W\xf3\xa5j{G\xa8d2\x87#\xd4Q\xb6u\x8dT(\xc0\x00\x00\x00\x00\xe3\x00\x00\x00\xec\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x002!\xd7c=\x1d\xc0\x06\x18\xb6/\r\xf9\x95D\x18\xe3\xe6!I\x81\xe39\xe8\x0ez\x95n\xd8\x93\xf9\xcbt\xedF\xaf\xb1\x02\x11u{q\xf2\x13;\x83\x00'/271}, 0x10) 02:39:12 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x10, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x161, 0x11, 0x5f5e0ff}]}, &(0x7f00000000c0)='GPL\x00', 0x6, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 02:39:12 executing program 2: add_key(&(0x7f0000000bc0)='asymmetric\x00', 0x0, &(0x7f0000000c40)="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", 0x401, 0xfffffffffffffffc) [ 341.302393][ C1] net_ratelimit: 24 callbacks suppressed [ 341.302401][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 341.314514][ C1] protocol 88fb is buggy, dev hsr_slave_1 02:39:12 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)={0x14, r1, 0x5, 0x0, 0x0, {0x4}}, 0x14}, 0x1, 0x6c}, 0x0) [ 341.391866][T21637] ------------[ cut here ]------------ [ 341.416258][T21637] jump label: negative count! [ 341.436863][T21637] WARNING: CPU: 1 PID: 21637 at kernel/jump_label.c:235 static_key_slow_try_dec+0x1f8/0x280 [ 341.447067][T21637] Kernel panic - not syncing: panic_on_warn set ... [ 341.453683][T21637] CPU: 1 PID: 21637 Comm: syz-executor.3 Not tainted 5.2.0+ #24 [ 341.461890][T21637] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 341.472043][T21637] Call Trace: [ 341.475349][T21637] dump_stack+0x1d8/0x2f8 [ 341.479780][T21637] panic+0x28a/0x7c9 [ 341.483691][T21637] ? __warn+0x126/0x220 [ 341.487857][T21637] ? nmi_panic+0x97/0x97 [ 341.492111][T21637] ? static_key_slow_try_dec+0x1f8/0x280 [ 341.497802][T21637] ? is_valid_bugaddr+0x81/0x100 [ 341.502844][T21637] __warn+0x216/0x220 [ 341.506832][T21637] ? static_key_slow_try_dec+0x1f8/0x280 [ 341.512476][T21637] report_bug+0x190/0x290 [ 341.516904][T21637] ? static_key_slow_try_dec+0x1f8/0x280 [ 341.522546][T21637] do_error_trap+0xd7/0x440 [ 341.527061][T21637] do_invalid_op+0x36/0x40 [ 341.531480][T21637] ? static_key_slow_try_dec+0x1f8/0x280 [ 341.537113][T21637] invalid_op+0x14/0x20 [ 341.541260][T21637] RIP: 0010:static_key_slow_try_dec+0x1f8/0x280 [ 341.547491][T21637] Code: 24 60 0f 85 99 00 00 00 48 8d 65 d8 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 b6 a3 e2 ff 48 c7 c7 26 e4 7d 88 31 c0 e8 08 08 b4 ff <0f> 0b eb b3 44 89 f9 80 e1 07 80 c1 03 38 c1 0f 8c 83 fe ff ff 4c [ 341.567282][T21637] RSP: 0018:ffff8880713473a0 EFLAGS: 00010246 [ 341.573361][T21637] RAX: 77fb49b4bba8ce00 RBX: 00000000ffffffff RCX: 0000000000040000 [ 341.581331][T21637] RDX: ffffc9000c635000 RSI: 000000000000ddc8 RDI: 000000000000ddc9 [ 341.589295][T21637] RBP: ffff888071347458 R08: ffffffff815f3604 R09: ffffed1015d66068 [ 341.597255][T21637] R10: ffffed1015d66068 R11: 1ffff11015d66067 R12: dffffc0000000000 [ 341.605226][T21637] R13: 1ffff1100e268e78 R14: 1ffff1100e268e7c R15: ffffffff88f26b00 [ 341.613215][T21637] ? vprintk_emit+0x2d4/0x3a0 [ 341.617907][T21637] ? __static_key_slow_dec_deferred+0x100/0x100 [ 