l$UI_SET_PHYS(r0, 0x4008556c, &(0x7f0000000000)='syz0\x00')
ioctl$UI_SET_PHYS(r0, 0x4008556c, &(0x7f0000000040)='syz0\x00')

[  118.802551][ T9622] openvswitch: netlink: IP tunnel attribute has 4 unknown bytes.
19:16:25 executing program 4:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/null\x00', 0x40000, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x7a, &(0x7f0000000700)=ANY=[@ANYBLOB="000800b867f2ad8bb8368900910000008100000086dd600200b69800"/64], 0x0)
keyctl$set_reqkey_keyring(0x5, 0xfffffffffffffffe)
add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
request_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='$.\x00', 0x0)
pipe2$9p(&(0x7f0000000240)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff}, 0x0)
write$P9_RVERSION(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f9870000c6504df67f00000000000000e98b4b153dffff082dbb78abd55fba3da80b856445ab1006487179e001b66c90c0473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd8824692f08ff8675bdf17ea1c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a671164679079d00"/148], 0x15)
r3 = dup(r2)
write$FUSE_BMAP(r3, &(0x7f0000000080)={0x18, 0x0, 0x6}, 0x18)
write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r5=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r5)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0, <r6=>0x0}, &(0x7f0000000580)=0xc)
r7 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r8=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r8)
r9 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r10=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r10)
r11 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x7)
lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, <r12=>0x0})
mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2000, &(0x7f0000000600)=ANY=[@ANYBLOB="7472616e733d7463702c706f72743d3078303030303030303030303030346532312c6163636573733d757365722c616e616d653d6e732f6d6e74002c6d61736b3d5e4d415941415001c8000000000000003d", @ANYRESDEC=r12, @ANYBLOB=',measure,smackfshat=TIPCv2\x00,\x00'])
r13 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x811, r13, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r13, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@loopback, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r14=>0x0}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xff2d)
setreuid(r14, r12)
stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, <r15=>0x0})
mount$fuse(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x40000, &(0x7f0000000800)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYRESDEC=r6, @ANYBLOB=',default_permissions,uid>', @ANYRESDEC=r8, @ANYBLOB=',fow%er<', @ANYRESDEC=r10, @ANYBLOB=',obj_type=keyring\x00,fscontext=root,rootcontext=unconfined_u,obj_role=security,uid=', @ANYRESDEC=r15, @ANYBLOB="2c7375626a5f757365723d74727573746564656d304000000000000000747275737465646b657972696e67637075736574d6379d9e4501302cf62a174b1073676a6499183a6a41735b802416248fce940f0a1c1d242c6673636f6e746578743d756e636f6e66696e65645f752c00"])
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='tran\x00\x00\x00\x00\x00\x00\x00\x00no=', @ANYRESHEX=r1, @ANYBLOB="2c7766646e9063ae6f3d684b22d93e8bf0a50500350000000000005e1a62fc6e1305f19d04b736e24adeda822a", @ANYRESHEX=r2, @ANYBLOB=',\x00'])
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={<r16=>0xffffffffffffffff})
dup2(r16, r16)
ioctl$EXT4_IOC_MOVE_EXT(r16, 0xc028660f, &(0x7f0000000300)={0x0, r2, 0x3ff, 0x10000, 0x4, 0x1})
r17 = mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5})
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedreceive(r17, &(0x7f0000000380)=""/204, 0x2b3, 0x0, 0x0)
umount2(&(0x7f0000000340)='./file0\x00', 0x3)
lseek(r0, 0x0, 0x0)
r18 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0)
lseek(r18, 0x0, 0x0)
socket$inet(0x2, 0x4, 0x0)

19:16:25 executing program 1:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, 0x0, 0x1, [@typed={0x8, 0x10, 0x0, 0x0, @binary="aab26848"}]}]}, 0x24}}, 0x0)

19:16:25 executing program 2:
r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0)
write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={<r1=>0xffffffffffffffff}, 0x2}}, 0x20)
write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000400)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x4}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x48)

19:16:25 executing program 0:
r0 = socket(0x10, 0x80002, 0x0)
ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071")
rt_sigaction(0x27, 0x0, 0x0, 0x8, &(0x7f0000000100))

19:16:25 executing program 5:
r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0)
ioctl$UI_SET_PHYS(r0, 0x4008556c, &(0x7f0000000000)='syz0\x00')
ioctl$UI_SET_PHYS(r0, 0x4008556c, &(0x7f0000000040)='syz0\x00')

19:16:25 executing program 3:
r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0)
ioctl$UI_SET_PHYS(r0, 0x4008556c, &(0x7f0000000000)='syz0\x00')
ioctl$UI_SET_PHYS(r0, 0x4008556c, &(0x7f0000000040)='syz0\x00')

19:16:25 executing program 2:
r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0)
write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={<r1=>0xffffffffffffffff}, 0x2}}, 0x20)
write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000400)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x4}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x48)

19:16:25 executing program 0:
r0 = socket(0x10, 0x80002, 0x0)
ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071")
rt_sigaction(0x27, 0x0, 0x0, 0x8, &(0x7f0000000100))

[  119.162537][ T9648] openvswitch: netlink: IP tunnel attribute has 4 unknown bytes.
19:16:25 executing program 1:
r0 = socket(0x10, 0x80002, 0x0)
ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071")
rt_sigaction(0x27, 0x0, 0x0, 0x8, &(0x7f0000000100))

19:16:26 executing program 5:
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
fcntl$setstatus(r0, 0x4, 0x2000)
bpf$MAP_CREATE(0x0, &(0x7f0000001b00)={0xa, 0x1d, 0x400, 0xc, 0x42}, 0x3f0)
openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xa)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
openat$full(0xffffffffffffff9c, 0x0, 0x1c0a00, 0x0)

19:16:26 executing program 3:
r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0)
ioctl$UI_SET_PHYS(r0, 0x4008556c, &(0x7f0000000000)='syz0\x00')
ioctl$UI_SET_PHYS(r0, 0x4008556c, &(0x7f0000000040)='syz0\x00')

19:16:26 executing program 2:
r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0)
write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={<r1=>0xffffffffffffffff}, 0x2}}, 0x20)
write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000400)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x4}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x48)

19:16:26 executing program 1:
r0 = socket(0x10, 0x80002, 0x0)
ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071")
rt_sigaction(0x27, 0x0, 0x0, 0x8, &(0x7f0000000100))

19:16:26 executing program 3:
r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0)
perf_event_open(&(0x7f0000000140)={0x0, 0xffffffffffffff65, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x21, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB='l\x00\x00', @ANYRES16=0x0, @ANYBLOB="0000f8ff0000e8ffffff0300000058000100100001007564703a73797a300000000015d044000400200001000a00000000000000ff01000000000000000000000000000100000000200002000a00000000000000ff020000000000000000000000000001"], 0x3}}, 0x0)
ioctl(r0, 0xfffffbfffff3ffa7, &(0x7f0000000140))

19:16:26 executing program 4:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/null\x00', 0x40000, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x7a, &(0x7f0000000700)=ANY=[@ANYBLOB="000800b867f2ad8bb8368900910000008100000086dd600200b69800"/64], 0x0)
keyctl$set_reqkey_keyring(0x5, 0xfffffffffffffffe)
add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
request_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='$.\x00', 0x0)
pipe2$9p(&(0x7f0000000240)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff}, 0x0)
write$P9_RVERSION(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f9870000c6504df67f00000000000000e98b4b153dffff082dbb78abd55fba3da80b856445ab1006487179e001b66c90c0473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd8824692f08ff8675bdf17ea1c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a671164679079d00"/148], 0x15)
r3 = dup(r2)
write$FUSE_BMAP(r3, &(0x7f0000000080)={0x18, 0x0, 0x6}, 0x18)
write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r5=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r5)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0, <r6=>0x0}, &(0x7f0000000580)=0xc)
r7 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r8=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r8)
r9 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r10=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r10)
r11 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x7)
lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, <r12=>0x0})
mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2000, &(0x7f0000000600)=ANY=[@ANYBLOB="7472616e733d7463702c706f72743d3078303030303030303030303030346532312c6163636573733d757365722c616e616d653d6e732f6d6e74002c6d61736b3d5e4d415941415001c8000000000000003d", @ANYRESDEC=r12, @ANYBLOB=',measure,smackfshat=TIPCv2\x00,\x00'])
r13 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x811, r13, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r13, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@loopback, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r14=>0x0}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xff2d)
setreuid(r14, r12)
stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, <r15=>0x0})
mount$fuse(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x40000, &(0x7f0000000800)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYRESDEC=r6, @ANYBLOB=',default_permissions,uid>', @ANYRESDEC=r8, @ANYBLOB=',fow%er<', @ANYRESDEC=r10, @ANYBLOB=',obj_type=keyring\x00,fscontext=root,rootcontext=unconfined_u,obj_role=security,uid=', @ANYRESDEC=r15, @ANYBLOB="2c7375626a5f757365723d74727573746564656d304000000000000000747275737465646b657972696e67637075736574d6379d9e4501302cf62a174b1073676a6499183a6a41735b802416248fce940f0a1c1d242c6673636f6e746578743d756e636f6e66696e65645f752c00"])
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='tran\x00\x00\x00\x00\x00\x00\x00\x00no=', @ANYRESHEX=r1, @ANYBLOB="2c7766646e9063ae6f3d684b22d93e8bf0a50500350000000000005e1a62fc6e1305f19d04b736e24adeda822a", @ANYRESHEX=r2, @ANYBLOB=',\x00'])
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={<r16=>0xffffffffffffffff})
dup2(r16, r16)
ioctl$EXT4_IOC_MOVE_EXT(r16, 0xc028660f, &(0x7f0000000300)={0x0, r2, 0x3ff, 0x10000, 0x4, 0x1})
r17 = mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5})
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedreceive(r17, &(0x7f0000000380)=""/204, 0x2b3, 0x0, 0x0)
umount2(&(0x7f0000000340)='./file0\x00', 0x3)
lseek(r0, 0x0, 0x0)
r18 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0)
lseek(r18, 0x0, 0x0)
socket$inet(0x2, 0x4, 0x0)

19:16:26 executing program 0:
r0 = socket(0x10, 0x80002, 0x0)
ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071")
rt_sigaction(0x27, 0x0, 0x0, 0x8, &(0x7f0000000100))

19:16:26 executing program 5:
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
fcntl$setstatus(r0, 0x4, 0x2000)
bpf$MAP_CREATE(0x0, &(0x7f0000001b00)={0xa, 0x1d, 0x400, 0xc, 0x42}, 0x3f0)
openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xa)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
openat$full(0xffffffffffffff9c, 0x0, 0x1c0a00, 0x0)

19:16:26 executing program 2:
r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0)
write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={<r1=>0xffffffffffffffff}, 0x2}}, 0x20)
write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000400)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev, 0x4}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x48)

19:16:26 executing program 0:
r0 = socket(0x10, 0x80002, 0x0)
ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071")
rt_sigaction(0x27, 0x0, 0x0, 0x8, &(0x7f0000000100))

19:16:26 executing program 3:
r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0)
perf_event_open(&(0x7f0000000140)={0x0, 0xffffffffffffff65, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x21, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB='l\x00\x00', @ANYRES16=0x0, @ANYBLOB="0000f8ff0000e8ffffff0300000058000100100001007564703a73797a300000000015d044000400200001000a00000000000000ff01000000000000000000000000000100000000200002000a00000000000000ff020000000000000000000000000001"], 0x3}}, 0x0)
ioctl(r0, 0xfffffbfffff3ffa7, &(0x7f0000000140))

19:16:26 executing program 2:
r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0)
perf_event_open(&(0x7f0000000140)={0x0, 0xffffffffffffff65, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x21, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB='l\x00\x00', @ANYRES16=0x0, @ANYBLOB="0000f8ff0000e8ffffff0300000058000100100001007564703a73797a300000000015d044000400200001000a00000000000000ff01000000000000000000000000000100000000200002000a00000000000000ff020000000000000000000000000001"], 0x3}}, 0x0)
ioctl(r0, 0xfffffbfffff3ffa7, &(0x7f0000000140))

19:16:26 executing program 5:
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
fcntl$setstatus(r0, 0x4, 0x2000)
bpf$MAP_CREATE(0x0, &(0x7f0000001b00)={0xa, 0x1d, 0x400, 0xc, 0x42}, 0x3f0)
openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xa)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
openat$full(0xffffffffffffff9c, 0x0, 0x1c0a00, 0x0)

19:16:26 executing program 1:
r0 = socket(0x10, 0x80002, 0x0)
ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071")
rt_sigaction(0x27, 0x0, 0x0, 0x8, &(0x7f0000000100))

19:16:26 executing program 0:
r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0)
perf_event_open(&(0x7f0000000140)={0x0, 0xffffffffffffff65, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x21, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB='l\x00\x00', @ANYRES16=0x0, @ANYBLOB="0000f8ff0000e8ffffff0300000058000100100001007564703a73797a300000000015d044000400200001000a00000000000000ff01000000000000000000000000000100000000200002000a00000000000000ff020000000000000000000000000001"], 0x3}}, 0x0)
ioctl(r0, 0xfffffbfffff3ffa7, &(0x7f0000000140))

19:16:27 executing program 2:
r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0)
perf_event_open(&(0x7f0000000140)={0x0, 0xffffffffffffff65, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x21, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB='l\x00\x00', @ANYRES16=0x0, @ANYBLOB="0000f8ff0000e8ffffff0300000058000100100001007564703a73797a300000000015d044000400200001000a00000000000000ff01000000000000000000000000000100000000200002000a00000000000000ff020000000000000000000000000001"], 0x3}}, 0x0)
ioctl(r0, 0xfffffbfffff3ffa7, &(0x7f0000000140))

19:16:27 executing program 3:
r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0)
perf_event_open(&(0x7f0000000140)={0x0, 0xffffffffffffff65, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x21, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB='l\x00\x00', @ANYRES16=0x0, @ANYBLOB="0000f8ff0000e8ffffff0300000058000100100001007564703a73797a300000000015d044000400200001000a00000000000000ff01000000000000000000000000000100000000200002000a00000000000000ff020000000000000000000000000001"], 0x3}}, 0x0)
ioctl(r0, 0xfffffbfffff3ffa7, &(0x7f0000000140))

19:16:27 executing program 5:
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
fcntl$setstatus(r0, 0x4, 0x2000)
bpf$MAP_CREATE(0x0, &(0x7f0000001b00)={0xa, 0x1d, 0x400, 0xc, 0x42}, 0x3f0)
openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xa)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
openat$full(0xffffffffffffff9c, 0x0, 0x1c0a00, 0x0)

19:16:27 executing program 4:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/null\x00', 0x40000, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x7a, &(0x7f0000000700)=ANY=[@ANYBLOB="000800b867f2ad8bb8368900910000008100000086dd600200b69800"/64], 0x0)
keyctl$set_reqkey_keyring(0x5, 0xfffffffffffffffe)
add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
request_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='$.\x00', 0x0)
pipe2$9p(&(0x7f0000000240)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff}, 0x0)
write$P9_RVERSION(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f9870000c6504df67f00000000000000e98b4b153dffff082dbb78abd55fba3da80b856445ab1006487179e001b66c90c0473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd8824692f08ff8675bdf17ea1c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a671164679079d00"/148], 0x15)
r3 = dup(r2)
write$FUSE_BMAP(r3, &(0x7f0000000080)={0x18, 0x0, 0x6}, 0x18)
write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r5=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r5)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0, <r6=>0x0}, &(0x7f0000000580)=0xc)
r7 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r8=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r8)
r9 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r10=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r10)
r11 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x7)
lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, <r12=>0x0})
mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2000, &(0x7f0000000600)=ANY=[@ANYBLOB="7472616e733d7463702c706f72743d3078303030303030303030303030346532312c6163636573733d757365722c616e616d653d6e732f6d6e74002c6d61736b3d5e4d415941415001c8000000000000003d", @ANYRESDEC=r12, @ANYBLOB=',measure,smackfshat=TIPCv2\x00,\x00'])
r13 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x811, r13, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r13, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@loopback, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r14=>0x0}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xff2d)
setreuid(r14, r12)
stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, <r15=>0x0})
mount$fuse(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x40000, &(0x7f0000000800)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYRESDEC=r6, @ANYBLOB=',default_permissions,uid>', @ANYRESDEC=r8, @ANYBLOB=',fow%er<', @ANYRESDEC=r10, @ANYBLOB=',obj_type=keyring\x00,fscontext=root,rootcontext=unconfined_u,obj_role=security,uid=', @ANYRESDEC=r15, @ANYBLOB="2c7375626a5f757365723d74727573746564656d304000000000000000747275737465646b657972696e67637075736574d6379d9e4501302cf62a174b1073676a6499183a6a41735b802416248fce940f0a1c1d242c6673636f6e746578743d756e636f6e66696e65645f752c00"])
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='tran\x00\x00\x00\x00\x00\x00\x00\x00no=', @ANYRESHEX=r1, @ANYBLOB="2c7766646e9063ae6f3d684b22d93e8bf0a50500350000000000005e1a62fc6e1305f19d04b736e24adeda822a", @ANYRESHEX=r2, @ANYBLOB=',\x00'])
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={<r16=>0xffffffffffffffff})
dup2(r16, r16)
ioctl$EXT4_IOC_MOVE_EXT(r16, 0xc028660f, &(0x7f0000000300)={0x0, r2, 0x3ff, 0x10000, 0x4, 0x1})
r17 = mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5})
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedreceive(r17, &(0x7f0000000380)=""/204, 0x2b3, 0x0, 0x0)
umount2(&(0x7f0000000340)='./file0\x00', 0x3)
lseek(r0, 0x0, 0x0)
r18 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0)
lseek(r18, 0x0, 0x0)
socket$inet(0x2, 0x4, 0x0)

19:16:27 executing program 1:
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
fcntl$setstatus(r0, 0x4, 0x2000)
bpf$MAP_CREATE(0x0, &(0x7f0000001b00)={0xa, 0x1d, 0x400, 0xc, 0x42}, 0x3f0)
openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xa)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
openat$full(0xffffffffffffff9c, 0x0, 0x1c0a00, 0x0)

19:16:27 executing program 0:
r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0)
perf_event_open(&(0x7f0000000140)={0x0, 0xffffffffffffff65, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x21, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB='l\x00\x00', @ANYRES16=0x0, @ANYBLOB="0000f8ff0000e8ffffff0300000058000100100001007564703a73797a300000000015d044000400200001000a00000000000000ff01000000000000000000000000000100000000200002000a00000000000000ff020000000000000000000000000001"], 0x3}}, 0x0)
ioctl(r0, 0xfffffbfffff3ffa7, &(0x7f0000000140))

19:16:27 executing program 3:
r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0)
perf_event_open(&(0x7f0000000140)={0x0, 0xffffffffffffff65, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x21, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB='l\x00\x00', @ANYRES16=0x0, @ANYBLOB="0000f8ff0000e8ffffff0300000058000100100001007564703a73797a300000000015d044000400200001000a00000000000000ff01000000000000000000000000000100000000200002000a00000000000000ff020000000000000000000000000001"], 0x3}}, 0x0)
ioctl(r0, 0xfffffbfffff3ffa7, &(0x7f0000000140))

19:16:27 executing program 5:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/null\x00', 0x40000, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x7a, &(0x7f0000000700)=ANY=[@ANYBLOB="000800b867f2ad8bb8368900910000008100000086dd600200b69800"/64], 0x0)
keyctl$set_reqkey_keyring(0x5, 0xfffffffffffffffe)
add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
request_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='$.\x00', 0x0)
pipe2$9p(&(0x7f0000000240)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff}, 0x0)
write$P9_RVERSION(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f9870000c6504df67f00000000000000e98b4b153dffff082dbb78abd55fba3da80b856445ab1006487179e001b66c90c0473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd8824692f08ff8675bdf17ea1c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a671164679079d00"/148], 0x15)
r3 = dup(r2)
write$FUSE_BMAP(r3, &(0x7f0000000080)={0x18, 0x0, 0x6}, 0x18)
write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r5=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r5)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0, <r6=>0x0}, &(0x7f0000000580)=0xc)
r7 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r8=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r8)
r9 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r10=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r10)
r11 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x7)
lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, <r12=>0x0})
mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2000, &(0x7f0000000600)=ANY=[@ANYBLOB="7472616e733d7463702c706f72743d3078303030303030303030303030346532312c6163636573733d757365722c616e616d653d6e732f6d6e74002c6d61736b3d5e4d415941415001c8000000000000003d", @ANYRESDEC=r12, @ANYBLOB=',measure,smackfshat=TIPCv2\x00,\x00'])
r13 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x811, r13, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r13, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@loopback, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r14=>0x0}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xff2d)
setreuid(r14, r12)
stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, <r15=>0x0})
mount$fuse(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x40000, &(0x7f0000000800)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYRESDEC=r6, @ANYBLOB=',default_permissions,uid>', @ANYRESDEC=r8, @ANYBLOB=',fow%er<', @ANYRESDEC=r10, @ANYBLOB=',obj_type=keyring\x00,fscontext=root,rootcontext=unconfined_u,obj_role=security,uid=', @ANYRESDEC=r15, @ANYBLOB="2c7375626a5f757365723d74727573746564656d304000000000000000747275737465646b657972696e67637075736574d6379d9e4501302cf62a174b1073676a6499183a6a41735b802416248fce940f0a1c1d242c6673636f6e746578743d756e636f6e66696e65645f752c00"])
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='tran\x00\x00\x00\x00\x00\x00\x00\x00no=', @ANYRESHEX=r1, @ANYBLOB="2c7766646e9063ae6f3d684b22d93e8bf0a50500350000000000005e1a62fc6e1305f19d04b736e24adeda822a", @ANYRESHEX=r2, @ANYBLOB=',\x00'])
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={<r16=>0xffffffffffffffff})
dup2(r16, r16)
ioctl$EXT4_IOC_MOVE_EXT(r16, 0xc028660f, &(0x7f0000000300)={0x0, r2, 0x3ff, 0x10000, 0x4, 0x1})
r17 = mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5})
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedreceive(r17, &(0x7f0000000380)=""/204, 0x2b3, 0x0, 0x0)
umount2(&(0x7f0000000340)='./file0\x00', 0x3)
lseek(r0, 0x0, 0x0)
r18 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0)
lseek(r18, 0x0, 0x0)
socket$inet(0x2, 0x4, 0x0)

19:16:27 executing program 2:
r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0)
perf_event_open(&(0x7f0000000140)={0x0, 0xffffffffffffff65, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x21, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB='l\x00\x00', @ANYRES16=0x0, @ANYBLOB="0000f8ff0000e8ffffff0300000058000100100001007564703a73797a300000000015d044000400200001000a00000000000000ff01000000000000000000000000000100000000200002000a00000000000000ff020000000000000000000000000001"], 0x3}}, 0x0)
ioctl(r0, 0xfffffbfffff3ffa7, &(0x7f0000000140))

19:16:27 executing program 1:
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
fcntl$setstatus(r0, 0x4, 0x2000)
bpf$MAP_CREATE(0x0, &(0x7f0000001b00)={0xa, 0x1d, 0x400, 0xc, 0x42}, 0x3f0)
openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xa)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
openat$full(0xffffffffffffff9c, 0x0, 0x1c0a00, 0x0)

19:16:27 executing program 2:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/null\x00', 0x40000, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x7a, &(0x7f0000000700)=ANY=[@ANYBLOB="000800b867f2ad8bb8368900910000008100000086dd600200b69800"/64], 0x0)
keyctl$set_reqkey_keyring(0x5, 0xfffffffffffffffe)
add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
request_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='$.\x00', 0x0)
pipe2$9p(&(0x7f0000000240)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff}, 0x0)
write$P9_RVERSION(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f9870000c6504df67f00000000000000e98b4b153dffff082dbb78abd55fba3da80b856445ab1006487179e001b66c90c0473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd8824692f08ff8675bdf17ea1c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a671164679079d00"/148], 0x15)
r3 = dup(r2)
write$FUSE_BMAP(r3, &(0x7f0000000080)={0x18, 0x0, 0x6}, 0x18)
write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r5=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r5)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0, <r6=>0x0}, &(0x7f0000000580)=0xc)
r7 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r8=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r8)
r9 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r10=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r10)
r11 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x7)
lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, <r12=>0x0})
mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2000, &(0x7f0000000600)=ANY=[@ANYBLOB="7472616e733d7463702c706f72743d3078303030303030303030303030346532312c6163636573733d757365722c616e616d653d6e732f6d6e74002c6d61736b3d5e4d415941415001c8000000000000003d", @ANYRESDEC=r12, @ANYBLOB=',measure,smackfshat=TIPCv2\x00,\x00'])
r13 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x811, r13, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r13, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@loopback, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r14=>0x0}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xff2d)
setreuid(r14, r12)
stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, <r15=>0x0})
mount$fuse(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x40000, &(0x7f0000000800)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYRESDEC=r6, @ANYBLOB=',default_permissions,uid>', @ANYRESDEC=r8, @ANYBLOB=',fow%er<', @ANYRESDEC=r10, @ANYBLOB=',obj_type=keyring\x00,fscontext=root,rootcontext=unconfined_u,obj_role=security,uid=', @ANYRESDEC=r15, @ANYBLOB="2c7375626a5f757365723d74727573746564656d304000000000000000747275737465646b657972696e67637075736574d6379d9e4501302cf62a174b1073676a6499183a6a41735b802416248fce940f0a1c1d242c6673636f6e746578743d756e636f6e66696e65645f752c00"])
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='tran\x00\x00\x00\x00\x00\x00\x00\x00no=', @ANYRESHEX=r1, @ANYBLOB="2c7766646e9063ae6f3d684b22d93e8bf0a50500350000000000005e1a62fc6e1305f19d04b736e24adeda822a", @ANYRESHEX=r2, @ANYBLOB=',\x00'])
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={<r16=>0xffffffffffffffff})
dup2(r16, r16)
ioctl$EXT4_IOC_MOVE_EXT(r16, 0xc028660f, &(0x7f0000000300)={0x0, r2, 0x3ff, 0x10000, 0x4, 0x1})
r17 = mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5})
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedreceive(r17, &(0x7f0000000380)=""/204, 0x2b3, 0x0, 0x0)
umount2(&(0x7f0000000340)='./file0\x00', 0x3)
lseek(r0, 0x0, 0x0)
r18 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0)
lseek(r18, 0x0, 0x0)
socket$inet(0x2, 0x4, 0x0)

19:16:27 executing program 0:
r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x1, 0x0)
perf_event_open(&(0x7f0000000140)={0x0, 0xffffffffffffff65, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x21, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sendmsg$TIPC_NL_BEARER_ENABLE(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB='l\x00\x00', @ANYRES16=0x0, @ANYBLOB="0000f8ff0000e8ffffff0300000058000100100001007564703a73797a300000000015d044000400200001000a00000000000000ff01000000000000000000000000000100000000200002000a00000000000000ff020000000000000000000000000001"], 0x3}}, 0x0)
ioctl(r0, 0xfffffbfffff3ffa7, &(0x7f0000000140))

19:16:27 executing program 3:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/null\x00', 0x40000, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x7a, &(0x7f0000000700)=ANY=[@ANYBLOB="000800b867f2ad8bb8368900910000008100000086dd600200b69800"/64], 0x0)
keyctl$set_reqkey_keyring(0x5, 0xfffffffffffffffe)
add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
request_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='$.\x00', 0x0)
pipe2$9p(&(0x7f0000000240)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff}, 0x0)
write$P9_RVERSION(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f9870000c6504df67f00000000000000e98b4b153dffff082dbb78abd55fba3da80b856445ab1006487179e001b66c90c0473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd8824692f08ff8675bdf17ea1c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a671164679079d00"/148], 0x15)
r3 = dup(r2)
write$FUSE_BMAP(r3, &(0x7f0000000080)={0x18, 0x0, 0x6}, 0x18)
write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r5=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r5)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0, <r6=>0x0}, &(0x7f0000000580)=0xc)
r7 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r8=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r8)
r9 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r10=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r10)
r11 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x7)
lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, <r12=>0x0})
mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2000, &(0x7f0000000600)=ANY=[@ANYBLOB="7472616e733d7463702c706f72743d3078303030303030303030303030346532312c6163636573733d757365722c616e616d653d6e732f6d6e74002c6d61736b3d5e4d415941415001c8000000000000003d", @ANYRESDEC=r12, @ANYBLOB=',measure,smackfshat=TIPCv2\x00,\x00'])
r13 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x811, r13, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r13, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@loopback, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r14=>0x0}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xff2d)
setreuid(r14, r12)
stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, <r15=>0x0})
mount$fuse(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x40000, &(0x7f0000000800)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYRESDEC=r6, @ANYBLOB=',default_permissions,uid>', @ANYRESDEC=r8, @ANYBLOB=',fow%er<', @ANYRESDEC=r10, @ANYBLOB=',obj_type=keyring\x00,fscontext=root,rootcontext=unconfined_u,obj_role=security,uid=', @ANYRESDEC=r15, @ANYBLOB="2c7375626a5f757365723d74727573746564656d304000000000000000747275737465646b657972696e67637075736574d6379d9e4501302cf62a174b1073676a6499183a6a41735b802416248fce940f0a1c1d242c6673636f6e746578743d756e636f6e66696e65645f752c00"])
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='tran\x00\x00\x00\x00\x00\x00\x00\x00no=', @ANYRESHEX=r1, @ANYBLOB="2c7766646e9063ae6f3d684b22d93e8bf0a50500350000000000005e1a62fc6e1305f19d04b736e24adeda822a", @ANYRESHEX=r2, @ANYBLOB=',\x00'])
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={<r16=>0xffffffffffffffff})
dup2(r16, r16)
ioctl$EXT4_IOC_MOVE_EXT(r16, 0xc028660f, &(0x7f0000000300)={0x0, r2, 0x3ff, 0x10000, 0x4, 0x1})
r17 = mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5})
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedreceive(r17, &(0x7f0000000380)=""/204, 0x2b3, 0x0, 0x0)
umount2(&(0x7f0000000340)='./file0\x00', 0x3)
lseek(r0, 0x0, 0x0)
r18 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0)
lseek(r18, 0x0, 0x0)
socket$inet(0x2, 0x4, 0x0)

19:16:27 executing program 1:
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
fcntl$setstatus(r0, 0x4, 0x2000)
bpf$MAP_CREATE(0x0, &(0x7f0000001b00)={0xa, 0x1d, 0x400, 0xc, 0x42}, 0x3f0)
openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xa)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
openat$full(0xffffffffffffff9c, 0x0, 0x1c0a00, 0x0)

19:16:27 executing program 4:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/null\x00', 0x40000, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x7a, &(0x7f0000000700)=ANY=[@ANYBLOB="000800b867f2ad8bb8368900910000008100000086dd600200b69800"/64], 0x0)
keyctl$set_reqkey_keyring(0x5, 0xfffffffffffffffe)
add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
request_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='$.\x00', 0x0)
pipe2$9p(&(0x7f0000000240)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff}, 0x0)
write$P9_RVERSION(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f9870000c6504df67f00000000000000e98b4b153dffff082dbb78abd55fba3da80b856445ab1006487179e001b66c90c0473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd8824692f08ff8675bdf17ea1c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a671164679079d00"/148], 0x15)
r3 = dup(r2)
write$FUSE_BMAP(r3, &(0x7f0000000080)={0x18, 0x0, 0x6}, 0x18)
write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r5=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r5)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0, <r6=>0x0}, &(0x7f0000000580)=0xc)
r7 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r8=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r8)
r9 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r10=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r10)
r11 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x7)
lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, <r12=>0x0})
mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2000, &(0x7f0000000600)=ANY=[@ANYBLOB="7472616e733d7463702c706f72743d3078303030303030303030303030346532312c6163636573733d757365722c616e616d653d6e732f6d6e74002c6d61736b3d5e4d415941415001c8000000000000003d", @ANYRESDEC=r12, @ANYBLOB=',measure,smackfshat=TIPCv2\x00,\x00'])
r13 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x811, r13, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r13, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@loopback, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r14=>0x0}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xff2d)
setreuid(r14, r12)
stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, <r15=>0x0})
mount$fuse(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x40000, &(0x7f0000000800)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYRESDEC=r6, @ANYBLOB=',default_permissions,uid>', @ANYRESDEC=r8, @ANYBLOB=',fow%er<', @ANYRESDEC=r10, @ANYBLOB=',obj_type=keyring\x00,fscontext=root,rootcontext=unconfined_u,obj_role=security,uid=', @ANYRESDEC=r15, @ANYBLOB="2c7375626a5f757365723d74727573746564656d304000000000000000747275737465646b657972696e67637075736574d6379d9e4501302cf62a174b1073676a6499183a6a41735b802416248fce940f0a1c1d242c6673636f6e746578743d756e636f6e66696e65645f752c00"])
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='tran\x00\x00\x00\x00\x00\x00\x00\x00no=', @ANYRESHEX=r1, @ANYBLOB="2c7766646e9063ae6f3d684b22d93e8bf0a50500350000000000005e1a62fc6e1305f19d04b736e24adeda822a", @ANYRESHEX=r2, @ANYBLOB=',\x00'])
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={<r16=>0xffffffffffffffff})
dup2(r16, r16)
ioctl$EXT4_IOC_MOVE_EXT(r16, 0xc028660f, &(0x7f0000000300)={0x0, r2, 0x3ff, 0x10000, 0x4, 0x1})
r17 = mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5})
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedreceive(r17, &(0x7f0000000380)=""/204, 0x2b3, 0x0, 0x0)
umount2(&(0x7f0000000340)='./file0\x00', 0x3)
lseek(r0, 0x0, 0x0)
r18 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0)
lseek(r18, 0x0, 0x0)
socket$inet(0x2, 0x4, 0x0)

19:16:27 executing program 0:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/null\x00', 0x40000, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x7a, &(0x7f0000000700)=ANY=[@ANYBLOB="000800b867f2ad8bb8368900910000008100000086dd600200b69800"/64], 0x0)
keyctl$set_reqkey_keyring(0x5, 0xfffffffffffffffe)
add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
request_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='$.\x00', 0x0)
pipe2$9p(&(0x7f0000000240)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff}, 0x0)
write$P9_RVERSION(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f9870000c6504df67f00000000000000e98b4b153dffff082dbb78abd55fba3da80b856445ab1006487179e001b66c90c0473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd8824692f08ff8675bdf17ea1c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a671164679079d00"/148], 0x15)
r3 = dup(r2)
write$FUSE_BMAP(r3, &(0x7f0000000080)={0x18, 0x0, 0x6}, 0x18)
write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r5=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r5)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0, <r6=>0x0}, &(0x7f0000000580)=0xc)
r7 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r8=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r8)
r9 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r10=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r10)
r11 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x7)
lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, <r12=>0x0})
mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2000, &(0x7f0000000600)=ANY=[@ANYBLOB="7472616e733d7463702c706f72743d3078303030303030303030303030346532312c6163636573733d757365722c616e616d653d6e732f6d6e74002c6d61736b3d5e4d415941415001c8000000000000003d", @ANYRESDEC=r12, @ANYBLOB=',measure,smackfshat=TIPCv2\x00,\x00'])
r13 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x811, r13, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r13, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@loopback, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r14=>0x0}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xff2d)
setreuid(r14, r12)
stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, <r15=>0x0})
mount$fuse(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x40000, &(0x7f0000000800)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYRESDEC=r6, @ANYBLOB=',default_permissions,uid>', @ANYRESDEC=r8, @ANYBLOB=',fow%er<', @ANYRESDEC=r10, @ANYBLOB=',obj_type=keyring\x00,fscontext=root,rootcontext=unconfined_u,obj_role=security,uid=', @ANYRESDEC=r15, @ANYBLOB="2c7375626a5f757365723d74727573746564656d304000000000000000747275737465646b657972696e67637075736574d6379d9e4501302cf62a174b1073676a6499183a6a41735b802416248fce940f0a1c1d242c6673636f6e746578743d756e636f6e66696e65645f752c00"])
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='tran\x00\x00\x00\x00\x00\x00\x00\x00no=', @ANYRESHEX=r1, @ANYBLOB="2c7766646e9063ae6f3d684b22d93e8bf0a50500350000000000005e1a62fc6e1305f19d04b736e24adeda822a", @ANYRESHEX=r2, @ANYBLOB=',\x00'])
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={<r16=>0xffffffffffffffff})
dup2(r16, r16)
ioctl$EXT4_IOC_MOVE_EXT(r16, 0xc028660f, &(0x7f0000000300)={0x0, r2, 0x3ff, 0x10000, 0x4, 0x1})
r17 = mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5})
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedreceive(r17, &(0x7f0000000380)=""/204, 0x2b3, 0x0, 0x0)
umount2(&(0x7f0000000340)='./file0\x00', 0x3)
lseek(r0, 0x0, 0x0)
r18 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0)
lseek(r18, 0x0, 0x0)
socket$inet(0x2, 0x4, 0x0)

19:16:28 executing program 1:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/null\x00', 0x40000, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x7a, &(0x7f0000000700)=ANY=[@ANYBLOB="000800b867f2ad8bb8368900910000008100000086dd600200b69800"/64], 0x0)
keyctl$set_reqkey_keyring(0x5, 0xfffffffffffffffe)
add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
request_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='$.\x00', 0x0)
pipe2$9p(&(0x7f0000000240)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff}, 0x0)
write$P9_RVERSION(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f9870000c6504df67f00000000000000e98b4b153dffff082dbb78abd55fba3da80b856445ab1006487179e001b66c90c0473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd8824692f08ff8675bdf17ea1c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a671164679079d00"/148], 0x15)
r3 = dup(r2)
write$FUSE_BMAP(r3, &(0x7f0000000080)={0x18, 0x0, 0x6}, 0x18)
write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r5=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r5)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0, <r6=>0x0}, &(0x7f0000000580)=0xc)
r7 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r8=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r8)
r9 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r10=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r10)
r11 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x7)
lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, <r12=>0x0})
mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2000, &(0x7f0000000600)=ANY=[@ANYBLOB="7472616e733d7463702c706f72743d3078303030303030303030303030346532312c6163636573733d757365722c616e616d653d6e732f6d6e74002c6d61736b3d5e4d415941415001c8000000000000003d", @ANYRESDEC=r12, @ANYBLOB=',measure,smackfshat=TIPCv2\x00,\x00'])
r13 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x811, r13, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r13, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@loopback, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r14=>0x0}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xff2d)
setreuid(r14, r12)
stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, <r15=>0x0})
mount$fuse(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x40000, &(0x7f0000000800)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYRESDEC=r6, @ANYBLOB=',default_permissions,uid>', @ANYRESDEC=r8, @ANYBLOB=',fow%er<', @ANYRESDEC=r10, @ANYBLOB=',obj_type=keyring\x00,fscontext=root,rootcontext=unconfined_u,obj_role=security,uid=', @ANYRESDEC=r15, @ANYBLOB="2c7375626a5f757365723d74727573746564656d304000000000000000747275737465646b657972696e67637075736574d6379d9e4501302cf62a174b1073676a6499183a6a41735b802416248fce940f0a1c1d242c6673636f6e746578743d756e636f6e66696e65645f752c00"])
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='tran\x00\x00\x00\x00\x00\x00\x00\x00no=', @ANYRESHEX=r1, @ANYBLOB="2c7766646e9063ae6f3d684b22d93e8bf0a50500350000000000005e1a62fc6e1305f19d04b736e24adeda822a", @ANYRESHEX=r2, @ANYBLOB=',\x00'])
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={<r16=>0xffffffffffffffff})
dup2(r16, r16)
ioctl$EXT4_IOC_MOVE_EXT(r16, 0xc028660f, &(0x7f0000000300)={0x0, r2, 0x3ff, 0x10000, 0x4, 0x1})
r17 = mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5})
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedreceive(r17, &(0x7f0000000380)=""/204, 0x2b3, 0x0, 0x0)
umount2(&(0x7f0000000340)='./file0\x00', 0x3)
lseek(r0, 0x0, 0x0)
r18 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0)
lseek(r18, 0x0, 0x0)
socket$inet(0x2, 0x4, 0x0)

19:16:28 executing program 5:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/null\x00', 0x40000, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x7a, &(0x7f0000000700)=ANY=[@ANYBLOB="000800b867f2ad8bb8368900910000008100000086dd600200b69800"/64], 0x0)
keyctl$set_reqkey_keyring(0x5, 0xfffffffffffffffe)
add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
request_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='$.\x00', 0x0)
pipe2$9p(&(0x7f0000000240)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff}, 0x0)
write$P9_RVERSION(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f9870000c6504df67f00000000000000e98b4b153dffff082dbb78abd55fba3da80b856445ab1006487179e001b66c90c0473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd8824692f08ff8675bdf17ea1c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a671164679079d00"/148], 0x15)
r3 = dup(r2)
write$FUSE_BMAP(r3, &(0x7f0000000080)={0x18, 0x0, 0x6}, 0x18)
write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r5=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r5)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0, <r6=>0x0}, &(0x7f0000000580)=0xc)
r7 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r8=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r8)
r9 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r10=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r10)
r11 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x7)
lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, <r12=>0x0})
mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2000, &(0x7f0000000600)=ANY=[@ANYBLOB="7472616e733d7463702c706f72743d3078303030303030303030303030346532312c6163636573733d757365722c616e616d653d6e732f6d6e74002c6d61736b3d5e4d415941415001c8000000000000003d", @ANYRESDEC=r12, @ANYBLOB=',measure,smackfshat=TIPCv2\x00,\x00'])
r13 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x811, r13, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r13, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@loopback, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r14=>0x0}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xff2d)
setreuid(r14, r12)
stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, <r15=>0x0})
mount$fuse(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x40000, &(0x7f0000000800)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYRESDEC=r6, @ANYBLOB=',default_permissions,uid>', @ANYRESDEC=r8, @ANYBLOB=',fow%er<', @ANYRESDEC=r10, @ANYBLOB=',obj_type=keyring\x00,fscontext=root,rootcontext=unconfined_u,obj_role=security,uid=', @ANYRESDEC=r15, @ANYBLOB="2c7375626a5f757365723d74727573746564656d304000000000000000747275737465646b657972696e67637075736574d6379d9e4501302cf62a174b1073676a6499183a6a41735b802416248fce940f0a1c1d242c6673636f6e746578743d756e636f6e66696e65645f752c00"])
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='tran\x00\x00\x00\x00\x00\x00\x00\x00no=', @ANYRESHEX=r1, @ANYBLOB="2c7766646e9063ae6f3d684b22d93e8bf0a50500350000000000005e1a62fc6e1305f19d04b736e24adeda822a", @ANYRESHEX=r2, @ANYBLOB=',\x00'])
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={<r16=>0xffffffffffffffff})
dup2(r16, r16)
ioctl$EXT4_IOC_MOVE_EXT(r16, 0xc028660f, &(0x7f0000000300)={0x0, r2, 0x3ff, 0x10000, 0x4, 0x1})
r17 = mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5})
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedreceive(r17, &(0x7f0000000380)=""/204, 0x2b3, 0x0, 0x0)
umount2(&(0x7f0000000340)='./file0\x00', 0x3)
lseek(r0, 0x0, 0x0)
r18 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0)
lseek(r18, 0x0, 0x0)
socket$inet(0x2, 0x4, 0x0)

19:16:28 executing program 2:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/null\x00', 0x40000, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x7a, &(0x7f0000000700)=ANY=[@ANYBLOB="000800b867f2ad8bb8368900910000008100000086dd600200b69800"/64], 0x0)
keyctl$set_reqkey_keyring(0x5, 0xfffffffffffffffe)
add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
request_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='$.\x00', 0x0)
pipe2$9p(&(0x7f0000000240)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff}, 0x0)
write$P9_RVERSION(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f9870000c6504df67f00000000000000e98b4b153dffff082dbb78abd55fba3da80b856445ab1006487179e001b66c90c0473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd8824692f08ff8675bdf17ea1c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a671164679079d00"/148], 0x15)
r3 = dup(r2)
write$FUSE_BMAP(r3, &(0x7f0000000080)={0x18, 0x0, 0x6}, 0x18)
write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r5=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r5)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0, <r6=>0x0}, &(0x7f0000000580)=0xc)
r7 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r8=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r8)
r9 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r10=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r10)
r11 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x7)
lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, <r12=>0x0})
mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2000, &(0x7f0000000600)=ANY=[@ANYBLOB="7472616e733d7463702c706f72743d3078303030303030303030303030346532312c6163636573733d757365722c616e616d653d6e732f6d6e74002c6d61736b3d5e4d415941415001c8000000000000003d", @ANYRESDEC=r12, @ANYBLOB=',measure,smackfshat=TIPCv2\x00,\x00'])
r13 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x811, r13, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r13, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@loopback, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r14=>0x0}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xff2d)
setreuid(r14, r12)
stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, <r15=>0x0})
mount$fuse(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x40000, &(0x7f0000000800)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYRESDEC=r6, @ANYBLOB=',default_permissions,uid>', @ANYRESDEC=r8, @ANYBLOB=',fow%er<', @ANYRESDEC=r10, @ANYBLOB=',obj_type=keyring\x00,fscontext=root,rootcontext=unconfined_u,obj_role=security,uid=', @ANYRESDEC=r15, @ANYBLOB="2c7375626a5f757365723d74727573746564656d304000000000000000747275737465646b657972696e67637075736574d6379d9e4501302cf62a174b1073676a6499183a6a41735b802416248fce940f0a1c1d242c6673636f6e746578743d756e636f6e66696e65645f752c00"])
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='tran\x00\x00\x00\x00\x00\x00\x00\x00no=', @ANYRESHEX=r1, @ANYBLOB="2c7766646e9063ae6f3d684b22d93e8bf0a50500350000000000005e1a62fc6e1305f19d04b736e24adeda822a", @ANYRESHEX=r2, @ANYBLOB=',\x00'])
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={<r16=>0xffffffffffffffff})
dup2(r16, r16)
ioctl$EXT4_IOC_MOVE_EXT(r16, 0xc028660f, &(0x7f0000000300)={0x0, r2, 0x3ff, 0x10000, 0x4, 0x1})
r17 = mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5})
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedreceive(r17, &(0x7f0000000380)=""/204, 0x2b3, 0x0, 0x0)
umount2(&(0x7f0000000340)='./file0\x00', 0x3)
lseek(r0, 0x0, 0x0)
r18 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0)
lseek(r18, 0x0, 0x0)
socket$inet(0x2, 0x4, 0x0)

19:16:28 executing program 4:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/null\x00', 0x40000, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x7a, &(0x7f0000000700)=ANY=[@ANYBLOB="000800b867f2ad8bb8368900910000008100000086dd600200b69800"/64], 0x0)
keyctl$set_reqkey_keyring(0x5, 0xfffffffffffffffe)
add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
request_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='$.\x00', 0x0)
pipe2$9p(&(0x7f0000000240)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff}, 0x0)
write$P9_RVERSION(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f9870000c6504df67f00000000000000e98b4b153dffff082dbb78abd55fba3da80b856445ab1006487179e001b66c90c0473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd8824692f08ff8675bdf17ea1c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a671164679079d00"/148], 0x15)
r3 = dup(r2)
write$FUSE_BMAP(r3, &(0x7f0000000080)={0x18, 0x0, 0x6}, 0x18)
write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r5=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r5)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0, <r6=>0x0}, &(0x7f0000000580)=0xc)
r7 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r8=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r8)
r9 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r10=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r10)
r11 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x7)
lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, <r12=>0x0})
mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2000, &(0x7f0000000600)=ANY=[@ANYBLOB="7472616e733d7463702c706f72743d3078303030303030303030303030346532312c6163636573733d757365722c616e616d653d6e732f6d6e74002c6d61736b3d5e4d415941415001c8000000000000003d", @ANYRESDEC=r12, @ANYBLOB=',measure,smackfshat=TIPCv2\x00,\x00'])
r13 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x811, r13, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r13, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@loopback, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r14=>0x0}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xff2d)
setreuid(r14, r12)
stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, <r15=>0x0})
mount$fuse(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x40000, &(0x7f0000000800)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYRESDEC=r6, @ANYBLOB=',default_permissions,uid>', @ANYRESDEC=r8, @ANYBLOB=',fow%er<', @ANYRESDEC=r10, @ANYBLOB=',obj_type=keyring\x00,fscontext=root,rootcontext=unconfined_u,obj_role=security,uid=', @ANYRESDEC=r15, @ANYBLOB="2c7375626a5f757365723d74727573746564656d304000000000000000747275737465646b657972696e67637075736574d6379d9e4501302cf62a174b1073676a6499183a6a41735b802416248fce940f0a1c1d242c6673636f6e746578743d756e636f6e66696e65645f752c00"])
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='tran\x00\x00\x00\x00\x00\x00\x00\x00no=', @ANYRESHEX=r1, @ANYBLOB="2c7766646e9063ae6f3d684b22d93e8bf0a50500350000000000005e1a62fc6e1305f19d04b736e24adeda822a", @ANYRESHEX=r2, @ANYBLOB=',\x00'])
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={<r16=>0xffffffffffffffff})
dup2(r16, r16)
ioctl$EXT4_IOC_MOVE_EXT(r16, 0xc028660f, &(0x7f0000000300)={0x0, r2, 0x3ff, 0x10000, 0x4, 0x1})
r17 = mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5})
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedreceive(r17, &(0x7f0000000380)=""/204, 0x2b3, 0x0, 0x0)
umount2(&(0x7f0000000340)='./file0\x00', 0x3)
lseek(r0, 0x0, 0x0)
r18 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0)
lseek(r18, 0x0, 0x0)
socket$inet(0x2, 0x4, 0x0)

19:16:28 executing program 3:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/null\x00', 0x40000, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x7a, &(0x7f0000000700)=ANY=[@ANYBLOB="000800b867f2ad8bb8368900910000008100000086dd600200b69800"/64], 0x0)
keyctl$set_reqkey_keyring(0x5, 0xfffffffffffffffe)
add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
request_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='$.\x00', 0x0)
pipe2$9p(&(0x7f0000000240)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff}, 0x0)
write$P9_RVERSION(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f9870000c6504df67f00000000000000e98b4b153dffff082dbb78abd55fba3da80b856445ab1006487179e001b66c90c0473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd8824692f08ff8675bdf17ea1c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a671164679079d00"/148], 0x15)
r3 = dup(r2)
write$FUSE_BMAP(r3, &(0x7f0000000080)={0x18, 0x0, 0x6}, 0x18)
write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r5=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r5)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0, <r6=>0x0}, &(0x7f0000000580)=0xc)
r7 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r8=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r8)
r9 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r10=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r10)
r11 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x7)
lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, <r12=>0x0})
mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2000, &(0x7f0000000600)=ANY=[@ANYBLOB="7472616e733d7463702c706f72743d3078303030303030303030303030346532312c6163636573733d757365722c616e616d653d6e732f6d6e74002c6d61736b3d5e4d415941415001c8000000000000003d", @ANYRESDEC=r12, @ANYBLOB=',measure,smackfshat=TIPCv2\x00,\x00'])
r13 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x811, r13, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r13, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@loopback, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r14=>0x0}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xff2d)
setreuid(r14, r12)
stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, <r15=>0x0})
mount$fuse(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x40000, &(0x7f0000000800)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYRESDEC=r6, @ANYBLOB=',default_permissions,uid>', @ANYRESDEC=r8, @ANYBLOB=',fow%er<', @ANYRESDEC=r10, @ANYBLOB=',obj_type=keyring\x00,fscontext=root,rootcontext=unconfined_u,obj_role=security,uid=', @ANYRESDEC=r15, @ANYBLOB="2c7375626a5f757365723d74727573746564656d304000000000000000747275737465646b657972696e67637075736574d6379d9e4501302cf62a174b1073676a6499183a6a41735b802416248fce940f0a1c1d242c6673636f6e746578743d756e636f6e66696e65645f752c00"])
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='tran\x00\x00\x00\x00\x00\x00\x00\x00no=', @ANYRESHEX=r1, @ANYBLOB="2c7766646e9063ae6f3d684b22d93e8bf0a50500350000000000005e1a62fc6e1305f19d04b736e24adeda822a", @ANYRESHEX=r2, @ANYBLOB=',\x00'])
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={<r16=>0xffffffffffffffff})
dup2(r16, r16)
ioctl$EXT4_IOC_MOVE_EXT(r16, 0xc028660f, &(0x7f0000000300)={0x0, r2, 0x3ff, 0x10000, 0x4, 0x1})
r17 = mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5})
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedreceive(r17, &(0x7f0000000380)=""/204, 0x2b3, 0x0, 0x0)
umount2(&(0x7f0000000340)='./file0\x00', 0x3)
lseek(r0, 0x0, 0x0)
r18 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0)
lseek(r18, 0x0, 0x0)
socket$inet(0x2, 0x4, 0x0)

19:16:28 executing program 0:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/null\x00', 0x40000, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x7a, &(0x7f0000000700)=ANY=[@ANYBLOB="000800b867f2ad8bb8368900910000008100000086dd600200b69800"/64], 0x0)
keyctl$set_reqkey_keyring(0x5, 0xfffffffffffffffe)
add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
request_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='$.\x00', 0x0)
pipe2$9p(&(0x7f0000000240)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff}, 0x0)
write$P9_RVERSION(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f9870000c6504df67f00000000000000e98b4b153dffff082dbb78abd55fba3da80b856445ab1006487179e001b66c90c0473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd8824692f08ff8675bdf17ea1c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a671164679079d00"/148], 0x15)
r3 = dup(r2)
write$FUSE_BMAP(r3, &(0x7f0000000080)={0x18, 0x0, 0x6}, 0x18)
write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r5=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r5)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0, <r6=>0x0}, &(0x7f0000000580)=0xc)
r7 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r8=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r8)
r9 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r10=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r10)
r11 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x7)
lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, <r12=>0x0})
mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2000, &(0x7f0000000600)=ANY=[@ANYBLOB="7472616e733d7463702c706f72743d3078303030303030303030303030346532312c6163636573733d757365722c616e616d653d6e732f6d6e74002c6d61736b3d5e4d415941415001c8000000000000003d", @ANYRESDEC=r12, @ANYBLOB=',measure,smackfshat=TIPCv2\x00,\x00'])
r13 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x811, r13, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r13, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@loopback, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r14=>0x0}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xff2d)
setreuid(r14, r12)
stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, <r15=>0x0})
mount$fuse(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x40000, &(0x7f0000000800)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYRESDEC=r6, @ANYBLOB=',default_permissions,uid>', @ANYRESDEC=r8, @ANYBLOB=',fow%er<', @ANYRESDEC=r10, @ANYBLOB=',obj_type=keyring\x00,fscontext=root,rootcontext=unconfined_u,obj_role=security,uid=', @ANYRESDEC=r15, @ANYBLOB="2c7375626a5f757365723d74727573746564656d304000000000000000747275737465646b657972696e67637075736574d6379d9e4501302cf62a174b1073676a6499183a6a41735b802416248fce940f0a1c1d242c6673636f6e746578743d756e636f6e66696e65645f752c00"])
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='tran\x00\x00\x00\x00\x00\x00\x00\x00no=', @ANYRESHEX=r1, @ANYBLOB="2c7766646e9063ae6f3d684b22d93e8bf0a50500350000000000005e1a62fc6e1305f19d04b736e24adeda822a", @ANYRESHEX=r2, @ANYBLOB=',\x00'])
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={<r16=>0xffffffffffffffff})
dup2(r16, r16)
ioctl$EXT4_IOC_MOVE_EXT(r16, 0xc028660f, &(0x7f0000000300)={0x0, r2, 0x3ff, 0x10000, 0x4, 0x1})
r17 = mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5})
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedreceive(r17, &(0x7f0000000380)=""/204, 0x2b3, 0x0, 0x0)
umount2(&(0x7f0000000340)='./file0\x00', 0x3)
lseek(r0, 0x0, 0x0)
r18 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0)
lseek(r18, 0x0, 0x0)
socket$inet(0x2, 0x4, 0x0)

19:16:28 executing program 5:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/null\x00', 0x40000, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x7a, &(0x7f0000000700)=ANY=[@ANYBLOB="000800b867f2ad8bb8368900910000008100000086dd600200b69800"/64], 0x0)
keyctl$set_reqkey_keyring(0x5, 0xfffffffffffffffe)
add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
request_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='$.\x00', 0x0)
pipe2$9p(&(0x7f0000000240)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff}, 0x0)
write$P9_RVERSION(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f9870000c6504df67f00000000000000e98b4b153dffff082dbb78abd55fba3da80b856445ab1006487179e001b66c90c0473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd8824692f08ff8675bdf17ea1c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a671164679079d00"/148], 0x15)
r3 = dup(r2)
write$FUSE_BMAP(r3, &(0x7f0000000080)={0x18, 0x0, 0x6}, 0x18)
write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r5=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r5)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0, <r6=>0x0}, &(0x7f0000000580)=0xc)
r7 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r8=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r8)
r9 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r10=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r10)
r11 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x7)
lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, <r12=>0x0})
mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2000, &(0x7f0000000600)=ANY=[@ANYBLOB="7472616e733d7463702c706f72743d3078303030303030303030303030346532312c6163636573733d757365722c616e616d653d6e732f6d6e74002c6d61736b3d5e4d415941415001c8000000000000003d", @ANYRESDEC=r12, @ANYBLOB=',measure,smackfshat=TIPCv2\x00,\x00'])
r13 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x811, r13, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r13, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@loopback, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r14=>0x0}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xff2d)
setreuid(r14, r12)
stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, <r15=>0x0})
mount$fuse(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x40000, &(0x7f0000000800)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYRESDEC=r6, @ANYBLOB=',default_permissions,uid>', @ANYRESDEC=r8, @ANYBLOB=',fow%er<', @ANYRESDEC=r10, @ANYBLOB=',obj_type=keyring\x00,fscontext=root,rootcontext=unconfined_u,obj_role=security,uid=', @ANYRESDEC=r15, @ANYBLOB="2c7375626a5f757365723d74727573746564656d304000000000000000747275737465646b657972696e67637075736574d6379d9e4501302cf62a174b1073676a6499183a6a41735b802416248fce940f0a1c1d242c6673636f6e746578743d756e636f6e66696e65645f752c00"])
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='tran\x00\x00\x00\x00\x00\x00\x00\x00no=', @ANYRESHEX=r1, @ANYBLOB="2c7766646e9063ae6f3d684b22d93e8bf0a50500350000000000005e1a62fc6e1305f19d04b736e24adeda822a", @ANYRESHEX=r2, @ANYBLOB=',\x00'])
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={<r16=>0xffffffffffffffff})
dup2(r16, r16)
ioctl$EXT4_IOC_MOVE_EXT(r16, 0xc028660f, &(0x7f0000000300)={0x0, r2, 0x3ff, 0x10000, 0x4, 0x1})
r17 = mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5})
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedreceive(r17, &(0x7f0000000380)=""/204, 0x2b3, 0x0, 0x0)
umount2(&(0x7f0000000340)='./file0\x00', 0x3)
lseek(r0, 0x0, 0x0)
r18 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0)
lseek(r18, 0x0, 0x0)
socket$inet(0x2, 0x4, 0x0)

19:16:28 executing program 1:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/null\x00', 0x40000, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x7a, &(0x7f0000000700)=ANY=[@ANYBLOB="000800b867f2ad8bb8368900910000008100000086dd600200b69800"/64], 0x0)
keyctl$set_reqkey_keyring(0x5, 0xfffffffffffffffe)
add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
request_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='$.\x00', 0x0)
pipe2$9p(&(0x7f0000000240)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff}, 0x0)
write$P9_RVERSION(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f9870000c6504df67f00000000000000e98b4b153dffff082dbb78abd55fba3da80b856445ab1006487179e001b66c90c0473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd8824692f08ff8675bdf17ea1c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a671164679079d00"/148], 0x15)
r3 = dup(r2)
write$FUSE_BMAP(r3, &(0x7f0000000080)={0x18, 0x0, 0x6}, 0x18)
write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r5=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r5)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0, <r6=>0x0}, &(0x7f0000000580)=0xc)
r7 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r8=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r8)
r9 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r10=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r10)
r11 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x7)
lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, <r12=>0x0})
mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2000, &(0x7f0000000600)=ANY=[@ANYBLOB="7472616e733d7463702c706f72743d3078303030303030303030303030346532312c6163636573733d757365722c616e616d653d6e732f6d6e74002c6d61736b3d5e4d415941415001c8000000000000003d", @ANYRESDEC=r12, @ANYBLOB=',measure,smackfshat=TIPCv2\x00,\x00'])
r13 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x811, r13, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r13, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@loopback, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r14=>0x0}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xff2d)
setreuid(r14, r12)
stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, <r15=>0x0})
mount$fuse(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x40000, &(0x7f0000000800)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYRESDEC=r6, @ANYBLOB=',default_permissions,uid>', @ANYRESDEC=r8, @ANYBLOB=',fow%er<', @ANYRESDEC=r10, @ANYBLOB=',obj_type=keyring\x00,fscontext=root,rootcontext=unconfined_u,obj_role=security,uid=', @ANYRESDEC=r15, @ANYBLOB="2c7375626a5f757365723d74727573746564656d304000000000000000747275737465646b657972696e67637075736574d6379d9e4501302cf62a174b1073676a6499183a6a41735b802416248fce940f0a1c1d242c6673636f6e746578743d756e636f6e66696e65645f752c00"])
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='tran\x00\x00\x00\x00\x00\x00\x00\x00no=', @ANYRESHEX=r1, @ANYBLOB="2c7766646e9063ae6f3d684b22d93e8bf0a50500350000000000005e1a62fc6e1305f19d04b736e24adeda822a", @ANYRESHEX=r2, @ANYBLOB=',\x00'])
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={<r16=>0xffffffffffffffff})
dup2(r16, r16)
ioctl$EXT4_IOC_MOVE_EXT(r16, 0xc028660f, &(0x7f0000000300)={0x0, r2, 0x3ff, 0x10000, 0x4, 0x1})
r17 = mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5})
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedreceive(r17, &(0x7f0000000380)=""/204, 0x2b3, 0x0, 0x0)
umount2(&(0x7f0000000340)='./file0\x00', 0x3)
lseek(r0, 0x0, 0x0)
r18 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0)
lseek(r18, 0x0, 0x0)
socket$inet(0x2, 0x4, 0x0)

19:16:28 executing program 2:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/null\x00', 0x40000, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x7a, &(0x7f0000000700)=ANY=[@ANYBLOB="000800b867f2ad8bb8368900910000008100000086dd600200b69800"/64], 0x0)
keyctl$set_reqkey_keyring(0x5, 0xfffffffffffffffe)
add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
request_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='$.\x00', 0x0)
pipe2$9p(&(0x7f0000000240)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff}, 0x0)
write$P9_RVERSION(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f9870000c6504df67f00000000000000e98b4b153dffff082dbb78abd55fba3da80b856445ab1006487179e001b66c90c0473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd8824692f08ff8675bdf17ea1c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a671164679079d00"/148], 0x15)
r3 = dup(r2)
write$FUSE_BMAP(r3, &(0x7f0000000080)={0x18, 0x0, 0x6}, 0x18)
write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r5=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r5)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0, <r6=>0x0}, &(0x7f0000000580)=0xc)
r7 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r8=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r8)
r9 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r10=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r10)
r11 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x7)
lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, <r12=>0x0})
mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2000, &(0x7f0000000600)=ANY=[@ANYBLOB="7472616e733d7463702c706f72743d3078303030303030303030303030346532312c6163636573733d757365722c616e616d653d6e732f6d6e74002c6d61736b3d5e4d415941415001c8000000000000003d", @ANYRESDEC=r12, @ANYBLOB=',measure,smackfshat=TIPCv2\x00,\x00'])
r13 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x811, r13, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r13, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@loopback, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r14=>0x0}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xff2d)
setreuid(r14, r12)
stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, <r15=>0x0})
mount$fuse(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x40000, &(0x7f0000000800)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYRESDEC=r6, @ANYBLOB=',default_permissions,uid>', @ANYRESDEC=r8, @ANYBLOB=',fow%er<', @ANYRESDEC=r10, @ANYBLOB=',obj_type=keyring\x00,fscontext=root,rootcontext=unconfined_u,obj_role=security,uid=', @ANYRESDEC=r15, @ANYBLOB="2c7375626a5f757365723d74727573746564656d304000000000000000747275737465646b657972696e67637075736574d6379d9e4501302cf62a174b1073676a6499183a6a41735b802416248fce940f0a1c1d242c6673636f6e746578743d756e636f6e66696e65645f752c00"])
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='tran\x00\x00\x00\x00\x00\x00\x00\x00no=', @ANYRESHEX=r1, @ANYBLOB="2c7766646e9063ae6f3d684b22d93e8bf0a50500350000000000005e1a62fc6e1305f19d04b736e24adeda822a", @ANYRESHEX=r2, @ANYBLOB=',\x00'])
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={<r16=>0xffffffffffffffff})
dup2(r16, r16)
ioctl$EXT4_IOC_MOVE_EXT(r16, 0xc028660f, &(0x7f0000000300)={0x0, r2, 0x3ff, 0x10000, 0x4, 0x1})
r17 = mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5})
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedreceive(r17, &(0x7f0000000380)=""/204, 0x2b3, 0x0, 0x0)
umount2(&(0x7f0000000340)='./file0\x00', 0x3)
lseek(r0, 0x0, 0x0)
r18 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0)
lseek(r18, 0x0, 0x0)
socket$inet(0x2, 0x4, 0x0)

19:16:28 executing program 4:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/null\x00', 0x40000, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x7a, &(0x7f0000000700)=ANY=[@ANYBLOB="000800b867f2ad8bb8368900910000008100000086dd600200b69800"/64], 0x0)
keyctl$set_reqkey_keyring(0x5, 0xfffffffffffffffe)
add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
request_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='$.\x00', 0x0)
pipe2$9p(&(0x7f0000000240)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff}, 0x0)
write$P9_RVERSION(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f9870000c6504df67f00000000000000e98b4b153dffff082dbb78abd55fba3da80b856445ab1006487179e001b66c90c0473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd8824692f08ff8675bdf17ea1c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a671164679079d00"/148], 0x15)
r3 = dup(r2)
write$FUSE_BMAP(r3, &(0x7f0000000080)={0x18, 0x0, 0x6}, 0x18)
write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r5=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r5)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0, <r6=>0x0}, &(0x7f0000000580)=0xc)
r7 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r8=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r8)
r9 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r10=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r10)
r11 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x7)
lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, <r12=>0x0})
mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2000, &(0x7f0000000600)=ANY=[@ANYBLOB="7472616e733d7463702c706f72743d3078303030303030303030303030346532312c6163636573733d757365722c616e616d653d6e732f6d6e74002c6d61736b3d5e4d415941415001c8000000000000003d", @ANYRESDEC=r12, @ANYBLOB=',measure,smackfshat=TIPCv2\x00,\x00'])
r13 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x811, r13, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r13, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@loopback, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r14=>0x0}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xff2d)
setreuid(r14, r12)
stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, <r15=>0x0})
mount$fuse(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x40000, &(0x7f0000000800)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYRESDEC=r6, @ANYBLOB=',default_permissions,uid>', @ANYRESDEC=r8, @ANYBLOB=',fow%er<', @ANYRESDEC=r10, @ANYBLOB=',obj_type=keyring\x00,fscontext=root,rootcontext=unconfined_u,obj_role=security,uid=', @ANYRESDEC=r15, @ANYBLOB="2c7375626a5f757365723d74727573746564656d304000000000000000747275737465646b657972696e67637075736574d6379d9e4501302cf62a174b1073676a6499183a6a41735b802416248fce940f0a1c1d242c6673636f6e746578743d756e636f6e66696e65645f752c00"])
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='tran\x00\x00\x00\x00\x00\x00\x00\x00no=', @ANYRESHEX=r1, @ANYBLOB="2c7766646e9063ae6f3d684b22d93e8bf0a50500350000000000005e1a62fc6e1305f19d04b736e24adeda822a", @ANYRESHEX=r2, @ANYBLOB=',\x00'])
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={<r16=>0xffffffffffffffff})
dup2(r16, r16)
ioctl$EXT4_IOC_MOVE_EXT(r16, 0xc028660f, &(0x7f0000000300)={0x0, r2, 0x3ff, 0x10000, 0x4, 0x1})
r17 = mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5})
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedreceive(r17, &(0x7f0000000380)=""/204, 0x2b3, 0x0, 0x0)
umount2(&(0x7f0000000340)='./file0\x00', 0x3)
lseek(r0, 0x0, 0x0)
r18 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0)
lseek(r18, 0x0, 0x0)
socket$inet(0x2, 0x4, 0x0)

19:16:29 executing program 3:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/null\x00', 0x40000, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x7a, &(0x7f0000000700)=ANY=[@ANYBLOB="000800b867f2ad8bb8368900910000008100000086dd600200b69800"/64], 0x0)
keyctl$set_reqkey_keyring(0x5, 0xfffffffffffffffe)
add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
request_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='$.\x00', 0x0)
pipe2$9p(&(0x7f0000000240)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff}, 0x0)
write$P9_RVERSION(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f9870000c6504df67f00000000000000e98b4b153dffff082dbb78abd55fba3da80b856445ab1006487179e001b66c90c0473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd8824692f08ff8675bdf17ea1c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a671164679079d00"/148], 0x15)
r3 = dup(r2)
write$FUSE_BMAP(r3, &(0x7f0000000080)={0x18, 0x0, 0x6}, 0x18)
write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r5=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r5)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0, <r6=>0x0}, &(0x7f0000000580)=0xc)
r7 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r8=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r8)
r9 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r10=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r10)
r11 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x7)
lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, <r12=>0x0})
mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2000, &(0x7f0000000600)=ANY=[@ANYBLOB="7472616e733d7463702c706f72743d3078303030303030303030303030346532312c6163636573733d757365722c616e616d653d6e732f6d6e74002c6d61736b3d5e4d415941415001c8000000000000003d", @ANYRESDEC=r12, @ANYBLOB=',measure,smackfshat=TIPCv2\x00,\x00'])
r13 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x811, r13, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r13, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@loopback, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r14=>0x0}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xff2d)
setreuid(r14, r12)
stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, <r15=>0x0})
mount$fuse(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x40000, &(0x7f0000000800)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYRESDEC=r6, @ANYBLOB=',default_permissions,uid>', @ANYRESDEC=r8, @ANYBLOB=',fow%er<', @ANYRESDEC=r10, @ANYBLOB=',obj_type=keyring\x00,fscontext=root,rootcontext=unconfined_u,obj_role=security,uid=', @ANYRESDEC=r15, @ANYBLOB="2c7375626a5f757365723d74727573746564656d304000000000000000747275737465646b657972696e67637075736574d6379d9e4501302cf62a174b1073676a6499183a6a41735b802416248fce940f0a1c1d242c6673636f6e746578743d756e636f6e66696e65645f752c00"])
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='tran\x00\x00\x00\x00\x00\x00\x00\x00no=', @ANYRESHEX=r1, @ANYBLOB="2c7766646e9063ae6f3d684b22d93e8bf0a50500350000000000005e1a62fc6e1305f19d04b736e24adeda822a", @ANYRESHEX=r2, @ANYBLOB=',\x00'])
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={<r16=>0xffffffffffffffff})
dup2(r16, r16)
ioctl$EXT4_IOC_MOVE_EXT(r16, 0xc028660f, &(0x7f0000000300)={0x0, r2, 0x3ff, 0x10000, 0x4, 0x1})
r17 = mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5})
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedreceive(r17, &(0x7f0000000380)=""/204, 0x2b3, 0x0, 0x0)
umount2(&(0x7f0000000340)='./file0\x00', 0x3)
lseek(r0, 0x0, 0x0)
r18 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0)
lseek(r18, 0x0, 0x0)
socket$inet(0x2, 0x4, 0x0)

19:16:29 executing program 0:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/null\x00', 0x40000, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x7a, &(0x7f0000000700)=ANY=[@ANYBLOB="000800b867f2ad8bb8368900910000008100000086dd600200b69800"/64], 0x0)
keyctl$set_reqkey_keyring(0x5, 0xfffffffffffffffe)
add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
request_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='$.\x00', 0x0)
pipe2$9p(&(0x7f0000000240)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff}, 0x0)
write$P9_RVERSION(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f9870000c6504df67f00000000000000e98b4b153dffff082dbb78abd55fba3da80b856445ab1006487179e001b66c90c0473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd8824692f08ff8675bdf17ea1c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a671164679079d00"/148], 0x15)
r3 = dup(r2)
write$FUSE_BMAP(r3, &(0x7f0000000080)={0x18, 0x0, 0x6}, 0x18)
write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r5=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r5)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0, <r6=>0x0}, &(0x7f0000000580)=0xc)
r7 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r8=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r8)
r9 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r10=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r10)
r11 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x7)
lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, <r12=>0x0})
mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2000, &(0x7f0000000600)=ANY=[@ANYBLOB="7472616e733d7463702c706f72743d3078303030303030303030303030346532312c6163636573733d757365722c616e616d653d6e732f6d6e74002c6d61736b3d5e4d415941415001c8000000000000003d", @ANYRESDEC=r12, @ANYBLOB=',measure,smackfshat=TIPCv2\x00,\x00'])
r13 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x811, r13, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r13, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@loopback, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r14=>0x0}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xff2d)
setreuid(r14, r12)
stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, <r15=>0x0})
mount$fuse(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x40000, &(0x7f0000000800)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYRESDEC=r6, @ANYBLOB=',default_permissions,uid>', @ANYRESDEC=r8, @ANYBLOB=',fow%er<', @ANYRESDEC=r10, @ANYBLOB=',obj_type=keyring\x00,fscontext=root,rootcontext=unconfined_u,obj_role=security,uid=', @ANYRESDEC=r15, @ANYBLOB="2c7375626a5f757365723d74727573746564656d304000000000000000747275737465646b657972696e67637075736574d6379d9e4501302cf62a174b1073676a6499183a6a41735b802416248fce940f0a1c1d242c6673636f6e746578743d756e636f6e66696e65645f752c00"])
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='tran\x00\x00\x00\x00\x00\x00\x00\x00no=', @ANYRESHEX=r1, @ANYBLOB="2c7766646e9063ae6f3d684b22d93e8bf0a50500350000000000005e1a62fc6e1305f19d04b736e24adeda822a", @ANYRESHEX=r2, @ANYBLOB=',\x00'])
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={<r16=>0xffffffffffffffff})
dup2(r16, r16)
ioctl$EXT4_IOC_MOVE_EXT(r16, 0xc028660f, &(0x7f0000000300)={0x0, r2, 0x3ff, 0x10000, 0x4, 0x1})
r17 = mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5})
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedreceive(r17, &(0x7f0000000380)=""/204, 0x2b3, 0x0, 0x0)
umount2(&(0x7f0000000340)='./file0\x00', 0x3)
lseek(r0, 0x0, 0x0)
r18 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0)
lseek(r18, 0x0, 0x0)
socket$inet(0x2, 0x4, 0x0)

19:16:29 executing program 5:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/null\x00', 0x40000, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x7a, &(0x7f0000000700)=ANY=[@ANYBLOB="000800b867f2ad8bb8368900910000008100000086dd600200b69800"/64], 0x0)
keyctl$set_reqkey_keyring(0x5, 0xfffffffffffffffe)
add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
request_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='$.\x00', 0x0)
pipe2$9p(&(0x7f0000000240)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff}, 0x0)
write$P9_RVERSION(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f9870000c6504df67f00000000000000e98b4b153dffff082dbb78abd55fba3da80b856445ab1006487179e001b66c90c0473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd8824692f08ff8675bdf17ea1c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a671164679079d00"/148], 0x15)
r3 = dup(r2)
write$FUSE_BMAP(r3, &(0x7f0000000080)={0x18, 0x0, 0x6}, 0x18)
write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r5=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r5)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0, <r6=>0x0}, &(0x7f0000000580)=0xc)
r7 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r8=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r8)
r9 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r10=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r10)
r11 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x7)
lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, <r12=>0x0})
mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2000, &(0x7f0000000600)=ANY=[@ANYBLOB="7472616e733d7463702c706f72743d3078303030303030303030303030346532312c6163636573733d757365722c616e616d653d6e732f6d6e74002c6d61736b3d5e4d415941415001c8000000000000003d", @ANYRESDEC=r12, @ANYBLOB=',measure,smackfshat=TIPCv2\x00,\x00'])
r13 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x811, r13, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r13, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@loopback, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r14=>0x0}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xff2d)
setreuid(r14, r12)
stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, <r15=>0x0})
mount$fuse(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x40000, &(0x7f0000000800)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYRESDEC=r6, @ANYBLOB=',default_permissions,uid>', @ANYRESDEC=r8, @ANYBLOB=',fow%er<', @ANYRESDEC=r10, @ANYBLOB=',obj_type=keyring\x00,fscontext=root,rootcontext=unconfined_u,obj_role=security,uid=', @ANYRESDEC=r15, @ANYBLOB="2c7375626a5f757365723d74727573746564656d304000000000000000747275737465646b657972696e67637075736574d6379d9e4501302cf62a174b1073676a6499183a6a41735b802416248fce940f0a1c1d242c6673636f6e746578743d756e636f6e66696e65645f752c00"])
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='tran\x00\x00\x00\x00\x00\x00\x00\x00no=', @ANYRESHEX=r1, @ANYBLOB="2c7766646e9063ae6f3d684b22d93e8bf0a50500350000000000005e1a62fc6e1305f19d04b736e24adeda822a", @ANYRESHEX=r2, @ANYBLOB=',\x00'])
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={<r16=>0xffffffffffffffff})
dup2(r16, r16)
ioctl$EXT4_IOC_MOVE_EXT(r16, 0xc028660f, &(0x7f0000000300)={0x0, r2, 0x3ff, 0x10000, 0x4, 0x1})
r17 = mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5})
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedreceive(r17, &(0x7f0000000380)=""/204, 0x2b3, 0x0, 0x0)
umount2(&(0x7f0000000340)='./file0\x00', 0x3)
lseek(r0, 0x0, 0x0)
r18 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0)
lseek(r18, 0x0, 0x0)
socket$inet(0x2, 0x4, 0x0)

19:16:29 executing program 1:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/null\x00', 0x40000, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x7a, &(0x7f0000000700)=ANY=[@ANYBLOB="000800b867f2ad8bb8368900910000008100000086dd600200b69800"/64], 0x0)
keyctl$set_reqkey_keyring(0x5, 0xfffffffffffffffe)
add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
request_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='$.\x00', 0x0)
pipe2$9p(&(0x7f0000000240)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff}, 0x0)
write$P9_RVERSION(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f9870000c6504df67f00000000000000e98b4b153dffff082dbb78abd55fba3da80b856445ab1006487179e001b66c90c0473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd8824692f08ff8675bdf17ea1c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a671164679079d00"/148], 0x15)
r3 = dup(r2)
write$FUSE_BMAP(r3, &(0x7f0000000080)={0x18, 0x0, 0x6}, 0x18)
write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r5=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r5)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0, <r6=>0x0}, &(0x7f0000000580)=0xc)
r7 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r8=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r8)
r9 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r10=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r10)
r11 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x7)
lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, <r12=>0x0})
mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2000, &(0x7f0000000600)=ANY=[@ANYBLOB="7472616e733d7463702c706f72743d3078303030303030303030303030346532312c6163636573733d757365722c616e616d653d6e732f6d6e74002c6d61736b3d5e4d415941415001c8000000000000003d", @ANYRESDEC=r12, @ANYBLOB=',measure,smackfshat=TIPCv2\x00,\x00'])
r13 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x811, r13, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r13, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@loopback, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r14=>0x0}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xff2d)
setreuid(r14, r12)
stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, <r15=>0x0})
mount$fuse(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x40000, &(0x7f0000000800)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYRESDEC=r6, @ANYBLOB=',default_permissions,uid>', @ANYRESDEC=r8, @ANYBLOB=',fow%er<', @ANYRESDEC=r10, @ANYBLOB=',obj_type=keyring\x00,fscontext=root,rootcontext=unconfined_u,obj_role=security,uid=', @ANYRESDEC=r15, @ANYBLOB="2c7375626a5f757365723d74727573746564656d304000000000000000747275737465646b657972696e67637075736574d6379d9e4501302cf62a174b1073676a6499183a6a41735b802416248fce940f0a1c1d242c6673636f6e746578743d756e636f6e66696e65645f752c00"])
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='tran\x00\x00\x00\x00\x00\x00\x00\x00no=', @ANYRESHEX=r1, @ANYBLOB="2c7766646e9063ae6f3d684b22d93e8bf0a50500350000000000005e1a62fc6e1305f19d04b736e24adeda822a", @ANYRESHEX=r2, @ANYBLOB=',\x00'])
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={<r16=>0xffffffffffffffff})
dup2(r16, r16)
ioctl$EXT4_IOC_MOVE_EXT(r16, 0xc028660f, &(0x7f0000000300)={0x0, r2, 0x3ff, 0x10000, 0x4, 0x1})
r17 = mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5})
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedreceive(r17, &(0x7f0000000380)=""/204, 0x2b3, 0x0, 0x0)
umount2(&(0x7f0000000340)='./file0\x00', 0x3)
lseek(r0, 0x0, 0x0)
r18 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0)
lseek(r18, 0x0, 0x0)
socket$inet(0x2, 0x4, 0x0)

19:16:29 executing program 2:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/null\x00', 0x40000, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x7a, &(0x7f0000000700)=ANY=[@ANYBLOB="000800b867f2ad8bb8368900910000008100000086dd600200b69800"/64], 0x0)
keyctl$set_reqkey_keyring(0x5, 0xfffffffffffffffe)
add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
request_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='$.\x00', 0x0)
pipe2$9p(&(0x7f0000000240)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff}, 0x0)
write$P9_RVERSION(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f9870000c6504df67f00000000000000e98b4b153dffff082dbb78abd55fba3da80b856445ab1006487179e001b66c90c0473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd8824692f08ff8675bdf17ea1c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a671164679079d00"/148], 0x15)
r3 = dup(r2)
write$FUSE_BMAP(r3, &(0x7f0000000080)={0x18, 0x0, 0x6}, 0x18)
write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r5=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r5)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0, <r6=>0x0}, &(0x7f0000000580)=0xc)
r7 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r8=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r8)
r9 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r10=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r10)
r11 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x7)
lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, <r12=>0x0})
mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2000, &(0x7f0000000600)=ANY=[@ANYBLOB="7472616e733d7463702c706f72743d3078303030303030303030303030346532312c6163636573733d757365722c616e616d653d6e732f6d6e74002c6d61736b3d5e4d415941415001c8000000000000003d", @ANYRESDEC=r12, @ANYBLOB=',measure,smackfshat=TIPCv2\x00,\x00'])
r13 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x811, r13, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r13, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@loopback, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r14=>0x0}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xff2d)
setreuid(r14, r12)
stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, <r15=>0x0})
mount$fuse(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x40000, &(0x7f0000000800)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYRESDEC=r6, @ANYBLOB=',default_permissions,uid>', @ANYRESDEC=r8, @ANYBLOB=',fow%er<', @ANYRESDEC=r10, @ANYBLOB=',obj_type=keyring\x00,fscontext=root,rootcontext=unconfined_u,obj_role=security,uid=', @ANYRESDEC=r15, @ANYBLOB="2c7375626a5f757365723d74727573746564656d304000000000000000747275737465646b657972696e67637075736574d6379d9e4501302cf62a174b1073676a6499183a6a41735b802416248fce940f0a1c1d242c6673636f6e746578743d756e636f6e66696e65645f752c00"])
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='tran\x00\x00\x00\x00\x00\x00\x00\x00no=', @ANYRESHEX=r1, @ANYBLOB="2c7766646e9063ae6f3d684b22d93e8bf0a50500350000000000005e1a62fc6e1305f19d04b736e24adeda822a", @ANYRESHEX=r2, @ANYBLOB=',\x00'])
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={<r16=>0xffffffffffffffff})
dup2(r16, r16)
ioctl$EXT4_IOC_MOVE_EXT(r16, 0xc028660f, &(0x7f0000000300)={0x0, r2, 0x3ff, 0x10000, 0x4, 0x1})
r17 = mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5})
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedreceive(r17, &(0x7f0000000380)=""/204, 0x2b3, 0x0, 0x0)
umount2(&(0x7f0000000340)='./file0\x00', 0x3)
lseek(r0, 0x0, 0x0)
r18 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0)
lseek(r18, 0x0, 0x0)
socket$inet(0x2, 0x4, 0x0)

19:16:29 executing program 4:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/null\x00', 0x40000, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x7a, &(0x7f0000000700)=ANY=[@ANYBLOB="000800b867f2ad8bb8368900910000008100000086dd600200b69800"/64], 0x0)
keyctl$set_reqkey_keyring(0x5, 0xfffffffffffffffe)
add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
request_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='$.\x00', 0x0)
pipe2$9p(&(0x7f0000000240)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff}, 0x0)
write$P9_RVERSION(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f9870000c6504df67f00000000000000e98b4b153dffff082dbb78abd55fba3da80b856445ab1006487179e001b66c90c0473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd8824692f08ff8675bdf17ea1c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a671164679079d00"/148], 0x15)
r3 = dup(r2)
write$FUSE_BMAP(r3, &(0x7f0000000080)={0x18, 0x0, 0x6}, 0x18)
write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r5=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r5)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0, <r6=>0x0}, &(0x7f0000000580)=0xc)
r7 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r8=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r8)
r9 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r10=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r10)
r11 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x7)
lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, <r12=>0x0})
mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2000, &(0x7f0000000600)=ANY=[@ANYBLOB="7472616e733d7463702c706f72743d3078303030303030303030303030346532312c6163636573733d757365722c616e616d653d6e732f6d6e74002c6d61736b3d5e4d415941415001c8000000000000003d", @ANYRESDEC=r12, @ANYBLOB=',measure,smackfshat=TIPCv2\x00,\x00'])
r13 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x811, r13, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r13, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@loopback, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r14=>0x0}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xff2d)
setreuid(r14, r12)
stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, <r15=>0x0})
mount$fuse(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x40000, &(0x7f0000000800)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYRESDEC=r6, @ANYBLOB=',default_permissions,uid>', @ANYRESDEC=r8, @ANYBLOB=',fow%er<', @ANYRESDEC=r10, @ANYBLOB=',obj_type=keyring\x00,fscontext=root,rootcontext=unconfined_u,obj_role=security,uid=', @ANYRESDEC=r15, @ANYBLOB="2c7375626a5f757365723d74727573746564656d304000000000000000747275737465646b657972696e67637075736574d6379d9e4501302cf62a174b1073676a6499183a6a41735b802416248fce940f0a1c1d242c6673636f6e746578743d756e636f6e66696e65645f752c00"])
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='tran\x00\x00\x00\x00\x00\x00\x00\x00no=', @ANYRESHEX=r1, @ANYBLOB="2c7766646e9063ae6f3d684b22d93e8bf0a50500350000000000005e1a62fc6e1305f19d04b736e24adeda822a", @ANYRESHEX=r2, @ANYBLOB=',\x00'])
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={<r16=>0xffffffffffffffff})
dup2(r16, r16)
ioctl$EXT4_IOC_MOVE_EXT(r16, 0xc028660f, &(0x7f0000000300)={0x0, r2, 0x3ff, 0x10000, 0x4, 0x1})
r17 = mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5})
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedreceive(r17, &(0x7f0000000380)=""/204, 0x2b3, 0x0, 0x0)
umount2(&(0x7f0000000340)='./file0\x00', 0x3)
lseek(r0, 0x0, 0x0)
r18 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0)
lseek(r18, 0x0, 0x0)
socket$inet(0x2, 0x4, 0x0)

19:16:29 executing program 3:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/null\x00', 0x40000, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x7a, &(0x7f0000000700)=ANY=[@ANYBLOB="000800b867f2ad8bb8368900910000008100000086dd600200b69800"/64], 0x0)
keyctl$set_reqkey_keyring(0x5, 0xfffffffffffffffe)
add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
request_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='$.\x00', 0x0)
pipe2$9p(&(0x7f0000000240)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff}, 0x0)
write$P9_RVERSION(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f9870000c6504df67f00000000000000e98b4b153dffff082dbb78abd55fba3da80b856445ab1006487179e001b66c90c0473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd8824692f08ff8675bdf17ea1c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a671164679079d00"/148], 0x15)
r3 = dup(r2)
write$FUSE_BMAP(r3, &(0x7f0000000080)={0x18, 0x0, 0x6}, 0x18)
write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r5=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r5)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0, <r6=>0x0}, &(0x7f0000000580)=0xc)
r7 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r8=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r8)
r9 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r10=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r10)
r11 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x7)
lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, <r12=>0x0})
mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2000, &(0x7f0000000600)=ANY=[@ANYBLOB="7472616e733d7463702c706f72743d3078303030303030303030303030346532312c6163636573733d757365722c616e616d653d6e732f6d6e74002c6d61736b3d5e4d415941415001c8000000000000003d", @ANYRESDEC=r12, @ANYBLOB=',measure,smackfshat=TIPCv2\x00,\x00'])
r13 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x811, r13, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r13, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@loopback, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r14=>0x0}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xff2d)
setreuid(r14, r12)
stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, <r15=>0x0})
mount$fuse(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x40000, &(0x7f0000000800)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYRESDEC=r6, @ANYBLOB=',default_permissions,uid>', @ANYRESDEC=r8, @ANYBLOB=',fow%er<', @ANYRESDEC=r10, @ANYBLOB=',obj_type=keyring\x00,fscontext=root,rootcontext=unconfined_u,obj_role=security,uid=', @ANYRESDEC=r15, @ANYBLOB="2c7375626a5f757365723d74727573746564656d304000000000000000747275737465646b657972696e67637075736574d6379d9e4501302cf62a174b1073676a6499183a6a41735b802416248fce940f0a1c1d242c6673636f6e746578743d756e636f6e66696e65645f752c00"])
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='tran\x00\x00\x00\x00\x00\x00\x00\x00no=', @ANYRESHEX=r1, @ANYBLOB="2c7766646e9063ae6f3d684b22d93e8bf0a50500350000000000005e1a62fc6e1305f19d04b736e24adeda822a", @ANYRESHEX=r2, @ANYBLOB=',\x00'])
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={<r16=>0xffffffffffffffff})
dup2(r16, r16)
ioctl$EXT4_IOC_MOVE_EXT(r16, 0xc028660f, &(0x7f0000000300)={0x0, r2, 0x3ff, 0x10000, 0x4, 0x1})
r17 = mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5})
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedreceive(r17, &(0x7f0000000380)=""/204, 0x2b3, 0x0, 0x0)
umount2(&(0x7f0000000340)='./file0\x00', 0x3)
lseek(r0, 0x0, 0x0)
r18 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0)
lseek(r18, 0x0, 0x0)
socket$inet(0x2, 0x4, 0x0)

19:16:29 executing program 0:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/null\x00', 0x40000, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x7a, &(0x7f0000000700)=ANY=[@ANYBLOB="000800b867f2ad8bb8368900910000008100000086dd600200b69800"/64], 0x0)
keyctl$set_reqkey_keyring(0x5, 0xfffffffffffffffe)
add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
request_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='$.\x00', 0x0)
pipe2$9p(&(0x7f0000000240)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff}, 0x0)
write$P9_RVERSION(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f9870000c6504df67f00000000000000e98b4b153dffff082dbb78abd55fba3da80b856445ab1006487179e001b66c90c0473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd8824692f08ff8675bdf17ea1c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a671164679079d00"/148], 0x15)
r3 = dup(r2)
write$FUSE_BMAP(r3, &(0x7f0000000080)={0x18, 0x0, 0x6}, 0x18)
write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r5=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r5)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0, <r6=>0x0}, &(0x7f0000000580)=0xc)
r7 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r8=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r8)
r9 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r10=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r10)
r11 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x7)
lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, <r12=>0x0})
mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2000, &(0x7f0000000600)=ANY=[@ANYBLOB="7472616e733d7463702c706f72743d3078303030303030303030303030346532312c6163636573733d757365722c616e616d653d6e732f6d6e74002c6d61736b3d5e4d415941415001c8000000000000003d", @ANYRESDEC=r12, @ANYBLOB=',measure,smackfshat=TIPCv2\x00,\x00'])
r13 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x811, r13, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r13, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@loopback, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r14=>0x0}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xff2d)
setreuid(r14, r12)
stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, <r15=>0x0})
mount$fuse(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x40000, &(0x7f0000000800)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYRESDEC=r6, @ANYBLOB=',default_permissions,uid>', @ANYRESDEC=r8, @ANYBLOB=',fow%er<', @ANYRESDEC=r10, @ANYBLOB=',obj_type=keyring\x00,fscontext=root,rootcontext=unconfined_u,obj_role=security,uid=', @ANYRESDEC=r15, @ANYBLOB="2c7375626a5f757365723d74727573746564656d304000000000000000747275737465646b657972696e67637075736574d6379d9e4501302cf62a174b1073676a6499183a6a41735b802416248fce940f0a1c1d242c6673636f6e746578743d756e636f6e66696e65645f752c00"])
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='tran\x00\x00\x00\x00\x00\x00\x00\x00no=', @ANYRESHEX=r1, @ANYBLOB="2c7766646e9063ae6f3d684b22d93e8bf0a50500350000000000005e1a62fc6e1305f19d04b736e24adeda822a", @ANYRESHEX=r2, @ANYBLOB=',\x00'])
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={<r16=>0xffffffffffffffff})
dup2(r16, r16)
ioctl$EXT4_IOC_MOVE_EXT(r16, 0xc028660f, &(0x7f0000000300)={0x0, r2, 0x3ff, 0x10000, 0x4, 0x1})
r17 = mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5})
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedreceive(r17, &(0x7f0000000380)=""/204, 0x2b3, 0x0, 0x0)
umount2(&(0x7f0000000340)='./file0\x00', 0x3)
lseek(r0, 0x0, 0x0)
r18 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0)
lseek(r18, 0x0, 0x0)
socket$inet(0x2, 0x4, 0x0)

19:16:29 executing program 5:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/null\x00', 0x40000, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x7a, &(0x7f0000000700)=ANY=[@ANYBLOB="000800b867f2ad8bb8368900910000008100000086dd600200b69800"/64], 0x0)
keyctl$set_reqkey_keyring(0x5, 0xfffffffffffffffe)
add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
request_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='$.\x00', 0x0)
pipe2$9p(&(0x7f0000000240)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff}, 0x0)
write$P9_RVERSION(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f9870000c6504df67f00000000000000e98b4b153dffff082dbb78abd55fba3da80b856445ab1006487179e001b66c90c0473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd8824692f08ff8675bdf17ea1c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a671164679079d00"/148], 0x15)
r3 = dup(r2)
write$FUSE_BMAP(r3, &(0x7f0000000080)={0x18, 0x0, 0x6}, 0x18)
write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r5=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r5)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0, <r6=>0x0}, &(0x7f0000000580)=0xc)
r7 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r8=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r8)
r9 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r10=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r10)
r11 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x7)
lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, <r12=>0x0})
mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2000, &(0x7f0000000600)=ANY=[@ANYBLOB="7472616e733d7463702c706f72743d3078303030303030303030303030346532312c6163636573733d757365722c616e616d653d6e732f6d6e74002c6d61736b3d5e4d415941415001c8000000000000003d", @ANYRESDEC=r12, @ANYBLOB=',measure,smackfshat=TIPCv2\x00,\x00'])
r13 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x811, r13, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r13, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@loopback, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r14=>0x0}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xff2d)
setreuid(r14, r12)
stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, <r15=>0x0})
mount$fuse(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x40000, &(0x7f0000000800)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYRESDEC=r6, @ANYBLOB=',default_permissions,uid>', @ANYRESDEC=r8, @ANYBLOB=',fow%er<', @ANYRESDEC=r10, @ANYBLOB=',obj_type=keyring\x00,fscontext=root,rootcontext=unconfined_u,obj_role=security,uid=', @ANYRESDEC=r15, @ANYBLOB="2c7375626a5f757365723d74727573746564656d304000000000000000747275737465646b657972696e67637075736574d6379d9e4501302cf62a174b1073676a6499183a6a41735b802416248fce940f0a1c1d242c6673636f6e746578743d756e636f6e66696e65645f752c00"])
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='tran\x00\x00\x00\x00\x00\x00\x00\x00no=', @ANYRESHEX=r1, @ANYBLOB="2c7766646e9063ae6f3d684b22d93e8bf0a50500350000000000005e1a62fc6e1305f19d04b736e24adeda822a", @ANYRESHEX=r2, @ANYBLOB=',\x00'])
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={<r16=>0xffffffffffffffff})
dup2(r16, r16)
ioctl$EXT4_IOC_MOVE_EXT(r16, 0xc028660f, &(0x7f0000000300)={0x0, r2, 0x3ff, 0x10000, 0x4, 0x1})
r17 = mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5})
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedreceive(r17, &(0x7f0000000380)=""/204, 0x2b3, 0x0, 0x0)
umount2(&(0x7f0000000340)='./file0\x00', 0x3)
lseek(r0, 0x0, 0x0)
r18 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0)
lseek(r18, 0x0, 0x0)
socket$inet(0x2, 0x4, 0x0)