341.624167][T21637] __static_key_slow_dec_deferred+0x61/0x100 [ 341.630243][T21637] ipv6_flowlabel_opt+0x1c09/0x3db0 [ 341.635457][T21637] ? __lock_acquire+0xc84/0x1ce0 [ 341.640398][T21637] ? ipv6_flowlabel_opt_get+0x830/0x830 [ 341.645942][T21637] ? debug_smp_processor_id+0x1c/0x20 [ 341.651315][T21637] ? perf_trace_preemptirq_template+0x2c1/0x380 [ 341.657553][T21637] ? __local_bh_enable_ip+0x13a/0x240 [ 341.663016][T21637] ? check_preemption_disabled+0x47/0x2a0 [ 341.668745][T21637] ? trace_event_raw_event_preemptirq_template+0x250/0x250 [ 341.675945][T21637] ? lockdep_hardirqs_on+0x3c5/0x7d0 [ 341.681219][T21637] ? __local_bh_enable_ip+0x13a/0x240 [ 341.686590][T21637] ? local_bh_enable+0x9/0x30 [ 341.691254][T21637] ? trace_hardirqs_on+0x74/0x80 [ 341.696183][T21637] ? local_bh_enable+0x1f/0x30 [ 341.700932][T21637] ? lock_sock_nested+0xd6/0x120 [ 341.705909][T21637] do_ipv6_setsockopt+0x5ff/0x3bc0 [ 341.711286][T21637] ? ipv6_setsockopt+0x170/0x170 [ 341.716247][T21637] ? futex_wait+0x810/0x810 [ 341.720741][T21637] ? stack_trace_save+0x111/0x1e0 [ 341.725761][T21637] ? __bfs+0x560/0x560 [ 341.729822][T21637] ? do_futex+0x503/0x3f90 [ 341.734244][T21637] ? __kasan_kmalloc+0x11c/0x1b0 [ 341.739215][T21637] ? security_file_alloc+0x36/0x200 [ 341.744410][T21637] ? do_syscall_64+0xfe/0x140 [ 341.749077][T21637] ? __lock_acquire+0xc84/0x1ce0 [ 341.754014][T21637] ? trace_lock_acquire+0x190/0x190 [ 341.759202][T21637] ? __lock_acquire+0xc84/0x1ce0 [ 341.764141][T21637] ? rcu_lock_release+0xd/0x30 [ 341.768900][T21637] ? __lock_acquire+0x1ce0/0x1ce0 [ 341.773918][T21637] ? check_preemption_disabled+0x47/0x2a0 [ 341.779638][T21637] ? rcu_lock_release+0x26/0x30 [ 341.784484][T21637] ? __fget+0x4fe/0x540 [ 341.789240][T21637] ? __might_fault+0xf9/0x160 [ 341.793920][T21637] ipv6_setsockopt+0x51/0x170 [ 341.798590][T21637] udpv6_setsockopt+0x7b/0x90 [ 341.803262][T21637] sock_common_setsockopt+0x99/0xb0 [ 341.808449][T21637] ? sock_common_recvmsg+0x240/0x240 [ 341.813724][T21637] __sys_setsockopt+0x67b/0x860 [ 341.818568][T21637] ? rcu_lock_release+0x30/0x30 [ 341.823616][T21637] ? do_syscall_64+0x1d/0x140 [ 341.828309][T21637] ? trace_hardirqs_off+0x74/0x80 [ 341.833332][T21637] ? rcu_irq_exit_irqson+0xc3/0x110 [ 341.838704][T21637] __x64_sys_setsockopt+0xbf/0xd0 [ 341.843731][T21637] do_syscall_64+0xfe/0x140 [ 341.848235][T21637] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 341.854117][T21637] RIP: 0033:0x459819 [ 341.858006][T21637] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 341.877627][T21637] RSP: 002b:00007f4d858b9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 341.886041][T21637] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000459819 [ 341.894011][T21637] RDX: 0000000000000020 RSI: 0000000000000029 RDI: 0000000000000004 [ 341.901975][T21637] RBP: 000000000075bfc8 R08: 0000000000000031 R09: 0000000000000000 [ 341.909945][T21637] R10: 0000000020000040 R11: 0000000000000246 R12: 00007f4d858ba6d4 [ 341.917935][T21637] R13: 00000000004cec98 R14: 00000000004dd5c0 R15: 00000000ffffffff [ 341.926955][T21637] Kernel Offset: disabled [ 341.931288][T21637] Rebooting in 86400 seconds..