19:16:29 executing program 1:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/null\x00', 0x40000, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x7a, &(0x7f0000000700)=ANY=[@ANYBLOB="000800b867f2ad8bb8368900910000008100000086dd600200b69800"/64], 0x0)
keyctl$set_reqkey_keyring(0x5, 0xfffffffffffffffe)
add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
request_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='$.\x00', 0x0)
pipe2$9p(&(0x7f0000000240)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff}, 0x0)
write$P9_RVERSION(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f9870000c6504df67f00000000000000e98b4b153dffff082dbb78abd55fba3da80b856445ab1006487179e001b66c90c0473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd8824692f08ff8675bdf17ea1c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a671164679079d00"/148], 0x15)
r3 = dup(r2)
write$FUSE_BMAP(r3, &(0x7f0000000080)={0x18, 0x0, 0x6}, 0x18)
write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r5=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r5)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0, <r6=>0x0}, &(0x7f0000000580)=0xc)
r7 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r8=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r8)
r9 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r10=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r10)
r11 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x7)
lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, <r12=>0x0})
mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2000, &(0x7f0000000600)=ANY=[@ANYBLOB="7472616e733d7463702c706f72743d3078303030303030303030303030346532312c6163636573733d757365722c616e616d653d6e732f6d6e74002c6d61736b3d5e4d415941415001c8000000000000003d", @ANYRESDEC=r12, @ANYBLOB=',measure,smackfshat=TIPCv2\x00,\x00'])
r13 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x811, r13, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r13, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@loopback, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r14=>0x0}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xff2d)
setreuid(r14, r12)
stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, <r15=>0x0})
mount$fuse(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x40000, &(0x7f0000000800)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYRESDEC=r6, @ANYBLOB=',default_permissions,uid>', @ANYRESDEC=r8, @ANYBLOB=',fow%er<', @ANYRESDEC=r10, @ANYBLOB=',obj_type=keyring\x00,fscontext=root,rootcontext=unconfined_u,obj_role=security,uid=', @ANYRESDEC=r15, @ANYBLOB="2c7375626a5f757365723d74727573746564656d304000000000000000747275737465646b657972696e67637075736574d6379d9e4501302cf62a174b1073676a6499183a6a41735b802416248fce940f0a1c1d242c6673636f6e746578743d756e636f6e66696e65645f752c00"])
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='tran\x00\x00\x00\x00\x00\x00\x00\x00no=', @ANYRESHEX=r1, @ANYBLOB="2c7766646e9063ae6f3d684b22d93e8bf0a50500350000000000005e1a62fc6e1305f19d04b736e24adeda822a", @ANYRESHEX=r2, @ANYBLOB=',\x00'])
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={<r16=>0xffffffffffffffff})
dup2(r16, r16)
ioctl$EXT4_IOC_MOVE_EXT(r16, 0xc028660f, &(0x7f0000000300)={0x0, r2, 0x3ff, 0x10000, 0x4, 0x1})
r17 = mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5})
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedreceive(r17, &(0x7f0000000380)=""/204, 0x2b3, 0x0, 0x0)
umount2(&(0x7f0000000340)='./file0\x00', 0x3)
lseek(r0, 0x0, 0x0)
r18 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0)
lseek(r18, 0x0, 0x0)
socket$inet(0x2, 0x4, 0x0)

19:16:30 executing program 2:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/null\x00', 0x40000, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x7a, &(0x7f0000000700)=ANY=[@ANYBLOB="000800b867f2ad8bb8368900910000008100000086dd600200b69800"/64], 0x0)
keyctl$set_reqkey_keyring(0x5, 0xfffffffffffffffe)
add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
request_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='$.\x00', 0x0)
pipe2$9p(&(0x7f0000000240)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff}, 0x0)
write$P9_RVERSION(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f9870000c6504df67f00000000000000e98b4b153dffff082dbb78abd55fba3da80b856445ab1006487179e001b66c90c0473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd8824692f08ff8675bdf17ea1c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a671164679079d00"/148], 0x15)
r3 = dup(r2)
write$FUSE_BMAP(r3, &(0x7f0000000080)={0x18, 0x0, 0x6}, 0x18)
write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r5=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r5)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0, <r6=>0x0}, &(0x7f0000000580)=0xc)
r7 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r8=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r8)
r9 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r10=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r10)
r11 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x7)
lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, <r12=>0x0})
mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2000, &(0x7f0000000600)=ANY=[@ANYBLOB="7472616e733d7463702c706f72743d3078303030303030303030303030346532312c6163636573733d757365722c616e616d653d6e732f6d6e74002c6d61736b3d5e4d415941415001c8000000000000003d", @ANYRESDEC=r12, @ANYBLOB=',measure,smackfshat=TIPCv2\x00,\x00'])
r13 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x811, r13, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r13, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@loopback, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r14=>0x0}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xff2d)
setreuid(r14, r12)
stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, <r15=>0x0})
mount$fuse(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x40000, &(0x7f0000000800)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYRESDEC=r6, @ANYBLOB=',default_permissions,uid>', @ANYRESDEC=r8, @ANYBLOB=',fow%er<', @ANYRESDEC=r10, @ANYBLOB=',obj_type=keyring\x00,fscontext=root,rootcontext=unconfined_u,obj_role=security,uid=', @ANYRESDEC=r15, @ANYBLOB="2c7375626a5f757365723d74727573746564656d304000000000000000747275737465646b657972696e67637075736574d6379d9e4501302cf62a174b1073676a6499183a6a41735b802416248fce940f0a1c1d242c6673636f6e746578743d756e636f6e66696e65645f752c00"])
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='tran\x00\x00\x00\x00\x00\x00\x00\x00no=', @ANYRESHEX=r1, @ANYBLOB="2c7766646e9063ae6f3d684b22d93e8bf0a50500350000000000005e1a62fc6e1305f19d04b736e24adeda822a", @ANYRESHEX=r2, @ANYBLOB=',\x00'])
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={<r16=>0xffffffffffffffff})
dup2(r16, r16)
ioctl$EXT4_IOC_MOVE_EXT(r16, 0xc028660f, &(0x7f0000000300)={0x0, r2, 0x3ff, 0x10000, 0x4, 0x1})
r17 = mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5})
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedreceive(r17, &(0x7f0000000380)=""/204, 0x2b3, 0x0, 0x0)
umount2(&(0x7f0000000340)='./file0\x00', 0x3)
lseek(r0, 0x0, 0x0)
r18 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0)
lseek(r18, 0x0, 0x0)
socket$inet(0x2, 0x4, 0x0)

19:16:30 executing program 4:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/null\x00', 0x40000, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x7a, &(0x7f0000000700)=ANY=[@ANYBLOB="000800b867f2ad8bb8368900910000008100000086dd600200b69800"/64], 0x0)
keyctl$set_reqkey_keyring(0x5, 0xfffffffffffffffe)
add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
request_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='$.\x00', 0x0)
pipe2$9p(&(0x7f0000000240)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff}, 0x0)
write$P9_RVERSION(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f9870000c6504df67f00000000000000e98b4b153dffff082dbb78abd55fba3da80b856445ab1006487179e001b66c90c0473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd8824692f08ff8675bdf17ea1c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a671164679079d00"/148], 0x15)
r3 = dup(r2)
write$FUSE_BMAP(r3, &(0x7f0000000080)={0x18, 0x0, 0x6}, 0x18)
write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r5=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r5)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0, <r6=>0x0}, &(0x7f0000000580)=0xc)
r7 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r8=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r8)
r9 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r10=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r10)
r11 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x7)
lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, <r12=>0x0})
mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2000, &(0x7f0000000600)=ANY=[@ANYBLOB="7472616e733d7463702c706f72743d3078303030303030303030303030346532312c6163636573733d757365722c616e616d653d6e732f6d6e74002c6d61736b3d5e4d415941415001c8000000000000003d", @ANYRESDEC=r12, @ANYBLOB=',measure,smackfshat=TIPCv2\x00,\x00'])
r13 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x811, r13, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r13, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@loopback, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r14=>0x0}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xff2d)
setreuid(r14, r12)
stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, <r15=>0x0})
mount$fuse(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x40000, &(0x7f0000000800)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYRESDEC=r6, @ANYBLOB=',default_permissions,uid>', @ANYRESDEC=r8, @ANYBLOB=',fow%er<', @ANYRESDEC=r10, @ANYBLOB=',obj_type=keyring\x00,fscontext=root,rootcontext=unconfined_u,obj_role=security,uid=', @ANYRESDEC=r15, @ANYBLOB="2c7375626a5f757365723d74727573746564656d304000000000000000747275737465646b657972696e67637075736574d6379d9e4501302cf62a174b1073676a6499183a6a41735b802416248fce940f0a1c1d242c6673636f6e746578743d756e636f6e66696e65645f752c00"])
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='tran\x00\x00\x00\x00\x00\x00\x00\x00no=', @ANYRESHEX=r1, @ANYBLOB="2c7766646e9063ae6f3d684b22d93e8bf0a50500350000000000005e1a62fc6e1305f19d04b736e24adeda822a", @ANYRESHEX=r2, @ANYBLOB=',\x00'])
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={<r16=>0xffffffffffffffff})
dup2(r16, r16)
ioctl$EXT4_IOC_MOVE_EXT(r16, 0xc028660f, &(0x7f0000000300)={0x0, r2, 0x3ff, 0x10000, 0x4, 0x1})
r17 = mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5})
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedreceive(r17, &(0x7f0000000380)=""/204, 0x2b3, 0x0, 0x0)
umount2(&(0x7f0000000340)='./file0\x00', 0x3)
lseek(r0, 0x0, 0x0)
r18 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0)
lseek(r18, 0x0, 0x0)
socket$inet(0x2, 0x4, 0x0)

19:16:30 executing program 3:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/null\x00', 0x40000, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x7a, &(0x7f0000000700)=ANY=[@ANYBLOB="000800b867f2ad8bb8368900910000008100000086dd600200b69800"/64], 0x0)
keyctl$set_reqkey_keyring(0x5, 0xfffffffffffffffe)
add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
request_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='$.\x00', 0x0)
pipe2$9p(&(0x7f0000000240)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff}, 0x0)
write$P9_RVERSION(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f9870000c6504df67f00000000000000e98b4b153dffff082dbb78abd55fba3da80b856445ab1006487179e001b66c90c0473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd8824692f08ff8675bdf17ea1c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a671164679079d00"/148], 0x15)
r3 = dup(r2)
write$FUSE_BMAP(r3, &(0x7f0000000080)={0x18, 0x0, 0x6}, 0x18)
write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r5=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r5)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0, <r6=>0x0}, &(0x7f0000000580)=0xc)
r7 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r8=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r8)
r9 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r10=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r10)
r11 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x7)
lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, <r12=>0x0})
mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2000, &(0x7f0000000600)=ANY=[@ANYBLOB="7472616e733d7463702c706f72743d3078303030303030303030303030346532312c6163636573733d757365722c616e616d653d6e732f6d6e74002c6d61736b3d5e4d415941415001c8000000000000003d", @ANYRESDEC=r12, @ANYBLOB=',measure,smackfshat=TIPCv2\x00,\x00'])
r13 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x811, r13, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r13, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@loopback, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r14=>0x0}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xff2d)
setreuid(r14, r12)
stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, <r15=>0x0})
mount$fuse(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x40000, &(0x7f0000000800)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYRESDEC=r6, @ANYBLOB=',default_permissions,uid>', @ANYRESDEC=r8, @ANYBLOB=',fow%er<', @ANYRESDEC=r10, @ANYBLOB=',obj_type=keyring\x00,fscontext=root,rootcontext=unconfined_u,obj_role=security,uid=', @ANYRESDEC=r15, @ANYBLOB="2c7375626a5f757365723d74727573746564656d304000000000000000747275737465646b657972696e67637075736574d6379d9e4501302cf62a174b1073676a6499183a6a41735b802416248fce940f0a1c1d242c6673636f6e746578743d756e636f6e66696e65645f752c00"])
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='tran\x00\x00\x00\x00\x00\x00\x00\x00no=', @ANYRESHEX=r1, @ANYBLOB="2c7766646e9063ae6f3d684b22d93e8bf0a50500350000000000005e1a62fc6e1305f19d04b736e24adeda822a", @ANYRESHEX=r2, @ANYBLOB=',\x00'])
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={<r16=>0xffffffffffffffff})
dup2(r16, r16)
ioctl$EXT4_IOC_MOVE_EXT(r16, 0xc028660f, &(0x7f0000000300)={0x0, r2, 0x3ff, 0x10000, 0x4, 0x1})
r17 = mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5})
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedreceive(r17, &(0x7f0000000380)=""/204, 0x2b3, 0x0, 0x0)
umount2(&(0x7f0000000340)='./file0\x00', 0x3)
lseek(r0, 0x0, 0x0)
r18 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0)
lseek(r18, 0x0, 0x0)
socket$inet(0x2, 0x4, 0x0)

19:16:30 executing program 0:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/null\x00', 0x40000, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x7a, &(0x7f0000000700)=ANY=[@ANYBLOB="000800b867f2ad8bb8368900910000008100000086dd600200b69800"/64], 0x0)
keyctl$set_reqkey_keyring(0x5, 0xfffffffffffffffe)
add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
request_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='$.\x00', 0x0)
pipe2$9p(&(0x7f0000000240)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff}, 0x0)
write$P9_RVERSION(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f9870000c6504df67f00000000000000e98b4b153dffff082dbb78abd55fba3da80b856445ab1006487179e001b66c90c0473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd8824692f08ff8675bdf17ea1c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a671164679079d00"/148], 0x15)
r3 = dup(r2)
write$FUSE_BMAP(r3, &(0x7f0000000080)={0x18, 0x0, 0x6}, 0x18)
write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r5=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r5)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0, <r6=>0x0}, &(0x7f0000000580)=0xc)
r7 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r8=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r8)
r9 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r10=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r10)
r11 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x7)
lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, <r12=>0x0})
mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2000, &(0x7f0000000600)=ANY=[@ANYBLOB="7472616e733d7463702c706f72743d3078303030303030303030303030346532312c6163636573733d757365722c616e616d653d6e732f6d6e74002c6d61736b3d5e4d415941415001c8000000000000003d", @ANYRESDEC=r12, @ANYBLOB=',measure,smackfshat=TIPCv2\x00,\x00'])
r13 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x811, r13, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r13, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@loopback, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r14=>0x0}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xff2d)
setreuid(r14, r12)
stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, <r15=>0x0})
mount$fuse(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x40000, &(0x7f0000000800)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYRESDEC=r6, @ANYBLOB=',default_permissions,uid>', @ANYRESDEC=r8, @ANYBLOB=',fow%er<', @ANYRESDEC=r10, @ANYBLOB=',obj_type=keyring\x00,fscontext=root,rootcontext=unconfined_u,obj_role=security,uid=', @ANYRESDEC=r15, @ANYBLOB="2c7375626a5f757365723d74727573746564656d304000000000000000747275737465646b657972696e67637075736574d6379d9e4501302cf62a174b1073676a6499183a6a41735b802416248fce940f0a1c1d242c6673636f6e746578743d756e636f6e66696e65645f752c00"])
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='tran\x00\x00\x00\x00\x00\x00\x00\x00no=', @ANYRESHEX=r1, @ANYBLOB="2c7766646e9063ae6f3d684b22d93e8bf0a50500350000000000005e1a62fc6e1305f19d04b736e24adeda822a", @ANYRESHEX=r2, @ANYBLOB=',\x00'])
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={<r16=>0xffffffffffffffff})
dup2(r16, r16)
ioctl$EXT4_IOC_MOVE_EXT(r16, 0xc028660f, &(0x7f0000000300)={0x0, r2, 0x3ff, 0x10000, 0x4, 0x1})
r17 = mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5})
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedreceive(r17, &(0x7f0000000380)=""/204, 0x2b3, 0x0, 0x0)
umount2(&(0x7f0000000340)='./file0\x00', 0x3)
lseek(r0, 0x0, 0x0)
r18 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0)
lseek(r18, 0x0, 0x0)
socket$inet(0x2, 0x4, 0x0)

19:16:30 executing program 1:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/null\x00', 0x40000, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x7a, &(0x7f0000000700)=ANY=[@ANYBLOB="000800b867f2ad8bb8368900910000008100000086dd600200b69800"/64], 0x0)
keyctl$set_reqkey_keyring(0x5, 0xfffffffffffffffe)
add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
request_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='$.\x00', 0x0)
pipe2$9p(&(0x7f0000000240)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff}, 0x0)
write$P9_RVERSION(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f9870000c6504df67f00000000000000e98b4b153dffff082dbb78abd55fba3da80b856445ab1006487179e001b66c90c0473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd8824692f08ff8675bdf17ea1c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a671164679079d00"/148], 0x15)
r3 = dup(r2)
write$FUSE_BMAP(r3, &(0x7f0000000080)={0x18, 0x0, 0x6}, 0x18)
write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r5=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r5)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0, <r6=>0x0}, &(0x7f0000000580)=0xc)
r7 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r8=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r8)
r9 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r10=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r10)
r11 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x7)
lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, <r12=>0x0})
mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2000, &(0x7f0000000600)=ANY=[@ANYBLOB="7472616e733d7463702c706f72743d3078303030303030303030303030346532312c6163636573733d757365722c616e616d653d6e732f6d6e74002c6d61736b3d5e4d415941415001c8000000000000003d", @ANYRESDEC=r12, @ANYBLOB=',measure,smackfshat=TIPCv2\x00,\x00'])
r13 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x811, r13, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r13, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@loopback, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r14=>0x0}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xff2d)
setreuid(r14, r12)
stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, <r15=>0x0})
mount$fuse(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x40000, &(0x7f0000000800)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYRESDEC=r6, @ANYBLOB=',default_permissions,uid>', @ANYRESDEC=r8, @ANYBLOB=',fow%er<', @ANYRESDEC=r10, @ANYBLOB=',obj_type=keyring\x00,fscontext=root,rootcontext=unconfined_u,obj_role=security,uid=', @ANYRESDEC=r15, @ANYBLOB="2c7375626a5f757365723d74727573746564656d304000000000000000747275737465646b657972696e67637075736574d6379d9e4501302cf62a174b1073676a6499183a6a41735b802416248fce940f0a1c1d242c6673636f6e746578743d756e636f6e66696e65645f752c00"])
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='tran\x00\x00\x00\x00\x00\x00\x00\x00no=', @ANYRESHEX=r1, @ANYBLOB="2c7766646e9063ae6f3d684b22d93e8bf0a50500350000000000005e1a62fc6e1305f19d04b736e24adeda822a", @ANYRESHEX=r2, @ANYBLOB=',\x00'])
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={<r16=>0xffffffffffffffff})
dup2(r16, r16)
ioctl$EXT4_IOC_MOVE_EXT(r16, 0xc028660f, &(0x7f0000000300)={0x0, r2, 0x3ff, 0x10000, 0x4, 0x1})
r17 = mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5})
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedreceive(r17, &(0x7f0000000380)=""/204, 0x2b3, 0x0, 0x0)
umount2(&(0x7f0000000340)='./file0\x00', 0x3)
lseek(r0, 0x0, 0x0)
r18 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0)
lseek(r18, 0x0, 0x0)
socket$inet(0x2, 0x4, 0x0)

19:16:30 executing program 5:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/null\x00', 0x40000, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x7a, &(0x7f0000000700)=ANY=[@ANYBLOB="000800b867f2ad8bb8368900910000008100000086dd600200b69800"/64], 0x0)
keyctl$set_reqkey_keyring(0x5, 0xfffffffffffffffe)
add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
request_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='$.\x00', 0x0)
pipe2$9p(&(0x7f0000000240)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff}, 0x0)
write$P9_RVERSION(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f9870000c6504df67f00000000000000e98b4b153dffff082dbb78abd55fba3da80b856445ab1006487179e001b66c90c0473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd8824692f08ff8675bdf17ea1c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a671164679079d00"/148], 0x15)
r3 = dup(r2)
write$FUSE_BMAP(r3, &(0x7f0000000080)={0x18, 0x0, 0x6}, 0x18)
write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r5=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r5)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0, <r6=>0x0}, &(0x7f0000000580)=0xc)
r7 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r8=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r8)
r9 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r10=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r10)
r11 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x7)
lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, <r12=>0x0})
mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2000, &(0x7f0000000600)=ANY=[@ANYBLOB="7472616e733d7463702c706f72743d3078303030303030303030303030346532312c6163636573733d757365722c616e616d653d6e732f6d6e74002c6d61736b3d5e4d415941415001c8000000000000003d", @ANYRESDEC=r12, @ANYBLOB=',measure,smackfshat=TIPCv2\x00,\x00'])
r13 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x811, r13, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r13, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@loopback, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r14=>0x0}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xff2d)
setreuid(r14, r12)
stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, <r15=>0x0})
mount$fuse(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x40000, &(0x7f0000000800)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYRESDEC=r6, @ANYBLOB=',default_permissions,uid>', @ANYRESDEC=r8, @ANYBLOB=',fow%er<', @ANYRESDEC=r10, @ANYBLOB=',obj_type=keyring\x00,fscontext=root,rootcontext=unconfined_u,obj_role=security,uid=', @ANYRESDEC=r15, @ANYBLOB="2c7375626a5f757365723d74727573746564656d304000000000000000747275737465646b657972696e67637075736574d6379d9e4501302cf62a174b1073676a6499183a6a41735b802416248fce940f0a1c1d242c6673636f6e746578743d756e636f6e66696e65645f752c00"])
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='tran\x00\x00\x00\x00\x00\x00\x00\x00no=', @ANYRESHEX=r1, @ANYBLOB="2c7766646e9063ae6f3d684b22d93e8bf0a50500350000000000005e1a62fc6e1305f19d04b736e24adeda822a", @ANYRESHEX=r2, @ANYBLOB=',\x00'])
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={<r16=>0xffffffffffffffff})
dup2(r16, r16)
ioctl$EXT4_IOC_MOVE_EXT(r16, 0xc028660f, &(0x7f0000000300)={0x0, r2, 0x3ff, 0x10000, 0x4, 0x1})
r17 = mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5})
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedreceive(r17, &(0x7f0000000380)=""/204, 0x2b3, 0x0, 0x0)
umount2(&(0x7f0000000340)='./file0\x00', 0x3)
lseek(r0, 0x0, 0x0)
r18 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0)
lseek(r18, 0x0, 0x0)
socket$inet(0x2, 0x4, 0x0)

19:16:30 executing program 2:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/null\x00', 0x40000, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x7a, &(0x7f0000000700)=ANY=[@ANYBLOB="000800b867f2ad8bb8368900910000008100000086dd600200b69800"/64], 0x0)
keyctl$set_reqkey_keyring(0x5, 0xfffffffffffffffe)
add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
request_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='$.\x00', 0x0)
pipe2$9p(&(0x7f0000000240)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff}, 0x0)
write$P9_RVERSION(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f9870000c6504df67f00000000000000e98b4b153dffff082dbb78abd55fba3da80b856445ab1006487179e001b66c90c0473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd8824692f08ff8675bdf17ea1c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a671164679079d00"/148], 0x15)
r3 = dup(r2)
write$FUSE_BMAP(r3, &(0x7f0000000080)={0x18, 0x0, 0x6}, 0x18)
write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r5=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r5)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0, <r6=>0x0}, &(0x7f0000000580)=0xc)
r7 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r8=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r8)
r9 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r10=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r10)
r11 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x7)
lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, <r12=>0x0})
mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2000, &(0x7f0000000600)=ANY=[@ANYBLOB="7472616e733d7463702c706f72743d3078303030303030303030303030346532312c6163636573733d757365722c616e616d653d6e732f6d6e74002c6d61736b3d5e4d415941415001c8000000000000003d", @ANYRESDEC=r12, @ANYBLOB=',measure,smackfshat=TIPCv2\x00,\x00'])
r13 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x811, r13, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r13, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@loopback, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r14=>0x0}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xff2d)
setreuid(r14, r12)
stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, <r15=>0x0})
mount$fuse(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x40000, &(0x7f0000000800)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYRESDEC=r6, @ANYBLOB=',default_permissions,uid>', @ANYRESDEC=r8, @ANYBLOB=',fow%er<', @ANYRESDEC=r10, @ANYBLOB=',obj_type=keyring\x00,fscontext=root,rootcontext=unconfined_u,obj_role=security,uid=', @ANYRESDEC=r15, @ANYBLOB="2c7375626a5f757365723d74727573746564656d304000000000000000747275737465646b657972696e67637075736574d6379d9e4501302cf62a174b1073676a6499183a6a41735b802416248fce940f0a1c1d242c6673636f6e746578743d756e636f6e66696e65645f752c00"])
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='tran\x00\x00\x00\x00\x00\x00\x00\x00no=', @ANYRESHEX=r1, @ANYBLOB="2c7766646e9063ae6f3d684b22d93e8bf0a50500350000000000005e1a62fc6e1305f19d04b736e24adeda822a", @ANYRESHEX=r2, @ANYBLOB=',\x00'])
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={<r16=>0xffffffffffffffff})
dup2(r16, r16)
ioctl$EXT4_IOC_MOVE_EXT(r16, 0xc028660f, &(0x7f0000000300)={0x0, r2, 0x3ff, 0x10000, 0x4, 0x1})
r17 = mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5})
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedreceive(r17, &(0x7f0000000380)=""/204, 0x2b3, 0x0, 0x0)
umount2(&(0x7f0000000340)='./file0\x00', 0x3)
lseek(r0, 0x0, 0x0)
r18 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0)
lseek(r18, 0x0, 0x0)
socket$inet(0x2, 0x4, 0x0)

19:16:30 executing program 4:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/null\x00', 0x40000, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x7a, &(0x7f0000000700)=ANY=[@ANYBLOB="000800b867f2ad8bb8368900910000008100000086dd600200b69800"/64], 0x0)
keyctl$set_reqkey_keyring(0x5, 0xfffffffffffffffe)
add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
request_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='$.\x00', 0x0)
pipe2$9p(&(0x7f0000000240)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff}, 0x0)
write$P9_RVERSION(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f9870000c6504df67f00000000000000e98b4b153dffff082dbb78abd55fba3da80b856445ab1006487179e001b66c90c0473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd8824692f08ff8675bdf17ea1c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a671164679079d00"/148], 0x15)
r3 = dup(r2)
write$FUSE_BMAP(r3, &(0x7f0000000080)={0x18, 0x0, 0x6}, 0x18)
write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r5=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r5)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0, <r6=>0x0}, &(0x7f0000000580)=0xc)
r7 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r8=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r8)
r9 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r10=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r10)
r11 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x7)
lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, <r12=>0x0})
mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2000, &(0x7f0000000600)=ANY=[@ANYBLOB="7472616e733d7463702c706f72743d3078303030303030303030303030346532312c6163636573733d757365722c616e616d653d6e732f6d6e74002c6d61736b3d5e4d415941415001c8000000000000003d", @ANYRESDEC=r12, @ANYBLOB=',measure,smackfshat=TIPCv2\x00,\x00'])
r13 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x811, r13, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r13, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@loopback, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r14=>0x0}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xff2d)
setreuid(r14, r12)
stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, <r15=>0x0})
mount$fuse(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x40000, &(0x7f0000000800)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYRESDEC=r6, @ANYBLOB=',default_permissions,uid>', @ANYRESDEC=r8, @ANYBLOB=',fow%er<', @ANYRESDEC=r10, @ANYBLOB=',obj_type=keyring\x00,fscontext=root,rootcontext=unconfined_u,obj_role=security,uid=', @ANYRESDEC=r15, @ANYBLOB="2c7375626a5f757365723d74727573746564656d304000000000000000747275737465646b657972696e67637075736574d6379d9e4501302cf62a174b1073676a6499183a6a41735b802416248fce940f0a1c1d242c6673636f6e746578743d756e636f6e66696e65645f752c00"])
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='tran\x00\x00\x00\x00\x00\x00\x00\x00no=', @ANYRESHEX=r1, @ANYBLOB="2c7766646e9063ae6f3d684b22d93e8bf0a50500350000000000005e1a62fc6e1305f19d04b736e24adeda822a", @ANYRESHEX=r2, @ANYBLOB=',\x00'])
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={<r16=>0xffffffffffffffff})
dup2(r16, r16)
ioctl$EXT4_IOC_MOVE_EXT(r16, 0xc028660f, &(0x7f0000000300)={0x0, r2, 0x3ff, 0x10000, 0x4, 0x1})
r17 = mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5})
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedreceive(r17, &(0x7f0000000380)=""/204, 0x2b3, 0x0, 0x0)
umount2(&(0x7f0000000340)='./file0\x00', 0x3)
lseek(r0, 0x0, 0x0)
r18 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0)
lseek(r18, 0x0, 0x0)
socket$inet(0x2, 0x4, 0x0)

19:16:30 executing program 3:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/null\x00', 0x40000, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x7a, &(0x7f0000000700)=ANY=[@ANYBLOB="000800b867f2ad8bb8368900910000008100000086dd600200b69800"/64], 0x0)
keyctl$set_reqkey_keyring(0x5, 0xfffffffffffffffe)
add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
request_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='$.\x00', 0x0)
pipe2$9p(&(0x7f0000000240)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff}, 0x0)
write$P9_RVERSION(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f9870000c6504df67f00000000000000e98b4b153dffff082dbb78abd55fba3da80b856445ab1006487179e001b66c90c0473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd8824692f08ff8675bdf17ea1c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a671164679079d00"/148], 0x15)
r3 = dup(r2)
write$FUSE_BMAP(r3, &(0x7f0000000080)={0x18, 0x0, 0x6}, 0x18)
write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r5=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r5)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0, <r6=>0x0}, &(0x7f0000000580)=0xc)
r7 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r8=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r8)
r9 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r10=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r10)
r11 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x7)
lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, <r12=>0x0})
mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2000, &(0x7f0000000600)=ANY=[@ANYBLOB="7472616e733d7463702c706f72743d3078303030303030303030303030346532312c6163636573733d757365722c616e616d653d6e732f6d6e74002c6d61736b3d5e4d415941415001c8000000000000003d", @ANYRESDEC=r12, @ANYBLOB=',measure,smackfshat=TIPCv2\x00,\x00'])
r13 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x811, r13, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r13, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@loopback, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r14=>0x0}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xff2d)
setreuid(r14, r12)
stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, <r15=>0x0})
mount$fuse(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x40000, &(0x7f0000000800)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYRESDEC=r6, @ANYBLOB=',default_permissions,uid>', @ANYRESDEC=r8, @ANYBLOB=',fow%er<', @ANYRESDEC=r10, @ANYBLOB=',obj_type=keyring\x00,fscontext=root,rootcontext=unconfined_u,obj_role=security,uid=', @ANYRESDEC=r15, @ANYBLOB="2c7375626a5f757365723d74727573746564656d304000000000000000747275737465646b657972696e67637075736574d6379d9e4501302cf62a174b1073676a6499183a6a41735b802416248fce940f0a1c1d242c6673636f6e746578743d756e636f6e66696e65645f752c00"])
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='tran\x00\x00\x00\x00\x00\x00\x00\x00no=', @ANYRESHEX=r1, @ANYBLOB="2c7766646e9063ae6f3d684b22d93e8bf0a50500350000000000005e1a62fc6e1305f19d04b736e24adeda822a", @ANYRESHEX=r2, @ANYBLOB=',\x00'])
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={<r16=>0xffffffffffffffff})
dup2(r16, r16)
ioctl$EXT4_IOC_MOVE_EXT(r16, 0xc028660f, &(0x7f0000000300)={0x0, r2, 0x3ff, 0x10000, 0x4, 0x1})
r17 = mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5})
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedreceive(r17, &(0x7f0000000380)=""/204, 0x2b3, 0x0, 0x0)
umount2(&(0x7f0000000340)='./file0\x00', 0x3)
lseek(r0, 0x0, 0x0)
r18 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0)
lseek(r18, 0x0, 0x0)
socket$inet(0x2, 0x4, 0x0)

19:16:30 executing program 0:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/null\x00', 0x40000, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x7a, &(0x7f0000000700)=ANY=[@ANYBLOB="000800b867f2ad8bb8368900910000008100000086dd600200b69800"/64], 0x0)
keyctl$set_reqkey_keyring(0x5, 0xfffffffffffffffe)
add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
request_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='$.\x00', 0x0)
pipe2$9p(&(0x7f0000000240)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff}, 0x0)
write$P9_RVERSION(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f9870000c6504df67f00000000000000e98b4b153dffff082dbb78abd55fba3da80b856445ab1006487179e001b66c90c0473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd8824692f08ff8675bdf17ea1c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a671164679079d00"/148], 0x15)
r3 = dup(r2)
write$FUSE_BMAP(r3, &(0x7f0000000080)={0x18, 0x0, 0x6}, 0x18)
write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r5=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r5)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0, <r6=>0x0}, &(0x7f0000000580)=0xc)
r7 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r8=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r8)
r9 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r10=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r10)
r11 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x7)
lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, <r12=>0x0})
mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2000, &(0x7f0000000600)=ANY=[@ANYBLOB="7472616e733d7463702c706f72743d3078303030303030303030303030346532312c6163636573733d757365722c616e616d653d6e732f6d6e74002c6d61736b3d5e4d415941415001c8000000000000003d", @ANYRESDEC=r12, @ANYBLOB=',measure,smackfshat=TIPCv2\x00,\x00'])
r13 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x811, r13, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r13, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@loopback, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r14=>0x0}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xff2d)
setreuid(r14, r12)
stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, <r15=>0x0})
mount$fuse(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x40000, &(0x7f0000000800)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYRESDEC=r6, @ANYBLOB=',default_permissions,uid>', @ANYRESDEC=r8, @ANYBLOB=',fow%er<', @ANYRESDEC=r10, @ANYBLOB=',obj_type=keyring\x00,fscontext=root,rootcontext=unconfined_u,obj_role=security,uid=', @ANYRESDEC=r15, @ANYBLOB="2c7375626a5f757365723d74727573746564656d304000000000000000747275737465646b657972696e67637075736574d6379d9e4501302cf62a174b1073676a6499183a6a41735b802416248fce940f0a1c1d242c6673636f6e746578743d756e636f6e66696e65645f752c00"])
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='tran\x00\x00\x00\x00\x00\x00\x00\x00no=', @ANYRESHEX=r1, @ANYBLOB="2c7766646e9063ae6f3d684b22d93e8bf0a50500350000000000005e1a62fc6e1305f19d04b736e24adeda822a", @ANYRESHEX=r2, @ANYBLOB=',\x00'])
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={<r16=>0xffffffffffffffff})
dup2(r16, r16)
ioctl$EXT4_IOC_MOVE_EXT(r16, 0xc028660f, &(0x7f0000000300)={0x0, r2, 0x3ff, 0x10000, 0x4, 0x1})
r17 = mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5})
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedreceive(r17, &(0x7f0000000380)=""/204, 0x2b3, 0x0, 0x0)
umount2(&(0x7f0000000340)='./file0\x00', 0x3)
lseek(r0, 0x0, 0x0)
r18 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0)
lseek(r18, 0x0, 0x0)
socket$inet(0x2, 0x4, 0x0)

19:16:31 executing program 5:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/null\x00', 0x40000, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x7a, &(0x7f0000000700)=ANY=[@ANYBLOB="000800b867f2ad8bb8368900910000008100000086dd600200b69800"/64], 0x0)
keyctl$set_reqkey_keyring(0x5, 0xfffffffffffffffe)
add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
request_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='$.\x00', 0x0)
pipe2$9p(&(0x7f0000000240)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff}, 0x0)
write$P9_RVERSION(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f9870000c6504df67f00000000000000e98b4b153dffff082dbb78abd55fba3da80b856445ab1006487179e001b66c90c0473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd8824692f08ff8675bdf17ea1c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a671164679079d00"/148], 0x15)
r3 = dup(r2)
write$FUSE_BMAP(r3, &(0x7f0000000080)={0x18, 0x0, 0x6}, 0x18)
write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r5=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r5)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0, <r6=>0x0}, &(0x7f0000000580)=0xc)
r7 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r8=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r8)
r9 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r10=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r10)
r11 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x7)
lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, <r12=>0x0})
mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2000, &(0x7f0000000600)=ANY=[@ANYBLOB="7472616e733d7463702c706f72743d3078303030303030303030303030346532312c6163636573733d757365722c616e616d653d6e732f6d6e74002c6d61736b3d5e4d415941415001c8000000000000003d", @ANYRESDEC=r12, @ANYBLOB=',measure,smackfshat=TIPCv2\x00,\x00'])
r13 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x811, r13, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r13, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@loopback, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r14=>0x0}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xff2d)
setreuid(r14, r12)
stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, <r15=>0x0})
mount$fuse(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x40000, &(0x7f0000000800)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYRESDEC=r6, @ANYBLOB=',default_permissions,uid>', @ANYRESDEC=r8, @ANYBLOB=',fow%er<', @ANYRESDEC=r10, @ANYBLOB=',obj_type=keyring\x00,fscontext=root,rootcontext=unconfined_u,obj_role=security,uid=', @ANYRESDEC=r15, @ANYBLOB="2c7375626a5f757365723d74727573746564656d304000000000000000747275737465646b657972696e67637075736574d6379d9e4501302cf62a174b1073676a6499183a6a41735b802416248fce940f0a1c1d242c6673636f6e746578743d756e636f6e66696e65645f752c00"])
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='tran\x00\x00\x00\x00\x00\x00\x00\x00no=', @ANYRESHEX=r1, @ANYBLOB="2c7766646e9063ae6f3d684b22d93e8bf0a50500350000000000005e1a62fc6e1305f19d04b736e24adeda822a", @ANYRESHEX=r2, @ANYBLOB=',\x00'])
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={<r16=>0xffffffffffffffff})
dup2(r16, r16)
ioctl$EXT4_IOC_MOVE_EXT(r16, 0xc028660f, &(0x7f0000000300)={0x0, r2, 0x3ff, 0x10000, 0x4, 0x1})
r17 = mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5})
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedreceive(r17, &(0x7f0000000380)=""/204, 0x2b3, 0x0, 0x0)
umount2(&(0x7f0000000340)='./file0\x00', 0x3)
lseek(r0, 0x0, 0x0)
r18 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0)
lseek(r18, 0x0, 0x0)
socket$inet(0x2, 0x4, 0x0)

19:16:31 executing program 1:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/null\x00', 0x40000, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x7a, &(0x7f0000000700)=ANY=[@ANYBLOB="000800b867f2ad8bb8368900910000008100000086dd600200b69800"/64], 0x0)
keyctl$set_reqkey_keyring(0x5, 0xfffffffffffffffe)
add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
request_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='$.\x00', 0x0)
pipe2$9p(&(0x7f0000000240)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff}, 0x0)
write$P9_RVERSION(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f9870000c6504df67f00000000000000e98b4b153dffff082dbb78abd55fba3da80b856445ab1006487179e001b66c90c0473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd8824692f08ff8675bdf17ea1c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a671164679079d00"/148], 0x15)
r3 = dup(r2)
write$FUSE_BMAP(r3, &(0x7f0000000080)={0x18, 0x0, 0x6}, 0x18)
write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r5=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r5)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0, <r6=>0x0}, &(0x7f0000000580)=0xc)
r7 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r8=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r8)
r9 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r10=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r10)
r11 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x7)
lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, <r12=>0x0})
mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2000, &(0x7f0000000600)=ANY=[@ANYBLOB="7472616e733d7463702c706f72743d3078303030303030303030303030346532312c6163636573733d757365722c616e616d653d6e732f6d6e74002c6d61736b3d5e4d415941415001c8000000000000003d", @ANYRESDEC=r12, @ANYBLOB=',measure,smackfshat=TIPCv2\x00,\x00'])
r13 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x811, r13, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r13, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@loopback, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r14=>0x0}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xff2d)
setreuid(r14, r12)
stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, <r15=>0x0})
mount$fuse(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x40000, &(0x7f0000000800)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYRESDEC=r6, @ANYBLOB=',default_permissions,uid>', @ANYRESDEC=r8, @ANYBLOB=',fow%er<', @ANYRESDEC=r10, @ANYBLOB=',obj_type=keyring\x00,fscontext=root,rootcontext=unconfined_u,obj_role=security,uid=', @ANYRESDEC=r15, @ANYBLOB="2c7375626a5f757365723d74727573746564656d304000000000000000747275737465646b657972696e67637075736574d6379d9e4501302cf62a174b1073676a6499183a6a41735b802416248fce940f0a1c1d242c6673636f6e746578743d756e636f6e66696e65645f752c00"])
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='tran\x00\x00\x00\x00\x00\x00\x00\x00no=', @ANYRESHEX=r1, @ANYBLOB="2c7766646e9063ae6f3d684b22d93e8bf0a50500350000000000005e1a62fc6e1305f19d04b736e24adeda822a", @ANYRESHEX=r2, @ANYBLOB=',\x00'])
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={<r16=>0xffffffffffffffff})
dup2(r16, r16)
ioctl$EXT4_IOC_MOVE_EXT(r16, 0xc028660f, &(0x7f0000000300)={0x0, r2, 0x3ff, 0x10000, 0x4, 0x1})
r17 = mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5})
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedreceive(r17, &(0x7f0000000380)=""/204, 0x2b3, 0x0, 0x0)
umount2(&(0x7f0000000340)='./file0\x00', 0x3)
lseek(r0, 0x0, 0x0)
r18 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0)
lseek(r18, 0x0, 0x0)
socket$inet(0x2, 0x4, 0x0)

19:16:31 executing program 2:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/null\x00', 0x40000, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x7a, &(0x7f0000000700)=ANY=[@ANYBLOB="000800b867f2ad8bb8368900910000008100000086dd600200b69800"/64], 0x0)
keyctl$set_reqkey_keyring(0x5, 0xfffffffffffffffe)
add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
request_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='$.\x00', 0x0)
pipe2$9p(&(0x7f0000000240)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff}, 0x0)
write$P9_RVERSION(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f9870000c6504df67f00000000000000e98b4b153dffff082dbb78abd55fba3da80b856445ab1006487179e001b66c90c0473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd8824692f08ff8675bdf17ea1c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a671164679079d00"/148], 0x15)
r3 = dup(r2)
write$FUSE_BMAP(r3, &(0x7f0000000080)={0x18, 0x0, 0x6}, 0x18)
write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r5=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r5)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0, <r6=>0x0}, &(0x7f0000000580)=0xc)
r7 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r8=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r8)
r9 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r10=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r10)
r11 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x7)
lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, <r12=>0x0})
mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2000, &(0x7f0000000600)=ANY=[@ANYBLOB="7472616e733d7463702c706f72743d3078303030303030303030303030346532312c6163636573733d757365722c616e616d653d6e732f6d6e74002c6d61736b3d5e4d415941415001c8000000000000003d", @ANYRESDEC=r12, @ANYBLOB=',measure,smackfshat=TIPCv2\x00,\x00'])
r13 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x811, r13, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r13, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@loopback, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r14=>0x0}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xff2d)
setreuid(r14, r12)
stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, <r15=>0x0})
mount$fuse(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x40000, &(0x7f0000000800)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYRESDEC=r6, @ANYBLOB=',default_permissions,uid>', @ANYRESDEC=r8, @ANYBLOB=',fow%er<', @ANYRESDEC=r10, @ANYBLOB=',obj_type=keyring\x00,fscontext=root,rootcontext=unconfined_u,obj_role=security,uid=', @ANYRESDEC=r15, @ANYBLOB="2c7375626a5f757365723d74727573746564656d304000000000000000747275737465646b657972696e67637075736574d6379d9e4501302cf62a174b1073676a6499183a6a41735b802416248fce940f0a1c1d242c6673636f6e746578743d756e636f6e66696e65645f752c00"])
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='tran\x00\x00\x00\x00\x00\x00\x00\x00no=', @ANYRESHEX=r1, @ANYBLOB="2c7766646e9063ae6f3d684b22d93e8bf0a50500350000000000005e1a62fc6e1305f19d04b736e24adeda822a", @ANYRESHEX=r2, @ANYBLOB=',\x00'])
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={<r16=>0xffffffffffffffff})
dup2(r16, r16)
ioctl$EXT4_IOC_MOVE_EXT(r16, 0xc028660f, &(0x7f0000000300)={0x0, r2, 0x3ff, 0x10000, 0x4, 0x1})
r17 = mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5})
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedreceive(r17, &(0x7f0000000380)=""/204, 0x2b3, 0x0, 0x0)
umount2(&(0x7f0000000340)='./file0\x00', 0x3)
lseek(r0, 0x0, 0x0)
r18 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0)
lseek(r18, 0x0, 0x0)
socket$inet(0x2, 0x4, 0x0)

19:16:31 executing program 4:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/null\x00', 0x40000, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x7a, &(0x7f0000000700)=ANY=[@ANYBLOB="000800b867f2ad8bb8368900910000008100000086dd600200b69800"/64], 0x0)
keyctl$set_reqkey_keyring(0x5, 0xfffffffffffffffe)
add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
request_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='$.\x00', 0x0)
pipe2$9p(&(0x7f0000000240)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff}, 0x0)
write$P9_RVERSION(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f9870000c6504df67f00000000000000e98b4b153dffff082dbb78abd55fba3da80b856445ab1006487179e001b66c90c0473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd8824692f08ff8675bdf17ea1c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a671164679079d00"/148], 0x15)
r3 = dup(r2)
write$FUSE_BMAP(r3, &(0x7f0000000080)={0x18, 0x0, 0x6}, 0x18)
write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r5=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r5)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0, <r6=>0x0}, &(0x7f0000000580)=0xc)
r7 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r8=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r8)
r9 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r10=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r10)
r11 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x7)
lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, <r12=>0x0})
mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2000, &(0x7f0000000600)=ANY=[@ANYBLOB="7472616e733d7463702c706f72743d3078303030303030303030303030346532312c6163636573733d757365722c616e616d653d6e732f6d6e74002c6d61736b3d5e4d415941415001c8000000000000003d", @ANYRESDEC=r12, @ANYBLOB=',measure,smackfshat=TIPCv2\x00,\x00'])
r13 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x811, r13, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r13, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@loopback, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r14=>0x0}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xff2d)
setreuid(r14, r12)
stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, <r15=>0x0})
mount$fuse(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x40000, &(0x7f0000000800)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYRESDEC=r6, @ANYBLOB=',default_permissions,uid>', @ANYRESDEC=r8, @ANYBLOB=',fow%er<', @ANYRESDEC=r10, @ANYBLOB=',obj_type=keyring\x00,fscontext=root,rootcontext=unconfined_u,obj_role=security,uid=', @ANYRESDEC=r15, @ANYBLOB="2c7375626a5f757365723d74727573746564656d304000000000000000747275737465646b657972696e67637075736574d6379d9e4501302cf62a174b1073676a6499183a6a41735b802416248fce940f0a1c1d242c6673636f6e746578743d756e636f6e66696e65645f752c00"])
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='tran\x00\x00\x00\x00\x00\x00\x00\x00no=', @ANYRESHEX=r1, @ANYBLOB="2c7766646e9063ae6f3d684b22d93e8bf0a50500350000000000005e1a62fc6e1305f19d04b736e24adeda822a", @ANYRESHEX=r2, @ANYBLOB=',\x00'])
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={<r16=>0xffffffffffffffff})
dup2(r16, r16)
ioctl$EXT4_IOC_MOVE_EXT(r16, 0xc028660f, &(0x7f0000000300)={0x0, r2, 0x3ff, 0x10000, 0x4, 0x1})
r17 = mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5})
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedreceive(r17, &(0x7f0000000380)=""/204, 0x2b3, 0x0, 0x0)
umount2(&(0x7f0000000340)='./file0\x00', 0x3)
lseek(r0, 0x0, 0x0)
r18 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0)
lseek(r18, 0x0, 0x0)
socket$inet(0x2, 0x4, 0x0)

19:16:31 executing program 3:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/null\x00', 0x40000, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x7a, &(0x7f0000000700)=ANY=[@ANYBLOB="000800b867f2ad8bb8368900910000008100000086dd600200b69800"/64], 0x0)
keyctl$set_reqkey_keyring(0x5, 0xfffffffffffffffe)
add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
request_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='$.\x00', 0x0)
pipe2$9p(&(0x7f0000000240)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff}, 0x0)
write$P9_RVERSION(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f9870000c6504df67f00000000000000e98b4b153dffff082dbb78abd55fba3da80b856445ab1006487179e001b66c90c0473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd8824692f08ff8675bdf17ea1c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a671164679079d00"/148], 0x15)
r3 = dup(r2)
write$FUSE_BMAP(r3, &(0x7f0000000080)={0x18, 0x0, 0x6}, 0x18)
write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r5=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r5)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0, <r6=>0x0}, &(0x7f0000000580)=0xc)
r7 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r8=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r8)
r9 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r10=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r10)
r11 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x7)
lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, <r12=>0x0})
mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2000, &(0x7f0000000600)=ANY=[@ANYBLOB="7472616e733d7463702c706f72743d3078303030303030303030303030346532312c6163636573733d757365722c616e616d653d6e732f6d6e74002c6d61736b3d5e4d415941415001c8000000000000003d", @ANYRESDEC=r12, @ANYBLOB=',measure,smackfshat=TIPCv2\x00,\x00'])
r13 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x811, r13, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r13, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@loopback, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r14=>0x0}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xff2d)
setreuid(r14, r12)
stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, <r15=>0x0})
mount$fuse(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x40000, &(0x7f0000000800)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYRESDEC=r6, @ANYBLOB=',default_permissions,uid>', @ANYRESDEC=r8, @ANYBLOB=',fow%er<', @ANYRESDEC=r10, @ANYBLOB=',obj_type=keyring\x00,fscontext=root,rootcontext=unconfined_u,obj_role=security,uid=', @ANYRESDEC=r15, @ANYBLOB="2c7375626a5f757365723d74727573746564656d304000000000000000747275737465646b657972696e67637075736574d6379d9e4501302cf62a174b1073676a6499183a6a41735b802416248fce940f0a1c1d242c6673636f6e746578743d756e636f6e66696e65645f752c00"])
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='tran\x00\x00\x00\x00\x00\x00\x00\x00no=', @ANYRESHEX=r1, @ANYBLOB="2c7766646e9063ae6f3d684b22d93e8bf0a50500350000000000005e1a62fc6e1305f19d04b736e24adeda822a", @ANYRESHEX=r2, @ANYBLOB=',\x00'])
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={<r16=>0xffffffffffffffff})
dup2(r16, r16)
ioctl$EXT4_IOC_MOVE_EXT(r16, 0xc028660f, &(0x7f0000000300)={0x0, r2, 0x3ff, 0x10000, 0x4, 0x1})
r17 = mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5})
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedreceive(r17, &(0x7f0000000380)=""/204, 0x2b3, 0x0, 0x0)
umount2(&(0x7f0000000340)='./file0\x00', 0x3)
lseek(r0, 0x0, 0x0)
r18 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0)
lseek(r18, 0x0, 0x0)
socket$inet(0x2, 0x4, 0x0)

19:16:31 executing program 0:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/null\x00', 0x40000, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x7a, &(0x7f0000000700)=ANY=[@ANYBLOB="000800b867f2ad8bb8368900910000008100000086dd600200b69800"/64], 0x0)
keyctl$set_reqkey_keyring(0x5, 0xfffffffffffffffe)
add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
request_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='$.\x00', 0x0)
pipe2$9p(&(0x7f0000000240)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff}, 0x0)
write$P9_RVERSION(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f9870000c6504df67f00000000000000e98b4b153dffff082dbb78abd55fba3da80b856445ab1006487179e001b66c90c0473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd8824692f08ff8675bdf17ea1c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a671164679079d00"/148], 0x15)
r3 = dup(r2)
write$FUSE_BMAP(r3, &(0x7f0000000080)={0x18, 0x0, 0x6}, 0x18)
write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r5=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r5)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0, <r6=>0x0}, &(0x7f0000000580)=0xc)
r7 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r8=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r8)
r9 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r10=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r10)
r11 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x7)
lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, <r12=>0x0})
mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2000, &(0x7f0000000600)=ANY=[@ANYBLOB="7472616e733d7463702c706f72743d3078303030303030303030303030346532312c6163636573733d757365722c616e616d653d6e732f6d6e74002c6d61736b3d5e4d415941415001c8000000000000003d", @ANYRESDEC=r12, @ANYBLOB=',measure,smackfshat=TIPCv2\x00,\x00'])
r13 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x811, r13, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r13, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@loopback, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r14=>0x0}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xff2d)
setreuid(r14, r12)
stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, <r15=>0x0})
mount$fuse(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x40000, &(0x7f0000000800)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYRESDEC=r6, @ANYBLOB=',default_permissions,uid>', @ANYRESDEC=r8, @ANYBLOB=',fow%er<', @ANYRESDEC=r10, @ANYBLOB=',obj_type=keyring\x00,fscontext=root,rootcontext=unconfined_u,obj_role=security,uid=', @ANYRESDEC=r15, @ANYBLOB="2c7375626a5f757365723d74727573746564656d304000000000000000747275737465646b657972696e67637075736574d6379d9e4501302cf62a174b1073676a6499183a6a41735b802416248fce940f0a1c1d242c6673636f6e746578743d756e636f6e66696e65645f752c00"])
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='tran\x00\x00\x00\x00\x00\x00\x00\x00no=', @ANYRESHEX=r1, @ANYBLOB="2c7766646e9063ae6f3d684b22d93e8bf0a50500350000000000005e1a62fc6e1305f19d04b736e24adeda822a", @ANYRESHEX=r2, @ANYBLOB=',\x00'])
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={<r16=>0xffffffffffffffff})
dup2(r16, r16)
ioctl$EXT4_IOC_MOVE_EXT(r16, 0xc028660f, &(0x7f0000000300)={0x0, r2, 0x3ff, 0x10000, 0x4, 0x1})
r17 = mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5})
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedreceive(r17, &(0x7f0000000380)=""/204, 0x2b3, 0x0, 0x0)
umount2(&(0x7f0000000340)='./file0\x00', 0x3)
lseek(r0, 0x0, 0x0)
r18 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0)
lseek(r18, 0x0, 0x0)
socket$inet(0x2, 0x4, 0x0)

19:16:31 executing program 5:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/null\x00', 0x40000, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x7a, &(0x7f0000000700)=ANY=[@ANYBLOB="000800b867f2ad8bb8368900910000008100000086dd600200b69800"/64], 0x0)
keyctl$set_reqkey_keyring(0x5, 0xfffffffffffffffe)
add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
request_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='$.\x00', 0x0)
pipe2$9p(&(0x7f0000000240)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff}, 0x0)
write$P9_RVERSION(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f9870000c6504df67f00000000000000e98b4b153dffff082dbb78abd55fba3da80b856445ab1006487179e001b66c90c0473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd8824692f08ff8675bdf17ea1c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a671164679079d00"/148], 0x15)
r3 = dup(r2)
write$FUSE_BMAP(r3, &(0x7f0000000080)={0x18, 0x0, 0x6}, 0x18)
write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r5=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r5)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0, <r6=>0x0}, &(0x7f0000000580)=0xc)
r7 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r8=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r8)
r9 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r10=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r10)
r11 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x7)
lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, <r12=>0x0})
mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2000, &(0x7f0000000600)=ANY=[@ANYBLOB="7472616e733d7463702c706f72743d3078303030303030303030303030346532312c6163636573733d757365722c616e616d653d6e732f6d6e74002c6d61736b3d5e4d415941415001c8000000000000003d", @ANYRESDEC=r12, @ANYBLOB=',measure,smackfshat=TIPCv2\x00,\x00'])
r13 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x811, r13, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r13, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@loopback, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r14=>0x0}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xff2d)
setreuid(r14, r12)
stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, <r15=>0x0})
mount$fuse(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x40000, &(0x7f0000000800)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYRESDEC=r6, @ANYBLOB=',default_permissions,uid>', @ANYRESDEC=r8, @ANYBLOB=',fow%er<', @ANYRESDEC=r10, @ANYBLOB=',obj_type=keyring\x00,fscontext=root,rootcontext=unconfined_u,obj_role=security,uid=', @ANYRESDEC=r15, @ANYBLOB="2c7375626a5f757365723d74727573746564656d304000000000000000747275737465646b657972696e67637075736574d6379d9e4501302cf62a174b1073676a6499183a6a41735b802416248fce940f0a1c1d242c6673636f6e746578743d756e636f6e66696e65645f752c00"])
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='tran\x00\x00\x00\x00\x00\x00\x00\x00no=', @ANYRESHEX=r1, @ANYBLOB="2c7766646e9063ae6f3d684b22d93e8bf0a50500350000000000005e1a62fc6e1305f19d04b736e24adeda822a", @ANYRESHEX=r2, @ANYBLOB=',\x00'])
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={<r16=>0xffffffffffffffff})
dup2(r16, r16)
ioctl$EXT4_IOC_MOVE_EXT(r16, 0xc028660f, &(0x7f0000000300)={0x0, r2, 0x3ff, 0x10000, 0x4, 0x1})
r17 = mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5})
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedreceive(r17, &(0x7f0000000380)=""/204, 0x2b3, 0x0, 0x0)
umount2(&(0x7f0000000340)='./file0\x00', 0x3)
lseek(r0, 0x0, 0x0)
r18 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0)
lseek(r18, 0x0, 0x0)
socket$inet(0x2, 0x4, 0x0)

19:16:31 executing program 1:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/null\x00', 0x40000, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x7a, &(0x7f0000000700)=ANY=[@ANYBLOB="000800b867f2ad8bb8368900910000008100000086dd600200b69800"/64], 0x0)
keyctl$set_reqkey_keyring(0x5, 0xfffffffffffffffe)
add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
request_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='$.\x00', 0x0)
pipe2$9p(&(0x7f0000000240)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff}, 0x0)
write$P9_RVERSION(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f9870000c6504df67f00000000000000e98b4b153dffff082dbb78abd55fba3da80b856445ab1006487179e001b66c90c0473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd8824692f08ff8675bdf17ea1c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a671164679079d00"/148], 0x15)
r3 = dup(r2)
write$FUSE_BMAP(r3, &(0x7f0000000080)={0x18, 0x0, 0x6}, 0x18)
write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r5=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r5)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0, <r6=>0x0}, &(0x7f0000000580)=0xc)
r7 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r8=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r8)
r9 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r10=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r10)
r11 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x7)
lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, <r12=>0x0})
mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2000, &(0x7f0000000600)=ANY=[@ANYBLOB="7472616e733d7463702c706f72743d3078303030303030303030303030346532312c6163636573733d757365722c616e616d653d6e732f6d6e74002c6d61736b3d5e4d415941415001c8000000000000003d", @ANYRESDEC=r12, @ANYBLOB=',measure,smackfshat=TIPCv2\x00,\x00'])
r13 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x811, r13, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r13, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@loopback, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r14=>0x0}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xff2d)
setreuid(r14, r12)
stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, <r15=>0x0})
mount$fuse(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x40000, &(0x7f0000000800)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYRESDEC=r6, @ANYBLOB=',default_permissions,uid>', @ANYRESDEC=r8, @ANYBLOB=',fow%er<', @ANYRESDEC=r10, @ANYBLOB=',obj_type=keyring\x00,fscontext=root,rootcontext=unconfined_u,obj_role=security,uid=', @ANYRESDEC=r15, @ANYBLOB="2c7375626a5f757365723d74727573746564656d304000000000000000747275737465646b657972696e67637075736574d6379d9e4501302cf62a174b1073676a6499183a6a41735b802416248fce940f0a1c1d242c6673636f6e746578743d756e636f6e66696e65645f752c00"])
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='tran\x00\x00\x00\x00\x00\x00\x00\x00no=', @ANYRESHEX=r1, @ANYBLOB="2c7766646e9063ae6f3d684b22d93e8bf0a50500350000000000005e1a62fc6e1305f19d04b736e24adeda822a", @ANYRESHEX=r2, @ANYBLOB=',\x00'])
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={<r16=>0xffffffffffffffff})
dup2(r16, r16)
ioctl$EXT4_IOC_MOVE_EXT(r16, 0xc028660f, &(0x7f0000000300)={0x0, r2, 0x3ff, 0x10000, 0x4, 0x1})
r17 = mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5})
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedreceive(r17, &(0x7f0000000380)=""/204, 0x2b3, 0x0, 0x0)
umount2(&(0x7f0000000340)='./file0\x00', 0x3)
lseek(r0, 0x0, 0x0)
r18 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0)
lseek(r18, 0x0, 0x0)
socket$inet(0x2, 0x4, 0x0)

19:16:31 executing program 4:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/null\x00', 0x40000, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x7a, &(0x7f0000000700)=ANY=[@ANYBLOB="000800b867f2ad8bb8368900910000008100000086dd600200b69800"/64], 0x0)
keyctl$set_reqkey_keyring(0x5, 0xfffffffffffffffe)
add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
request_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='$.\x00', 0x0)
pipe2$9p(&(0x7f0000000240)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff}, 0x0)
write$P9_RVERSION(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f9870000c6504df67f00000000000000e98b4b153dffff082dbb78abd55fba3da80b856445ab1006487179e001b66c90c0473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd8824692f08ff8675bdf17ea1c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a671164679079d00"/148], 0x15)
r3 = dup(r2)
write$FUSE_BMAP(r3, &(0x7f0000000080)={0x18, 0x0, 0x6}, 0x18)
write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r5=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r5)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0, <r6=>0x0}, &(0x7f0000000580)=0xc)
r7 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r8=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r8)
r9 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r10=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r10)
r11 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x7)
lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, <r12=>0x0})
mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2000, &(0x7f0000000600)=ANY=[@ANYBLOB="7472616e733d7463702c706f72743d3078303030303030303030303030346532312c6163636573733d757365722c616e616d653d6e732f6d6e74002c6d61736b3d5e4d415941415001c8000000000000003d", @ANYRESDEC=r12, @ANYBLOB=',measure,smackfshat=TIPCv2\x00,\x00'])
r13 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x811, r13, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r13, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@loopback, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r14=>0x0}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xff2d)
setreuid(r14, r12)
stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, <r15=>0x0})
mount$fuse(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x40000, &(0x7f0000000800)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYRESDEC=r6, @ANYBLOB=',default_permissions,uid>', @ANYRESDEC=r8, @ANYBLOB=',fow%er<', @ANYRESDEC=r10, @ANYBLOB=',obj_type=keyring\x00,fscontext=root,rootcontext=unconfined_u,obj_role=security,uid=', @ANYRESDEC=r15, @ANYBLOB="2c7375626a5f757365723d74727573746564656d304000000000000000747275737465646b657972696e67637075736574d6379d9e4501302cf62a174b1073676a6499183a6a41735b802416248fce940f0a1c1d242c6673636f6e746578743d756e636f6e66696e65645f752c00"])
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='tran\x00\x00\x00\x00\x00\x00\x00\x00no=', @ANYRESHEX=r1, @ANYBLOB="2c7766646e9063ae6f3d684b22d93e8bf0a50500350000000000005e1a62fc6e1305f19d04b736e24adeda822a", @ANYRESHEX=r2, @ANYBLOB=',\x00'])
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={<r16=>0xffffffffffffffff})
dup2(r16, r16)
ioctl$EXT4_IOC_MOVE_EXT(r16, 0xc028660f, &(0x7f0000000300)={0x0, r2, 0x3ff, 0x10000, 0x4, 0x1})
r17 = mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5})
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedreceive(r17, &(0x7f0000000380)=""/204, 0x2b3, 0x0, 0x0)
umount2(&(0x7f0000000340)='./file0\x00', 0x3)
lseek(r0, 0x0, 0x0)
r18 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0)
lseek(r18, 0x0, 0x0)
socket$inet(0x2, 0x4, 0x0)

19:16:31 executing program 2:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/null\x00', 0x40000, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x7a, &(0x7f0000000700)=ANY=[@ANYBLOB="000800b867f2ad8bb8368900910000008100000086dd600200b69800"/64], 0x0)
keyctl$set_reqkey_keyring(0x5, 0xfffffffffffffffe)
add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
request_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='$.\x00', 0x0)
pipe2$9p(&(0x7f0000000240)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff}, 0x0)
write$P9_RVERSION(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f9870000c6504df67f00000000000000e98b4b153dffff082dbb78abd55fba3da80b856445ab1006487179e001b66c90c0473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd8824692f08ff8675bdf17ea1c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a671164679079d00"/148], 0x15)
r3 = dup(r2)
write$FUSE_BMAP(r3, &(0x7f0000000080)={0x18, 0x0, 0x6}, 0x18)
write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r5=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r5)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0, <r6=>0x0}, &(0x7f0000000580)=0xc)
r7 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r8=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r8)
r9 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r10=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r10)
r11 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x7)
lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, <r12=>0x0})
mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2000, &(0x7f0000000600)=ANY=[@ANYBLOB="7472616e733d7463702c706f72743d3078303030303030303030303030346532312c6163636573733d757365722c616e616d653d6e732f6d6e74002c6d61736b3d5e4d415941415001c8000000000000003d", @ANYRESDEC=r12, @ANYBLOB=',measure,smackfshat=TIPCv2\x00,\x00'])
r13 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x811, r13, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r13, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@loopback, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r14=>0x0}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xff2d)
setreuid(r14, r12)
stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, <r15=>0x0})
mount$fuse(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x40000, &(0x7f0000000800)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYRESDEC=r6, @ANYBLOB=',default_permissions,uid>', @ANYRESDEC=r8, @ANYBLOB=',fow%er<', @ANYRESDEC=r10, @ANYBLOB=',obj_type=keyring\x00,fscontext=root,rootcontext=unconfined_u,obj_role=security,uid=', @ANYRESDEC=r15, @ANYBLOB="2c7375626a5f757365723d74727573746564656d304000000000000000747275737465646b657972696e67637075736574d6379d9e4501302cf62a174b1073676a6499183a6a41735b802416248fce940f0a1c1d242c6673636f6e746578743d756e636f6e66696e65645f752c00"])
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='tran\x00\x00\x00\x00\x00\x00\x00\x00no=', @ANYRESHEX=r1, @ANYBLOB="2c7766646e9063ae6f3d684b22d93e8bf0a50500350000000000005e1a62fc6e1305f19d04b736e24adeda822a", @ANYRESHEX=r2, @ANYBLOB=',\x00'])
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={<r16=>0xffffffffffffffff})
dup2(r16, r16)
ioctl$EXT4_IOC_MOVE_EXT(r16, 0xc028660f, &(0x7f0000000300)={0x0, r2, 0x3ff, 0x10000, 0x4, 0x1})
r17 = mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5})
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedreceive(r17, &(0x7f0000000380)=""/204, 0x2b3, 0x0, 0x0)
umount2(&(0x7f0000000340)='./file0\x00', 0x3)
lseek(r0, 0x0, 0x0)
r18 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0)
lseek(r18, 0x0, 0x0)
socket$inet(0x2, 0x4, 0x0)

19:16:31 executing program 3:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/null\x00', 0x40000, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x7a, &(0x7f0000000700)=ANY=[@ANYBLOB="000800b867f2ad8bb8368900910000008100000086dd600200b69800"/64], 0x0)
keyctl$set_reqkey_keyring(0x5, 0xfffffffffffffffe)
add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
request_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='$.\x00', 0x0)
pipe2$9p(&(0x7f0000000240)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff}, 0x0)
write$P9_RVERSION(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f9870000c6504df67f00000000000000e98b4b153dffff082dbb78abd55fba3da80b856445ab1006487179e001b66c90c0473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd8824692f08ff8675bdf17ea1c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a671164679079d00"/148], 0x15)
r3 = dup(r2)
write$FUSE_BMAP(r3, &(0x7f0000000080)={0x18, 0x0, 0x6}, 0x18)
write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r5=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r5)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0, <r6=>0x0}, &(0x7f0000000580)=0xc)
r7 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r8=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r8)
r9 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r10=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r10)
r11 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x7)
lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, <r12=>0x0})
mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2000, &(0x7f0000000600)=ANY=[@ANYBLOB="7472616e733d7463702c706f72743d3078303030303030303030303030346532312c6163636573733d757365722c616e616d653d6e732f6d6e74002c6d61736b3d5e4d415941415001c8000000000000003d", @ANYRESDEC=r12, @ANYBLOB=',measure,smackfshat=TIPCv2\x00,\x00'])
r13 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x811, r13, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r13, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@loopback, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r14=>0x0}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xff2d)
setreuid(r14, r12)
stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, <r15=>0x0})
mount$fuse(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x40000, &(0x7f0000000800)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYRESDEC=r6, @ANYBLOB=',default_permissions,uid>', @ANYRESDEC=r8, @ANYBLOB=',fow%er<', @ANYRESDEC=r10, @ANYBLOB=',obj_type=keyring\x00,fscontext=root,rootcontext=unconfined_u,obj_role=security,uid=', @ANYRESDEC=r15, @ANYBLOB="2c7375626a5f757365723d74727573746564656d304000000000000000747275737465646b657972696e67637075736574d6379d9e4501302cf62a174b1073676a6499183a6a41735b802416248fce940f0a1c1d242c6673636f6e746578743d756e636f6e66696e65645f752c00"])
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='tran\x00\x00\x00\x00\x00\x00\x00\x00no=', @ANYRESHEX=r1, @ANYBLOB="2c7766646e9063ae6f3d684b22d93e8bf0a50500350000000000005e1a62fc6e1305f19d04b736e24adeda822a", @ANYRESHEX=r2, @ANYBLOB=',\x00'])
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={<r16=>0xffffffffffffffff})
dup2(r16, r16)
ioctl$EXT4_IOC_MOVE_EXT(r16, 0xc028660f, &(0x7f0000000300)={0x0, r2, 0x3ff, 0x10000, 0x4, 0x1})
r17 = mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5})
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedreceive(r17, &(0x7f0000000380)=""/204, 0x2b3, 0x0, 0x0)
umount2(&(0x7f0000000340)='./file0\x00', 0x3)
lseek(r0, 0x0, 0x0)
r18 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0)
lseek(r18, 0x0, 0x0)
socket$inet(0x2, 0x4, 0x0)

19:16:32 executing program 0:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/null\x00', 0x40000, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x7a, &(0x7f0000000700)=ANY=[@ANYBLOB="000800b867f2ad8bb8368900910000008100000086dd600200b69800"/64], 0x0)
keyctl$set_reqkey_keyring(0x5, 0xfffffffffffffffe)
add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
request_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='$.\x00', 0x0)
pipe2$9p(&(0x7f0000000240)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff}, 0x0)
write$P9_RVERSION(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f9870000c6504df67f00000000000000e98b4b153dffff082dbb78abd55fba3da80b856445ab1006487179e001b66c90c0473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd8824692f08ff8675bdf17ea1c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a671164679079d00"/148], 0x15)
r3 = dup(r2)
write$FUSE_BMAP(r3, &(0x7f0000000080)={0x18, 0x0, 0x6}, 0x18)
write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r5=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r5)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0, <r6=>0x0}, &(0x7f0000000580)=0xc)
r7 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r8=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r8)
r9 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r10=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r10)
r11 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x7)
lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, <r12=>0x0})
mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2000, &(0x7f0000000600)=ANY=[@ANYBLOB="7472616e733d7463702c706f72743d3078303030303030303030303030346532312c6163636573733d757365722c616e616d653d6e732f6d6e74002c6d61736b3d5e4d415941415001c8000000000000003d", @ANYRESDEC=r12, @ANYBLOB=',measure,smackfshat=TIPCv2\x00,\x00'])
r13 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x811, r13, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r13, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@loopback, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r14=>0x0}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xff2d)
setreuid(r14, r12)
stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, <r15=>0x0})
mount$fuse(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x40000, &(0x7f0000000800)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYRESDEC=r6, @ANYBLOB=',default_permissions,uid>', @ANYRESDEC=r8, @ANYBLOB=',fow%er<', @ANYRESDEC=r10, @ANYBLOB=',obj_type=keyring\x00,fscontext=root,rootcontext=unconfined_u,obj_role=security,uid=', @ANYRESDEC=r15, @ANYBLOB="2c7375626a5f757365723d74727573746564656d304000000000000000747275737465646b657972696e67637075736574d6379d9e4501302cf62a174b1073676a6499183a6a41735b802416248fce940f0a1c1d242c6673636f6e746578743d756e636f6e66696e65645f752c00"])
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='tran\x00\x00\x00\x00\x00\x00\x00\x00no=', @ANYRESHEX=r1, @ANYBLOB="2c7766646e9063ae6f3d684b22d93e8bf0a50500350000000000005e1a62fc6e1305f19d04b736e24adeda822a", @ANYRESHEX=r2, @ANYBLOB=',\x00'])
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={<r16=>0xffffffffffffffff})
dup2(r16, r16)
ioctl$EXT4_IOC_MOVE_EXT(r16, 0xc028660f, &(0x7f0000000300)={0x0, r2, 0x3ff, 0x10000, 0x4, 0x1})
r17 = mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5})
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedreceive(r17, &(0x7f0000000380)=""/204, 0x2b3, 0x0, 0x0)
umount2(&(0x7f0000000340)='./file0\x00', 0x3)
lseek(r0, 0x0, 0x0)
r18 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0)
lseek(r18, 0x0, 0x0)
socket$inet(0x2, 0x4, 0x0)

19:16:32 executing program 5:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/null\x00', 0x40000, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x7a, &(0x7f0000000700)=ANY=[@ANYBLOB="000800b867f2ad8bb8368900910000008100000086dd600200b69800"/64], 0x0)
keyctl$set_reqkey_keyring(0x5, 0xfffffffffffffffe)
add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
request_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='$.\x00', 0x0)
pipe2$9p(&(0x7f0000000240)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff}, 0x0)
write$P9_RVERSION(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f9870000c6504df67f00000000000000e98b4b153dffff082dbb78abd55fba3da80b856445ab1006487179e001b66c90c0473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd8824692f08ff8675bdf17ea1c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a671164679079d00"/148], 0x15)
r3 = dup(r2)
write$FUSE_BMAP(r3, &(0x7f0000000080)={0x18, 0x0, 0x6}, 0x18)
write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r5=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r5)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0, <r6=>0x0}, &(0x7f0000000580)=0xc)
r7 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r8=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r8)
r9 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r10=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r10)
r11 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x7)
lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, <r12=>0x0})
mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2000, &(0x7f0000000600)=ANY=[@ANYBLOB="7472616e733d7463702c706f72743d3078303030303030303030303030346532312c6163636573733d757365722c616e616d653d6e732f6d6e74002c6d61736b3d5e4d415941415001c8000000000000003d", @ANYRESDEC=r12, @ANYBLOB=',measure,smackfshat=TIPCv2\x00,\x00'])
r13 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x811, r13, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r13, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@loopback, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r14=>0x0}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xff2d)
setreuid(r14, r12)
stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, <r15=>0x0})
mount$fuse(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x40000, &(0x7f0000000800)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYRESDEC=r6, @ANYBLOB=',default_permissions,uid>', @ANYRESDEC=r8, @ANYBLOB=',fow%er<', @ANYRESDEC=r10, @ANYBLOB=',obj_type=keyring\x00,fscontext=root,rootcontext=unconfined_u,obj_role=security,uid=', @ANYRESDEC=r15, @ANYBLOB="2c7375626a5f757365723d74727573746564656d304000000000000000747275737465646b657972696e67637075736574d6379d9e4501302cf62a174b1073676a6499183a6a41735b802416248fce940f0a1c1d242c6673636f6e746578743d756e636f6e66696e65645f752c00"])
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='tran\x00\x00\x00\x00\x00\x00\x00\x00no=', @ANYRESHEX=r1, @ANYBLOB="2c7766646e9063ae6f3d684b22d93e8bf0a50500350000000000005e1a62fc6e1305f19d04b736e24adeda822a", @ANYRESHEX=r2, @ANYBLOB=',\x00'])
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={<r16=>0xffffffffffffffff})
dup2(r16, r16)
ioctl$EXT4_IOC_MOVE_EXT(r16, 0xc028660f, &(0x7f0000000300)={0x0, r2, 0x3ff, 0x10000, 0x4, 0x1})
r17 = mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5})
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedreceive(r17, &(0x7f0000000380)=""/204, 0x2b3, 0x0, 0x0)
umount2(&(0x7f0000000340)='./file0\x00', 0x3)
lseek(r0, 0x0, 0x0)
r18 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0)
lseek(r18, 0x0, 0x0)
socket$inet(0x2, 0x4, 0x0)

19:16:32 executing program 4:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/null\x00', 0x40000, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x7a, &(0x7f0000000700)=ANY=[@ANYBLOB="000800b867f2ad8bb8368900910000008100000086dd600200b69800"/64], 0x0)
keyctl$set_reqkey_keyring(0x5, 0xfffffffffffffffe)
add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
request_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='$.\x00', 0x0)
pipe2$9p(&(0x7f0000000240)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff}, 0x0)
write$P9_RVERSION(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f9870000c6504df67f00000000000000e98b4b153dffff082dbb78abd55fba3da80b856445ab1006487179e001b66c90c0473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd8824692f08ff8675bdf17ea1c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a671164679079d00"/148], 0x15)
r3 = dup(r2)
write$FUSE_BMAP(r3, &(0x7f0000000080)={0x18, 0x0, 0x6}, 0x18)
write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r5=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r5)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0, <r6=>0x0}, &(0x7f0000000580)=0xc)
r7 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r8=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r8)
r9 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r10=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r10)
r11 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x7)
lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, <r12=>0x0})
mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2000, &(0x7f0000000600)=ANY=[@ANYBLOB="7472616e733d7463702c706f72743d3078303030303030303030303030346532312c6163636573733d757365722c616e616d653d6e732f6d6e74002c6d61736b3d5e4d415941415001c8000000000000003d", @ANYRESDEC=r12, @ANYBLOB=',measure,smackfshat=TIPCv2\x00,\x00'])
r13 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x811, r13, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r13, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@loopback, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r14=>0x0}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xff2d)
setreuid(r14, r12)
stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, <r15=>0x0})
mount$fuse(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x40000, &(0x7f0000000800)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYRESDEC=r6, @ANYBLOB=',default_permissions,uid>', @ANYRESDEC=r8, @ANYBLOB=',fow%er<', @ANYRESDEC=r10, @ANYBLOB=',obj_type=keyring\x00,fscontext=root,rootcontext=unconfined_u,obj_role=security,uid=', @ANYRESDEC=r15, @ANYBLOB="2c7375626a5f757365723d74727573746564656d304000000000000000747275737465646b657972696e67637075736574d6379d9e4501302cf62a174b1073676a6499183a6a41735b802416248fce940f0a1c1d242c6673636f6e746578743d756e636f6e66696e65645f752c00"])
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='tran\x00\x00\x00\x00\x00\x00\x00\x00no=', @ANYRESHEX=r1, @ANYBLOB="2c7766646e9063ae6f3d684b22d93e8bf0a50500350000000000005e1a62fc6e1305f19d04b736e24adeda822a", @ANYRESHEX=r2, @ANYBLOB=',\x00'])
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={<r16=>0xffffffffffffffff})
dup2(r16, r16)
ioctl$EXT4_IOC_MOVE_EXT(r16, 0xc028660f, &(0x7f0000000300)={0x0, r2, 0x3ff, 0x10000, 0x4, 0x1})
r17 = mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5})
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedreceive(r17, &(0x7f0000000380)=""/204, 0x2b3, 0x0, 0x0)
umount2(&(0x7f0000000340)='./file0\x00', 0x3)
lseek(r0, 0x0, 0x0)
r18 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0)
lseek(r18, 0x0, 0x0)
socket$inet(0x2, 0x4, 0x0)

19:16:32 executing program 1:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/null\x00', 0x40000, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x7a, &(0x7f0000000700)=ANY=[@ANYBLOB="000800b867f2ad8bb8368900910000008100000086dd600200b69800"/64], 0x0)
keyctl$set_reqkey_keyring(0x5, 0xfffffffffffffffe)
add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
request_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='$.\x00', 0x0)
pipe2$9p(&(0x7f0000000240)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff}, 0x0)
write$P9_RVERSION(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f9870000c6504df67f00000000000000e98b4b153dffff082dbb78abd55fba3da80b856445ab1006487179e001b66c90c0473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd8824692f08ff8675bdf17ea1c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a671164679079d00"/148], 0x15)
r3 = dup(r2)
write$FUSE_BMAP(r3, &(0x7f0000000080)={0x18, 0x0, 0x6}, 0x18)
write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r5=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r5)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0, <r6=>0x0}, &(0x7f0000000580)=0xc)
r7 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r8=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r8)
r9 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r10=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r10)
r11 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x7)
lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, <r12=>0x0})
mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2000, &(0x7f0000000600)=ANY=[@ANYBLOB="7472616e733d7463702c706f72743d3078303030303030303030303030346532312c6163636573733d757365722c616e616d653d6e732f6d6e74002c6d61736b3d5e4d415941415001c8000000000000003d", @ANYRESDEC=r12, @ANYBLOB=',measure,smackfshat=TIPCv2\x00,\x00'])
r13 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x811, r13, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r13, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@loopback, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r14=>0x0}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xff2d)
setreuid(r14, r12)
stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, <r15=>0x0})
mount$fuse(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x40000, &(0x7f0000000800)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYRESDEC=r6, @ANYBLOB=',default_permissions,uid>', @ANYRESDEC=r8, @ANYBLOB=',fow%er<', @ANYRESDEC=r10, @ANYBLOB=',obj_type=keyring\x00,fscontext=root,rootcontext=unconfined_u,obj_role=security,uid=', @ANYRESDEC=r15, @ANYBLOB="2c7375626a5f757365723d74727573746564656d304000000000000000747275737465646b657972696e67637075736574d6379d9e4501302cf62a174b1073676a6499183a6a41735b802416248fce940f0a1c1d242c6673636f6e746578743d756e636f6e66696e65645f752c00"])
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='tran\x00\x00\x00\x00\x00\x00\x00\x00no=', @ANYRESHEX=r1, @ANYBLOB="2c7766646e9063ae6f3d684b22d93e8bf0a50500350000000000005e1a62fc6e1305f19d04b736e24adeda822a", @ANYRESHEX=r2, @ANYBLOB=',\x00'])
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={<r16=>0xffffffffffffffff})
dup2(r16, r16)
ioctl$EXT4_IOC_MOVE_EXT(r16, 0xc028660f, &(0x7f0000000300)={0x0, r2, 0x3ff, 0x10000, 0x4, 0x1})
r17 = mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5})
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedreceive(r17, &(0x7f0000000380)=""/204, 0x2b3, 0x0, 0x0)
umount2(&(0x7f0000000340)='./file0\x00', 0x3)
lseek(r0, 0x0, 0x0)
r18 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0)
lseek(r18, 0x0, 0x0)
socket$inet(0x2, 0x4, 0x0)

19:16:32 executing program 2:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/null\x00', 0x40000, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x7a, &(0x7f0000000700)=ANY=[@ANYBLOB="000800b867f2ad8bb8368900910000008100000086dd600200b69800"/64], 0x0)
keyctl$set_reqkey_keyring(0x5, 0xfffffffffffffffe)
add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
request_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='$.\x00', 0x0)
pipe2$9p(&(0x7f0000000240)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff}, 0x0)
write$P9_RVERSION(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f9870000c6504df67f00000000000000e98b4b153dffff082dbb78abd55fba3da80b856445ab1006487179e001b66c90c0473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd8824692f08ff8675bdf17ea1c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a671164679079d00"/148], 0x15)
r3 = dup(r2)
write$FUSE_BMAP(r3, &(0x7f0000000080)={0x18, 0x0, 0x6}, 0x18)
write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r5=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r5)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0, <r6=>0x0}, &(0x7f0000000580)=0xc)
r7 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r8=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r8)
r9 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r10=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r10)
r11 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x7)
lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, <r12=>0x0})
mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2000, &(0x7f0000000600)=ANY=[@ANYBLOB="7472616e733d7463702c706f72743d3078303030303030303030303030346532312c6163636573733d757365722c616e616d653d6e732f6d6e74002c6d61736b3d5e4d415941415001c8000000000000003d", @ANYRESDEC=r12, @ANYBLOB=',measure,smackfshat=TIPCv2\x00,\x00'])
r13 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x811, r13, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r13, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@loopback, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r14=>0x0}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xff2d)
setreuid(r14, r12)
stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, <r15=>0x0})
mount$fuse(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x40000, &(0x7f0000000800)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYRESDEC=r6, @ANYBLOB=',default_permissions,uid>', @ANYRESDEC=r8, @ANYBLOB=',fow%er<', @ANYRESDEC=r10, @ANYBLOB=',obj_type=keyring\x00,fscontext=root,rootcontext=unconfined_u,obj_role=security,uid=', @ANYRESDEC=r15, @ANYBLOB="2c7375626a5f757365723d74727573746564656d304000000000000000747275737465646b657972696e67637075736574d6379d9e4501302cf62a174b1073676a6499183a6a41735b802416248fce940f0a1c1d242c6673636f6e746578743d756e636f6e66696e65645f752c00"])
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='tran\x00\x00\x00\x00\x00\x00\x00\x00no=', @ANYRESHEX=r1, @ANYBLOB="2c7766646e9063ae6f3d684b22d93e8bf0a50500350000000000005e1a62fc6e1305f19d04b736e24adeda822a", @ANYRESHEX=r2, @ANYBLOB=',\x00'])
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={<r16=>0xffffffffffffffff})
dup2(r16, r16)
ioctl$EXT4_IOC_MOVE_EXT(r16, 0xc028660f, &(0x7f0000000300)={0x0, r2, 0x3ff, 0x10000, 0x4, 0x1})
r17 = mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5})
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedreceive(r17, &(0x7f0000000380)=""/204, 0x2b3, 0x0, 0x0)
umount2(&(0x7f0000000340)='./file0\x00', 0x3)
lseek(r0, 0x0, 0x0)
r18 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0)
lseek(r18, 0x0, 0x0)
socket$inet(0x2, 0x4, 0x0)

19:16:32 executing program 3:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/null\x00', 0x40000, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x7a, &(0x7f0000000700)=ANY=[@ANYBLOB="000800b867f2ad8bb8368900910000008100000086dd600200b69800"/64], 0x0)
keyctl$set_reqkey_keyring(0x5, 0xfffffffffffffffe)
add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
request_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='$.\x00', 0x0)
pipe2$9p(&(0x7f0000000240)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff}, 0x0)
write$P9_RVERSION(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f9870000c6504df67f00000000000000e98b4b153dffff082dbb78abd55fba3da80b856445ab1006487179e001b66c90c0473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd8824692f08ff8675bdf17ea1c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a671164679079d00"/148], 0x15)
r3 = dup(r2)
write$FUSE_BMAP(r3, &(0x7f0000000080)={0x18, 0x0, 0x6}, 0x18)
write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r5=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r5)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0, <r6=>0x0}, &(0x7f0000000580)=0xc)
r7 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r8=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r8)
r9 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r10=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r10)
r11 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x7)
lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, <r12=>0x0})
mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2000, &(0x7f0000000600)=ANY=[@ANYBLOB="7472616e733d7463702c706f72743d3078303030303030303030303030346532312c6163636573733d757365722c616e616d653d6e732f6d6e74002c6d61736b3d5e4d415941415001c8000000000000003d", @ANYRESDEC=r12, @ANYBLOB=',measure,smackfshat=TIPCv2\x00,\x00'])
r13 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x811, r13, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r13, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@loopback, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r14=>0x0}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xff2d)
setreuid(r14, r12)
stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, <r15=>0x0})
mount$fuse(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x40000, &(0x7f0000000800)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYRESDEC=r6, @ANYBLOB=',default_permissions,uid>', @ANYRESDEC=r8, @ANYBLOB=',fow%er<', @ANYRESDEC=r10, @ANYBLOB=',obj_type=keyring\x00,fscontext=root,rootcontext=unconfined_u,obj_role=security,uid=', @ANYRESDEC=r15, @ANYBLOB="2c7375626a5f757365723d74727573746564656d304000000000000000747275737465646b657972696e67637075736574d6379d9e4501302cf62a174b1073676a6499183a6a41735b802416248fce940f0a1c1d242c6673636f6e746578743d756e636f6e66696e65645f752c00"])
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='tran\x00\x00\x00\x00\x00\x00\x00\x00no=', @ANYRESHEX=r1, @ANYBLOB="2c7766646e9063ae6f3d684b22d93e8bf0a50500350000000000005e1a62fc6e1305f19d04b736e24adeda822a", @ANYRESHEX=r2, @ANYBLOB=',\x00'])
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={<r16=>0xffffffffffffffff})
dup2(r16, r16)
ioctl$EXT4_IOC_MOVE_EXT(r16, 0xc028660f, &(0x7f0000000300)={0x0, r2, 0x3ff, 0x10000, 0x4, 0x1})
r17 = mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5})
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedreceive(r17, &(0x7f0000000380)=""/204, 0x2b3, 0x0, 0x0)
umount2(&(0x7f0000000340)='./file0\x00', 0x3)
lseek(r0, 0x0, 0x0)
r18 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0)
lseek(r18, 0x0, 0x0)
socket$inet(0x2, 0x4, 0x0)

19:16:32 executing program 0:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/null\x00', 0x40000, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x7a, &(0x7f0000000700)=ANY=[@ANYBLOB="000800b867f2ad8bb8368900910000008100000086dd600200b69800"/64], 0x0)
keyctl$set_reqkey_keyring(0x5, 0xfffffffffffffffe)
add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
request_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='$.\x00', 0x0)
pipe2$9p(&(0x7f0000000240)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff}, 0x0)
write$P9_RVERSION(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f9870000c6504df67f00000000000000e98b4b153dffff082dbb78abd55fba3da80b856445ab1006487179e001b66c90c0473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd8824692f08ff8675bdf17ea1c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a671164679079d00"/148], 0x15)
r3 = dup(r2)
write$FUSE_BMAP(r3, &(0x7f0000000080)={0x18, 0x0, 0x6}, 0x18)
write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r5=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r5)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0, <r6=>0x0}, &(0x7f0000000580)=0xc)
r7 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r8=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r8)
r9 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r10=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r10)
r11 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x7)
lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, <r12=>0x0})
mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2000, &(0x7f0000000600)=ANY=[@ANYBLOB="7472616e733d7463702c706f72743d3078303030303030303030303030346532312c6163636573733d757365722c616e616d653d6e732f6d6e74002c6d61736b3d5e4d415941415001c8000000000000003d", @ANYRESDEC=r12, @ANYBLOB=',measure,smackfshat=TIPCv2\x00,\x00'])
r13 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x811, r13, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r13, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@loopback, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r14=>0x0}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xff2d)
setreuid(r14, r12)
stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, <r15=>0x0})
mount$fuse(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x40000, &(0x7f0000000800)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYRESDEC=r6, @ANYBLOB=',default_permissions,uid>', @ANYRESDEC=r8, @ANYBLOB=',fow%er<', @ANYRESDEC=r10, @ANYBLOB=',obj_type=keyring\x00,fscontext=root,rootcontext=unconfined_u,obj_role=security,uid=', @ANYRESDEC=r15, @ANYBLOB="2c7375626a5f757365723d74727573746564656d304000000000000000747275737465646b657972696e67637075736574d6379d9e4501302cf62a174b1073676a6499183a6a41735b802416248fce940f0a1c1d242c6673636f6e746578743d756e636f6e66696e65645f752c00"])
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='tran\x00\x00\x00\x00\x00\x00\x00\x00no=', @ANYRESHEX=r1, @ANYBLOB="2c7766646e9063ae6f3d684b22d93e8bf0a50500350000000000005e1a62fc6e1305f19d04b736e24adeda822a", @ANYRESHEX=r2, @ANYBLOB=',\x00'])
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={<r16=>0xffffffffffffffff})
dup2(r16, r16)
ioctl$EXT4_IOC_MOVE_EXT(r16, 0xc028660f, &(0x7f0000000300)={0x0, r2, 0x3ff, 0x10000, 0x4, 0x1})
r17 = mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5})
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedreceive(r17, &(0x7f0000000380)=""/204, 0x2b3, 0x0, 0x0)
umount2(&(0x7f0000000340)='./file0\x00', 0x3)
lseek(r0, 0x0, 0x0)
r18 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0)
lseek(r18, 0x0, 0x0)
socket$inet(0x2, 0x4, 0x0)

19:16:32 executing program 4:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/null\x00', 0x40000, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x7a, &(0x7f0000000700)=ANY=[@ANYBLOB="000800b867f2ad8bb8368900910000008100000086dd600200b69800"/64], 0x0)
keyctl$set_reqkey_keyring(0x5, 0xfffffffffffffffe)
add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
request_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='$.\x00', 0x0)
pipe2$9p(&(0x7f0000000240)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff}, 0x0)
write$P9_RVERSION(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f9870000c6504df67f00000000000000e98b4b153dffff082dbb78abd55fba3da80b856445ab1006487179e001b66c90c0473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd8824692f08ff8675bdf17ea1c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a671164679079d00"/148], 0x15)
r3 = dup(r2)
write$FUSE_BMAP(r3, &(0x7f0000000080)={0x18, 0x0, 0x6}, 0x18)
write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r5=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r5)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0, <r6=>0x0}, &(0x7f0000000580)=0xc)
r7 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r8=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r8)
r9 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r10=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r10)
r11 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x7)
lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, <r12=>0x0})
mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2000, &(0x7f0000000600)=ANY=[@ANYBLOB="7472616e733d7463702c706f72743d3078303030303030303030303030346532312c6163636573733d757365722c616e616d653d6e732f6d6e74002c6d61736b3d5e4d415941415001c8000000000000003d", @ANYRESDEC=r12, @ANYBLOB=',measure,smackfshat=TIPCv2\x00,\x00'])
r13 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x811, r13, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r13, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@loopback, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r14=>0x0}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xff2d)
setreuid(r14, r12)
stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, <r15=>0x0})
mount$fuse(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x40000, &(0x7f0000000800)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYRESDEC=r6, @ANYBLOB=',default_permissions,uid>', @ANYRESDEC=r8, @ANYBLOB=',fow%er<', @ANYRESDEC=r10, @ANYBLOB=',obj_type=keyring\x00,fscontext=root,rootcontext=unconfined_u,obj_role=security,uid=', @ANYRESDEC=r15, @ANYBLOB="2c7375626a5f757365723d74727573746564656d304000000000000000747275737465646b657972696e67637075736574d6379d9e4501302cf62a174b1073676a6499183a6a41735b802416248fce940f0a1c1d242c6673636f6e746578743d756e636f6e66696e65645f752c00"])
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='tran\x00\x00\x00\x00\x00\x00\x00\x00no=', @ANYRESHEX=r1, @ANYBLOB="2c7766646e9063ae6f3d684b22d93e8bf0a50500350000000000005e1a62fc6e1305f19d04b736e24adeda822a", @ANYRESHEX=r2, @ANYBLOB=',\x00'])
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={<r16=>0xffffffffffffffff})
dup2(r16, r16)
ioctl$EXT4_IOC_MOVE_EXT(r16, 0xc028660f, &(0x7f0000000300)={0x0, r2, 0x3ff, 0x10000, 0x4, 0x1})
r17 = mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5})
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedreceive(r17, &(0x7f0000000380)=""/204, 0x2b3, 0x0, 0x0)
umount2(&(0x7f0000000340)='./file0\x00', 0x3)
lseek(r0, 0x0, 0x0)
r18 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0)
lseek(r18, 0x0, 0x0)
socket$inet(0x2, 0x4, 0x0)

19:16:32 executing program 1:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/null\x00', 0x40000, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x7a, &(0x7f0000000700)=ANY=[@ANYBLOB="000800b867f2ad8bb8368900910000008100000086dd600200b69800"/64], 0x0)
keyctl$set_reqkey_keyring(0x5, 0xfffffffffffffffe)
add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
request_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='$.\x00', 0x0)
pipe2$9p(&(0x7f0000000240)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff}, 0x0)
write$P9_RVERSION(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f9870000c6504df67f00000000000000e98b4b153dffff082dbb78abd55fba3da80b856445ab1006487179e001b66c90c0473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd8824692f08ff8675bdf17ea1c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a671164679079d00"/148], 0x15)
r3 = dup(r2)
write$FUSE_BMAP(r3, &(0x7f0000000080)={0x18, 0x0, 0x6}, 0x18)
write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r5=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r5)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0, <r6=>0x0}, &(0x7f0000000580)=0xc)
r7 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r8=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r8)
r9 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r10=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r10)
r11 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x7)
lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, <r12=>0x0})
mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2000, &(0x7f0000000600)=ANY=[@ANYBLOB="7472616e733d7463702c706f72743d3078303030303030303030303030346532312c6163636573733d757365722c616e616d653d6e732f6d6e74002c6d61736b3d5e4d415941415001c8000000000000003d", @ANYRESDEC=r12, @ANYBLOB=',measure,smackfshat=TIPCv2\x00,\x00'])
r13 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x811, r13, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r13, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@loopback, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r14=>0x0}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xff2d)
setreuid(r14, r12)
stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, <r15=>0x0})
mount$fuse(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x40000, &(0x7f0000000800)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYRESDEC=r6, @ANYBLOB=',default_permissions,uid>', @ANYRESDEC=r8, @ANYBLOB=',fow%er<', @ANYRESDEC=r10, @ANYBLOB=',obj_type=keyring\x00,fscontext=root,rootcontext=unconfined_u,obj_role=security,uid=', @ANYRESDEC=r15, @ANYBLOB="2c7375626a5f757365723d74727573746564656d304000000000000000747275737465646b657972696e67637075736574d6379d9e4501302cf62a174b1073676a6499183a6a41735b802416248fce940f0a1c1d242c6673636f6e746578743d756e636f6e66696e65645f752c00"])
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='tran\x00\x00\x00\x00\x00\x00\x00\x00no=', @ANYRESHEX=r1, @ANYBLOB="2c7766646e9063ae6f3d684b22d93e8bf0a50500350000000000005e1a62fc6e1305f19d04b736e24adeda822a", @ANYRESHEX=r2, @ANYBLOB=',\x00'])
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={<r16=>0xffffffffffffffff})
dup2(r16, r16)
ioctl$EXT4_IOC_MOVE_EXT(r16, 0xc028660f, &(0x7f0000000300)={0x0, r2, 0x3ff, 0x10000, 0x4, 0x1})
r17 = mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5})
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedreceive(r17, &(0x7f0000000380)=""/204, 0x2b3, 0x0, 0x0)
umount2(&(0x7f0000000340)='./file0\x00', 0x3)
lseek(r0, 0x0, 0x0)
r18 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0)
lseek(r18, 0x0, 0x0)
socket$inet(0x2, 0x4, 0x0)

19:16:32 executing program 5:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/null\x00', 0x40000, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x7a, &(0x7f0000000700)=ANY=[@ANYBLOB="000800b867f2ad8bb8368900910000008100000086dd600200b69800"/64], 0x0)
keyctl$set_reqkey_keyring(0x5, 0xfffffffffffffffe)
add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
request_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='$.\x00', 0x0)
pipe2$9p(&(0x7f0000000240)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff}, 0x0)
write$P9_RVERSION(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f9870000c6504df67f00000000000000e98b4b153dffff082dbb78abd55fba3da80b856445ab1006487179e001b66c90c0473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd8824692f08ff8675bdf17ea1c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a671164679079d00"/148], 0x15)
r3 = dup(r2)
write$FUSE_BMAP(r3, &(0x7f0000000080)={0x18, 0x0, 0x6}, 0x18)
write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r5=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r5)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0, <r6=>0x0}, &(0x7f0000000580)=0xc)
r7 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r8=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r8)
r9 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r10=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r10)
r11 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x7)
lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, <r12=>0x0})
mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2000, &(0x7f0000000600)=ANY=[@ANYBLOB="7472616e733d7463702c706f72743d3078303030303030303030303030346532312c6163636573733d757365722c616e616d653d6e732f6d6e74002c6d61736b3d5e4d415941415001c8000000000000003d", @ANYRESDEC=r12, @ANYBLOB=',measure,smackfshat=TIPCv2\x00,\x00'])
r13 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x811, r13, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r13, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@loopback, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r14=>0x0}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xff2d)
setreuid(r14, r12)
stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, <r15=>0x0})
mount$fuse(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x40000, &(0x7f0000000800)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYRESDEC=r6, @ANYBLOB=',default_permissions,uid>', @ANYRESDEC=r8, @ANYBLOB=',fow%er<', @ANYRESDEC=r10, @ANYBLOB=',obj_type=keyring\x00,fscontext=root,rootcontext=unconfined_u,obj_role=security,uid=', @ANYRESDEC=r15, @ANYBLOB="2c7375626a5f757365723d74727573746564656d304000000000000000747275737465646b657972696e67637075736574d6379d9e4501302cf62a174b1073676a6499183a6a41735b802416248fce940f0a1c1d242c6673636f6e746578743d756e636f6e66696e65645f752c00"])
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='tran\x00\x00\x00\x00\x00\x00\x00\x00no=', @ANYRESHEX=r1, @ANYBLOB="2c7766646e9063ae6f3d684b22d93e8bf0a50500350000000000005e1a62fc6e1305f19d04b736e24adeda822a", @ANYRESHEX=r2, @ANYBLOB=',\x00'])
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={<r16=>0xffffffffffffffff})
dup2(r16, r16)
ioctl$EXT4_IOC_MOVE_EXT(r16, 0xc028660f, &(0x7f0000000300)={0x0, r2, 0x3ff, 0x10000, 0x4, 0x1})
r17 = mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5})
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedreceive(r17, &(0x7f0000000380)=""/204, 0x2b3, 0x0, 0x0)
umount2(&(0x7f0000000340)='./file0\x00', 0x3)
lseek(r0, 0x0, 0x0)
r18 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0)
lseek(r18, 0x0, 0x0)
socket$inet(0x2, 0x4, 0x0)

19:16:33 executing program 2:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/null\x00', 0x40000, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x7a, &(0x7f0000000700)=ANY=[@ANYBLOB="000800b867f2ad8bb8368900910000008100000086dd600200b69800"/64], 0x0)
keyctl$set_reqkey_keyring(0x5, 0xfffffffffffffffe)
add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
request_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='$.\x00', 0x0)
pipe2$9p(&(0x7f0000000240)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff}, 0x0)
write$P9_RVERSION(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f9870000c6504df67f00000000000000e98b4b153dffff082dbb78abd55fba3da80b856445ab1006487179e001b66c90c0473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd8824692f08ff8675bdf17ea1c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a671164679079d00"/148], 0x15)
r3 = dup(r2)
write$FUSE_BMAP(r3, &(0x7f0000000080)={0x18, 0x0, 0x6}, 0x18)
write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r5=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r5)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0, <r6=>0x0}, &(0x7f0000000580)=0xc)
r7 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r8=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r8)
r9 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r10=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r10)
r11 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x7)
lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, <r12=>0x0})
mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2000, &(0x7f0000000600)=ANY=[@ANYBLOB="7472616e733d7463702c706f72743d3078303030303030303030303030346532312c6163636573733d757365722c616e616d653d6e732f6d6e74002c6d61736b3d5e4d415941415001c8000000000000003d", @ANYRESDEC=r12, @ANYBLOB=',measure,smackfshat=TIPCv2\x00,\x00'])
r13 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x811, r13, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r13, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@loopback, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r14=>0x0}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xff2d)
setreuid(r14, r12)
stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, <r15=>0x0})
mount$fuse(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x40000, &(0x7f0000000800)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYRESDEC=r6, @ANYBLOB=',default_permissions,uid>', @ANYRESDEC=r8, @ANYBLOB=',fow%er<', @ANYRESDEC=r10, @ANYBLOB=',obj_type=keyring\x00,fscontext=root,rootcontext=unconfined_u,obj_role=security,uid=', @ANYRESDEC=r15, @ANYBLOB="2c7375626a5f757365723d74727573746564656d304000000000000000747275737465646b657972696e67637075736574d6379d9e4501302cf62a174b1073676a6499183a6a41735b802416248fce940f0a1c1d242c6673636f6e746578743d756e636f6e66696e65645f752c00"])
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='tran\x00\x00\x00\x00\x00\x00\x00\x00no=', @ANYRESHEX=r1, @ANYBLOB="2c7766646e9063ae6f3d684b22d93e8bf0a50500350000000000005e1a62fc6e1305f19d04b736e24adeda822a", @ANYRESHEX=r2, @ANYBLOB=',\x00'])
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={<r16=>0xffffffffffffffff})
dup2(r16, r16)
ioctl$EXT4_IOC_MOVE_EXT(r16, 0xc028660f, &(0x7f0000000300)={0x0, r2, 0x3ff, 0x10000, 0x4, 0x1})
r17 = mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5})
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedreceive(r17, &(0x7f0000000380)=""/204, 0x2b3, 0x0, 0x0)
umount2(&(0x7f0000000340)='./file0\x00', 0x3)
lseek(r0, 0x0, 0x0)
r18 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0)
lseek(r18, 0x0, 0x0)
socket$inet(0x2, 0x4, 0x0)

19:16:33 executing program 3:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/null\x00', 0x40000, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x7a, &(0x7f0000000700)=ANY=[@ANYBLOB="000800b867f2ad8bb8368900910000008100000086dd600200b69800"/64], 0x0)
keyctl$set_reqkey_keyring(0x5, 0xfffffffffffffffe)
add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
request_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='$.\x00', 0x0)
pipe2$9p(&(0x7f0000000240)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff}, 0x0)
write$P9_RVERSION(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f9870000c6504df67f00000000000000e98b4b153dffff082dbb78abd55fba3da80b856445ab1006487179e001b66c90c0473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd8824692f08ff8675bdf17ea1c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a671164679079d00"/148], 0x15)
r3 = dup(r2)
write$FUSE_BMAP(r3, &(0x7f0000000080)={0x18, 0x0, 0x6}, 0x18)
write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r5=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r5)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0, <r6=>0x0}, &(0x7f0000000580)=0xc)
r7 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r8=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r8)
r9 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r10=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r10)
r11 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x7)
lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, <r12=>0x0})
mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2000, &(0x7f0000000600)=ANY=[@ANYBLOB="7472616e733d7463702c706f72743d3078303030303030303030303030346532312c6163636573733d757365722c616e616d653d6e732f6d6e74002c6d61736b3d5e4d415941415001c8000000000000003d", @ANYRESDEC=r12, @ANYBLOB=',measure,smackfshat=TIPCv2\x00,\x00'])
r13 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x811, r13, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r13, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@loopback, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r14=>0x0}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xff2d)
setreuid(r14, r12)
stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, <r15=>0x0})
mount$fuse(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x40000, &(0x7f0000000800)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYRESDEC=r6, @ANYBLOB=',default_permissions,uid>', @ANYRESDEC=r8, @ANYBLOB=',fow%er<', @ANYRESDEC=r10, @ANYBLOB=',obj_type=keyring\x00,fscontext=root,rootcontext=unconfined_u,obj_role=security,uid=', @ANYRESDEC=r15, @ANYBLOB="2c7375626a5f757365723d74727573746564656d304000000000000000747275737465646b657972696e67637075736574d6379d9e4501302cf62a174b1073676a6499183a6a41735b802416248fce940f0a1c1d242c6673636f6e746578743d756e636f6e66696e65645f752c00"])
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='tran\x00\x00\x00\x00\x00\x00\x00\x00no=', @ANYRESHEX=r1, @ANYBLOB="2c7766646e9063ae6f3d684b22d93e8bf0a50500350000000000005e1a62fc6e1305f19d04b736e24adeda822a", @ANYRESHEX=r2, @ANYBLOB=',\x00'])
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={<r16=>0xffffffffffffffff})
dup2(r16, r16)
ioctl$EXT4_IOC_MOVE_EXT(r16, 0xc028660f, &(0x7f0000000300)={0x0, r2, 0x3ff, 0x10000, 0x4, 0x1})
r17 = mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5})
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedreceive(r17, &(0x7f0000000380)=""/204, 0x2b3, 0x0, 0x0)
umount2(&(0x7f0000000340)='./file0\x00', 0x3)
lseek(r0, 0x0, 0x0)
r18 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0)
lseek(r18, 0x0, 0x0)
socket$inet(0x2, 0x4, 0x0)

19:16:33 executing program 0:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/null\x00', 0x40000, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x7a, &(0x7f0000000700)=ANY=[@ANYBLOB="000800b867f2ad8bb8368900910000008100000086dd600200b69800"/64], 0x0)
keyctl$set_reqkey_keyring(0x5, 0xfffffffffffffffe)
add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
request_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='$.\x00', 0x0)
pipe2$9p(&(0x7f0000000240)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff}, 0x0)
write$P9_RVERSION(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f9870000c6504df67f00000000000000e98b4b153dffff082dbb78abd55fba3da80b856445ab1006487179e001b66c90c0473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd8824692f08ff8675bdf17ea1c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a671164679079d00"/148], 0x15)
r3 = dup(r2)
write$FUSE_BMAP(r3, &(0x7f0000000080)={0x18, 0x0, 0x6}, 0x18)
write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r5=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r5)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0, <r6=>0x0}, &(0x7f0000000580)=0xc)
r7 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r8=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r8)
r9 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r10=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r10)
r11 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x7)
lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, <r12=>0x0})
mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2000, &(0x7f0000000600)=ANY=[@ANYBLOB="7472616e733d7463702c706f72743d3078303030303030303030303030346532312c6163636573733d757365722c616e616d653d6e732f6d6e74002c6d61736b3d5e4d415941415001c8000000000000003d", @ANYRESDEC=r12, @ANYBLOB=',measure,smackfshat=TIPCv2\x00,\x00'])
r13 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x811, r13, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r13, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@loopback, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r14=>0x0}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xff2d)
setreuid(r14, r12)
stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, <r15=>0x0})
mount$fuse(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x40000, &(0x7f0000000800)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYRESDEC=r6, @ANYBLOB=',default_permissions,uid>', @ANYRESDEC=r8, @ANYBLOB=',fow%er<', @ANYRESDEC=r10, @ANYBLOB=',obj_type=keyring\x00,fscontext=root,rootcontext=unconfined_u,obj_role=security,uid=', @ANYRESDEC=r15, @ANYBLOB="2c7375626a5f757365723d74727573746564656d304000000000000000747275737465646b657972696e67637075736574d6379d9e4501302cf62a174b1073676a6499183a6a41735b802416248fce940f0a1c1d242c6673636f6e746578743d756e636f6e66696e65645f752c00"])
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='tran\x00\x00\x00\x00\x00\x00\x00\x00no=', @ANYRESHEX=r1, @ANYBLOB="2c7766646e9063ae6f3d684b22d93e8bf0a50500350000000000005e1a62fc6e1305f19d04b736e24adeda822a", @ANYRESHEX=r2, @ANYBLOB=',\x00'])
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={<r16=>0xffffffffffffffff})
dup2(r16, r16)
ioctl$EXT4_IOC_MOVE_EXT(r16, 0xc028660f, &(0x7f0000000300)={0x0, r2, 0x3ff, 0x10000, 0x4, 0x1})
r17 = mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5})
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedreceive(r17, &(0x7f0000000380)=""/204, 0x2b3, 0x0, 0x0)
umount2(&(0x7f0000000340)='./file0\x00', 0x3)
lseek(r0, 0x0, 0x0)
r18 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0)
lseek(r18, 0x0, 0x0)
socket$inet(0x2, 0x4, 0x0)

19:16:33 executing program 4:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/null\x00', 0x40000, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x7a, &(0x7f0000000700)=ANY=[@ANYBLOB="000800b867f2ad8bb8368900910000008100000086dd600200b69800"/64], 0x0)
keyctl$set_reqkey_keyring(0x5, 0xfffffffffffffffe)
add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
request_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='$.\x00', 0x0)
pipe2$9p(&(0x7f0000000240)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff}, 0x0)
write$P9_RVERSION(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f9870000c6504df67f00000000000000e98b4b153dffff082dbb78abd55fba3da80b856445ab1006487179e001b66c90c0473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd8824692f08ff8675bdf17ea1c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a671164679079d00"/148], 0x15)
r3 = dup(r2)
write$FUSE_BMAP(r3, &(0x7f0000000080)={0x18, 0x0, 0x6}, 0x18)
write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r5=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r5)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0, <r6=>0x0}, &(0x7f0000000580)=0xc)
r7 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r8=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r8)
r9 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r10=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r10)
r11 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x7)
lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, <r12=>0x0})
mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2000, &(0x7f0000000600)=ANY=[@ANYBLOB="7472616e733d7463702c706f72743d3078303030303030303030303030346532312c6163636573733d757365722c616e616d653d6e732f6d6e74002c6d61736b3d5e4d415941415001c8000000000000003d", @ANYRESDEC=r12, @ANYBLOB=',measure,smackfshat=TIPCv2\x00,\x00'])
r13 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x811, r13, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r13, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@loopback, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r14=>0x0}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xff2d)
setreuid(r14, r12)
stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, <r15=>0x0})
mount$fuse(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x40000, &(0x7f0000000800)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYRESDEC=r6, @ANYBLOB=',default_permissions,uid>', @ANYRESDEC=r8, @ANYBLOB=',fow%er<', @ANYRESDEC=r10, @ANYBLOB=',obj_type=keyring\x00,fscontext=root,rootcontext=unconfined_u,obj_role=security,uid=', @ANYRESDEC=r15, @ANYBLOB="2c7375626a5f757365723d74727573746564656d304000000000000000747275737465646b657972696e67637075736574d6379d9e4501302cf62a174b1073676a6499183a6a41735b802416248fce940f0a1c1d242c6673636f6e746578743d756e636f6e66696e65645f752c00"])
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='tran\x00\x00\x00\x00\x00\x00\x00\x00no=', @ANYRESHEX=r1, @ANYBLOB="2c7766646e9063ae6f3d684b22d93e8bf0a50500350000000000005e1a62fc6e1305f19d04b736e24adeda822a", @ANYRESHEX=r2, @ANYBLOB=',\x00'])
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={<r16=>0xffffffffffffffff})
dup2(r16, r16)
ioctl$EXT4_IOC_MOVE_EXT(r16, 0xc028660f, &(0x7f0000000300)={0x0, r2, 0x3ff, 0x10000, 0x4, 0x1})
r17 = mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5})
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedreceive(r17, &(0x7f0000000380)=""/204, 0x2b3, 0x0, 0x0)
umount2(&(0x7f0000000340)='./file0\x00', 0x3)
lseek(r0, 0x0, 0x0)
r18 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0)
lseek(r18, 0x0, 0x0)
socket$inet(0x2, 0x4, 0x0)

19:16:33 executing program 5:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/null\x00', 0x40000, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x7a, &(0x7f0000000700)=ANY=[@ANYBLOB="000800b867f2ad8bb8368900910000008100000086dd600200b69800"/64], 0x0)
keyctl$set_reqkey_keyring(0x5, 0xfffffffffffffffe)
add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
request_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='$.\x00', 0x0)
pipe2$9p(&(0x7f0000000240)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff}, 0x0)
write$P9_RVERSION(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f9870000c6504df67f00000000000000e98b4b153dffff082dbb78abd55fba3da80b856445ab1006487179e001b66c90c0473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd8824692f08ff8675bdf17ea1c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a671164679079d00"/148], 0x15)
r3 = dup(r2)
write$FUSE_BMAP(r3, &(0x7f0000000080)={0x18, 0x0, 0x6}, 0x18)
write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r5=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r5)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0, <r6=>0x0}, &(0x7f0000000580)=0xc)
r7 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r8=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r8)
r9 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r10=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r10)
r11 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x7)
lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, <r12=>0x0})
mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2000, &(0x7f0000000600)=ANY=[@ANYBLOB="7472616e733d7463702c706f72743d3078303030303030303030303030346532312c6163636573733d757365722c616e616d653d6e732f6d6e74002c6d61736b3d5e4d415941415001c8000000000000003d", @ANYRESDEC=r12, @ANYBLOB=',measure,smackfshat=TIPCv2\x00,\x00'])
r13 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x811, r13, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r13, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@loopback, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r14=>0x0}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xff2d)
setreuid(r14, r12)
stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, <r15=>0x0})
mount$fuse(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x40000, &(0x7f0000000800)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYRESDEC=r6, @ANYBLOB=',default_permissions,uid>', @ANYRESDEC=r8, @ANYBLOB=',fow%er<', @ANYRESDEC=r10, @ANYBLOB=',obj_type=keyring\x00,fscontext=root,rootcontext=unconfined_u,obj_role=security,uid=', @ANYRESDEC=r15, @ANYBLOB="2c7375626a5f757365723d74727573746564656d304000000000000000747275737465646b657972696e67637075736574d6379d9e4501302cf62a174b1073676a6499183a6a41735b802416248fce940f0a1c1d242c6673636f6e746578743d756e636f6e66696e65645f752c00"])
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='tran\x00\x00\x00\x00\x00\x00\x00\x00no=', @ANYRESHEX=r1, @ANYBLOB="2c7766646e9063ae6f3d684b22d93e8bf0a50500350000000000005e1a62fc6e1305f19d04b736e24adeda822a", @ANYRESHEX=r2, @ANYBLOB=',\x00'])
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={<r16=>0xffffffffffffffff})
dup2(r16, r16)
ioctl$EXT4_IOC_MOVE_EXT(r16, 0xc028660f, &(0x7f0000000300)={0x0, r2, 0x3ff, 0x10000, 0x4, 0x1})
r17 = mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5})
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedreceive(r17, &(0x7f0000000380)=""/204, 0x2b3, 0x0, 0x0)
umount2(&(0x7f0000000340)='./file0\x00', 0x3)
lseek(r0, 0x0, 0x0)
r18 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0)
lseek(r18, 0x0, 0x0)
socket$inet(0x2, 0x4, 0x0)

19:16:33 executing program 1:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/null\x00', 0x40000, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x7a, &(0x7f0000000700)=ANY=[@ANYBLOB="000800b867f2ad8bb8368900910000008100000086dd600200b69800"/64], 0x0)
keyctl$set_reqkey_keyring(0x5, 0xfffffffffffffffe)
add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
request_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='$.\x00', 0x0)
pipe2$9p(&(0x7f0000000240)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff}, 0x0)
write$P9_RVERSION(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f9870000c6504df67f00000000000000e98b4b153dffff082dbb78abd55fba3da80b856445ab1006487179e001b66c90c0473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd8824692f08ff8675bdf17ea1c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a671164679079d00"/148], 0x15)
r3 = dup(r2)
write$FUSE_BMAP(r3, &(0x7f0000000080)={0x18, 0x0, 0x6}, 0x18)
write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r5=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r5)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0, <r6=>0x0}, &(0x7f0000000580)=0xc)
r7 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r8=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r8)
r9 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r10=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r10)
r11 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x7)
lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, <r12=>0x0})
mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2000, &(0x7f0000000600)=ANY=[@ANYBLOB="7472616e733d7463702c706f72743d3078303030303030303030303030346532312c6163636573733d757365722c616e616d653d6e732f6d6e74002c6d61736b3d5e4d415941415001c8000000000000003d", @ANYRESDEC=r12, @ANYBLOB=',measure,smackfshat=TIPCv2\x00,\x00'])
r13 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x811, r13, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r13, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@loopback, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r14=>0x0}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xff2d)
setreuid(r14, r12)
stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, <r15=>0x0})
mount$fuse(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x40000, &(0x7f0000000800)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYRESDEC=r6, @ANYBLOB=',default_permissions,uid>', @ANYRESDEC=r8, @ANYBLOB=',fow%er<', @ANYRESDEC=r10, @ANYBLOB=',obj_type=keyring\x00,fscontext=root,rootcontext=unconfined_u,obj_role=security,uid=', @ANYRESDEC=r15, @ANYBLOB="2c7375626a5f757365723d74727573746564656d304000000000000000747275737465646b657972696e67637075736574d6379d9e4501302cf62a174b1073676a6499183a6a41735b802416248fce940f0a1c1d242c6673636f6e746578743d756e636f6e66696e65645f752c00"])
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='tran\x00\x00\x00\x00\x00\x00\x00\x00no=', @ANYRESHEX=r1, @ANYBLOB="2c7766646e9063ae6f3d684b22d93e8bf0a50500350000000000005e1a62fc6e1305f19d04b736e24adeda822a", @ANYRESHEX=r2, @ANYBLOB=',\x00'])
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={<r16=>0xffffffffffffffff})
dup2(r16, r16)
ioctl$EXT4_IOC_MOVE_EXT(r16, 0xc028660f, &(0x7f0000000300)={0x0, r2, 0x3ff, 0x10000, 0x4, 0x1})
r17 = mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5})
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedreceive(r17, &(0x7f0000000380)=""/204, 0x2b3, 0x0, 0x0)
umount2(&(0x7f0000000340)='./file0\x00', 0x3)
lseek(r0, 0x0, 0x0)
r18 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0)
lseek(r18, 0x0, 0x0)
socket$inet(0x2, 0x4, 0x0)

19:16:33 executing program 2:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/null\x00', 0x40000, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x7a, &(0x7f0000000700)=ANY=[@ANYBLOB="000800b867f2ad8bb8368900910000008100000086dd600200b69800"/64], 0x0)
keyctl$set_reqkey_keyring(0x5, 0xfffffffffffffffe)
add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
request_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='$.\x00', 0x0)
pipe2$9p(&(0x7f0000000240)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff}, 0x0)
write$P9_RVERSION(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f9870000c6504df67f00000000000000e98b4b153dffff082dbb78abd55fba3da80b856445ab1006487179e001b66c90c0473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd8824692f08ff8675bdf17ea1c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a671164679079d00"/148], 0x15)
r3 = dup(r2)
write$FUSE_BMAP(r3, &(0x7f0000000080)={0x18, 0x0, 0x6}, 0x18)
write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r5=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r5)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0, <r6=>0x0}, &(0x7f0000000580)=0xc)
r7 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r8=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r8)
r9 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r10=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r10)
r11 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x7)
lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, <r12=>0x0})
mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2000, &(0x7f0000000600)=ANY=[@ANYBLOB="7472616e733d7463702c706f72743d3078303030303030303030303030346532312c6163636573733d757365722c616e616d653d6e732f6d6e74002c6d61736b3d5e4d415941415001c8000000000000003d", @ANYRESDEC=r12, @ANYBLOB=',measure,smackfshat=TIPCv2\x00,\x00'])
r13 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x811, r13, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r13, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@loopback, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r14=>0x0}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xff2d)
setreuid(r14, r12)
stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, <r15=>0x0})
mount$fuse(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x40000, &(0x7f0000000800)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYRESDEC=r6, @ANYBLOB=',default_permissions,uid>', @ANYRESDEC=r8, @ANYBLOB=',fow%er<', @ANYRESDEC=r10, @ANYBLOB=',obj_type=keyring\x00,fscontext=root,rootcontext=unconfined_u,obj_role=security,uid=', @ANYRESDEC=r15, @ANYBLOB="2c7375626a5f757365723d74727573746564656d304000000000000000747275737465646b657972696e67637075736574d6379d9e4501302cf62a174b1073676a6499183a6a41735b802416248fce940f0a1c1d242c6673636f6e746578743d756e636f6e66696e65645f752c00"])
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='tran\x00\x00\x00\x00\x00\x00\x00\x00no=', @ANYRESHEX=r1, @ANYBLOB="2c7766646e9063ae6f3d684b22d93e8bf0a50500350000000000005e1a62fc6e1305f19d04b736e24adeda822a", @ANYRESHEX=r2, @ANYBLOB=',\x00'])
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={<r16=>0xffffffffffffffff})
dup2(r16, r16)
ioctl$EXT4_IOC_MOVE_EXT(r16, 0xc028660f, &(0x7f0000000300)={0x0, r2, 0x3ff, 0x10000, 0x4, 0x1})
r17 = mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5})
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedreceive(r17, &(0x7f0000000380)=""/204, 0x2b3, 0x0, 0x0)
umount2(&(0x7f0000000340)='./file0\x00', 0x3)
lseek(r0, 0x0, 0x0)
r18 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0)
lseek(r18, 0x0, 0x0)
socket$inet(0x2, 0x4, 0x0)

19:16:33 executing program 3:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/null\x00', 0x40000, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x7a, &(0x7f0000000700)=ANY=[@ANYBLOB="000800b867f2ad8bb8368900910000008100000086dd600200b69800"/64], 0x0)
keyctl$set_reqkey_keyring(0x5, 0xfffffffffffffffe)
add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
request_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='$.\x00', 0x0)
pipe2$9p(&(0x7f0000000240)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff}, 0x0)
write$P9_RVERSION(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f9870000c6504df67f00000000000000e98b4b153dffff082dbb78abd55fba3da80b856445ab1006487179e001b66c90c0473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd8824692f08ff8675bdf17ea1c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a671164679079d00"/148], 0x15)
r3 = dup(r2)
write$FUSE_BMAP(r3, &(0x7f0000000080)={0x18, 0x0, 0x6}, 0x18)
write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r5=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r5)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0, <r6=>0x0}, &(0x7f0000000580)=0xc)
r7 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r8=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r8)
r9 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r10=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r10)
r11 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x7)
lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, <r12=>0x0})
mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2000, &(0x7f0000000600)=ANY=[@ANYBLOB="7472616e733d7463702c706f72743d3078303030303030303030303030346532312c6163636573733d757365722c616e616d653d6e732f6d6e74002c6d61736b3d5e4d415941415001c8000000000000003d", @ANYRESDEC=r12, @ANYBLOB=',measure,smackfshat=TIPCv2\x00,\x00'])
r13 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x811, r13, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r13, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@loopback, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r14=>0x0}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xff2d)
setreuid(r14, r12)
stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, <r15=>0x0})
mount$fuse(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x40000, &(0x7f0000000800)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYRESDEC=r6, @ANYBLOB=',default_permissions,uid>', @ANYRESDEC=r8, @ANYBLOB=',fow%er<', @ANYRESDEC=r10, @ANYBLOB=',obj_type=keyring\x00,fscontext=root,rootcontext=unconfined_u,obj_role=security,uid=', @ANYRESDEC=r15, @ANYBLOB="2c7375626a5f757365723d74727573746564656d304000000000000000747275737465646b657972696e67637075736574d6379d9e4501302cf62a174b1073676a6499183a6a41735b802416248fce940f0a1c1d242c6673636f6e746578743d756e636f6e66696e65645f752c00"])
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='tran\x00\x00\x00\x00\x00\x00\x00\x00no=', @ANYRESHEX=r1, @ANYBLOB="2c7766646e9063ae6f3d684b22d93e8bf0a50500350000000000005e1a62fc6e1305f19d04b736e24adeda822a", @ANYRESHEX=r2, @ANYBLOB=',\x00'])
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={<r16=>0xffffffffffffffff})
dup2(r16, r16)
ioctl$EXT4_IOC_MOVE_EXT(r16, 0xc028660f, &(0x7f0000000300)={0x0, r2, 0x3ff, 0x10000, 0x4, 0x1})
r17 = mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5})
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedreceive(r17, &(0x7f0000000380)=""/204, 0x2b3, 0x0, 0x0)
umount2(&(0x7f0000000340)='./file0\x00', 0x3)
lseek(r0, 0x0, 0x0)
r18 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0)
lseek(r18, 0x0, 0x0)
socket$inet(0x2, 0x4, 0x0)

19:16:33 executing program 0:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/null\x00', 0x40000, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x7a, &(0x7f0000000700)=ANY=[@ANYBLOB="000800b867f2ad8bb8368900910000008100000086dd600200b69800"/64], 0x0)
keyctl$set_reqkey_keyring(0x5, 0xfffffffffffffffe)
add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
request_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='$.\x00', 0x0)
pipe2$9p(&(0x7f0000000240)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff}, 0x0)
write$P9_RVERSION(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f9870000c6504df67f00000000000000e98b4b153dffff082dbb78abd55fba3da80b856445ab1006487179e001b66c90c0473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd8824692f08ff8675bdf17ea1c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a671164679079d00"/148], 0x15)
r3 = dup(r2)
write$FUSE_BMAP(r3, &(0x7f0000000080)={0x18, 0x0, 0x6}, 0x18)
write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r5=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r5)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0, <r6=>0x0}, &(0x7f0000000580)=0xc)
r7 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r8=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r8)
r9 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r10=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r10)
r11 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x7)
lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, <r12=>0x0})
mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2000, &(0x7f0000000600)=ANY=[@ANYBLOB="7472616e733d7463702c706f72743d3078303030303030303030303030346532312c6163636573733d757365722c616e616d653d6e732f6d6e74002c6d61736b3d5e4d415941415001c8000000000000003d", @ANYRESDEC=r12, @ANYBLOB=',measure,smackfshat=TIPCv2\x00,\x00'])
r13 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x811, r13, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r13, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@loopback, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r14=>0x0}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xff2d)
setreuid(r14, r12)
stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, <r15=>0x0})
mount$fuse(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x40000, &(0x7f0000000800)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYRESDEC=r6, @ANYBLOB=',default_permissions,uid>', @ANYRESDEC=r8, @ANYBLOB=',fow%er<', @ANYRESDEC=r10, @ANYBLOB=',obj_type=keyring\x00,fscontext=root,rootcontext=unconfined_u,obj_role=security,uid=', @ANYRESDEC=r15, @ANYBLOB="2c7375626a5f757365723d74727573746564656d304000000000000000747275737465646b657972696e67637075736574d6379d9e4501302cf62a174b1073676a6499183a6a41735b802416248fce940f0a1c1d242c6673636f6e746578743d756e636f6e66696e65645f752c00"])
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='tran\x00\x00\x00\x00\x00\x00\x00\x00no=', @ANYRESHEX=r1, @ANYBLOB="2c7766646e9063ae6f3d684b22d93e8bf0a50500350000000000005e1a62fc6e1305f19d04b736e24adeda822a", @ANYRESHEX=r2, @ANYBLOB=',\x00'])
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={<r16=>0xffffffffffffffff})
dup2(r16, r16)
ioctl$EXT4_IOC_MOVE_EXT(r16, 0xc028660f, &(0x7f0000000300)={0x0, r2, 0x3ff, 0x10000, 0x4, 0x1})
r17 = mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5})
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedreceive(r17, &(0x7f0000000380)=""/204, 0x2b3, 0x0, 0x0)
umount2(&(0x7f0000000340)='./file0\x00', 0x3)
lseek(r0, 0x0, 0x0)
r18 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0)
lseek(r18, 0x0, 0x0)
socket$inet(0x2, 0x4, 0x0)

19:16:33 executing program 4:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/null\x00', 0x40000, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x7a, &(0x7f0000000700)=ANY=[@ANYBLOB="000800b867f2ad8bb8368900910000008100000086dd600200b69800"/64], 0x0)
keyctl$set_reqkey_keyring(0x5, 0xfffffffffffffffe)
add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
request_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='$.\x00', 0x0)
pipe2$9p(&(0x7f0000000240)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff}, 0x0)
write$P9_RVERSION(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f9870000c6504df67f00000000000000e98b4b153dffff082dbb78abd55fba3da80b856445ab1006487179e001b66c90c0473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd8824692f08ff8675bdf17ea1c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a671164679079d00"/148], 0x15)
r3 = dup(r2)
write$FUSE_BMAP(r3, &(0x7f0000000080)={0x18, 0x0, 0x6}, 0x18)
write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r5=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r5)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0, <r6=>0x0}, &(0x7f0000000580)=0xc)
r7 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r8=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r8)
r9 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r10=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r10)
r11 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x7)
lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, <r12=>0x0})
mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2000, &(0x7f0000000600)=ANY=[@ANYBLOB="7472616e733d7463702c706f72743d3078303030303030303030303030346532312c6163636573733d757365722c616e616d653d6e732f6d6e74002c6d61736b3d5e4d415941415001c8000000000000003d", @ANYRESDEC=r12, @ANYBLOB=',measure,smackfshat=TIPCv2\x00,\x00'])
r13 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x811, r13, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r13, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@loopback, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r14=>0x0}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xff2d)
setreuid(r14, r12)
stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, <r15=>0x0})
mount$fuse(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x40000, &(0x7f0000000800)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYRESDEC=r6, @ANYBLOB=',default_permissions,uid>', @ANYRESDEC=r8, @ANYBLOB=',fow%er<', @ANYRESDEC=r10, @ANYBLOB=',obj_type=keyring\x00,fscontext=root,rootcontext=unconfined_u,obj_role=security,uid=', @ANYRESDEC=r15, @ANYBLOB="2c7375626a5f757365723d74727573746564656d304000000000000000747275737465646b657972696e67637075736574d6379d9e4501302cf62a174b1073676a6499183a6a41735b802416248fce940f0a1c1d242c6673636f6e746578743d756e636f6e66696e65645f752c00"])
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='tran\x00\x00\x00\x00\x00\x00\x00\x00no=', @ANYRESHEX=r1, @ANYBLOB="2c7766646e9063ae6f3d684b22d93e8bf0a50500350000000000005e1a62fc6e1305f19d04b736e24adeda822a", @ANYRESHEX=r2, @ANYBLOB=',\x00'])
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={<r16=>0xffffffffffffffff})
dup2(r16, r16)
ioctl$EXT4_IOC_MOVE_EXT(r16, 0xc028660f, &(0x7f0000000300)={0x0, r2, 0x3ff, 0x10000, 0x4, 0x1})
r17 = mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5})
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedreceive(r17, &(0x7f0000000380)=""/204, 0x2b3, 0x0, 0x0)
umount2(&(0x7f0000000340)='./file0\x00', 0x3)
lseek(r0, 0x0, 0x0)
r18 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0)
lseek(r18, 0x0, 0x0)
socket$inet(0x2, 0x4, 0x0)

19:16:34 executing program 5:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/null\x00', 0x40000, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x7a, &(0x7f0000000700)=ANY=[@ANYBLOB="000800b867f2ad8bb8368900910000008100000086dd600200b69800"/64], 0x0)
keyctl$set_reqkey_keyring(0x5, 0xfffffffffffffffe)
add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
request_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='$.\x00', 0x0)
pipe2$9p(&(0x7f0000000240)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff}, 0x0)
write$P9_RVERSION(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f9870000c6504df67f00000000000000e98b4b153dffff082dbb78abd55fba3da80b856445ab1006487179e001b66c90c0473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd8824692f08ff8675bdf17ea1c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a671164679079d00"/148], 0x15)
r3 = dup(r2)
write$FUSE_BMAP(r3, &(0x7f0000000080)={0x18, 0x0, 0x6}, 0x18)
write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r5=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r5)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0, <r6=>0x0}, &(0x7f0000000580)=0xc)
r7 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r8=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r8)
r9 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r10=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r10)
r11 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x7)
lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, <r12=>0x0})
mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2000, &(0x7f0000000600)=ANY=[@ANYBLOB="7472616e733d7463702c706f72743d3078303030303030303030303030346532312c6163636573733d757365722c616e616d653d6e732f6d6e74002c6d61736b3d5e4d415941415001c8000000000000003d", @ANYRESDEC=r12, @ANYBLOB=',measure,smackfshat=TIPCv2\x00,\x00'])
r13 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x811, r13, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r13, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@loopback, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r14=>0x0}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xff2d)
setreuid(r14, r12)
stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, <r15=>0x0})
mount$fuse(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x40000, &(0x7f0000000800)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYRESDEC=r6, @ANYBLOB=',default_permissions,uid>', @ANYRESDEC=r8, @ANYBLOB=',fow%er<', @ANYRESDEC=r10, @ANYBLOB=',obj_type=keyring\x00,fscontext=root,rootcontext=unconfined_u,obj_role=security,uid=', @ANYRESDEC=r15, @ANYBLOB="2c7375626a5f757365723d74727573746564656d304000000000000000747275737465646b657972696e67637075736574d6379d9e4501302cf62a174b1073676a6499183a6a41735b802416248fce940f0a1c1d242c6673636f6e746578743d756e636f6e66696e65645f752c00"])
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='tran\x00\x00\x00\x00\x00\x00\x00\x00no=', @ANYRESHEX=r1, @ANYBLOB="2c7766646e9063ae6f3d684b22d93e8bf0a50500350000000000005e1a62fc6e1305f19d04b736e24adeda822a", @ANYRESHEX=r2, @ANYBLOB=',\x00'])
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={<r16=>0xffffffffffffffff})
dup2(r16, r16)
ioctl$EXT4_IOC_MOVE_EXT(r16, 0xc028660f, &(0x7f0000000300)={0x0, r2, 0x3ff, 0x10000, 0x4, 0x1})
r17 = mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5})
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedreceive(r17, &(0x7f0000000380)=""/204, 0x2b3, 0x0, 0x0)
umount2(&(0x7f0000000340)='./file0\x00', 0x3)
lseek(r0, 0x0, 0x0)
r18 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0)
lseek(r18, 0x0, 0x0)
socket$inet(0x2, 0x4, 0x0)

19:16:34 executing program 1:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/null\x00', 0x40000, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x7a, &(0x7f0000000700)=ANY=[@ANYBLOB="000800b867f2ad8bb8368900910000008100000086dd600200b69800"/64], 0x0)
keyctl$set_reqkey_keyring(0x5, 0xfffffffffffffffe)
add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
request_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='$.\x00', 0x0)
pipe2$9p(&(0x7f0000000240)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff}, 0x0)
write$P9_RVERSION(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f9870000c6504df67f00000000000000e98b4b153dffff082dbb78abd55fba3da80b856445ab1006487179e001b66c90c0473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd8824692f08ff8675bdf17ea1c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a671164679079d00"/148], 0x15)
r3 = dup(r2)
write$FUSE_BMAP(r3, &(0x7f0000000080)={0x18, 0x0, 0x6}, 0x18)
write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r5=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r5)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0, <r6=>0x0}, &(0x7f0000000580)=0xc)
r7 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r8=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r8)
r9 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r10=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r10)
r11 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x7)
lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, <r12=>0x0})
mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2000, &(0x7f0000000600)=ANY=[@ANYBLOB="7472616e733d7463702c706f72743d3078303030303030303030303030346532312c6163636573733d757365722c616e616d653d6e732f6d6e74002c6d61736b3d5e4d415941415001c8000000000000003d", @ANYRESDEC=r12, @ANYBLOB=',measure,smackfshat=TIPCv2\x00,\x00'])
r13 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x811, r13, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r13, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@loopback, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r14=>0x0}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xff2d)
setreuid(r14, r12)
stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, <r15=>0x0})
mount$fuse(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x40000, &(0x7f0000000800)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYRESDEC=r6, @ANYBLOB=',default_permissions,uid>', @ANYRESDEC=r8, @ANYBLOB=',fow%er<', @ANYRESDEC=r10, @ANYBLOB=',obj_type=keyring\x00,fscontext=root,rootcontext=unconfined_u,obj_role=security,uid=', @ANYRESDEC=r15, @ANYBLOB="2c7375626a5f757365723d74727573746564656d304000000000000000747275737465646b657972696e67637075736574d6379d9e4501302cf62a174b1073676a6499183a6a41735b802416248fce940f0a1c1d242c6673636f6e746578743d756e636f6e66696e65645f752c00"])
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='tran\x00\x00\x00\x00\x00\x00\x00\x00no=', @ANYRESHEX=r1, @ANYBLOB="2c7766646e9063ae6f3d684b22d93e8bf0a50500350000000000005e1a62fc6e1305f19d04b736e24adeda822a", @ANYRESHEX=r2, @ANYBLOB=',\x00'])
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={<r16=>0xffffffffffffffff})
dup2(r16, r16)
ioctl$EXT4_IOC_MOVE_EXT(r16, 0xc028660f, &(0x7f0000000300)={0x0, r2, 0x3ff, 0x10000, 0x4, 0x1})
r17 = mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5})
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedreceive(r17, &(0x7f0000000380)=""/204, 0x2b3, 0x0, 0x0)
umount2(&(0x7f0000000340)='./file0\x00', 0x3)
lseek(r0, 0x0, 0x0)
r18 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0)
lseek(r18, 0x0, 0x0)
socket$inet(0x2, 0x4, 0x0)

19:16:34 executing program 2:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/null\x00', 0x40000, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x7a, &(0x7f0000000700)=ANY=[@ANYBLOB="000800b867f2ad8bb8368900910000008100000086dd600200b69800"/64], 0x0)
keyctl$set_reqkey_keyring(0x5, 0xfffffffffffffffe)
add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
request_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='$.\x00', 0x0)
pipe2$9p(&(0x7f0000000240)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff}, 0x0)
write$P9_RVERSION(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f9870000c6504df67f00000000000000e98b4b153dffff082dbb78abd55fba3da80b856445ab1006487179e001b66c90c0473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd8824692f08ff8675bdf17ea1c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a671164679079d00"/148], 0x15)
r3 = dup(r2)
write$FUSE_BMAP(r3, &(0x7f0000000080)={0x18, 0x0, 0x6}, 0x18)
write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r5=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r5)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0, <r6=>0x0}, &(0x7f0000000580)=0xc)
r7 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r8=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r8)
r9 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r10=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r10)
r11 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x7)
lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, <r12=>0x0})
mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2000, &(0x7f0000000600)=ANY=[@ANYBLOB="7472616e733d7463702c706f72743d3078303030303030303030303030346532312c6163636573733d757365722c616e616d653d6e732f6d6e74002c6d61736b3d5e4d415941415001c8000000000000003d", @ANYRESDEC=r12, @ANYBLOB=',measure,smackfshat=TIPCv2\x00,\x00'])
r13 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x811, r13, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r13, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@loopback, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r14=>0x0}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xff2d)
setreuid(r14, r12)
stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, <r15=>0x0})
mount$fuse(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x40000, &(0x7f0000000800)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYRESDEC=r6, @ANYBLOB=',default_permissions,uid>', @ANYRESDEC=r8, @ANYBLOB=',fow%er<', @ANYRESDEC=r10, @ANYBLOB=',obj_type=keyring\x00,fscontext=root,rootcontext=unconfined_u,obj_role=security,uid=', @ANYRESDEC=r15, @ANYBLOB="2c7375626a5f757365723d74727573746564656d304000000000000000747275737465646b657972696e67637075736574d6379d9e4501302cf62a174b1073676a6499183a6a41735b802416248fce940f0a1c1d242c6673636f6e746578743d756e636f6e66696e65645f752c00"])
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='tran\x00\x00\x00\x00\x00\x00\x00\x00no=', @ANYRESHEX=r1, @ANYBLOB="2c7766646e9063ae6f3d684b22d93e8bf0a50500350000000000005e1a62fc6e1305f19d04b736e24adeda822a", @ANYRESHEX=r2, @ANYBLOB=',\x00'])
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={<r16=>0xffffffffffffffff})
dup2(r16, r16)
ioctl$EXT4_IOC_MOVE_EXT(r16, 0xc028660f, &(0x7f0000000300)={0x0, r2, 0x3ff, 0x10000, 0x4, 0x1})
r17 = mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5})
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedreceive(r17, &(0x7f0000000380)=""/204, 0x2b3, 0x0, 0x0)
umount2(&(0x7f0000000340)='./file0\x00', 0x3)
lseek(r0, 0x0, 0x0)
r18 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0)
lseek(r18, 0x0, 0x0)
socket$inet(0x2, 0x4, 0x0)

19:16:34 executing program 3:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/null\x00', 0x40000, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x7a, &(0x7f0000000700)=ANY=[@ANYBLOB="000800b867f2ad8bb8368900910000008100000086dd600200b69800"/64], 0x0)
keyctl$set_reqkey_keyring(0x5, 0xfffffffffffffffe)
add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
request_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='$.\x00', 0x0)
pipe2$9p(&(0x7f0000000240)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff}, 0x0)
write$P9_RVERSION(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f9870000c6504df67f00000000000000e98b4b153dffff082dbb78abd55fba3da80b856445ab1006487179e001b66c90c0473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd8824692f08ff8675bdf17ea1c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a671164679079d00"/148], 0x15)
r3 = dup(r2)
write$FUSE_BMAP(r3, &(0x7f0000000080)={0x18, 0x0, 0x6}, 0x18)
write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r5=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r5)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0, <r6=>0x0}, &(0x7f0000000580)=0xc)
r7 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r8=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r8)
r9 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r10=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r10)
r11 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x7)
lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, <r12=>0x0})
mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2000, &(0x7f0000000600)=ANY=[@ANYBLOB="7472616e733d7463702c706f72743d3078303030303030303030303030346532312c6163636573733d757365722c616e616d653d6e732f6d6e74002c6d61736b3d5e4d415941415001c8000000000000003d", @ANYRESDEC=r12, @ANYBLOB=',measure,smackfshat=TIPCv2\x00,\x00'])
r13 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x811, r13, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r13, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@loopback, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r14=>0x0}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xff2d)
setreuid(r14, r12)
stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, <r15=>0x0})
mount$fuse(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x40000, &(0x7f0000000800)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYRESDEC=r6, @ANYBLOB=',default_permissions,uid>', @ANYRESDEC=r8, @ANYBLOB=',fow%er<', @ANYRESDEC=r10, @ANYBLOB=',obj_type=keyring\x00,fscontext=root,rootcontext=unconfined_u,obj_role=security,uid=', @ANYRESDEC=r15, @ANYBLOB="2c7375626a5f757365723d74727573746564656d304000000000000000747275737465646b657972696e67637075736574d6379d9e4501302cf62a174b1073676a6499183a6a41735b802416248fce940f0a1c1d242c6673636f6e746578743d756e636f6e66696e65645f752c00"])
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='tran\x00\x00\x00\x00\x00\x00\x00\x00no=', @ANYRESHEX=r1, @ANYBLOB="2c7766646e9063ae6f3d684b22d93e8bf0a50500350000000000005e1a62fc6e1305f19d04b736e24adeda822a", @ANYRESHEX=r2, @ANYBLOB=',\x00'])
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={<r16=>0xffffffffffffffff})
dup2(r16, r16)
ioctl$EXT4_IOC_MOVE_EXT(r16, 0xc028660f, &(0x7f0000000300)={0x0, r2, 0x3ff, 0x10000, 0x4, 0x1})
r17 = mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5})
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedreceive(r17, &(0x7f0000000380)=""/204, 0x2b3, 0x0, 0x0)
umount2(&(0x7f0000000340)='./file0\x00', 0x3)
lseek(r0, 0x0, 0x0)
r18 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0)
lseek(r18, 0x0, 0x0)
socket$inet(0x2, 0x4, 0x0)

19:16:34 executing program 0:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/null\x00', 0x40000, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x7a, &(0x7f0000000700)=ANY=[@ANYBLOB="000800b867f2ad8bb8368900910000008100000086dd600200b69800"/64], 0x0)
keyctl$set_reqkey_keyring(0x5, 0xfffffffffffffffe)
add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
request_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='$.\x00', 0x0)
pipe2$9p(&(0x7f0000000240)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff}, 0x0)
write$P9_RVERSION(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f9870000c6504df67f00000000000000e98b4b153dffff082dbb78abd55fba3da80b856445ab1006487179e001b66c90c0473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd8824692f08ff8675bdf17ea1c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a671164679079d00"/148], 0x15)
r3 = dup(r2)
write$FUSE_BMAP(r3, &(0x7f0000000080)={0x18, 0x0, 0x6}, 0x18)
write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r5=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r5)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0, <r6=>0x0}, &(0x7f0000000580)=0xc)
r7 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r8=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r8)
r9 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r10=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r10)
r11 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x7)
lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, <r12=>0x0})
mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2000, &(0x7f0000000600)=ANY=[@ANYBLOB="7472616e733d7463702c706f72743d3078303030303030303030303030346532312c6163636573733d757365722c616e616d653d6e732f6d6e74002c6d61736b3d5e4d415941415001c8000000000000003d", @ANYRESDEC=r12, @ANYBLOB=',measure,smackfshat=TIPCv2\x00,\x00'])
r13 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x811, r13, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r13, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@loopback, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r14=>0x0}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xff2d)
setreuid(r14, r12)
stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, <r15=>0x0})
mount$fuse(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x40000, &(0x7f0000000800)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYRESDEC=r6, @ANYBLOB=',default_permissions,uid>', @ANYRESDEC=r8, @ANYBLOB=',fow%er<', @ANYRESDEC=r10, @ANYBLOB=',obj_type=keyring\x00,fscontext=root,rootcontext=unconfined_u,obj_role=security,uid=', @ANYRESDEC=r15, @ANYBLOB="2c7375626a5f757365723d74727573746564656d304000000000000000747275737465646b657972696e67637075736574d6379d9e4501302cf62a174b1073676a6499183a6a41735b802416248fce940f0a1c1d242c6673636f6e746578743d756e636f6e66696e65645f752c00"])
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='tran\x00\x00\x00\x00\x00\x00\x00\x00no=', @ANYRESHEX=r1, @ANYBLOB="2c7766646e9063ae6f3d684b22d93e8bf0a50500350000000000005e1a62fc6e1305f19d04b736e24adeda822a", @ANYRESHEX=r2, @ANYBLOB=',\x00'])
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={<r16=>0xffffffffffffffff})
dup2(r16, r16)
ioctl$EXT4_IOC_MOVE_EXT(r16, 0xc028660f, &(0x7f0000000300)={0x0, r2, 0x3ff, 0x10000, 0x4, 0x1})
r17 = mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5})
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedreceive(r17, &(0x7f0000000380)=""/204, 0x2b3, 0x0, 0x0)
umount2(&(0x7f0000000340)='./file0\x00', 0x3)
lseek(r0, 0x0, 0x0)
r18 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0)
lseek(r18, 0x0, 0x0)
socket$inet(0x2, 0x4, 0x0)

19:16:34 executing program 4:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/null\x00', 0x40000, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x7a, &(0x7f0000000700)=ANY=[@ANYBLOB="000800b867f2ad8bb8368900910000008100000086dd600200b69800"/64], 0x0)
keyctl$set_reqkey_keyring(0x5, 0xfffffffffffffffe)
add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
request_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='$.\x00', 0x0)
pipe2$9p(&(0x7f0000000240)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff}, 0x0)
write$P9_RVERSION(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f9870000c6504df67f00000000000000e98b4b153dffff082dbb78abd55fba3da80b856445ab1006487179e001b66c90c0473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd8824692f08ff8675bdf17ea1c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a671164679079d00"/148], 0x15)
r3 = dup(r2)
write$FUSE_BMAP(r3, &(0x7f0000000080)={0x18, 0x0, 0x6}, 0x18)
write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r5=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r5)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0, <r6=>0x0}, &(0x7f0000000580)=0xc)
r7 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r8=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r8)
r9 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r10=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r10)
r11 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x7)
lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, <r12=>0x0})
mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2000, &(0x7f0000000600)=ANY=[@ANYBLOB="7472616e733d7463702c706f72743d3078303030303030303030303030346532312c6163636573733d757365722c616e616d653d6e732f6d6e74002c6d61736b3d5e4d415941415001c8000000000000003d", @ANYRESDEC=r12, @ANYBLOB=',measure,smackfshat=TIPCv2\x00,\x00'])
r13 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x811, r13, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r13, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@loopback, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r14=>0x0}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xff2d)
setreuid(r14, r12)
stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, <r15=>0x0})
mount$fuse(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x40000, &(0x7f0000000800)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYRESDEC=r6, @ANYBLOB=',default_permissions,uid>', @ANYRESDEC=r8, @ANYBLOB=',fow%er<', @ANYRESDEC=r10, @ANYBLOB=',obj_type=keyring\x00,fscontext=root,rootcontext=unconfined_u,obj_role=security,uid=', @ANYRESDEC=r15, @ANYBLOB="2c7375626a5f757365723d74727573746564656d304000000000000000747275737465646b657972696e67637075736574d6379d9e4501302cf62a174b1073676a6499183a6a41735b802416248fce940f0a1c1d242c6673636f6e746578743d756e636f6e66696e65645f752c00"])
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='tran\x00\x00\x00\x00\x00\x00\x00\x00no=', @ANYRESHEX=r1, @ANYBLOB="2c7766646e9063ae6f3d684b22d93e8bf0a50500350000000000005e1a62fc6e1305f19d04b736e24adeda822a", @ANYRESHEX=r2, @ANYBLOB=',\x00'])
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={<r16=>0xffffffffffffffff})
dup2(r16, r16)
ioctl$EXT4_IOC_MOVE_EXT(r16, 0xc028660f, &(0x7f0000000300)={0x0, r2, 0x3ff, 0x10000, 0x4, 0x1})
r17 = mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5})
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedreceive(r17, &(0x7f0000000380)=""/204, 0x2b3, 0x0, 0x0)
umount2(&(0x7f0000000340)='./file0\x00', 0x3)
lseek(r0, 0x0, 0x0)
r18 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0)
lseek(r18, 0x0, 0x0)
socket$inet(0x2, 0x4, 0x0)

19:16:34 executing program 5:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/null\x00', 0x40000, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x7a, &(0x7f0000000700)=ANY=[@ANYBLOB="000800b867f2ad8bb8368900910000008100000086dd600200b69800"/64], 0x0)
keyctl$set_reqkey_keyring(0x5, 0xfffffffffffffffe)
add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
request_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='$.\x00', 0x0)
pipe2$9p(&(0x7f0000000240)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff}, 0x0)
write$P9_RVERSION(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f9870000c6504df67f00000000000000e98b4b153dffff082dbb78abd55fba3da80b856445ab1006487179e001b66c90c0473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd8824692f08ff8675bdf17ea1c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a671164679079d00"/148], 0x15)
r3 = dup(r2)
write$FUSE_BMAP(r3, &(0x7f0000000080)={0x18, 0x0, 0x6}, 0x18)
write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r5=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r5)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0, <r6=>0x0}, &(0x7f0000000580)=0xc)
r7 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r8=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r8)
r9 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r10=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r10)
r11 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x7)
lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, <r12=>0x0})
mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2000, &(0x7f0000000600)=ANY=[@ANYBLOB="7472616e733d7463702c706f72743d3078303030303030303030303030346532312c6163636573733d757365722c616e616d653d6e732f6d6e74002c6d61736b3d5e4d415941415001c8000000000000003d", @ANYRESDEC=r12, @ANYBLOB=',measure,smackfshat=TIPCv2\x00,\x00'])
r13 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x811, r13, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r13, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@loopback, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r14=>0x0}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xff2d)
setreuid(r14, r12)
stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, <r15=>0x0})
mount$fuse(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x40000, &(0x7f0000000800)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYRESDEC=r6, @ANYBLOB=',default_permissions,uid>', @ANYRESDEC=r8, @ANYBLOB=',fow%er<', @ANYRESDEC=r10, @ANYBLOB=',obj_type=keyring\x00,fscontext=root,rootcontext=unconfined_u,obj_role=security,uid=', @ANYRESDEC=r15, @ANYBLOB="2c7375626a5f757365723d74727573746564656d304000000000000000747275737465646b657972696e67637075736574d6379d9e4501302cf62a174b1073676a6499183a6a41735b802416248fce940f0a1c1d242c6673636f6e746578743d756e636f6e66696e65645f752c00"])
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='tran\x00\x00\x00\x00\x00\x00\x00\x00no=', @ANYRESHEX=r1, @ANYBLOB="2c7766646e9063ae6f3d684b22d93e8bf0a50500350000000000005e1a62fc6e1305f19d04b736e24adeda822a", @ANYRESHEX=r2, @ANYBLOB=',\x00'])
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={<r16=>0xffffffffffffffff})
dup2(r16, r16)
ioctl$EXT4_IOC_MOVE_EXT(r16, 0xc028660f, &(0x7f0000000300)={0x0, r2, 0x3ff, 0x10000, 0x4, 0x1})
r17 = mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5})
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedreceive(r17, &(0x7f0000000380)=""/204, 0x2b3, 0x0, 0x0)
umount2(&(0x7f0000000340)='./file0\x00', 0x3)
lseek(r0, 0x0, 0x0)
r18 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0)
lseek(r18, 0x0, 0x0)
socket$inet(0x2, 0x4, 0x0)

19:16:34 executing program 1:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/null\x00', 0x40000, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x7a, &(0x7f0000000700)=ANY=[@ANYBLOB="000800b867f2ad8bb8368900910000008100000086dd600200b69800"/64], 0x0)
keyctl$set_reqkey_keyring(0x5, 0xfffffffffffffffe)
add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
request_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='$.\x00', 0x0)
pipe2$9p(&(0x7f0000000240)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff}, 0x0)
write$P9_RVERSION(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f9870000c6504df67f00000000000000e98b4b153dffff082dbb78abd55fba3da80b856445ab1006487179e001b66c90c0473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd8824692f08ff8675bdf17ea1c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a671164679079d00"/148], 0x15)
r3 = dup(r2)
write$FUSE_BMAP(r3, &(0x7f0000000080)={0x18, 0x0, 0x6}, 0x18)
write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r5=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r5)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0, <r6=>0x0}, &(0x7f0000000580)=0xc)
r7 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r8=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r8)
r9 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r10=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r10)
r11 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x7)
lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, <r12=>0x0})
mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2000, &(0x7f0000000600)=ANY=[@ANYBLOB="7472616e733d7463702c706f72743d3078303030303030303030303030346532312c6163636573733d757365722c616e616d653d6e732f6d6e74002c6d61736b3d5e4d415941415001c8000000000000003d", @ANYRESDEC=r12, @ANYBLOB=',measure,smackfshat=TIPCv2\x00,\x00'])
r13 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x811, r13, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r13, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@loopback, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r14=>0x0}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xff2d)
setreuid(r14, r12)
stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, <r15=>0x0})
mount$fuse(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x40000, &(0x7f0000000800)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYRESDEC=r6, @ANYBLOB=',default_permissions,uid>', @ANYRESDEC=r8, @ANYBLOB=',fow%er<', @ANYRESDEC=r10, @ANYBLOB=',obj_type=keyring\x00,fscontext=root,rootcontext=unconfined_u,obj_role=security,uid=', @ANYRESDEC=r15, @ANYBLOB="2c7375626a5f757365723d74727573746564656d304000000000000000747275737465646b657972696e67637075736574d6379d9e4501302cf62a174b1073676a6499183a6a41735b802416248fce940f0a1c1d242c6673636f6e746578743d756e636f6e66696e65645f752c00"])
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='tran\x00\x00\x00\x00\x00\x00\x00\x00no=', @ANYRESHEX=r1, @ANYBLOB="2c7766646e9063ae6f3d684b22d93e8bf0a50500350000000000005e1a62fc6e1305f19d04b736e24adeda822a", @ANYRESHEX=r2, @ANYBLOB=',\x00'])
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={<r16=>0xffffffffffffffff})
dup2(r16, r16)
ioctl$EXT4_IOC_MOVE_EXT(r16, 0xc028660f, &(0x7f0000000300)={0x0, r2, 0x3ff, 0x10000, 0x4, 0x1})
r17 = mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5})
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedreceive(r17, &(0x7f0000000380)=""/204, 0x2b3, 0x0, 0x0)
umount2(&(0x7f0000000340)='./file0\x00', 0x3)
lseek(r0, 0x0, 0x0)
r18 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0)
lseek(r18, 0x0, 0x0)
socket$inet(0x2, 0x4, 0x0)

19:16:34 executing program 3:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/null\x00', 0x40000, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x7a, &(0x7f0000000700)=ANY=[@ANYBLOB="000800b867f2ad8bb8368900910000008100000086dd600200b69800"/64], 0x0)
keyctl$set_reqkey_keyring(0x5, 0xfffffffffffffffe)
add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
request_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='$.\x00', 0x0)
pipe2$9p(&(0x7f0000000240)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff}, 0x0)
write$P9_RVERSION(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f9870000c6504df67f00000000000000e98b4b153dffff082dbb78abd55fba3da80b856445ab1006487179e001b66c90c0473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd8824692f08ff8675bdf17ea1c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a671164679079d00"/148], 0x15)
r3 = dup(r2)
write$FUSE_BMAP(r3, &(0x7f0000000080)={0x18, 0x0, 0x6}, 0x18)
write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r5=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r5)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0, <r6=>0x0}, &(0x7f0000000580)=0xc)
r7 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r8=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r8)
r9 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r10=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r10)
r11 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x7)
lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, <r12=>0x0})
mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2000, &(0x7f0000000600)=ANY=[@ANYBLOB="7472616e733d7463702c706f72743d3078303030303030303030303030346532312c6163636573733d757365722c616e616d653d6e732f6d6e74002c6d61736b3d5e4d415941415001c8000000000000003d", @ANYRESDEC=r12, @ANYBLOB=',measure,smackfshat=TIPCv2\x00,\x00'])
r13 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x811, r13, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r13, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@loopback, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r14=>0x0}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xff2d)
setreuid(r14, r12)
stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, <r15=>0x0})
mount$fuse(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x40000, &(0x7f0000000800)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYRESDEC=r6, @ANYBLOB=',default_permissions,uid>', @ANYRESDEC=r8, @ANYBLOB=',fow%er<', @ANYRESDEC=r10, @ANYBLOB=',obj_type=keyring\x00,fscontext=root,rootcontext=unconfined_u,obj_role=security,uid=', @ANYRESDEC=r15, @ANYBLOB="2c7375626a5f757365723d74727573746564656d304000000000000000747275737465646b657972696e67637075736574d6379d9e4501302cf62a174b1073676a6499183a6a41735b802416248fce940f0a1c1d242c6673636f6e746578743d756e636f6e66696e65645f752c00"])
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='tran\x00\x00\x00\x00\x00\x00\x00\x00no=', @ANYRESHEX=r1, @ANYBLOB="2c7766646e9063ae6f3d684b22d93e8bf0a50500350000000000005e1a62fc6e1305f19d04b736e24adeda822a", @ANYRESHEX=r2, @ANYBLOB=',\x00'])
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={<r16=>0xffffffffffffffff})
dup2(r16, r16)
ioctl$EXT4_IOC_MOVE_EXT(r16, 0xc028660f, &(0x7f0000000300)={0x0, r2, 0x3ff, 0x10000, 0x4, 0x1})
r17 = mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5})
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedreceive(r17, &(0x7f0000000380)=""/204, 0x2b3, 0x0, 0x0)
umount2(&(0x7f0000000340)='./file0\x00', 0x3)
lseek(r0, 0x0, 0x0)
r18 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0)
lseek(r18, 0x0, 0x0)
socket$inet(0x2, 0x4, 0x0)

19:16:34 executing program 2:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/null\x00', 0x40000, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x7a, &(0x7f0000000700)=ANY=[@ANYBLOB="000800b867f2ad8bb8368900910000008100000086dd600200b69800"/64], 0x0)
keyctl$set_reqkey_keyring(0x5, 0xfffffffffffffffe)
add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
request_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='$.\x00', 0x0)
pipe2$9p(&(0x7f0000000240)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff}, 0x0)
write$P9_RVERSION(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f9870000c6504df67f00000000000000e98b4b153dffff082dbb78abd55fba3da80b856445ab1006487179e001b66c90c0473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd8824692f08ff8675bdf17ea1c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a671164679079d00"/148], 0x15)
r3 = dup(r2)
write$FUSE_BMAP(r3, &(0x7f0000000080)={0x18, 0x0, 0x6}, 0x18)
write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r5=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r5)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0, <r6=>0x0}, &(0x7f0000000580)=0xc)
r7 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r8=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r8)
r9 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r10=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r10)
r11 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x7)
lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, <r12=>0x0})
mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2000, &(0x7f0000000600)=ANY=[@ANYBLOB="7472616e733d7463702c706f72743d3078303030303030303030303030346532312c6163636573733d757365722c616e616d653d6e732f6d6e74002c6d61736b3d5e4d415941415001c8000000000000003d", @ANYRESDEC=r12, @ANYBLOB=',measure,smackfshat=TIPCv2\x00,\x00'])
r13 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x811, r13, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r13, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@loopback, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r14=>0x0}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xff2d)
setreuid(r14, r12)
stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, <r15=>0x0})
mount$fuse(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x40000, &(0x7f0000000800)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYRESDEC=r6, @ANYBLOB=',default_permissions,uid>', @ANYRESDEC=r8, @ANYBLOB=',fow%er<', @ANYRESDEC=r10, @ANYBLOB=',obj_type=keyring\x00,fscontext=root,rootcontext=unconfined_u,obj_role=security,uid=', @ANYRESDEC=r15, @ANYBLOB="2c7375626a5f757365723d74727573746564656d304000000000000000747275737465646b657972696e67637075736574d6379d9e4501302cf62a174b1073676a6499183a6a41735b802416248fce940f0a1c1d242c6673636f6e746578743d756e636f6e66696e65645f752c00"])
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='tran\x00\x00\x00\x00\x00\x00\x00\x00no=', @ANYRESHEX=r1, @ANYBLOB="2c7766646e9063ae6f3d684b22d93e8bf0a50500350000000000005e1a62fc6e1305f19d04b736e24adeda822a", @ANYRESHEX=r2, @ANYBLOB=',\x00'])
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={<r16=>0xffffffffffffffff})
dup2(r16, r16)
ioctl$EXT4_IOC_MOVE_EXT(r16, 0xc028660f, &(0x7f0000000300)={0x0, r2, 0x3ff, 0x10000, 0x4, 0x1})
r17 = mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5})
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedreceive(r17, &(0x7f0000000380)=""/204, 0x2b3, 0x0, 0x0)
umount2(&(0x7f0000000340)='./file0\x00', 0x3)
lseek(r0, 0x0, 0x0)
r18 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0)
lseek(r18, 0x0, 0x0)
socket$inet(0x2, 0x4, 0x0)

19:16:35 executing program 0:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/null\x00', 0x40000, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x7a, &(0x7f0000000700)=ANY=[@ANYBLOB="000800b867f2ad8bb8368900910000008100000086dd600200b69800"/64], 0x0)
keyctl$set_reqkey_keyring(0x5, 0xfffffffffffffffe)
add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
request_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='$.\x00', 0x0)
pipe2$9p(&(0x7f0000000240)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff}, 0x0)
write$P9_RVERSION(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f9870000c6504df67f00000000000000e98b4b153dffff082dbb78abd55fba3da80b856445ab1006487179e001b66c90c0473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd8824692f08ff8675bdf17ea1c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a671164679079d00"/148], 0x15)
r3 = dup(r2)
write$FUSE_BMAP(r3, &(0x7f0000000080)={0x18, 0x0, 0x6}, 0x18)
write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r5=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r5)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0, <r6=>0x0}, &(0x7f0000000580)=0xc)
r7 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r8=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r8)
r9 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r10=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r10)
r11 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x7)
lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, <r12=>0x0})
mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2000, &(0x7f0000000600)=ANY=[@ANYBLOB="7472616e733d7463702c706f72743d3078303030303030303030303030346532312c6163636573733d757365722c616e616d653d6e732f6d6e74002c6d61736b3d5e4d415941415001c8000000000000003d", @ANYRESDEC=r12, @ANYBLOB=',measure,smackfshat=TIPCv2\x00,\x00'])
r13 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x811, r13, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r13, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@loopback, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r14=>0x0}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xff2d)
setreuid(r14, r12)
stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, <r15=>0x0})
mount$fuse(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x40000, &(0x7f0000000800)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYRESDEC=r6, @ANYBLOB=',default_permissions,uid>', @ANYRESDEC=r8, @ANYBLOB=',fow%er<', @ANYRESDEC=r10, @ANYBLOB=',obj_type=keyring\x00,fscontext=root,rootcontext=unconfined_u,obj_role=security,uid=', @ANYRESDEC=r15, @ANYBLOB="2c7375626a5f757365723d74727573746564656d304000000000000000747275737465646b657972696e67637075736574d6379d9e4501302cf62a174b1073676a6499183a6a41735b802416248fce940f0a1c1d242c6673636f6e746578743d756e636f6e66696e65645f752c00"])
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='tran\x00\x00\x00\x00\x00\x00\x00\x00no=', @ANYRESHEX=r1, @ANYBLOB="2c7766646e9063ae6f3d684b22d93e8bf0a50500350000000000005e1a62fc6e1305f19d04b736e24adeda822a", @ANYRESHEX=r2, @ANYBLOB=',\x00'])
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={<r16=>0xffffffffffffffff})
dup2(r16, r16)
ioctl$EXT4_IOC_MOVE_EXT(r16, 0xc028660f, &(0x7f0000000300)={0x0, r2, 0x3ff, 0x10000, 0x4, 0x1})
r17 = mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5})
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedreceive(r17, &(0x7f0000000380)=""/204, 0x2b3, 0x0, 0x0)
umount2(&(0x7f0000000340)='./file0\x00', 0x3)
lseek(r0, 0x0, 0x0)
r18 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0)
lseek(r18, 0x0, 0x0)
socket$inet(0x2, 0x4, 0x0)

19:16:35 executing program 4:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/null\x00', 0x40000, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x7a, &(0x7f0000000700)=ANY=[@ANYBLOB="000800b867f2ad8bb8368900910000008100000086dd600200b69800"/64], 0x0)
keyctl$set_reqkey_keyring(0x5, 0xfffffffffffffffe)
add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
request_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='$.\x00', 0x0)
pipe2$9p(&(0x7f0000000240)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff}, 0x0)
write$P9_RVERSION(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f9870000c6504df67f00000000000000e98b4b153dffff082dbb78abd55fba3da80b856445ab1006487179e001b66c90c0473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd8824692f08ff8675bdf17ea1c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a671164679079d00"/148], 0x15)
r3 = dup(r2)
write$FUSE_BMAP(r3, &(0x7f0000000080)={0x18, 0x0, 0x6}, 0x18)
write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r5=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r5)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0, <r6=>0x0}, &(0x7f0000000580)=0xc)
r7 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r8=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r8)
r9 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r10=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r10)
r11 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x7)
lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, <r12=>0x0})
mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2000, &(0x7f0000000600)=ANY=[@ANYBLOB="7472616e733d7463702c706f72743d3078303030303030303030303030346532312c6163636573733d757365722c616e616d653d6e732f6d6e74002c6d61736b3d5e4d415941415001c8000000000000003d", @ANYRESDEC=r12, @ANYBLOB=',measure,smackfshat=TIPCv2\x00,\x00'])
r13 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x811, r13, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r13, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@loopback, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r14=>0x0}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xff2d)
setreuid(r14, r12)
stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, <r15=>0x0})
mount$fuse(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x40000, &(0x7f0000000800)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYRESDEC=r6, @ANYBLOB=',default_permissions,uid>', @ANYRESDEC=r8, @ANYBLOB=',fow%er<', @ANYRESDEC=r10, @ANYBLOB=',obj_type=keyring\x00,fscontext=root,rootcontext=unconfined_u,obj_role=security,uid=', @ANYRESDEC=r15, @ANYBLOB="2c7375626a5f757365723d74727573746564656d304000000000000000747275737465646b657972696e67637075736574d6379d9e4501302cf62a174b1073676a6499183a6a41735b802416248fce940f0a1c1d242c6673636f6e746578743d756e636f6e66696e65645f752c00"])
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='tran\x00\x00\x00\x00\x00\x00\x00\x00no=', @ANYRESHEX=r1, @ANYBLOB="2c7766646e9063ae6f3d684b22d93e8bf0a50500350000000000005e1a62fc6e1305f19d04b736e24adeda822a", @ANYRESHEX=r2, @ANYBLOB=',\x00'])
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={<r16=>0xffffffffffffffff})
dup2(r16, r16)
ioctl$EXT4_IOC_MOVE_EXT(r16, 0xc028660f, &(0x7f0000000300)={0x0, r2, 0x3ff, 0x10000, 0x4, 0x1})
r17 = mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5})
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedreceive(r17, &(0x7f0000000380)=""/204, 0x2b3, 0x0, 0x0)
umount2(&(0x7f0000000340)='./file0\x00', 0x3)
lseek(r0, 0x0, 0x0)
r18 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0)
lseek(r18, 0x0, 0x0)
socket$inet(0x2, 0x4, 0x0)

19:16:35 executing program 5:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/null\x00', 0x40000, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x7a, &(0x7f0000000700)=ANY=[@ANYBLOB="000800b867f2ad8bb8368900910000008100000086dd600200b69800"/64], 0x0)
keyctl$set_reqkey_keyring(0x5, 0xfffffffffffffffe)
add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
request_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='$.\x00', 0x0)
pipe2$9p(&(0x7f0000000240)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff}, 0x0)
write$P9_RVERSION(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f9870000c6504df67f00000000000000e98b4b153dffff082dbb78abd55fba3da80b856445ab1006487179e001b66c90c0473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd8824692f08ff8675bdf17ea1c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a671164679079d00"/148], 0x15)
r3 = dup(r2)
write$FUSE_BMAP(r3, &(0x7f0000000080)={0x18, 0x0, 0x6}, 0x18)
write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r5=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r5)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0, <r6=>0x0}, &(0x7f0000000580)=0xc)
r7 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r8=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r8)
r9 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r10=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r10)
r11 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x7)
lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, <r12=>0x0})
mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2000, &(0x7f0000000600)=ANY=[@ANYBLOB="7472616e733d7463702c706f72743d3078303030303030303030303030346532312c6163636573733d757365722c616e616d653d6e732f6d6e74002c6d61736b3d5e4d415941415001c8000000000000003d", @ANYRESDEC=r12, @ANYBLOB=',measure,smackfshat=TIPCv2\x00,\x00'])
r13 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x811, r13, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r13, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@loopback, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r14=>0x0}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xff2d)
setreuid(r14, r12)
stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, <r15=>0x0})
mount$fuse(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x40000, &(0x7f0000000800)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYRESDEC=r6, @ANYBLOB=',default_permissions,uid>', @ANYRESDEC=r8, @ANYBLOB=',fow%er<', @ANYRESDEC=r10, @ANYBLOB=',obj_type=keyring\x00,fscontext=root,rootcontext=unconfined_u,obj_role=security,uid=', @ANYRESDEC=r15, @ANYBLOB="2c7375626a5f757365723d74727573746564656d304000000000000000747275737465646b657972696e67637075736574d6379d9e4501302cf62a174b1073676a6499183a6a41735b802416248fce940f0a1c1d242c6673636f6e746578743d756e636f6e66696e65645f752c00"])
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='tran\x00\x00\x00\x00\x00\x00\x00\x00no=', @ANYRESHEX=r1, @ANYBLOB="2c7766646e9063ae6f3d684b22d93e8bf0a50500350000000000005e1a62fc6e1305f19d04b736e24adeda822a", @ANYRESHEX=r2, @ANYBLOB=',\x00'])
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={<r16=>0xffffffffffffffff})
dup2(r16, r16)
ioctl$EXT4_IOC_MOVE_EXT(r16, 0xc028660f, &(0x7f0000000300)={0x0, r2, 0x3ff, 0x10000, 0x4, 0x1})
r17 = mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5})
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedreceive(r17, &(0x7f0000000380)=""/204, 0x2b3, 0x0, 0x0)
umount2(&(0x7f0000000340)='./file0\x00', 0x3)
lseek(r0, 0x0, 0x0)
r18 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0)
lseek(r18, 0x0, 0x0)
socket$inet(0x2, 0x4, 0x0)

19:16:35 executing program 1:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/null\x00', 0x40000, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x7a, &(0x7f0000000700)=ANY=[@ANYBLOB="000800b867f2ad8bb8368900910000008100000086dd600200b69800"/64], 0x0)
keyctl$set_reqkey_keyring(0x5, 0xfffffffffffffffe)
add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
request_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='$.\x00', 0x0)
pipe2$9p(&(0x7f0000000240)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff}, 0x0)
write$P9_RVERSION(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f9870000c6504df67f00000000000000e98b4b153dffff082dbb78abd55fba3da80b856445ab1006487179e001b66c90c0473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd8824692f08ff8675bdf17ea1c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a671164679079d00"/148], 0x15)
r3 = dup(r2)
write$FUSE_BMAP(r3, &(0x7f0000000080)={0x18, 0x0, 0x6}, 0x18)
write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r5=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r5)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0, <r6=>0x0}, &(0x7f0000000580)=0xc)
r7 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r8=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r8)
r9 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r10=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r10)
r11 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x7)
lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, <r12=>0x0})
mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2000, &(0x7f0000000600)=ANY=[@ANYBLOB="7472616e733d7463702c706f72743d3078303030303030303030303030346532312c6163636573733d757365722c616e616d653d6e732f6d6e74002c6d61736b3d5e4d415941415001c8000000000000003d", @ANYRESDEC=r12, @ANYBLOB=',measure,smackfshat=TIPCv2\x00,\x00'])
r13 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x811, r13, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r13, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@loopback, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r14=>0x0}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xff2d)
setreuid(r14, r12)
stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, <r15=>0x0})
mount$fuse(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x40000, &(0x7f0000000800)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYRESDEC=r6, @ANYBLOB=',default_permissions,uid>', @ANYRESDEC=r8, @ANYBLOB=',fow%er<', @ANYRESDEC=r10, @ANYBLOB=',obj_type=keyring\x00,fscontext=root,rootcontext=unconfined_u,obj_role=security,uid=', @ANYRESDEC=r15, @ANYBLOB="2c7375626a5f757365723d74727573746564656d304000000000000000747275737465646b657972696e67637075736574d6379d9e4501302cf62a174b1073676a6499183a6a41735b802416248fce940f0a1c1d242c6673636f6e746578743d756e636f6e66696e65645f752c00"])
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='tran\x00\x00\x00\x00\x00\x00\x00\x00no=', @ANYRESHEX=r1, @ANYBLOB="2c7766646e9063ae6f3d684b22d93e8bf0a50500350000000000005e1a62fc6e1305f19d04b736e24adeda822a", @ANYRESHEX=r2, @ANYBLOB=',\x00'])
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={<r16=>0xffffffffffffffff})
dup2(r16, r16)
ioctl$EXT4_IOC_MOVE_EXT(r16, 0xc028660f, &(0x7f0000000300)={0x0, r2, 0x3ff, 0x10000, 0x4, 0x1})
r17 = mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5})
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedreceive(r17, &(0x7f0000000380)=""/204, 0x2b3, 0x0, 0x0)
umount2(&(0x7f0000000340)='./file0\x00', 0x3)
lseek(r0, 0x0, 0x0)
r18 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0)
lseek(r18, 0x0, 0x0)
socket$inet(0x2, 0x4, 0x0)

19:16:35 executing program 3:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/null\x00', 0x40000, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x7a, &(0x7f0000000700)=ANY=[@ANYBLOB="000800b867f2ad8bb8368900910000008100000086dd600200b69800"/64], 0x0)
keyctl$set_reqkey_keyring(0x5, 0xfffffffffffffffe)
add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
request_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='$.\x00', 0x0)
pipe2$9p(&(0x7f0000000240)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff}, 0x0)
write$P9_RVERSION(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f9870000c6504df67f00000000000000e98b4b153dffff082dbb78abd55fba3da80b856445ab1006487179e001b66c90c0473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd8824692f08ff8675bdf17ea1c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a671164679079d00"/148], 0x15)
r3 = dup(r2)
write$FUSE_BMAP(r3, &(0x7f0000000080)={0x18, 0x0, 0x6}, 0x18)
write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r5=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r5)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0, <r6=>0x0}, &(0x7f0000000580)=0xc)
r7 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r8=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r8)
r9 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r10=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r10)
r11 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x7)
lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, <r12=>0x0})
mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2000, &(0x7f0000000600)=ANY=[@ANYBLOB="7472616e733d7463702c706f72743d3078303030303030303030303030346532312c6163636573733d757365722c616e616d653d6e732f6d6e74002c6d61736b3d5e4d415941415001c8000000000000003d", @ANYRESDEC=r12, @ANYBLOB=',measure,smackfshat=TIPCv2\x00,\x00'])
r13 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x811, r13, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r13, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@loopback, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r14=>0x0}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xff2d)
setreuid(r14, r12)
stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, <r15=>0x0})
mount$fuse(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x40000, &(0x7f0000000800)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYRESDEC=r6, @ANYBLOB=',default_permissions,uid>', @ANYRESDEC=r8, @ANYBLOB=',fow%er<', @ANYRESDEC=r10, @ANYBLOB=',obj_type=keyring\x00,fscontext=root,rootcontext=unconfined_u,obj_role=security,uid=', @ANYRESDEC=r15, @ANYBLOB="2c7375626a5f757365723d74727573746564656d304000000000000000747275737465646b657972696e67637075736574d6379d9e4501302cf62a174b1073676a6499183a6a41735b802416248fce940f0a1c1d242c6673636f6e746578743d756e636f6e66696e65645f752c00"])
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='tran\x00\x00\x00\x00\x00\x00\x00\x00no=', @ANYRESHEX=r1, @ANYBLOB="2c7766646e9063ae6f3d684b22d93e8bf0a50500350000000000005e1a62fc6e1305f19d04b736e24adeda822a", @ANYRESHEX=r2, @ANYBLOB=',\x00'])
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={<r16=>0xffffffffffffffff})
dup2(r16, r16)
ioctl$EXT4_IOC_MOVE_EXT(r16, 0xc028660f, &(0x7f0000000300)={0x0, r2, 0x3ff, 0x10000, 0x4, 0x1})
r17 = mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5})
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedreceive(r17, &(0x7f0000000380)=""/204, 0x2b3, 0x0, 0x0)
umount2(&(0x7f0000000340)='./file0\x00', 0x3)
lseek(r0, 0x0, 0x0)
r18 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0)
lseek(r18, 0x0, 0x0)
socket$inet(0x2, 0x4, 0x0)

19:16:35 executing program 2:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/null\x00', 0x40000, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x7a, &(0x7f0000000700)=ANY=[@ANYBLOB="000800b867f2ad8bb8368900910000008100000086dd600200b69800"/64], 0x0)
keyctl$set_reqkey_keyring(0x5, 0xfffffffffffffffe)
add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
request_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='$.\x00', 0x0)
pipe2$9p(&(0x7f0000000240)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff}, 0x0)
write$P9_RVERSION(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f9870000c6504df67f00000000000000e98b4b153dffff082dbb78abd55fba3da80b856445ab1006487179e001b66c90c0473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd8824692f08ff8675bdf17ea1c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a671164679079d00"/148], 0x15)
r3 = dup(r2)
write$FUSE_BMAP(r3, &(0x7f0000000080)={0x18, 0x0, 0x6}, 0x18)
write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r5=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r5)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0, <r6=>0x0}, &(0x7f0000000580)=0xc)
r7 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r8=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r8)
r9 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r10=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r10)
r11 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x7)
lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, <r12=>0x0})
mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2000, &(0x7f0000000600)=ANY=[@ANYBLOB="7472616e733d7463702c706f72743d3078303030303030303030303030346532312c6163636573733d757365722c616e616d653d6e732f6d6e74002c6d61736b3d5e4d415941415001c8000000000000003d", @ANYRESDEC=r12, @ANYBLOB=',measure,smackfshat=TIPCv2\x00,\x00'])
r13 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x811, r13, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r13, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@loopback, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r14=>0x0}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xff2d)
setreuid(r14, r12)
stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, <r15=>0x0})
mount$fuse(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x40000, &(0x7f0000000800)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYRESDEC=r6, @ANYBLOB=',default_permissions,uid>', @ANYRESDEC=r8, @ANYBLOB=',fow%er<', @ANYRESDEC=r10, @ANYBLOB=',obj_type=keyring\x00,fscontext=root,rootcontext=unconfined_u,obj_role=security,uid=', @ANYRESDEC=r15, @ANYBLOB="2c7375626a5f757365723d74727573746564656d304000000000000000747275737465646b657972696e67637075736574d6379d9e4501302cf62a174b1073676a6499183a6a41735b802416248fce940f0a1c1d242c6673636f6e746578743d756e636f6e66696e65645f752c00"])
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='tran\x00\x00\x00\x00\x00\x00\x00\x00no=', @ANYRESHEX=r1, @ANYBLOB="2c7766646e9063ae6f3d684b22d93e8bf0a50500350000000000005e1a62fc6e1305f19d04b736e24adeda822a", @ANYRESHEX=r2, @ANYBLOB=',\x00'])
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={<r16=>0xffffffffffffffff})
dup2(r16, r16)
ioctl$EXT4_IOC_MOVE_EXT(r16, 0xc028660f, &(0x7f0000000300)={0x0, r2, 0x3ff, 0x10000, 0x4, 0x1})
r17 = mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5})
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedreceive(r17, &(0x7f0000000380)=""/204, 0x2b3, 0x0, 0x0)
umount2(&(0x7f0000000340)='./file0\x00', 0x3)
lseek(r0, 0x0, 0x0)
r18 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0)
lseek(r18, 0x0, 0x0)
socket$inet(0x2, 0x4, 0x0)

19:16:35 executing program 5:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/null\x00', 0x40000, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x7a, &(0x7f0000000700)=ANY=[@ANYBLOB="000800b867f2ad8bb8368900910000008100000086dd600200b69800"/64], 0x0)
keyctl$set_reqkey_keyring(0x5, 0xfffffffffffffffe)
add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
request_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='$.\x00', 0x0)
pipe2$9p(&(0x7f0000000240)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff}, 0x0)
write$P9_RVERSION(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f9870000c6504df67f00000000000000e98b4b153dffff082dbb78abd55fba3da80b856445ab1006487179e001b66c90c0473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd8824692f08ff8675bdf17ea1c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a671164679079d00"/148], 0x15)
r3 = dup(r2)
write$FUSE_BMAP(r3, &(0x7f0000000080)={0x18, 0x0, 0x6}, 0x18)
write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r5=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r5)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0, <r6=>0x0}, &(0x7f0000000580)=0xc)
r7 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r8=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r8)
r9 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r10=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r10)
r11 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x7)
lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, <r12=>0x0})
mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2000, &(0x7f0000000600)=ANY=[@ANYBLOB="7472616e733d7463702c706f72743d3078303030303030303030303030346532312c6163636573733d757365722c616e616d653d6e732f6d6e74002c6d61736b3d5e4d415941415001c8000000000000003d", @ANYRESDEC=r12, @ANYBLOB=',measure,smackfshat=TIPCv2\x00,\x00'])
r13 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x811, r13, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r13, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@loopback, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r14=>0x0}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xff2d)
setreuid(r14, r12)
stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, <r15=>0x0})
mount$fuse(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x40000, &(0x7f0000000800)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYRESDEC=r6, @ANYBLOB=',default_permissions,uid>', @ANYRESDEC=r8, @ANYBLOB=',fow%er<', @ANYRESDEC=r10, @ANYBLOB=',obj_type=keyring\x00,fscontext=root,rootcontext=unconfined_u,obj_role=security,uid=', @ANYRESDEC=r15, @ANYBLOB="2c7375626a5f757365723d74727573746564656d304000000000000000747275737465646b657972696e67637075736574d6379d9e4501302cf62a174b1073676a6499183a6a41735b802416248fce940f0a1c1d242c6673636f6e746578743d756e636f6e66696e65645f752c00"])
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='tran\x00\x00\x00\x00\x00\x00\x00\x00no=', @ANYRESHEX=r1, @ANYBLOB="2c7766646e9063ae6f3d684b22d93e8bf0a50500350000000000005e1a62fc6e1305f19d04b736e24adeda822a", @ANYRESHEX=r2, @ANYBLOB=',\x00'])
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={<r16=>0xffffffffffffffff})
dup2(r16, r16)
ioctl$EXT4_IOC_MOVE_EXT(r16, 0xc028660f, &(0x7f0000000300)={0x0, r2, 0x3ff, 0x10000, 0x4, 0x1})
r17 = mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5})
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedreceive(r17, &(0x7f0000000380)=""/204, 0x2b3, 0x0, 0x0)
umount2(&(0x7f0000000340)='./file0\x00', 0x3)
lseek(r0, 0x0, 0x0)
r18 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0)
lseek(r18, 0x0, 0x0)
socket$inet(0x2, 0x4, 0x0)

19:16:35 executing program 4:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/null\x00', 0x40000, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x7a, &(0x7f0000000700)=ANY=[@ANYBLOB="000800b867f2ad8bb8368900910000008100000086dd600200b69800"/64], 0x0)
keyctl$set_reqkey_keyring(0x5, 0xfffffffffffffffe)
add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
request_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='$.\x00', 0x0)
pipe2$9p(&(0x7f0000000240)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff}, 0x0)
write$P9_RVERSION(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f9870000c6504df67f00000000000000e98b4b153dffff082dbb78abd55fba3da80b856445ab1006487179e001b66c90c0473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd8824692f08ff8675bdf17ea1c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a671164679079d00"/148], 0x15)
r3 = dup(r2)
write$FUSE_BMAP(r3, &(0x7f0000000080)={0x18, 0x0, 0x6}, 0x18)
write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r5=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r5)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0, <r6=>0x0}, &(0x7f0000000580)=0xc)
r7 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r8=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r8)
r9 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r10=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r10)
r11 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x7)
lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, <r12=>0x0})
mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2000, &(0x7f0000000600)=ANY=[@ANYBLOB="7472616e733d7463702c706f72743d3078303030303030303030303030346532312c6163636573733d757365722c616e616d653d6e732f6d6e74002c6d61736b3d5e4d415941415001c8000000000000003d", @ANYRESDEC=r12, @ANYBLOB=',measure,smackfshat=TIPCv2\x00,\x00'])
r13 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x811, r13, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r13, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@loopback, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r14=>0x0}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xff2d)
setreuid(r14, r12)
stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, <r15=>0x0})
mount$fuse(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x40000, &(0x7f0000000800)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYRESDEC=r6, @ANYBLOB=',default_permissions,uid>', @ANYRESDEC=r8, @ANYBLOB=',fow%er<', @ANYRESDEC=r10, @ANYBLOB=',obj_type=keyring\x00,fscontext=root,rootcontext=unconfined_u,obj_role=security,uid=', @ANYRESDEC=r15, @ANYBLOB="2c7375626a5f757365723d74727573746564656d304000000000000000747275737465646b657972696e67637075736574d6379d9e4501302cf62a174b1073676a6499183a6a41735b802416248fce940f0a1c1d242c6673636f6e746578743d756e636f6e66696e65645f752c00"])
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='tran\x00\x00\x00\x00\x00\x00\x00\x00no=', @ANYRESHEX=r1, @ANYBLOB="2c7766646e9063ae6f3d684b22d93e8bf0a50500350000000000005e1a62fc6e1305f19d04b736e24adeda822a", @ANYRESHEX=r2, @ANYBLOB=',\x00'])
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={<r16=>0xffffffffffffffff})
dup2(r16, r16)
ioctl$EXT4_IOC_MOVE_EXT(r16, 0xc028660f, &(0x7f0000000300)={0x0, r2, 0x3ff, 0x10000, 0x4, 0x1})
r17 = mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5})
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedreceive(r17, &(0x7f0000000380)=""/204, 0x2b3, 0x0, 0x0)
umount2(&(0x7f0000000340)='./file0\x00', 0x3)
lseek(r0, 0x0, 0x0)
r18 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0)
lseek(r18, 0x0, 0x0)
socket$inet(0x2, 0x4, 0x0)

19:16:35 executing program 0:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/null\x00', 0x40000, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x7a, &(0x7f0000000700)=ANY=[@ANYBLOB="000800b867f2ad8bb8368900910000008100000086dd600200b69800"/64], 0x0)
keyctl$set_reqkey_keyring(0x5, 0xfffffffffffffffe)
add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
request_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='$.\x00', 0x0)
pipe2$9p(&(0x7f0000000240)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff}, 0x0)
write$P9_RVERSION(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f9870000c6504df67f00000000000000e98b4b153dffff082dbb78abd55fba3da80b856445ab1006487179e001b66c90c0473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd8824692f08ff8675bdf17ea1c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a671164679079d00"/148], 0x15)
r3 = dup(r2)
write$FUSE_BMAP(r3, &(0x7f0000000080)={0x18, 0x0, 0x6}, 0x18)
write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r5=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r5)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0, <r6=>0x0}, &(0x7f0000000580)=0xc)
r7 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r8=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r8)
r9 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r10=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r10)
r11 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x7)
lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, <r12=>0x0})
mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2000, &(0x7f0000000600)=ANY=[@ANYBLOB="7472616e733d7463702c706f72743d3078303030303030303030303030346532312c6163636573733d757365722c616e616d653d6e732f6d6e74002c6d61736b3d5e4d415941415001c8000000000000003d", @ANYRESDEC=r12, @ANYBLOB=',measure,smackfshat=TIPCv2\x00,\x00'])
r13 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x811, r13, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r13, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@loopback, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r14=>0x0}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xff2d)
setreuid(r14, r12)
stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, <r15=>0x0})
mount$fuse(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x40000, &(0x7f0000000800)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYRESDEC=r6, @ANYBLOB=',default_permissions,uid>', @ANYRESDEC=r8, @ANYBLOB=',fow%er<', @ANYRESDEC=r10, @ANYBLOB=',obj_type=keyring\x00,fscontext=root,rootcontext=unconfined_u,obj_role=security,uid=', @ANYRESDEC=r15, @ANYBLOB="2c7375626a5f757365723d74727573746564656d304000000000000000747275737465646b657972696e67637075736574d6379d9e4501302cf62a174b1073676a6499183a6a41735b802416248fce940f0a1c1d242c6673636f6e746578743d756e636f6e66696e65645f752c00"])
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='tran\x00\x00\x00\x00\x00\x00\x00\x00no=', @ANYRESHEX=r1, @ANYBLOB="2c7766646e9063ae6f3d684b22d93e8bf0a50500350000000000005e1a62fc6e1305f19d04b736e24adeda822a", @ANYRESHEX=r2, @ANYBLOB=',\x00'])
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={<r16=>0xffffffffffffffff})
dup2(r16, r16)
ioctl$EXT4_IOC_MOVE_EXT(r16, 0xc028660f, &(0x7f0000000300)={0x0, r2, 0x3ff, 0x10000, 0x4, 0x1})
r17 = mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5})
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedreceive(r17, &(0x7f0000000380)=""/204, 0x2b3, 0x0, 0x0)
umount2(&(0x7f0000000340)='./file0\x00', 0x3)
lseek(r0, 0x0, 0x0)
r18 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0)
lseek(r18, 0x0, 0x0)
socket$inet(0x2, 0x4, 0x0)

19:16:35 executing program 3:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/null\x00', 0x40000, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x7a, &(0x7f0000000700)=ANY=[@ANYBLOB="000800b867f2ad8bb8368900910000008100000086dd600200b69800"/64], 0x0)
keyctl$set_reqkey_keyring(0x5, 0xfffffffffffffffe)
add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
request_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='$.\x00', 0x0)
pipe2$9p(&(0x7f0000000240)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff}, 0x0)
write$P9_RVERSION(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f9870000c6504df67f00000000000000e98b4b153dffff082dbb78abd55fba3da80b856445ab1006487179e001b66c90c0473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd8824692f08ff8675bdf17ea1c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a671164679079d00"/148], 0x15)
r3 = dup(r2)
write$FUSE_BMAP(r3, &(0x7f0000000080)={0x18, 0x0, 0x6}, 0x18)
write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r5=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r5)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0, <r6=>0x0}, &(0x7f0000000580)=0xc)
r7 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r8=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r8)
r9 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r10=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r10)
r11 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x7)
lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, <r12=>0x0})
mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2000, &(0x7f0000000600)=ANY=[@ANYBLOB="7472616e733d7463702c706f72743d3078303030303030303030303030346532312c6163636573733d757365722c616e616d653d6e732f6d6e74002c6d61736b3d5e4d415941415001c8000000000000003d", @ANYRESDEC=r12, @ANYBLOB=',measure,smackfshat=TIPCv2\x00,\x00'])
r13 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x811, r13, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r13, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@loopback, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r14=>0x0}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xff2d)
setreuid(r14, r12)
stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, <r15=>0x0})
mount$fuse(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x40000, &(0x7f0000000800)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYRESDEC=r6, @ANYBLOB=',default_permissions,uid>', @ANYRESDEC=r8, @ANYBLOB=',fow%er<', @ANYRESDEC=r10, @ANYBLOB=',obj_type=keyring\x00,fscontext=root,rootcontext=unconfined_u,obj_role=security,uid=', @ANYRESDEC=r15, @ANYBLOB="2c7375626a5f757365723d74727573746564656d304000000000000000747275737465646b657972696e67637075736574d6379d9e4501302cf62a174b1073676a6499183a6a41735b802416248fce940f0a1c1d242c6673636f6e746578743d756e636f6e66696e65645f752c00"])
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='tran\x00\x00\x00\x00\x00\x00\x00\x00no=', @ANYRESHEX=r1, @ANYBLOB="2c7766646e9063ae6f3d684b22d93e8bf0a50500350000000000005e1a62fc6e1305f19d04b736e24adeda822a", @ANYRESHEX=r2, @ANYBLOB=',\x00'])
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={<r16=>0xffffffffffffffff})
dup2(r16, r16)
ioctl$EXT4_IOC_MOVE_EXT(r16, 0xc028660f, &(0x7f0000000300)={0x0, r2, 0x3ff, 0x10000, 0x4, 0x1})
r17 = mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5})
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedreceive(r17, &(0x7f0000000380)=""/204, 0x2b3, 0x0, 0x0)
umount2(&(0x7f0000000340)='./file0\x00', 0x3)
lseek(r0, 0x0, 0x0)
r18 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0)
lseek(r18, 0x0, 0x0)
socket$inet(0x2, 0x4, 0x0)

19:16:35 executing program 1:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/null\x00', 0x40000, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x7a, &(0x7f0000000700)=ANY=[@ANYBLOB="000800b867f2ad8bb8368900910000008100000086dd600200b69800"/64], 0x0)
keyctl$set_reqkey_keyring(0x5, 0xfffffffffffffffe)
add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
request_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='$.\x00', 0x0)
pipe2$9p(&(0x7f0000000240)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff}, 0x0)
write$P9_RVERSION(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f9870000c6504df67f00000000000000e98b4b153dffff082dbb78abd55fba3da80b856445ab1006487179e001b66c90c0473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd8824692f08ff8675bdf17ea1c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a671164679079d00"/148], 0x15)
r3 = dup(r2)
write$FUSE_BMAP(r3, &(0x7f0000000080)={0x18, 0x0, 0x6}, 0x18)
write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r5=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r5)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0, <r6=>0x0}, &(0x7f0000000580)=0xc)
r7 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r8=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r8)
r9 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r10=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r10)
r11 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x7)
lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, <r12=>0x0})
mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2000, &(0x7f0000000600)=ANY=[@ANYBLOB="7472616e733d7463702c706f72743d3078303030303030303030303030346532312c6163636573733d757365722c616e616d653d6e732f6d6e74002c6d61736b3d5e4d415941415001c8000000000000003d", @ANYRESDEC=r12, @ANYBLOB=',measure,smackfshat=TIPCv2\x00,\x00'])
r13 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x811, r13, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r13, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@loopback, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r14=>0x0}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xff2d)
setreuid(r14, r12)
stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, <r15=>0x0})
mount$fuse(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x40000, &(0x7f0000000800)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYRESDEC=r6, @ANYBLOB=',default_permissions,uid>', @ANYRESDEC=r8, @ANYBLOB=',fow%er<', @ANYRESDEC=r10, @ANYBLOB=',obj_type=keyring\x00,fscontext=root,rootcontext=unconfined_u,obj_role=security,uid=', @ANYRESDEC=r15, @ANYBLOB="2c7375626a5f757365723d74727573746564656d304000000000000000747275737465646b657972696e67637075736574d6379d9e4501302cf62a174b1073676a6499183a6a41735b802416248fce940f0a1c1d242c6673636f6e746578743d756e636f6e66696e65645f752c00"])
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='tran\x00\x00\x00\x00\x00\x00\x00\x00no=', @ANYRESHEX=r1, @ANYBLOB="2c7766646e9063ae6f3d684b22d93e8bf0a50500350000000000005e1a62fc6e1305f19d04b736e24adeda822a", @ANYRESHEX=r2, @ANYBLOB=',\x00'])
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={<r16=>0xffffffffffffffff})
dup2(r16, r16)
ioctl$EXT4_IOC_MOVE_EXT(r16, 0xc028660f, &(0x7f0000000300)={0x0, r2, 0x3ff, 0x10000, 0x4, 0x1})
r17 = mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5})
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedreceive(r17, &(0x7f0000000380)=""/204, 0x2b3, 0x0, 0x0)
umount2(&(0x7f0000000340)='./file0\x00', 0x3)
lseek(r0, 0x0, 0x0)
r18 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0)
lseek(r18, 0x0, 0x0)
socket$inet(0x2, 0x4, 0x0)

19:16:36 executing program 2:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/null\x00', 0x40000, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x7a, &(0x7f0000000700)=ANY=[@ANYBLOB="000800b867f2ad8bb8368900910000008100000086dd600200b69800"/64], 0x0)
keyctl$set_reqkey_keyring(0x5, 0xfffffffffffffffe)
add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
request_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='$.\x00', 0x0)
pipe2$9p(&(0x7f0000000240)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff}, 0x0)
write$P9_RVERSION(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f9870000c6504df67f00000000000000e98b4b153dffff082dbb78abd55fba3da80b856445ab1006487179e001b66c90c0473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd8824692f08ff8675bdf17ea1c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a671164679079d00"/148], 0x15)
r3 = dup(r2)
write$FUSE_BMAP(r3, &(0x7f0000000080)={0x18, 0x0, 0x6}, 0x18)
write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r5=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r5)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0, <r6=>0x0}, &(0x7f0000000580)=0xc)
r7 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r8=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r8)
r9 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r10=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r10)
r11 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x7)
lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, <r12=>0x0})
mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2000, &(0x7f0000000600)=ANY=[@ANYBLOB="7472616e733d7463702c706f72743d3078303030303030303030303030346532312c6163636573733d757365722c616e616d653d6e732f6d6e74002c6d61736b3d5e4d415941415001c8000000000000003d", @ANYRESDEC=r12, @ANYBLOB=',measure,smackfshat=TIPCv2\x00,\x00'])
r13 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x811, r13, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r13, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@loopback, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r14=>0x0}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xff2d)
setreuid(r14, r12)
stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, <r15=>0x0})
mount$fuse(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x40000, &(0x7f0000000800)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYRESDEC=r6, @ANYBLOB=',default_permissions,uid>', @ANYRESDEC=r8, @ANYBLOB=',fow%er<', @ANYRESDEC=r10, @ANYBLOB=',obj_type=keyring\x00,fscontext=root,rootcontext=unconfined_u,obj_role=security,uid=', @ANYRESDEC=r15, @ANYBLOB="2c7375626a5f757365723d74727573746564656d304000000000000000747275737465646b657972696e67637075736574d6379d9e4501302cf62a174b1073676a6499183a6a41735b802416248fce940f0a1c1d242c6673636f6e746578743d756e636f6e66696e65645f752c00"])
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='tran\x00\x00\x00\x00\x00\x00\x00\x00no=', @ANYRESHEX=r1, @ANYBLOB="2c7766646e9063ae6f3d684b22d93e8bf0a50500350000000000005e1a62fc6e1305f19d04b736e24adeda822a", @ANYRESHEX=r2, @ANYBLOB=',\x00'])
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={<r16=>0xffffffffffffffff})
dup2(r16, r16)
ioctl$EXT4_IOC_MOVE_EXT(r16, 0xc028660f, &(0x7f0000000300)={0x0, r2, 0x3ff, 0x10000, 0x4, 0x1})
r17 = mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5})
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedreceive(r17, &(0x7f0000000380)=""/204, 0x2b3, 0x0, 0x0)
umount2(&(0x7f0000000340)='./file0\x00', 0x3)
lseek(r0, 0x0, 0x0)
r18 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0)
lseek(r18, 0x0, 0x0)
socket$inet(0x2, 0x4, 0x0)

19:16:36 executing program 4:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/null\x00', 0x40000, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x7a, &(0x7f0000000700)=ANY=[@ANYBLOB="000800b867f2ad8bb8368900910000008100000086dd600200b69800"/64], 0x0)
keyctl$set_reqkey_keyring(0x5, 0xfffffffffffffffe)
add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
request_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='$.\x00', 0x0)
pipe2$9p(&(0x7f0000000240)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff}, 0x0)
write$P9_RVERSION(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f9870000c6504df67f00000000000000e98b4b153dffff082dbb78abd55fba3da80b856445ab1006487179e001b66c90c0473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd8824692f08ff8675bdf17ea1c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a671164679079d00"/148], 0x15)
r3 = dup(r2)
write$FUSE_BMAP(r3, &(0x7f0000000080)={0x18, 0x0, 0x6}, 0x18)
write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r5=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r5)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0, <r6=>0x0}, &(0x7f0000000580)=0xc)
r7 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r8=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r8)
r9 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r10=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r10)
r11 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x7)
lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, <r12=>0x0})
mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2000, &(0x7f0000000600)=ANY=[@ANYBLOB="7472616e733d7463702c706f72743d3078303030303030303030303030346532312c6163636573733d757365722c616e616d653d6e732f6d6e74002c6d61736b3d5e4d415941415001c8000000000000003d", @ANYRESDEC=r12, @ANYBLOB=',measure,smackfshat=TIPCv2\x00,\x00'])
r13 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x811, r13, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r13, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@loopback, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r14=>0x0}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xff2d)
setreuid(r14, r12)
stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, <r15=>0x0})
mount$fuse(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x40000, &(0x7f0000000800)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYRESDEC=r6, @ANYBLOB=',default_permissions,uid>', @ANYRESDEC=r8, @ANYBLOB=',fow%er<', @ANYRESDEC=r10, @ANYBLOB=',obj_type=keyring\x00,fscontext=root,rootcontext=unconfined_u,obj_role=security,uid=', @ANYRESDEC=r15, @ANYBLOB="2c7375626a5f757365723d74727573746564656d304000000000000000747275737465646b657972696e67637075736574d6379d9e4501302cf62a174b1073676a6499183a6a41735b802416248fce940f0a1c1d242c6673636f6e746578743d756e636f6e66696e65645f752c00"])
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='tran\x00\x00\x00\x00\x00\x00\x00\x00no=', @ANYRESHEX=r1, @ANYBLOB="2c7766646e9063ae6f3d684b22d93e8bf0a50500350000000000005e1a62fc6e1305f19d04b736e24adeda822a", @ANYRESHEX=r2, @ANYBLOB=',\x00'])
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={<r16=>0xffffffffffffffff})
dup2(r16, r16)
ioctl$EXT4_IOC_MOVE_EXT(r16, 0xc028660f, &(0x7f0000000300)={0x0, r2, 0x3ff, 0x10000, 0x4, 0x1})
r17 = mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5})
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedreceive(r17, &(0x7f0000000380)=""/204, 0x2b3, 0x0, 0x0)
umount2(&(0x7f0000000340)='./file0\x00', 0x3)
lseek(r0, 0x0, 0x0)
r18 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0)
lseek(r18, 0x0, 0x0)
socket$inet(0x2, 0x4, 0x0)

19:16:36 executing program 0:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/null\x00', 0x40000, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x7a, &(0x7f0000000700)=ANY=[@ANYBLOB="000800b867f2ad8bb8368900910000008100000086dd600200b69800"/64], 0x0)
keyctl$set_reqkey_keyring(0x5, 0xfffffffffffffffe)
add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
request_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='$.\x00', 0x0)
pipe2$9p(&(0x7f0000000240)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff}, 0x0)
write$P9_RVERSION(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f9870000c6504df67f00000000000000e98b4b153dffff082dbb78abd55fba3da80b856445ab1006487179e001b66c90c0473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd8824692f08ff8675bdf17ea1c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a671164679079d00"/148], 0x15)
r3 = dup(r2)
write$FUSE_BMAP(r3, &(0x7f0000000080)={0x18, 0x0, 0x6}, 0x18)
write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r5=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r5)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0, <r6=>0x0}, &(0x7f0000000580)=0xc)
r7 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r8=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r8)
r9 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r10=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r10)
r11 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x7)
lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, <r12=>0x0})
mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2000, &(0x7f0000000600)=ANY=[@ANYBLOB="7472616e733d7463702c706f72743d3078303030303030303030303030346532312c6163636573733d757365722c616e616d653d6e732f6d6e74002c6d61736b3d5e4d415941415001c8000000000000003d", @ANYRESDEC=r12, @ANYBLOB=',measure,smackfshat=TIPCv2\x00,\x00'])
r13 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x811, r13, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r13, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@loopback, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r14=>0x0}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xff2d)
setreuid(r14, r12)
stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, <r15=>0x0})
mount$fuse(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x40000, &(0x7f0000000800)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYRESDEC=r6, @ANYBLOB=',default_permissions,uid>', @ANYRESDEC=r8, @ANYBLOB=',fow%er<', @ANYRESDEC=r10, @ANYBLOB=',obj_type=keyring\x00,fscontext=root,rootcontext=unconfined_u,obj_role=security,uid=', @ANYRESDEC=r15, @ANYBLOB="2c7375626a5f757365723d74727573746564656d304000000000000000747275737465646b657972696e67637075736574d6379d9e4501302cf62a174b1073676a6499183a6a41735b802416248fce940f0a1c1d242c6673636f6e746578743d756e636f6e66696e65645f752c00"])
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='tran\x00\x00\x00\x00\x00\x00\x00\x00no=', @ANYRESHEX=r1, @ANYBLOB="2c7766646e9063ae6f3d684b22d93e8bf0a50500350000000000005e1a62fc6e1305f19d04b736e24adeda822a", @ANYRESHEX=r2, @ANYBLOB=',\x00'])
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={<r16=>0xffffffffffffffff})
dup2(r16, r16)
ioctl$EXT4_IOC_MOVE_EXT(r16, 0xc028660f, &(0x7f0000000300)={0x0, r2, 0x3ff, 0x10000, 0x4, 0x1})
r17 = mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5})
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedreceive(r17, &(0x7f0000000380)=""/204, 0x2b3, 0x0, 0x0)
umount2(&(0x7f0000000340)='./file0\x00', 0x3)
lseek(r0, 0x0, 0x0)
r18 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0)
lseek(r18, 0x0, 0x0)
socket$inet(0x2, 0x4, 0x0)

19:16:36 executing program 5:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/null\x00', 0x40000, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x7a, &(0x7f0000000700)=ANY=[@ANYBLOB="000800b867f2ad8bb8368900910000008100000086dd600200b69800"/64], 0x0)
keyctl$set_reqkey_keyring(0x5, 0xfffffffffffffffe)
add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
request_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='$.\x00', 0x0)
pipe2$9p(&(0x7f0000000240)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff}, 0x0)
write$P9_RVERSION(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f9870000c6504df67f00000000000000e98b4b153dffff082dbb78abd55fba3da80b856445ab1006487179e001b66c90c0473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd8824692f08ff8675bdf17ea1c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a671164679079d00"/148], 0x15)
r3 = dup(r2)
write$FUSE_BMAP(r3, &(0x7f0000000080)={0x18, 0x0, 0x6}, 0x18)
write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r5=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r5)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0, <r6=>0x0}, &(0x7f0000000580)=0xc)
r7 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r8=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r8)
r9 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r10=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r10)
r11 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x7)
lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, <r12=>0x0})
mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2000, &(0x7f0000000600)=ANY=[@ANYBLOB="7472616e733d7463702c706f72743d3078303030303030303030303030346532312c6163636573733d757365722c616e616d653d6e732f6d6e74002c6d61736b3d5e4d415941415001c8000000000000003d", @ANYRESDEC=r12, @ANYBLOB=',measure,smackfshat=TIPCv2\x00,\x00'])
r13 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x811, r13, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r13, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@loopback, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r14=>0x0}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xff2d)
setreuid(r14, r12)
stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, <r15=>0x0})
mount$fuse(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x40000, &(0x7f0000000800)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYRESDEC=r6, @ANYBLOB=',default_permissions,uid>', @ANYRESDEC=r8, @ANYBLOB=',fow%er<', @ANYRESDEC=r10, @ANYBLOB=',obj_type=keyring\x00,fscontext=root,rootcontext=unconfined_u,obj_role=security,uid=', @ANYRESDEC=r15, @ANYBLOB="2c7375626a5f757365723d74727573746564656d304000000000000000747275737465646b657972696e67637075736574d6379d9e4501302cf62a174b1073676a6499183a6a41735b802416248fce940f0a1c1d242c6673636f6e746578743d756e636f6e66696e65645f752c00"])
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='tran\x00\x00\x00\x00\x00\x00\x00\x00no=', @ANYRESHEX=r1, @ANYBLOB="2c7766646e9063ae6f3d684b22d93e8bf0a50500350000000000005e1a62fc6e1305f19d04b736e24adeda822a", @ANYRESHEX=r2, @ANYBLOB=',\x00'])
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={<r16=>0xffffffffffffffff})
dup2(r16, r16)
ioctl$EXT4_IOC_MOVE_EXT(r16, 0xc028660f, &(0x7f0000000300)={0x0, r2, 0x3ff, 0x10000, 0x4, 0x1})
r17 = mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5})
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedreceive(r17, &(0x7f0000000380)=""/204, 0x2b3, 0x0, 0x0)
umount2(&(0x7f0000000340)='./file0\x00', 0x3)
lseek(r0, 0x0, 0x0)
r18 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0)
lseek(r18, 0x0, 0x0)
socket$inet(0x2, 0x4, 0x0)

19:16:36 executing program 1:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/null\x00', 0x40000, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x7a, &(0x7f0000000700)=ANY=[@ANYBLOB="000800b867f2ad8bb8368900910000008100000086dd600200b69800"/64], 0x0)
keyctl$set_reqkey_keyring(0x5, 0xfffffffffffffffe)
add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
request_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='$.\x00', 0x0)
pipe2$9p(&(0x7f0000000240)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff}, 0x0)
write$P9_RVERSION(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f9870000c6504df67f00000000000000e98b4b153dffff082dbb78abd55fba3da80b856445ab1006487179e001b66c90c0473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd8824692f08ff8675bdf17ea1c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a671164679079d00"/148], 0x15)
r3 = dup(r2)
write$FUSE_BMAP(r3, &(0x7f0000000080)={0x18, 0x0, 0x6}, 0x18)
write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r5=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r5)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0, <r6=>0x0}, &(0x7f0000000580)=0xc)
r7 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r8=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r8)
r9 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r10=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r10)
r11 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x7)
lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, <r12=>0x0})
mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2000, &(0x7f0000000600)=ANY=[@ANYBLOB="7472616e733d7463702c706f72743d3078303030303030303030303030346532312c6163636573733d757365722c616e616d653d6e732f6d6e74002c6d61736b3d5e4d415941415001c8000000000000003d", @ANYRESDEC=r12, @ANYBLOB=',measure,smackfshat=TIPCv2\x00,\x00'])
r13 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x811, r13, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r13, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@loopback, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r14=>0x0}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xff2d)
setreuid(r14, r12)
stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, <r15=>0x0})
mount$fuse(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x40000, &(0x7f0000000800)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYRESDEC=r6, @ANYBLOB=',default_permissions,uid>', @ANYRESDEC=r8, @ANYBLOB=',fow%er<', @ANYRESDEC=r10, @ANYBLOB=',obj_type=keyring\x00,fscontext=root,rootcontext=unconfined_u,obj_role=security,uid=', @ANYRESDEC=r15, @ANYBLOB="2c7375626a5f757365723d74727573746564656d304000000000000000747275737465646b657972696e67637075736574d6379d9e4501302cf62a174b1073676a6499183a6a41735b802416248fce940f0a1c1d242c6673636f6e746578743d756e636f6e66696e65645f752c00"])
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='tran\x00\x00\x00\x00\x00\x00\x00\x00no=', @ANYRESHEX=r1, @ANYBLOB="2c7766646e9063ae6f3d684b22d93e8bf0a50500350000000000005e1a62fc6e1305f19d04b736e24adeda822a", @ANYRESHEX=r2, @ANYBLOB=',\x00'])
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={<r16=>0xffffffffffffffff})
dup2(r16, r16)
ioctl$EXT4_IOC_MOVE_EXT(r16, 0xc028660f, &(0x7f0000000300)={0x0, r2, 0x3ff, 0x10000, 0x4, 0x1})
r17 = mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5})
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedreceive(r17, &(0x7f0000000380)=""/204, 0x2b3, 0x0, 0x0)
umount2(&(0x7f0000000340)='./file0\x00', 0x3)
lseek(r0, 0x0, 0x0)
r18 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0)
lseek(r18, 0x0, 0x0)
socket$inet(0x2, 0x4, 0x0)

19:16:36 executing program 3:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/null\x00', 0x40000, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x7a, &(0x7f0000000700)=ANY=[@ANYBLOB="000800b867f2ad8bb8368900910000008100000086dd600200b69800"/64], 0x0)
keyctl$set_reqkey_keyring(0x5, 0xfffffffffffffffe)
add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
request_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='$.\x00', 0x0)
pipe2$9p(&(0x7f0000000240)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff}, 0x0)
write$P9_RVERSION(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f9870000c6504df67f00000000000000e98b4b153dffff082dbb78abd55fba3da80b856445ab1006487179e001b66c90c0473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd8824692f08ff8675bdf17ea1c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a671164679079d00"/148], 0x15)
r3 = dup(r2)
write$FUSE_BMAP(r3, &(0x7f0000000080)={0x18, 0x0, 0x6}, 0x18)
write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r5=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r5)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0, <r6=>0x0}, &(0x7f0000000580)=0xc)
r7 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r8=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r8)
r9 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r10=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r10)
r11 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x7)
lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, <r12=>0x0})
mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2000, &(0x7f0000000600)=ANY=[@ANYBLOB="7472616e733d7463702c706f72743d3078303030303030303030303030346532312c6163636573733d757365722c616e616d653d6e732f6d6e74002c6d61736b3d5e4d415941415001c8000000000000003d", @ANYRESDEC=r12, @ANYBLOB=',measure,smackfshat=TIPCv2\x00,\x00'])
r13 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x811, r13, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r13, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@loopback, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r14=>0x0}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xff2d)
setreuid(r14, r12)
stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, <r15=>0x0})
mount$fuse(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x40000, &(0x7f0000000800)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYRESDEC=r6, @ANYBLOB=',default_permissions,uid>', @ANYRESDEC=r8, @ANYBLOB=',fow%er<', @ANYRESDEC=r10, @ANYBLOB=',obj_type=keyring\x00,fscontext=root,rootcontext=unconfined_u,obj_role=security,uid=', @ANYRESDEC=r15, @ANYBLOB="2c7375626a5f757365723d74727573746564656d304000000000000000747275737465646b657972696e67637075736574d6379d9e4501302cf62a174b1073676a6499183a6a41735b802416248fce940f0a1c1d242c6673636f6e746578743d756e636f6e66696e65645f752c00"])
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='tran\x00\x00\x00\x00\x00\x00\x00\x00no=', @ANYRESHEX=r1, @ANYBLOB="2c7766646e9063ae6f3d684b22d93e8bf0a50500350000000000005e1a62fc6e1305f19d04b736e24adeda822a", @ANYRESHEX=r2, @ANYBLOB=',\x00'])
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={<r16=>0xffffffffffffffff})
dup2(r16, r16)
ioctl$EXT4_IOC_MOVE_EXT(r16, 0xc028660f, &(0x7f0000000300)={0x0, r2, 0x3ff, 0x10000, 0x4, 0x1})
r17 = mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5})
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedreceive(r17, &(0x7f0000000380)=""/204, 0x2b3, 0x0, 0x0)
umount2(&(0x7f0000000340)='./file0\x00', 0x3)
lseek(r0, 0x0, 0x0)
r18 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0)
lseek(r18, 0x0, 0x0)
socket$inet(0x2, 0x4, 0x0)

19:16:36 executing program 4:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/null\x00', 0x40000, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x7a, &(0x7f0000000700)=ANY=[@ANYBLOB="000800b867f2ad8bb8368900910000008100000086dd600200b69800"/64], 0x0)
keyctl$set_reqkey_keyring(0x5, 0xfffffffffffffffe)
add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
request_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='$.\x00', 0x0)
pipe2$9p(&(0x7f0000000240)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff}, 0x0)
write$P9_RVERSION(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f9870000c6504df67f00000000000000e98b4b153dffff082dbb78abd55fba3da80b856445ab1006487179e001b66c90c0473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd8824692f08ff8675bdf17ea1c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a671164679079d00"/148], 0x15)
r3 = dup(r2)
write$FUSE_BMAP(r3, &(0x7f0000000080)={0x18, 0x0, 0x6}, 0x18)
write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r5=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r5)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0, <r6=>0x0}, &(0x7f0000000580)=0xc)
r7 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r8=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r8)
r9 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r10=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r10)
r11 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x7)
lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, <r12=>0x0})
mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2000, &(0x7f0000000600)=ANY=[@ANYBLOB="7472616e733d7463702c706f72743d3078303030303030303030303030346532312c6163636573733d757365722c616e616d653d6e732f6d6e74002c6d61736b3d5e4d415941415001c8000000000000003d", @ANYRESDEC=r12, @ANYBLOB=',measure,smackfshat=TIPCv2\x00,\x00'])
r13 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x811, r13, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r13, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@loopback, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r14=>0x0}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xff2d)
setreuid(r14, r12)
stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, <r15=>0x0})
mount$fuse(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x40000, &(0x7f0000000800)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYRESDEC=r6, @ANYBLOB=',default_permissions,uid>', @ANYRESDEC=r8, @ANYBLOB=',fow%er<', @ANYRESDEC=r10, @ANYBLOB=',obj_type=keyring\x00,fscontext=root,rootcontext=unconfined_u,obj_role=security,uid=', @ANYRESDEC=r15, @ANYBLOB="2c7375626a5f757365723d74727573746564656d304000000000000000747275737465646b657972696e67637075736574d6379d9e4501302cf62a174b1073676a6499183a6a41735b802416248fce940f0a1c1d242c6673636f6e746578743d756e636f6e66696e65645f752c00"])
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='tran\x00\x00\x00\x00\x00\x00\x00\x00no=', @ANYRESHEX=r1, @ANYBLOB="2c7766646e9063ae6f3d684b22d93e8bf0a50500350000000000005e1a62fc6e1305f19d04b736e24adeda822a", @ANYRESHEX=r2, @ANYBLOB=',\x00'])
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={<r16=>0xffffffffffffffff})
dup2(r16, r16)
ioctl$EXT4_IOC_MOVE_EXT(r16, 0xc028660f, &(0x7f0000000300)={0x0, r2, 0x3ff, 0x10000, 0x4, 0x1})
r17 = mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5})
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedreceive(r17, &(0x7f0000000380)=""/204, 0x2b3, 0x0, 0x0)
umount2(&(0x7f0000000340)='./file0\x00', 0x3)
lseek(r0, 0x0, 0x0)
r18 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0)
lseek(r18, 0x0, 0x0)
socket$inet(0x2, 0x4, 0x0)

19:16:36 executing program 0:
perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYRESHEX], 0xffe8)
r3 = socket$inet(0x2, 0x3, 0x29)
r4 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4)
lstat(0x0, 0x0)
getresgid(0x0, 0x0, &(0x7f0000000d00))
bind$inet(r3, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

19:16:36 executing program 2:
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0)
futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = fcntl$dupfd(r1, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x2, 0x4004031, 0xffffffffffffffff, 0x0)
seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f0000000040))

19:16:36 executing program 5:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/null\x00', 0x40000, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x7a, &(0x7f0000000700)=ANY=[@ANYBLOB="000800b867f2ad8bb8368900910000008100000086dd600200b69800"/64], 0x0)
keyctl$set_reqkey_keyring(0x5, 0xfffffffffffffffe)
add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
request_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='$.\x00', 0x0)
pipe2$9p(&(0x7f0000000240)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff}, 0x0)
write$P9_RVERSION(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f9870000c6504df67f00000000000000e98b4b153dffff082dbb78abd55fba3da80b856445ab1006487179e001b66c90c0473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd8824692f08ff8675bdf17ea1c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a671164679079d00"/148], 0x15)
r3 = dup(r2)
write$FUSE_BMAP(r3, &(0x7f0000000080)={0x18, 0x0, 0x6}, 0x18)
write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r5=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r5)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0, <r6=>0x0}, &(0x7f0000000580)=0xc)
r7 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r8=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r8)
r9 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r10=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r10)
r11 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x7)
lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, <r12=>0x0})
mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2000, &(0x7f0000000600)=ANY=[@ANYBLOB="7472616e733d7463702c706f72743d3078303030303030303030303030346532312c6163636573733d757365722c616e616d653d6e732f6d6e74002c6d61736b3d5e4d415941415001c8000000000000003d", @ANYRESDEC=r12, @ANYBLOB=',measure,smackfshat=TIPCv2\x00,\x00'])
r13 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x811, r13, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r13, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@loopback, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r14=>0x0}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xff2d)
setreuid(r14, r12)
stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, <r15=>0x0})
mount$fuse(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x40000, &(0x7f0000000800)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYRESDEC=r6, @ANYBLOB=',default_permissions,uid>', @ANYRESDEC=r8, @ANYBLOB=',fow%er<', @ANYRESDEC=r10, @ANYBLOB=',obj_type=keyring\x00,fscontext=root,rootcontext=unconfined_u,obj_role=security,uid=', @ANYRESDEC=r15, @ANYBLOB="2c7375626a5f757365723d74727573746564656d304000000000000000747275737465646b657972696e67637075736574d6379d9e4501302cf62a174b1073676a6499183a6a41735b802416248fce940f0a1c1d242c6673636f6e746578743d756e636f6e66696e65645f752c00"])
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='tran\x00\x00\x00\x00\x00\x00\x00\x00no=', @ANYRESHEX=r1, @ANYBLOB="2c7766646e9063ae6f3d684b22d93e8bf0a50500350000000000005e1a62fc6e1305f19d04b736e24adeda822a", @ANYRESHEX=r2, @ANYBLOB=',\x00'])
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={<r16=>0xffffffffffffffff})
dup2(r16, r16)
ioctl$EXT4_IOC_MOVE_EXT(r16, 0xc028660f, &(0x7f0000000300)={0x0, r2, 0x3ff, 0x10000, 0x4, 0x1})
r17 = mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5})
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedreceive(r17, &(0x7f0000000380)=""/204, 0x2b3, 0x0, 0x0)
umount2(&(0x7f0000000340)='./file0\x00', 0x3)
lseek(r0, 0x0, 0x0)
r18 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0)
lseek(r18, 0x0, 0x0)
socket$inet(0x2, 0x4, 0x0)

[  130.214255][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  130.220074][    C0] protocol 88fb is buggy, dev hsr_slave_1
19:16:37 executing program 1:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
clock_settime(0x0, &(0x7f0000000100))

19:16:37 executing program 4:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/null\x00', 0x40000, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x7a, &(0x7f0000000700)=ANY=[@ANYBLOB="000800b867f2ad8bb8368900910000008100000086dd600200b69800"/64], 0x0)
keyctl$set_reqkey_keyring(0x5, 0xfffffffffffffffe)
add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
request_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='$.\x00', 0x0)
pipe2$9p(&(0x7f0000000240)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff}, 0x0)
write$P9_RVERSION(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f9870000c6504df67f00000000000000e98b4b153dffff082dbb78abd55fba3da80b856445ab1006487179e001b66c90c0473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd8824692f08ff8675bdf17ea1c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a671164679079d00"/148], 0x15)
r3 = dup(r2)
write$FUSE_BMAP(r3, &(0x7f0000000080)={0x18, 0x0, 0x6}, 0x18)
write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r5=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r5)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0, <r6=>0x0}, &(0x7f0000000580)=0xc)
r7 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r8=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r8)
r9 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r10=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r10)
r11 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x7)
lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, <r12=>0x0})
mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2000, &(0x7f0000000600)=ANY=[@ANYBLOB="7472616e733d7463702c706f72743d3078303030303030303030303030346532312c6163636573733d757365722c616e616d653d6e732f6d6e74002c6d61736b3d5e4d415941415001c8000000000000003d", @ANYRESDEC=r12, @ANYBLOB=',measure,smackfshat=TIPCv2\x00,\x00'])
r13 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x811, r13, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r13, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@loopback, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r14=>0x0}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xff2d)
setreuid(r14, r12)
stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, <r15=>0x0})
mount$fuse(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x40000, &(0x7f0000000800)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYRESDEC=r6, @ANYBLOB=',default_permissions,uid>', @ANYRESDEC=r8, @ANYBLOB=',fow%er<', @ANYRESDEC=r10, @ANYBLOB=',obj_type=keyring\x00,fscontext=root,rootcontext=unconfined_u,obj_role=security,uid=', @ANYRESDEC=r15, @ANYBLOB="2c7375626a5f757365723d74727573746564656d304000000000000000747275737465646b657972696e67637075736574d6379d9e4501302cf62a174b1073676a6499183a6a41735b802416248fce940f0a1c1d242c6673636f6e746578743d756e636f6e66696e65645f752c00"])
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='tran\x00\x00\x00\x00\x00\x00\x00\x00no=', @ANYRESHEX=r1, @ANYBLOB="2c7766646e9063ae6f3d684b22d93e8bf0a50500350000000000005e1a62fc6e1305f19d04b736e24adeda822a", @ANYRESHEX=r2, @ANYBLOB=',\x00'])
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={<r16=>0xffffffffffffffff})
dup2(r16, r16)
ioctl$EXT4_IOC_MOVE_EXT(r16, 0xc028660f, &(0x7f0000000300)={0x0, r2, 0x3ff, 0x10000, 0x4, 0x1})
r17 = mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5})
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedreceive(r17, &(0x7f0000000380)=""/204, 0x2b3, 0x0, 0x0)
umount2(&(0x7f0000000340)='./file0\x00', 0x3)
lseek(r0, 0x0, 0x0)
r18 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0)
lseek(r18, 0x0, 0x0)
socket$inet(0x2, 0x4, 0x0)

19:16:37 executing program 1:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
clock_settime(0x0, &(0x7f0000000100))

19:16:37 executing program 0:
perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYRESHEX], 0xffe8)
r3 = socket$inet(0x2, 0x3, 0x29)
r4 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4)
lstat(0x0, 0x0)
getresgid(0x0, 0x0, &(0x7f0000000d00))
bind$inet(r3, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

19:16:37 executing program 3:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/null\x00', 0x40000, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x7a, &(0x7f0000000700)=ANY=[@ANYBLOB="000800b867f2ad8bb8368900910000008100000086dd600200b69800"/64], 0x0)
keyctl$set_reqkey_keyring(0x5, 0xfffffffffffffffe)
add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
request_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='$.\x00', 0x0)
pipe2$9p(&(0x7f0000000240)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff}, 0x0)
write$P9_RVERSION(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f9870000c6504df67f00000000000000e98b4b153dffff082dbb78abd55fba3da80b856445ab1006487179e001b66c90c0473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd8824692f08ff8675bdf17ea1c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a671164679079d00"/148], 0x15)
r3 = dup(r2)
write$FUSE_BMAP(r3, &(0x7f0000000080)={0x18, 0x0, 0x6}, 0x18)
write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r5=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r5)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0, <r6=>0x0}, &(0x7f0000000580)=0xc)
r7 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r8=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r8)
r9 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r10=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r10)
r11 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x7)
lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, <r12=>0x0})
mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2000, &(0x7f0000000600)=ANY=[@ANYBLOB="7472616e733d7463702c706f72743d3078303030303030303030303030346532312c6163636573733d757365722c616e616d653d6e732f6d6e74002c6d61736b3d5e4d415941415001c8000000000000003d", @ANYRESDEC=r12, @ANYBLOB=',measure,smackfshat=TIPCv2\x00,\x00'])
r13 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x811, r13, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r13, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@loopback, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r14=>0x0}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xff2d)
setreuid(r14, r12)
stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, <r15=>0x0})
mount$fuse(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x40000, &(0x7f0000000800)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYRESDEC=r6, @ANYBLOB=',default_permissions,uid>', @ANYRESDEC=r8, @ANYBLOB=',fow%er<', @ANYRESDEC=r10, @ANYBLOB=',obj_type=keyring\x00,fscontext=root,rootcontext=unconfined_u,obj_role=security,uid=', @ANYRESDEC=r15, @ANYBLOB="2c7375626a5f757365723d74727573746564656d304000000000000000747275737465646b657972696e67637075736574d6379d9e4501302cf62a174b1073676a6499183a6a41735b802416248fce940f0a1c1d242c6673636f6e746578743d756e636f6e66696e65645f752c00"])
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='tran\x00\x00\x00\x00\x00\x00\x00\x00no=', @ANYRESHEX=r1, @ANYBLOB="2c7766646e9063ae6f3d684b22d93e8bf0a50500350000000000005e1a62fc6e1305f19d04b736e24adeda822a", @ANYRESHEX=r2, @ANYBLOB=',\x00'])
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={<r16=>0xffffffffffffffff})
dup2(r16, r16)
ioctl$EXT4_IOC_MOVE_EXT(r16, 0xc028660f, &(0x7f0000000300)={0x0, r2, 0x3ff, 0x10000, 0x4, 0x1})
r17 = mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5})
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedreceive(r17, &(0x7f0000000380)=""/204, 0x2b3, 0x0, 0x0)
umount2(&(0x7f0000000340)='./file0\x00', 0x3)
lseek(r0, 0x0, 0x0)
r18 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0)
lseek(r18, 0x0, 0x0)
socket$inet(0x2, 0x4, 0x0)

19:16:37 executing program 1:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
clock_settime(0x0, &(0x7f0000000100))

19:16:37 executing program 5:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/null\x00', 0x40000, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x7a, &(0x7f0000000700)=ANY=[@ANYBLOB="000800b867f2ad8bb8368900910000008100000086dd600200b69800"/64], 0x0)
keyctl$set_reqkey_keyring(0x5, 0xfffffffffffffffe)
add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
request_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='$.\x00', 0x0)
pipe2$9p(&(0x7f0000000240)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff}, 0x0)
write$P9_RVERSION(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f9870000c6504df67f00000000000000e98b4b153dffff082dbb78abd55fba3da80b856445ab1006487179e001b66c90c0473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd8824692f08ff8675bdf17ea1c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a671164679079d00"/148], 0x15)
r3 = dup(r2)
write$FUSE_BMAP(r3, &(0x7f0000000080)={0x18, 0x0, 0x6}, 0x18)
write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r5=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r5)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0, <r6=>0x0}, &(0x7f0000000580)=0xc)
r7 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r8=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r8)
r9 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r10=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r10)
r11 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x7)
lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, <r12=>0x0})
mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2000, &(0x7f0000000600)=ANY=[@ANYBLOB="7472616e733d7463702c706f72743d3078303030303030303030303030346532312c6163636573733d757365722c616e616d653d6e732f6d6e74002c6d61736b3d5e4d415941415001c8000000000000003d", @ANYRESDEC=r12, @ANYBLOB=',measure,smackfshat=TIPCv2\x00,\x00'])
r13 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x811, r13, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r13, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@loopback, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r14=>0x0}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xff2d)
setreuid(r14, r12)
stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, <r15=>0x0})
mount$fuse(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x40000, &(0x7f0000000800)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYRESDEC=r6, @ANYBLOB=',default_permissions,uid>', @ANYRESDEC=r8, @ANYBLOB=',fow%er<', @ANYRESDEC=r10, @ANYBLOB=',obj_type=keyring\x00,fscontext=root,rootcontext=unconfined_u,obj_role=security,uid=', @ANYRESDEC=r15, @ANYBLOB="2c7375626a5f757365723d74727573746564656d304000000000000000747275737465646b657972696e67637075736574d6379d9e4501302cf62a174b1073676a6499183a6a41735b802416248fce940f0a1c1d242c6673636f6e746578743d756e636f6e66696e65645f752c00"])
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='tran\x00\x00\x00\x00\x00\x00\x00\x00no=', @ANYRESHEX=r1, @ANYBLOB="2c7766646e9063ae6f3d684b22d93e8bf0a50500350000000000005e1a62fc6e1305f19d04b736e24adeda822a", @ANYRESHEX=r2, @ANYBLOB=',\x00'])
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={<r16=>0xffffffffffffffff})
dup2(r16, r16)
ioctl$EXT4_IOC_MOVE_EXT(r16, 0xc028660f, &(0x7f0000000300)={0x0, r2, 0x3ff, 0x10000, 0x4, 0x1})
r17 = mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5})
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedreceive(r17, &(0x7f0000000380)=""/204, 0x2b3, 0x0, 0x0)
umount2(&(0x7f0000000340)='./file0\x00', 0x3)
lseek(r0, 0x0, 0x0)
r18 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0)
lseek(r18, 0x0, 0x0)
socket$inet(0x2, 0x4, 0x0)

19:16:37 executing program 4:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/null\x00', 0x40000, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x7a, &(0x7f0000000700)=ANY=[@ANYBLOB="000800b867f2ad8bb8368900910000008100000086dd600200b69800"/64], 0x0)
keyctl$set_reqkey_keyring(0x5, 0xfffffffffffffffe)
add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
request_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='$.\x00', 0x0)
pipe2$9p(&(0x7f0000000240)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff}, 0x0)
write$P9_RVERSION(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f9870000c6504df67f00000000000000e98b4b153dffff082dbb78abd55fba3da80b856445ab1006487179e001b66c90c0473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd8824692f08ff8675bdf17ea1c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a671164679079d00"/148], 0x15)
r3 = dup(r2)
write$FUSE_BMAP(r3, &(0x7f0000000080)={0x18, 0x0, 0x6}, 0x18)
write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r5=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r5)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0, <r6=>0x0}, &(0x7f0000000580)=0xc)
r7 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r8=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r8)
r9 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r10=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r10)
r11 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x7)
lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, <r12=>0x0})
mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2000, &(0x7f0000000600)=ANY=[@ANYBLOB="7472616e733d7463702c706f72743d3078303030303030303030303030346532312c6163636573733d757365722c616e616d653d6e732f6d6e74002c6d61736b3d5e4d415941415001c8000000000000003d", @ANYRESDEC=r12, @ANYBLOB=',measure,smackfshat=TIPCv2\x00,\x00'])
r13 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x811, r13, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r13, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@loopback, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r14=>0x0}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xff2d)
setreuid(r14, r12)
stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, <r15=>0x0})
mount$fuse(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x40000, &(0x7f0000000800)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYRESDEC=r6, @ANYBLOB=',default_permissions,uid>', @ANYRESDEC=r8, @ANYBLOB=',fow%er<', @ANYRESDEC=r10, @ANYBLOB=',obj_type=keyring\x00,fscontext=root,rootcontext=unconfined_u,obj_role=security,uid=', @ANYRESDEC=r15, @ANYBLOB="2c7375626a5f757365723d74727573746564656d304000000000000000747275737465646b657972696e67637075736574d6379d9e4501302cf62a174b1073676a6499183a6a41735b802416248fce940f0a1c1d242c6673636f6e746578743d756e636f6e66696e65645f752c00"])
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='tran\x00\x00\x00\x00\x00\x00\x00\x00no=', @ANYRESHEX=r1, @ANYBLOB="2c7766646e9063ae6f3d684b22d93e8bf0a50500350000000000005e1a62fc6e1305f19d04b736e24adeda822a", @ANYRESHEX=r2, @ANYBLOB=',\x00'])
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={<r16=>0xffffffffffffffff})
dup2(r16, r16)
ioctl$EXT4_IOC_MOVE_EXT(r16, 0xc028660f, &(0x7f0000000300)={0x0, r2, 0x3ff, 0x10000, 0x4, 0x1})
r17 = mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5})
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedreceive(r17, &(0x7f0000000380)=""/204, 0x2b3, 0x0, 0x0)
umount2(&(0x7f0000000340)='./file0\x00', 0x3)
lseek(r0, 0x0, 0x0)
r18 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0)
lseek(r18, 0x0, 0x0)
socket$inet(0x2, 0x4, 0x0)

[  130.934270][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  130.940091][    C0] protocol 88fb is buggy, dev hsr_slave_1
19:16:37 executing program 1:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
clock_settime(0x0, &(0x7f0000000100))

19:16:37 executing program 3:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/null\x00', 0x40000, 0x0)
mkdir(&(0x7f0000000040)='./file0\x00', 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_emit_ethernet(0x7a, &(0x7f0000000700)=ANY=[@ANYBLOB="000800b867f2ad8bb8368900910000008100000086dd600200b69800"/64], 0x0)
keyctl$set_reqkey_keyring(0x5, 0xfffffffffffffffe)
add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd)
request_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='$.\x00', 0x0)
pipe2$9p(&(0x7f0000000240)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff}, 0x0)
write$P9_RVERSION(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f9870000c6504df67f00000000000000e98b4b153dffff082dbb78abd55fba3da80b856445ab1006487179e001b66c90c0473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd8824692f08ff8675bdf17ea1c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a671164679079d00"/148], 0x15)
r3 = dup(r2)
write$FUSE_BMAP(r3, &(0x7f0000000080)={0x18, 0x0, 0x6}, 0x18)
write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r5=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r5)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0, <r6=>0x0}, &(0x7f0000000580)=0xc)
r7 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r8=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r8)
r9 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f00000001c0)={0x0, <r10=>0x0}, &(0x7f0000000200)=0x7)
setreuid(0x0, r10)
r11 = socket$inet_udplite(0x2, 0x2, 0x88)
getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0x7)
lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, <r12=>0x0})
mount$9p_tcp(&(0x7f0000000100)='127.0.0.1\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2000, &(0x7f0000000600)=ANY=[@ANYBLOB="7472616e733d7463702c706f72743d3078303030303030303030303030346532312c6163636573733d757365722c616e616d653d6e732f6d6e74002c6d61736b3d5e4d415941415001c8000000000000003d", @ANYRESDEC=r12, @ANYBLOB=',measure,smackfshat=TIPCv2\x00,\x00'])
r13 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0)
mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x811, r13, 0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r13, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@loopback, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r14=>0x0}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xff2d)
setreuid(r14, r12)
stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, <r15=>0x0})
mount$fuse(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='fuse\x00', 0x40000, &(0x7f0000000800)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r5, @ANYBLOB=',group_id=', @ANYRESDEC=r6, @ANYBLOB=',default_permissions,uid>', @ANYRESDEC=r8, @ANYBLOB=',fow%er<', @ANYRESDEC=r10, @ANYBLOB=',obj_type=keyring\x00,fscontext=root,rootcontext=unconfined_u,obj_role=security,uid=', @ANYRESDEC=r15, @ANYBLOB="2c7375626a5f757365723d74727573746564656d304000000000000000747275737465646b657972696e67637075736574d6379d9e4501302cf62a174b1073676a6499183a6a41735b802416248fce940f0a1c1d242c6673636f6e746578743d756e636f6e66696e65645f752c00"])
mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='tran\x00\x00\x00\x00\x00\x00\x00\x00no=', @ANYRESHEX=r1, @ANYBLOB="2c7766646e9063ae6f3d684b22d93e8bf0a50500350000000000005e1a62fc6e1305f19d04b736e24adeda822a", @ANYRESHEX=r2, @ANYBLOB=',\x00'])
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={<r16=>0xffffffffffffffff})
dup2(r16, r16)
ioctl$EXT4_IOC_MOVE_EXT(r16, 0xc028660f, &(0x7f0000000300)={0x0, r2, 0x3ff, 0x10000, 0x4, 0x1})
r17 = mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5})
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedsend(r17, 0x0, 0x0, 0x0, 0x0)
mq_timedreceive(r17, &(0x7f0000000380)=""/204, 0x2b3, 0x0, 0x0)
umount2(&(0x7f0000000340)='./file0\x00', 0x3)
lseek(r0, 0x0, 0x0)
r18 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0)
lseek(r18, 0x0, 0x0)
socket$inet(0x2, 0x4, 0x0)

19:16:38 executing program 1:
perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYRESHEX], 0xffe8)
r3 = socket$inet(0x2, 0x3, 0x29)
r4 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4)
lstat(0x0, 0x0)
getresgid(0x0, 0x0, &(0x7f0000000d00))
bind$inet(r3, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

19:16:38 executing program 0:
perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYRESHEX], 0xffe8)
r3 = socket$inet(0x2, 0x3, 0x29)
r4 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4)
lstat(0x0, 0x0)
getresgid(0x0, 0x0, &(0x7f0000000d00))
bind$inet(r3, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

19:16:38 executing program 4:
perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYRESHEX], 0xffe8)
r3 = socket$inet(0x2, 0x3, 0x29)
r4 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4)
lstat(0x0, 0x0)
getresgid(0x0, 0x0, &(0x7f0000000d00))
bind$inet(r3, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

19:16:38 executing program 5:
perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYRESHEX], 0xffe8)
r3 = socket$inet(0x2, 0x3, 0x29)
r4 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4)
lstat(0x0, 0x0)
getresgid(0x0, 0x0, &(0x7f0000000d00))
bind$inet(r3, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

19:16:38 executing program 2:
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0)
futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = fcntl$dupfd(r1, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x2, 0x4004031, 0xffffffffffffffff, 0x0)
seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f0000000040))

19:16:38 executing program 3:
perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYRESHEX], 0xffe8)
r3 = socket$inet(0x2, 0x3, 0x29)
r4 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4)
lstat(0x0, 0x0)
getresgid(0x0, 0x0, &(0x7f0000000d00))
bind$inet(r3, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

[  131.814288][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  131.820174][    C0] protocol 88fb is buggy, dev hsr_slave_1
19:16:38 executing program 4:
perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYRESHEX], 0xffe8)
r3 = socket$inet(0x2, 0x3, 0x29)
r4 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4)
lstat(0x0, 0x0)
getresgid(0x0, 0x0, &(0x7f0000000d00))
bind$inet(r3, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

19:16:38 executing program 5:
perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYRESHEX], 0xffe8)
r3 = socket$inet(0x2, 0x3, 0x29)
r4 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4)
lstat(0x0, 0x0)
getresgid(0x0, 0x0, &(0x7f0000000d00))
bind$inet(r3, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

19:16:38 executing program 3:
perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYRESHEX], 0xffe8)
r3 = socket$inet(0x2, 0x3, 0x29)
r4 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4)
lstat(0x0, 0x0)
getresgid(0x0, 0x0, &(0x7f0000000d00))
bind$inet(r3, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

19:16:38 executing program 0:
perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYRESHEX], 0xffe8)
r3 = socket$inet(0x2, 0x3, 0x29)
r4 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4)
lstat(0x0, 0x0)
getresgid(0x0, 0x0, &(0x7f0000000d00))
bind$inet(r3, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

19:16:39 executing program 1:
perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYRESHEX], 0xffe8)
r3 = socket$inet(0x2, 0x3, 0x29)
r4 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4)
lstat(0x0, 0x0)
getresgid(0x0, 0x0, &(0x7f0000000d00))
bind$inet(r3, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

[  132.304229][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  132.310034][    C0] protocol 88fb is buggy, dev hsr_slave_1
19:16:39 executing program 4:
perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYRESHEX], 0xffe8)
r3 = socket$inet(0x2, 0x3, 0x29)
r4 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4)
lstat(0x0, 0x0)
getresgid(0x0, 0x0, &(0x7f0000000d00))
bind$inet(r3, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

19:16:39 executing program 5:
perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYRESHEX], 0xffe8)
r3 = socket$inet(0x2, 0x3, 0x29)
r4 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4)
lstat(0x0, 0x0)
getresgid(0x0, 0x0, &(0x7f0000000d00))
bind$inet(r3, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

19:16:39 executing program 0:
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0)
futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = fcntl$dupfd(r1, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x2, 0x4004031, 0xffffffffffffffff, 0x0)
seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f0000000040))

19:16:39 executing program 3:
perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYRESHEX], 0xffe8)
r3 = socket$inet(0x2, 0x3, 0x29)
r4 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4)
lstat(0x0, 0x0)
getresgid(0x0, 0x0, &(0x7f0000000d00))
bind$inet(r3, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

19:16:39 executing program 1:
perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYRESHEX], 0xffe8)
r3 = socket$inet(0x2, 0x3, 0x29)
r4 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4)
lstat(0x0, 0x0)
getresgid(0x0, 0x0, &(0x7f0000000d00))
bind$inet(r3, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

[  133.014231][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  133.020049][    C0] protocol 88fb is buggy, dev hsr_slave_1
19:16:40 executing program 2:
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0)
futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = fcntl$dupfd(r1, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x2, 0x4004031, 0xffffffffffffffff, 0x0)
seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f0000000040))

19:16:40 executing program 5:
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0)
futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = fcntl$dupfd(r1, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x2, 0x4004031, 0xffffffffffffffff, 0x0)
seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f0000000040))

19:16:40 executing program 4:
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0)
futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = fcntl$dupfd(r1, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x2, 0x4004031, 0xffffffffffffffff, 0x0)
seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f0000000040))

19:16:40 executing program 3:
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0)
futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = fcntl$dupfd(r1, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x2, 0x4004031, 0xffffffffffffffff, 0x0)
seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f0000000040))

19:16:40 executing program 1:
perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYRESHEX], 0xffe8)
r3 = socket$inet(0x2, 0x3, 0x29)
r4 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4)
lstat(0x0, 0x0)
getresgid(0x0, 0x0, &(0x7f0000000d00))
bind$inet(r3, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

19:16:40 executing program 1:
perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYRESHEX], 0xffe8)
r3 = socket$inet(0x2, 0x3, 0x29)
r4 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4)
lstat(0x0, 0x0)
getresgid(0x0, 0x0, &(0x7f0000000d00))
bind$inet(r3, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

19:16:40 executing program 0:
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0)
futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = fcntl$dupfd(r1, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x2, 0x4004031, 0xffffffffffffffff, 0x0)
seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f0000000040))

19:16:41 executing program 1:
perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYRESHEX], 0xffe8)
r3 = socket$inet(0x2, 0x3, 0x29)
r4 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4)
lstat(0x0, 0x0)
getresgid(0x0, 0x0, &(0x7f0000000d00))
bind$inet(r3, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

19:16:41 executing program 5:
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0)
futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = fcntl$dupfd(r1, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x2, 0x4004031, 0xffffffffffffffff, 0x0)
seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f0000000040))

19:16:41 executing program 4:
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0)
futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = fcntl$dupfd(r1, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x2, 0x4004031, 0xffffffffffffffff, 0x0)
seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f0000000040))

19:16:41 executing program 2:
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0)
futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = fcntl$dupfd(r1, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x2, 0x4004031, 0xffffffffffffffff, 0x0)
seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f0000000040))

19:16:41 executing program 3:
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0)
futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = fcntl$dupfd(r1, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x2, 0x4004031, 0xffffffffffffffff, 0x0)
seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f0000000040))

19:16:41 executing program 1:
perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYRESHEX], 0xffe8)
r3 = socket$inet(0x2, 0x3, 0x29)
r4 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4)
lstat(0x0, 0x0)
getresgid(0x0, 0x0, &(0x7f0000000d00))
bind$inet(r3, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

19:16:42 executing program 1:
perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYRESHEX], 0xffe8)
r3 = socket$inet(0x2, 0x3, 0x29)
r4 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4)
lstat(0x0, 0x0)
getresgid(0x0, 0x0, &(0x7f0000000d00))
bind$inet(r3, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

19:16:42 executing program 0:
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0)
futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = fcntl$dupfd(r1, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x2, 0x4004031, 0xffffffffffffffff, 0x0)
seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f0000000040))

19:16:42 executing program 1:
perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYRESHEX], 0xffe8)
r3 = socket$inet(0x2, 0x3, 0x29)
r4 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4)
lstat(0x0, 0x0)
getresgid(0x0, 0x0, &(0x7f0000000d00))
bind$inet(r3, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

[  135.974224][    C0] net_ratelimit: 6 callbacks suppressed
[  135.974233][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  135.985592][    C0] protocol 88fb is buggy, dev hsr_slave_1
19:16:42 executing program 3:
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0)
futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = fcntl$dupfd(r1, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x2, 0x4004031, 0xffffffffffffffff, 0x0)
seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f0000000040))

19:16:42 executing program 4:
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0)
futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = fcntl$dupfd(r1, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x2, 0x4004031, 0xffffffffffffffff, 0x0)
seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f0000000040))

19:16:42 executing program 5:
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0)
futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = fcntl$dupfd(r1, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x2, 0x4004031, 0xffffffffffffffff, 0x0)
seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f0000000040))

19:16:42 executing program 1:
perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYRESHEX], 0xffe8)
r3 = socket$inet(0x2, 0x3, 0x29)
r4 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4)
lstat(0x0, 0x0)
getresgid(0x0, 0x0, &(0x7f0000000d00))
bind$inet(r3, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

[  136.294310][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  136.300112][    C0] protocol 88fb is buggy, dev hsr_slave_1
19:16:43 executing program 2:
perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYRESHEX], 0xffe8)
r3 = socket$inet(0x2, 0x3, 0x29)
r4 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4)
lstat(0x0, 0x0)
getresgid(0x0, 0x0, &(0x7f0000000d00))
bind$inet(r3, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

[  136.454497][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  136.460305][    C0] protocol 88fb is buggy, dev hsr_slave_1
19:16:43 executing program 1:
perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYRESHEX], 0xffe8)
r3 = socket$inet(0x2, 0x3, 0x29)
r4 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4)
lstat(0x0, 0x0)
getresgid(0x0, 0x0, &(0x7f0000000d00))
bind$inet(r3, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

19:16:43 executing program 2:
perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYRESHEX], 0xffe8)
r3 = socket$inet(0x2, 0x3, 0x29)
r4 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4)
lstat(0x0, 0x0)
getresgid(0x0, 0x0, &(0x7f0000000d00))
bind$inet(r3, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

19:16:43 executing program 0:
perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYRESHEX], 0xffe8)
r3 = socket$inet(0x2, 0x3, 0x29)
r4 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4)
lstat(0x0, 0x0)
getresgid(0x0, 0x0, &(0x7f0000000d00))
bind$inet(r3, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

19:16:43 executing program 1:
perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYRESHEX], 0xffe8)
r3 = socket$inet(0x2, 0x3, 0x29)
r4 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4)
lstat(0x0, 0x0)
getresgid(0x0, 0x0, &(0x7f0000000d00))
bind$inet(r3, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

[  137.174245][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  137.180077][    C0] protocol 88fb is buggy, dev hsr_slave_1
[  137.344244][    C0] protocol 88fb is buggy, dev hsr_slave_0
[  137.350087][    C0] protocol 88fb is buggy, dev hsr_slave_1
19:16:44 executing program 0:
perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYRESHEX], 0xffe8)
r3 = socket$inet(0x2, 0x3, 0x29)
r4 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4)
lstat(0x0, 0x0)
getresgid(0x0, 0x0, &(0x7f0000000d00))
bind$inet(r3, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

19:16:44 executing program 3:
r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0xa0002, 0x0)
write$sndseq(r0, &(0x7f0000000080)=[{0x10081, 0x2, 0x0, 0x0, @tick, {}, {}, @queue}], 0x1c)

19:16:44 executing program 2:
perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYRESHEX], 0xffe8)
r3 = socket$inet(0x2, 0x3, 0x29)
r4 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4)
lstat(0x0, 0x0)
getresgid(0x0, 0x0, &(0x7f0000000d00))
bind$inet(r3, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

19:16:44 executing program 4:
r0 = socket$can_raw(0x1d, 0x3, 0x1)
r1 = socket(0x10, 0x80002, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000000)={'vxcan0\x00', <r2=>0x0})
bind$can_raw(r0, &(0x7f00000000c0)={0x1d, r2}, 0x10)
setsockopt$CAN_RAW_ERR_FILTER(r0, 0x65, 0x2, &(0x7f0000000040), 0x4)

19:16:44 executing program 1:
setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f00000000c0)={0x0, 'veth0_to_bond\x00'}, 0x18)
socket(0x0, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0)
recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000007d40), 0x10)
bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x6, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x101}, [@generic={0x4, 0x0, 0x2}, @generic={0x0, 0x0, 0xe, 0x0, 0x81}, @jmp={0x5, 0x1, 0x0, 0x7, 0x6, 0x1}]}, &(0x7f0000000100)='syzkaller\x00', 0xe2, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fcntl$setstatus(r2, 0x4, 0x2000)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0x0, r2, 0x0, 0x5, &(0x7f0000000440)='f2fs\x00'}, 0x30)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$P9_RREADLINK(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="3a258211f663a7724bdef6a53bfce1e775d740627227b11e2daf85534aa6f5083067b0248878f07a91df1acc99e664c11cbf51b4f6bff473492cfc5ead68cb6a050655a837ad411cb73394239fdd9e33efb5b63c5ff85708d8994e34841e04ec5f4962c4636b7fb34f186b86bb0467bdd13133ef429bda82f9b8e15eae491432dd2a52707c9ff05a83380901aeeba6a468acc01591"], 0x95)
sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe)
r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
r4 = creat(&(0x7f0000000000)='./file0\x00', 0x0)
write$P9_RREMOVE(r4, &(0x7f0000000040)={0x7}, 0x7)
ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000200)={0x0, r4, 0x0, 0x1a0ffffffff})
ioctl$VIDIOC_DQEVENT(r3, 0x80885659, &(0x7f0000000300)={0x0, @ctrl={0x0, 0x0, @value64}})

19:16:44 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10)
r1 = socket(0x10, 0x80002, 0x0)
ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071")
r2 = accept$alg(r0, 0x0, 0x0)
sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2f5}], 0x30}, 0x0)
write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8)
recvmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0)

19:16:44 executing program 3:
r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0xa0002, 0x0)
write$sndseq(r0, &(0x7f0000000080)=[{0x10081, 0x2, 0x0, 0x0, @tick, {}, {}, @queue}], 0x1c)

19:16:44 executing program 0:
perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
pipe(&(0x7f0000000080)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYRESHEX], 0xffe8)
r3 = socket$inet(0x2, 0x3, 0x29)
r4 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4)
lstat(0x0, 0x0)
getresgid(0x0, 0x0, &(0x7f0000000d00))
bind$inet(r3, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

19:16:44 executing program 2:
r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0xa0002, 0x0)
write$sndseq(r0, &(0x7f0000000080)=[{0x10081, 0x2, 0x0, 0x0, @tick, {}, {}, @queue}], 0x1c)

19:16:44 executing program 4:
r0 = socket$can_raw(0x1d, 0x3, 0x1)
r1 = socket(0x10, 0x80002, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000000)={'vxcan0\x00', <r2=>0x0})
bind$can_raw(r0, &(0x7f00000000c0)={0x1d, r2}, 0x10)
setsockopt$CAN_RAW_ERR_FILTER(r0, 0x65, 0x2, &(0x7f0000000040), 0x4)

19:16:45 executing program 0:
r0 = socket$can_raw(0x1d, 0x3, 0x1)
r1 = socket(0x10, 0x80002, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000000)={'vxcan0\x00', <r2=>0x0})
bind$can_raw(r0, &(0x7f00000000c0)={0x1d, r2}, 0x10)
setsockopt$CAN_RAW_ERR_FILTER(r0, 0x65, 0x2, &(0x7f0000000040), 0x4)

19:16:45 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10)
r1 = socket(0x10, 0x80002, 0x0)
ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071")
r2 = accept$alg(r0, 0x0, 0x0)
sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2f5}], 0x30}, 0x0)
write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8)
recvmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0)

19:16:45 executing program 3:
r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0xa0002, 0x0)
write$sndseq(r0, &(0x7f0000000080)=[{0x10081, 0x2, 0x0, 0x0, @tick, {}, {}, @queue}], 0x1c)

19:16:45 executing program 4:
r0 = socket$can_raw(0x1d, 0x3, 0x1)
r1 = socket(0x10, 0x80002, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000000)={'vxcan0\x00', <r2=>0x0})
bind$can_raw(r0, &(0x7f00000000c0)={0x1d, r2}, 0x10)
setsockopt$CAN_RAW_ERR_FILTER(r0, 0x65, 0x2, &(0x7f0000000040), 0x4)

19:16:45 executing program 2:
r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0xa0002, 0x0)
write$sndseq(r0, &(0x7f0000000080)=[{0x10081, 0x2, 0x0, 0x0, @tick, {}, {}, @queue}], 0x1c)

19:16:45 executing program 3:
r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0xa0002, 0x0)
write$sndseq(r0, &(0x7f0000000080)=[{0x10081, 0x2, 0x0, 0x0, @tick, {}, {}, @queue}], 0x1c)

[  138.734301][T10447] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 17)
[  138.787427][T10447] FAT-fs (loop1): Filesystem has been set read-only
[  138.788156][   T26] audit: type=1804 audit(1579029405.476:72): pid=10486 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir595147817/syzkaller.H5olM1/97/file0/file0" dev="loop1" ino=609 res=1
[  138.899561][T10447] FAT-fs (loop1): error, fat_free: invalid cluster chain (i_pos 17)
19:16:45 executing program 1:
setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f00000000c0)={0x0, 'veth0_to_bond\x00'}, 0x18)
socket(0x0, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0)
recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000007d40), 0x10)
bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x6, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x101}, [@generic={0x4, 0x0, 0x2}, @generic={0x0, 0x0, 0xe, 0x0, 0x81}, @jmp={0x5, 0x1, 0x0, 0x7, 0x6, 0x1}]}, &(0x7f0000000100)='syzkaller\x00', 0xe2, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fcntl$setstatus(r2, 0x4, 0x2000)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0x0, r2, 0x0, 0x5, &(0x7f0000000440)='f2fs\x00'}, 0x30)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$P9_RREADLINK(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="3a258211f663a7724bdef6a53bfce1e775d740627227b11e2daf85534aa6f5083067b0248878f07a91df1acc99e664c11cbf51b4f6bff473492cfc5ead68cb6a050655a837ad411cb73394239fdd9e33efb5b63c5ff85708d8994e34841e04ec5f4962c4636b7fb34f186b86bb0467bdd13133ef429bda82f9b8e15eae491432dd2a52707c9ff05a83380901aeeba6a468acc01591"], 0x95)
sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe)
r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
r4 = creat(&(0x7f0000000000)='./file0\x00', 0x0)
write$P9_RREMOVE(r4, &(0x7f0000000040)={0x7}, 0x7)
ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000200)={0x0, r4, 0x0, 0x1a0ffffffff})
ioctl$VIDIOC_DQEVENT(r3, 0x80885659, &(0x7f0000000300)={0x0, @ctrl={0x0, 0x0, @value64}})

19:16:45 executing program 2:
r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0xa0002, 0x0)
write$sndseq(r0, &(0x7f0000000080)=[{0x10081, 0x2, 0x0, 0x0, @tick, {}, {}, @queue}], 0x1c)

19:16:45 executing program 0:
r0 = socket$can_raw(0x1d, 0x3, 0x1)
r1 = socket(0x10, 0x80002, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000000)={'vxcan0\x00', <r2=>0x0})
bind$can_raw(r0, &(0x7f00000000c0)={0x1d, r2}, 0x10)
setsockopt$CAN_RAW_ERR_FILTER(r0, 0x65, 0x2, &(0x7f0000000040), 0x4)

19:16:45 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10)
r1 = socket(0x10, 0x80002, 0x0)
ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071")
r2 = accept$alg(r0, 0x0, 0x0)
sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2f5}], 0x30}, 0x0)
write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8)
recvmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0)

19:16:45 executing program 4:
r0 = socket$can_raw(0x1d, 0x3, 0x1)
r1 = socket(0x10, 0x80002, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000000)={'vxcan0\x00', <r2=>0x0})
bind$can_raw(r0, &(0x7f00000000c0)={0x1d, r2}, 0x10)
setsockopt$CAN_RAW_ERR_FILTER(r0, 0x65, 0x2, &(0x7f0000000040), 0x4)

19:16:45 executing program 3:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10)
r1 = socket(0x10, 0x80002, 0x0)
ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071")
r2 = accept$alg(r0, 0x0, 0x0)
sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2f5}], 0x30}, 0x0)
write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8)
recvmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0)

19:16:45 executing program 2:
setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f00000000c0)={0x0, 'veth0_to_bond\x00'}, 0x18)
socket(0x0, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0)
recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000007d40), 0x10)
bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x6, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x101}, [@generic={0x4, 0x0, 0x2}, @generic={0x0, 0x0, 0xe, 0x0, 0x81}, @jmp={0x5, 0x1, 0x0, 0x7, 0x6, 0x1}]}, &(0x7f0000000100)='syzkaller\x00', 0xe2, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fcntl$setstatus(r2, 0x4, 0x2000)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0x0, r2, 0x0, 0x5, &(0x7f0000000440)='f2fs\x00'}, 0x30)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$P9_RREADLINK(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="3a258211f663a7724bdef6a53bfce1e775d740627227b11e2daf85534aa6f5083067b0248878f07a91df1acc99e664c11cbf51b4f6bff473492cfc5ead68cb6a050655a837ad411cb73394239fdd9e33efb5b63c5ff85708d8994e34841e04ec5f4962c4636b7fb34f186b86bb0467bdd13133ef429bda82f9b8e15eae491432dd2a52707c9ff05a83380901aeeba6a468acc01591"], 0x95)
sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe)
r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
r4 = creat(&(0x7f0000000000)='./file0\x00', 0x0)
write$P9_RREMOVE(r4, &(0x7f0000000040)={0x7}, 0x7)
ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000200)={0x0, r4, 0x0, 0x1a0ffffffff})
ioctl$VIDIOC_DQEVENT(r3, 0x80885659, &(0x7f0000000300)={0x0, @ctrl={0x0, 0x0, @value64}})

19:16:45 executing program 4:
setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f00000000c0)={0x0, 'veth0_to_bond\x00'}, 0x18)
socket(0x0, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0)
recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000007d40), 0x10)
bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x6, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x101}, [@generic={0x4, 0x0, 0x2}, @generic={0x0, 0x0, 0xe, 0x0, 0x81}, @jmp={0x5, 0x1, 0x0, 0x7, 0x6, 0x1}]}, &(0x7f0000000100)='syzkaller\x00', 0xe2, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fcntl$setstatus(r2, 0x4, 0x2000)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0x0, r2, 0x0, 0x5, &(0x7f0000000440)='f2fs\x00'}, 0x30)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$P9_RREADLINK(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="3a258211f663a7724bdef6a53bfce1e775d740627227b11e2daf85534aa6f5083067b0248878f07a91df1acc99e664c11cbf51b4f6bff473492cfc5ead68cb6a050655a837ad411cb73394239fdd9e33efb5b63c5ff85708d8994e34841e04ec5f4962c4636b7fb34f186b86bb0467bdd13133ef429bda82f9b8e15eae491432dd2a52707c9ff05a83380901aeeba6a468acc01591"], 0x95)
sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe)
r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
r4 = creat(&(0x7f0000000000)='./file0\x00', 0x0)
write$P9_RREMOVE(r4, &(0x7f0000000040)={0x7}, 0x7)
ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000200)={0x0, r4, 0x0, 0x1a0ffffffff})
ioctl$VIDIOC_DQEVENT(r3, 0x80885659, &(0x7f0000000300)={0x0, @ctrl={0x0, 0x0, @value64}})

19:16:45 executing program 5:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10)
r1 = socket(0x10, 0x80002, 0x0)
ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071")
r2 = accept$alg(r0, 0x0, 0x0)
sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2f5}], 0x30}, 0x0)
write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8)
recvmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0)

19:16:45 executing program 3:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10)
r1 = socket(0x10, 0x80002, 0x0)
ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071")
r2 = accept$alg(r0, 0x0, 0x0)
sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2f5}], 0x30}, 0x0)
write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8)
recvmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0)

19:16:45 executing program 0:
r0 = socket$can_raw(0x1d, 0x3, 0x1)
r1 = socket(0x10, 0x80002, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000000)={'vxcan0\x00', <r2=>0x0})
bind$can_raw(r0, &(0x7f00000000c0)={0x1d, r2}, 0x10)
setsockopt$CAN_RAW_ERR_FILTER(r0, 0x65, 0x2, &(0x7f0000000040), 0x4)

[  139.610175][T10519] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 17)
[  139.619621][T10519] FAT-fs (loop2): Filesystem has been set read-only
[  139.628612][T10519] FAT-fs (loop2): error, fat_free: invalid cluster chain (i_pos 17)
19:16:46 executing program 0:
setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f00000000c0)={0x0, 'veth0_to_bond\x00'}, 0x18)
socket(0x0, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0)
recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000007d40), 0x10)
bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x6, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x101}, [@generic={0x4, 0x0, 0x2}, @generic={0x0, 0x0, 0xe, 0x0, 0x81}, @jmp={0x5, 0x1, 0x0, 0x7, 0x6, 0x1}]}, &(0x7f0000000100)='syzkaller\x00', 0xe2, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fcntl$setstatus(r2, 0x4, 0x2000)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0x0, r2, 0x0, 0x5, &(0x7f0000000440)='f2fs\x00'}, 0x30)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$P9_RREADLINK(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="3a258211f663a7724bdef6a53bfce1e775d740627227b11e2daf85534aa6f5083067b0248878f07a91df1acc99e664c11cbf51b4f6bff473492cfc5ead68cb6a050655a837ad411cb73394239fdd9e33efb5b63c5ff85708d8994e34841e04ec5f4962c4636b7fb34f186b86bb0467bdd13133ef429bda82f9b8e15eae491432dd2a52707c9ff05a83380901aeeba6a468acc01591"], 0x95)
sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe)
r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
r4 = creat(&(0x7f0000000000)='./file0\x00', 0x0)
write$P9_RREMOVE(r4, &(0x7f0000000040)={0x7}, 0x7)
ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000200)={0x0, r4, 0x0, 0x1a0ffffffff})
ioctl$VIDIOC_DQEVENT(r3, 0x80885659, &(0x7f0000000300)={0x0, @ctrl={0x0, 0x0, @value64}})

19:16:46 executing program 1:
setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f00000000c0)={0x0, 'veth0_to_bond\x00'}, 0x18)
socket(0x0, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0)
recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000007d40), 0x10)
bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x6, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x101}, [@generic={0x4, 0x0, 0x2}, @generic={0x0, 0x0, 0xe, 0x0, 0x81}, @jmp={0x5, 0x1, 0x0, 0x7, 0x6, 0x1}]}, &(0x7f0000000100)='syzkaller\x00', 0xe2, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fcntl$setstatus(r2, 0x4, 0x2000)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0x0, r2, 0x0, 0x5, &(0x7f0000000440)='f2fs\x00'}, 0x30)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$P9_RREADLINK(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="3a258211f663a7724bdef6a53bfce1e775d740627227b11e2daf85534aa6f5083067b0248878f07a91df1acc99e664c11cbf51b4f6bff473492cfc5ead68cb6a050655a837ad411cb73394239fdd9e33efb5b63c5ff85708d8994e34841e04ec5f4962c4636b7fb34f186b86bb0467bdd13133ef429bda82f9b8e15eae491432dd2a52707c9ff05a83380901aeeba6a468acc01591"], 0x95)
sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe)
r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
r4 = creat(&(0x7f0000000000)='./file0\x00', 0x0)
write$P9_RREMOVE(r4, &(0x7f0000000040)={0x7}, 0x7)
ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000200)={0x0, r4, 0x0, 0x1a0ffffffff})
ioctl$VIDIOC_DQEVENT(r3, 0x80885659, &(0x7f0000000300)={0x0, @ctrl={0x0, 0x0, @value64}})

19:16:46 executing program 2:
setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f00000000c0)={0x0, 'veth0_to_bond\x00'}, 0x18)
socket(0x0, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0)
recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000007d40), 0x10)
bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x6, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x101}, [@generic={0x4, 0x0, 0x2}, @generic={0x0, 0x0, 0xe, 0x0, 0x81}, @jmp={0x5, 0x1, 0x0, 0x7, 0x6, 0x1}]}, &(0x7f0000000100)='syzkaller\x00', 0xe2, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fcntl$setstatus(r2, 0x4, 0x2000)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0x0, r2, 0x0, 0x5, &(0x7f0000000440)='f2fs\x00'}, 0x30)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$P9_RREADLINK(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="3a258211f663a7724bdef6a53bfce1e775d740627227b11e2daf85534aa6f5083067b0248878f07a91df1acc99e664c11cbf51b4f6bff473492cfc5ead68cb6a050655a837ad411cb73394239fdd9e33efb5b63c5ff85708d8994e34841e04ec5f4962c4636b7fb34f186b86bb0467bdd13133ef429bda82f9b8e15eae491432dd2a52707c9ff05a83380901aeeba6a468acc01591"], 0x95)
sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe)
r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
r4 = creat(&(0x7f0000000000)='./file0\x00', 0x0)
write$P9_RREMOVE(r4, &(0x7f0000000040)={0x7}, 0x7)
ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000200)={0x0, r4, 0x0, 0x1a0ffffffff})
ioctl$VIDIOC_DQEVENT(r3, 0x80885659, &(0x7f0000000300)={0x0, @ctrl={0x0, 0x0, @value64}})

19:16:46 executing program 3:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10)
r1 = socket(0x10, 0x80002, 0x0)
ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071")
r2 = accept$alg(r0, 0x0, 0x0)
sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2f5}], 0x30}, 0x0)
write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8)
recvmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0)

19:16:46 executing program 5:
setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f00000000c0)={0x0, 'veth0_to_bond\x00'}, 0x18)
socket(0x0, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0)
recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000007d40), 0x10)
bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x6, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x101}, [@generic={0x4, 0x0, 0x2}, @generic={0x0, 0x0, 0xe, 0x0, 0x81}, @jmp={0x5, 0x1, 0x0, 0x7, 0x6, 0x1}]}, &(0x7f0000000100)='syzkaller\x00', 0xe2, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fcntl$setstatus(r2, 0x4, 0x2000)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0x0, r2, 0x0, 0x5, &(0x7f0000000440)='f2fs\x00'}, 0x30)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$P9_RREADLINK(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="3a258211f663a7724bdef6a53bfce1e775d740627227b11e2daf85534aa6f5083067b0248878f07a91df1acc99e664c11cbf51b4f6bff473492cfc5ead68cb6a050655a837ad411cb73394239fdd9e33efb5b63c5ff85708d8994e34841e04ec5f4962c4636b7fb34f186b86bb0467bdd13133ef429bda82f9b8e15eae491432dd2a52707c9ff05a83380901aeeba6a468acc01591"], 0x95)
sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe)
r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
r4 = creat(&(0x7f0000000000)='./file0\x00', 0x0)
write$P9_RREMOVE(r4, &(0x7f0000000040)={0x7}, 0x7)
ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000200)={0x0, r4, 0x0, 0x1a0ffffffff})
ioctl$VIDIOC_DQEVENT(r3, 0x80885659, &(0x7f0000000300)={0x0, @ctrl={0x0, 0x0, @value64}})

[  140.121137][T10526] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 17)
19:16:46 executing program 3:
setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f00000000c0)={0x0, 'veth0_to_bond\x00'}, 0x18)
socket(0x0, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0)
recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000007d40), 0x10)
bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x6, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x101}, [@generic={0x4, 0x0, 0x2}, @generic={0x0, 0x0, 0xe, 0x0, 0x81}, @jmp={0x5, 0x1, 0x0, 0x7, 0x6, 0x1}]}, &(0x7f0000000100)='syzkaller\x00', 0xe2, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fcntl$setstatus(r2, 0x4, 0x2000)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0x0, r2, 0x0, 0x5, &(0x7f0000000440)='f2fs\x00'}, 0x30)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$P9_RREADLINK(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="3a258211f663a7724bdef6a53bfce1e775d740627227b11e2daf85534aa6f5083067b0248878f07a91df1acc99e664c11cbf51b4f6bff473492cfc5ead68cb6a050655a837ad411cb73394239fdd9e33efb5b63c5ff85708d8994e34841e04ec5f4962c4636b7fb34f186b86bb0467bdd13133ef429bda82f9b8e15eae491432dd2a52707c9ff05a83380901aeeba6a468acc01591"], 0x95)
sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe)
r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
r4 = creat(&(0x7f0000000000)='./file0\x00', 0x0)
write$P9_RREMOVE(r4, &(0x7f0000000040)={0x7}, 0x7)
ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000200)={0x0, r4, 0x0, 0x1a0ffffffff})
ioctl$VIDIOC_DQEVENT(r3, 0x80885659, &(0x7f0000000300)={0x0, @ctrl={0x0, 0x0, @value64}})

[  140.272351][T10526] FAT-fs (loop4): Filesystem has been set read-only
19:16:47 executing program 4:
setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f00000000c0)={0x0, 'veth0_to_bond\x00'}, 0x18)
socket(0x0, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0)
recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000007d40), 0x10)
bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x6, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x101}, [@generic={0x4, 0x0, 0x2}, @generic={0x0, 0x0, 0xe, 0x0, 0x81}, @jmp={0x5, 0x1, 0x0, 0x7, 0x6, 0x1}]}, &(0x7f0000000100)='syzkaller\x00', 0xe2, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fcntl$setstatus(r2, 0x4, 0x2000)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0x0, r2, 0x0, 0x5, &(0x7f0000000440)='f2fs\x00'}, 0x30)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$P9_RREADLINK(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="3a258211f663a7724bdef6a53bfce1e775d740627227b11e2daf85534aa6f5083067b0248878f07a91df1acc99e664c11cbf51b4f6bff473492cfc5ead68cb6a050655a837ad411cb73394239fdd9e33efb5b63c5ff85708d8994e34841e04ec5f4962c4636b7fb34f186b86bb0467bdd13133ef429bda82f9b8e15eae491432dd2a52707c9ff05a83380901aeeba6a468acc01591"], 0x95)
sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe)
r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
r4 = creat(&(0x7f0000000000)='./file0\x00', 0x0)
write$P9_RREMOVE(r4, &(0x7f0000000040)={0x7}, 0x7)
ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000200)={0x0, r4, 0x0, 0x1a0ffffffff})
ioctl$VIDIOC_DQEVENT(r3, 0x80885659, &(0x7f0000000300)={0x0, @ctrl={0x0, 0x0, @value64}})

[  140.361583][T10526] FAT-fs (loop4): error, fat_free: invalid cluster chain (i_pos 17)
[  140.891706][T10560] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 17)
[  140.908474][T10560] FAT-fs (loop1): Filesystem has been set read-only
19:16:47 executing program 0:
setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f00000000c0)={0x0, 'veth0_to_bond\x00'}, 0x18)
socket(0x0, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0)
recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000007d40), 0x10)
bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x6, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x101}, [@generic={0x4, 0x0, 0x2}, @generic={0x0, 0x0, 0xe, 0x0, 0x81}, @jmp={0x5, 0x1, 0x0, 0x7, 0x6, 0x1}]}, &(0x7f0000000100)='syzkaller\x00', 0xe2, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fcntl$setstatus(r2, 0x4, 0x2000)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0x0, r2, 0x0, 0x5, &(0x7f0000000440)='f2fs\x00'}, 0x30)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$P9_RREADLINK(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="3a258211f663a7724bdef6a53bfce1e775d740627227b11e2daf85534aa6f5083067b0248878f07a91df1acc99e664c11cbf51b4f6bff473492cfc5ead68cb6a050655a837ad411cb73394239fdd9e33efb5b63c5ff85708d8994e34841e04ec5f4962c4636b7fb34f186b86bb0467bdd13133ef429bda82f9b8e15eae491432dd2a52707c9ff05a83380901aeeba6a468acc01591"], 0x95)
sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe)
r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
r4 = creat(&(0x7f0000000000)='./file0\x00', 0x0)
write$P9_RREMOVE(r4, &(0x7f0000000040)={0x7}, 0x7)
ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000200)={0x0, r4, 0x0, 0x1a0ffffffff})
ioctl$VIDIOC_DQEVENT(r3, 0x80885659, &(0x7f0000000300)={0x0, @ctrl={0x0, 0x0, @value64}})

[  140.947487][T10560] FAT-fs (loop1): error, fat_free: invalid cluster chain (i_pos 17)
[  141.009758][T10549] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 17)
[  141.021417][T10560] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 17)
19:16:47 executing program 5:
setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f00000000c0)={0x0, 'veth0_to_bond\x00'}, 0x18)
socket(0x0, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0)
recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000007d40), 0x10)
bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x6, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x101}, [@generic={0x4, 0x0, 0x2}, @generic={0x0, 0x0, 0xe, 0x0, 0x81}, @jmp={0x5, 0x1, 0x0, 0x7, 0x6, 0x1}]}, &(0x7f0000000100)='syzkaller\x00', 0xe2, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fcntl$setstatus(r2, 0x4, 0x2000)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0x0, r2, 0x0, 0x5, &(0x7f0000000440)='f2fs\x00'}, 0x30)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$P9_RREADLINK(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="3a258211f663a7724bdef6a53bfce1e775d740627227b11e2daf85534aa6f5083067b0248878f07a91df1acc99e664c11cbf51b4f6bff473492cfc5ead68cb6a050655a837ad411cb73394239fdd9e33efb5b63c5ff85708d8994e34841e04ec5f4962c4636b7fb34f186b86bb0467bdd13133ef429bda82f9b8e15eae491432dd2a52707c9ff05a83380901aeeba6a468acc01591"], 0x95)
sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe)
r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
r4 = creat(&(0x7f0000000000)='./file0\x00', 0x0)
write$P9_RREMOVE(r4, &(0x7f0000000040)={0x7}, 0x7)
ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000200)={0x0, r4, 0x0, 0x1a0ffffffff})
ioctl$VIDIOC_DQEVENT(r3, 0x80885659, &(0x7f0000000300)={0x0, @ctrl={0x0, 0x0, @value64}})

[  141.180629][T10549] FAT-fs (loop2): Filesystem has been set read-only
[  141.190297][T10560] FAT-fs (loop1): error, fat_free: invalid cluster chain (i_pos 17)
[  141.215124][T10566] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17)
[  141.224004][T10566] FAT-fs (loop3): Filesystem has been set read-only
[  141.251169][T10566] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 17)
[  141.266986][T10549] FAT-fs (loop2): error, fat_free: invalid cluster chain (i_pos 17)
19:16:48 executing program 2:
setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f00000000c0)={0x0, 'veth0_to_bond\x00'}, 0x18)
socket(0x0, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0)
recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000007d40), 0x10)
bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x6, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x101}, [@generic={0x4, 0x0, 0x2}, @generic={0x0, 0x0, 0xe, 0x0, 0x81}, @jmp={0x5, 0x1, 0x0, 0x7, 0x6, 0x1}]}, &(0x7f0000000100)='syzkaller\x00', 0xe2, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fcntl$setstatus(r2, 0x4, 0x2000)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0x0, r2, 0x0, 0x5, &(0x7f0000000440)='f2fs\x00'}, 0x30)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$P9_RREADLINK(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="3a258211f663a7724bdef6a53bfce1e775d740627227b11e2daf85534aa6f5083067b0248878f07a91df1acc99e664c11cbf51b4f6bff473492cfc5ead68cb6a050655a837ad411cb73394239fdd9e33efb5b63c5ff85708d8994e34841e04ec5f4962c4636b7fb34f186b86bb0467bdd13133ef429bda82f9b8e15eae491432dd2a52707c9ff05a83380901aeeba6a468acc01591"], 0x95)
sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe)
r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
r4 = creat(&(0x7f0000000000)='./file0\x00', 0x0)
write$P9_RREMOVE(r4, &(0x7f0000000040)={0x7}, 0x7)
ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000200)={0x0, r4, 0x0, 0x1a0ffffffff})
ioctl$VIDIOC_DQEVENT(r3, 0x80885659, &(0x7f0000000300)={0x0, @ctrl={0x0, 0x0, @value64}})

19:16:48 executing program 1:
setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f00000000c0)={0x0, 'veth0_to_bond\x00'}, 0x18)
socket(0x0, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0)
recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000007d40), 0x10)
bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x6, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x101}, [@generic={0x4, 0x0, 0x2}, @generic={0x0, 0x0, 0xe, 0x0, 0x81}, @jmp={0x5, 0x1, 0x0, 0x7, 0x6, 0x1}]}, &(0x7f0000000100)='syzkaller\x00', 0xe2, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fcntl$setstatus(r2, 0x4, 0x2000)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0x0, r2, 0x0, 0x5, &(0x7f0000000440)='f2fs\x00'}, 0x30)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$P9_RREADLINK(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="3a258211f663a7724bdef6a53bfce1e775d740627227b11e2daf85534aa6f5083067b0248878f07a91df1acc99e664c11cbf51b4f6bff473492cfc5ead68cb6a050655a837ad411cb73394239fdd9e33efb5b63c5ff85708d8994e34841e04ec5f4962c4636b7fb34f186b86bb0467bdd13133ef429bda82f9b8e15eae491432dd2a52707c9ff05a83380901aeeba6a468acc01591"], 0x95)
sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe)
r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
r4 = creat(&(0x7f0000000000)='./file0\x00', 0x0)
write$P9_RREMOVE(r4, &(0x7f0000000040)={0x7}, 0x7)
ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000200)={0x0, r4, 0x0, 0x1a0ffffffff})
ioctl$VIDIOC_DQEVENT(r3, 0x80885659, &(0x7f0000000300)={0x0, @ctrl={0x0, 0x0, @value64}})

19:16:48 executing program 3:
setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f00000000c0)={0x0, 'veth0_to_bond\x00'}, 0x18)
socket(0x0, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0)
recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000007d40), 0x10)
bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x6, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x101}, [@generic={0x4, 0x0, 0x2}, @generic={0x0, 0x0, 0xe, 0x0, 0x81}, @jmp={0x5, 0x1, 0x0, 0x7, 0x6, 0x1}]}, &(0x7f0000000100)='syzkaller\x00', 0xe2, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fcntl$setstatus(r2, 0x4, 0x2000)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0x0, r2, 0x0, 0x5, &(0x7f0000000440)='f2fs\x00'}, 0x30)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$P9_RREADLINK(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="3a258211f663a7724bdef6a53bfce1e775d740627227b11e2daf85534aa6f5083067b0248878f07a91df1acc99e664c11cbf51b4f6bff473492cfc5ead68cb6a050655a837ad411cb73394239fdd9e33efb5b63c5ff85708d8994e34841e04ec5f4962c4636b7fb34f186b86bb0467bdd13133ef429bda82f9b8e15eae491432dd2a52707c9ff05a83380901aeeba6a468acc01591"], 0x95)
sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe)
r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
r4 = creat(&(0x7f0000000000)='./file0\x00', 0x0)
write$P9_RREMOVE(r4, &(0x7f0000000040)={0x7}, 0x7)
ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000200)={0x0, r4, 0x0, 0x1a0ffffffff})
ioctl$VIDIOC_DQEVENT(r3, 0x80885659, &(0x7f0000000300)={0x0, @ctrl={0x0, 0x0, @value64}})

19:16:48 executing program 4:
setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f00000000c0)={0x0, 'veth0_to_bond\x00'}, 0x18)
socket(0x0, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0)
recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000007d40), 0x10)
bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x6, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x101}, [@generic={0x4, 0x0, 0x2}, @generic={0x0, 0x0, 0xe, 0x0, 0x81}, @jmp={0x5, 0x1, 0x0, 0x7, 0x6, 0x1}]}, &(0x7f0000000100)='syzkaller\x00', 0xe2, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fcntl$setstatus(r2, 0x4, 0x2000)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0x0, r2, 0x0, 0x5, &(0x7f0000000440)='f2fs\x00'}, 0x30)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$P9_RREADLINK(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="3a258211f663a7724bdef6a53bfce1e775d740627227b11e2daf85534aa6f5083067b0248878f07a91df1acc99e664c11cbf51b4f6bff473492cfc5ead68cb6a050655a837ad411cb73394239fdd9e33efb5b63c5ff85708d8994e34841e04ec5f4962c4636b7fb34f186b86bb0467bdd13133ef429bda82f9b8e15eae491432dd2a52707c9ff05a83380901aeeba6a468acc01591"], 0x95)
sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe)
r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
r4 = creat(&(0x7f0000000000)='./file0\x00', 0x0)
write$P9_RREMOVE(r4, &(0x7f0000000040)={0x7}, 0x7)
ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000200)={0x0, r4, 0x0, 0x1a0ffffffff})
ioctl$VIDIOC_DQEVENT(r3, 0x80885659, &(0x7f0000000300)={0x0, @ctrl={0x0, 0x0, @value64}})

[  141.847760][T10588] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 17)
[  141.874563][T10588] FAT-fs (loop0): Filesystem has been set read-only
[  141.913105][T10588] FAT-fs (loop0): error, fat_free: invalid cluster chain (i_pos 17)
[  142.228501][T10595] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 17)
[  142.237853][T10595] FAT-fs (loop5): Filesystem has been set read-only
[  142.247069][T10595] FAT-fs (loop5): error, fat_free: invalid cluster chain (i_pos 17)
[  142.261005][T10595] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 17)
[  142.272200][T10595] FAT-fs (loop5): error, fat_free: invalid cluster chain (i_pos 17)
19:16:49 executing program 0:
setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f00000000c0)={0x0, 'veth0_to_bond\x00'}, 0x18)
socket(0x0, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0)
recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000007d40), 0x10)
bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x6, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x101}, [@generic={0x4, 0x0, 0x2}, @generic={0x0, 0x0, 0xe, 0x0, 0x81}, @jmp={0x5, 0x1, 0x0, 0x7, 0x6, 0x1}]}, &(0x7f0000000100)='syzkaller\x00', 0xe2, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fcntl$setstatus(r2, 0x4, 0x2000)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0x0, r2, 0x0, 0x5, &(0x7f0000000440)='f2fs\x00'}, 0x30)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$P9_RREADLINK(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="3a258211f663a7724bdef6a53bfce1e775d740627227b11e2daf85534aa6f5083067b0248878f07a91df1acc99e664c11cbf51b4f6bff473492cfc5ead68cb6a050655a837ad411cb73394239fdd9e33efb5b63c5ff85708d8994e34841e04ec5f4962c4636b7fb34f186b86bb0467bdd13133ef429bda82f9b8e15eae491432dd2a52707c9ff05a83380901aeeba6a468acc01591"], 0x95)
sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe)
r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
r4 = creat(&(0x7f0000000000)='./file0\x00', 0x0)
write$P9_RREMOVE(r4, &(0x7f0000000040)={0x7}, 0x7)
ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000200)={0x0, r4, 0x0, 0x1a0ffffffff})
ioctl$VIDIOC_DQEVENT(r3, 0x80885659, &(0x7f0000000300)={0x0, @ctrl={0x0, 0x0, @value64}})

19:16:49 executing program 5:
setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f00000000c0)={0x0, 'veth0_to_bond\x00'}, 0x18)
socket(0x0, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0)
recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000007d40), 0x10)
bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x6, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x101}, [@generic={0x4, 0x0, 0x2}, @generic={0x0, 0x0, 0xe, 0x0, 0x81}, @jmp={0x5, 0x1, 0x0, 0x7, 0x6, 0x1}]}, &(0x7f0000000100)='syzkaller\x00', 0xe2, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fcntl$setstatus(r2, 0x4, 0x2000)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0x0, r2, 0x0, 0x5, &(0x7f0000000440)='f2fs\x00'}, 0x30)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$P9_RREADLINK(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="3a258211f663a7724bdef6a53bfce1e775d740627227b11e2daf85534aa6f5083067b0248878f07a91df1acc99e664c11cbf51b4f6bff473492cfc5ead68cb6a050655a837ad411cb73394239fdd9e33efb5b63c5ff85708d8994e34841e04ec5f4962c4636b7fb34f186b86bb0467bdd13133ef429bda82f9b8e15eae491432dd2a52707c9ff05a83380901aeeba6a468acc01591"], 0x95)
sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe)
r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
r4 = creat(&(0x7f0000000000)='./file0\x00', 0x0)
write$P9_RREMOVE(r4, &(0x7f0000000040)={0x7}, 0x7)
ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000200)={0x0, r4, 0x0, 0x1a0ffffffff})
ioctl$VIDIOC_DQEVENT(r3, 0x80885659, &(0x7f0000000300)={0x0, @ctrl={0x0, 0x0, @value64}})

19:16:49 executing program 2:
setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f00000000c0)={0x0, 'veth0_to_bond\x00'}, 0x18)
socket(0x0, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0)
recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000007d40), 0x10)
bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x6, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x101}, [@generic={0x4, 0x0, 0x2}, @generic={0x0, 0x0, 0xe, 0x0, 0x81}, @jmp={0x5, 0x1, 0x0, 0x7, 0x6, 0x1}]}, &(0x7f0000000100)='syzkaller\x00', 0xe2, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fcntl$setstatus(r2, 0x4, 0x2000)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0x0, r2, 0x0, 0x5, &(0x7f0000000440)='f2fs\x00'}, 0x30)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$P9_RREADLINK(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="3a258211f663a7724bdef6a53bfce1e775d740627227b11e2daf85534aa6f5083067b0248878f07a91df1acc99e664c11cbf51b4f6bff473492cfc5ead68cb6a050655a837ad411cb73394239fdd9e33efb5b63c5ff85708d8994e34841e04ec5f4962c4636b7fb34f186b86bb0467bdd13133ef429bda82f9b8e15eae491432dd2a52707c9ff05a83380901aeeba6a468acc01591"], 0x95)
sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe)
r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
r4 = creat(&(0x7f0000000000)='./file0\x00', 0x0)
write$P9_RREMOVE(r4, &(0x7f0000000040)={0x7}, 0x7)
ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000200)={0x0, r4, 0x0, 0x1a0ffffffff})
ioctl$VIDIOC_DQEVENT(r3, 0x80885659, &(0x7f0000000300)={0x0, @ctrl={0x0, 0x0, @value64}})

19:16:49 executing program 3:
setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f00000000c0)={0x0, 'veth0_to_bond\x00'}, 0x18)
socket(0x0, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0)
recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000007d40), 0x10)
bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x6, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x101}, [@generic={0x4, 0x0, 0x2}, @generic={0x0, 0x0, 0xe, 0x0, 0x81}, @jmp={0x5, 0x1, 0x0, 0x7, 0x6, 0x1}]}, &(0x7f0000000100)='syzkaller\x00', 0xe2, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fcntl$setstatus(r2, 0x4, 0x2000)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0x0, r2, 0x0, 0x5, &(0x7f0000000440)='f2fs\x00'}, 0x30)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$P9_RREADLINK(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="3a258211f663a7724bdef6a53bfce1e775d740627227b11e2daf85534aa6f5083067b0248878f07a91df1acc99e664c11cbf51b4f6bff473492cfc5ead68cb6a050655a837ad411cb73394239fdd9e33efb5b63c5ff85708d8994e34841e04ec5f4962c4636b7fb34f186b86bb0467bdd13133ef429bda82f9b8e15eae491432dd2a52707c9ff05a83380901aeeba6a468acc01591"], 0x95)
sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe)
r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
r4 = creat(&(0x7f0000000000)='./file0\x00', 0x0)
write$P9_RREMOVE(r4, &(0x7f0000000040)={0x7}, 0x7)
ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000200)={0x0, r4, 0x0, 0x1a0ffffffff})
ioctl$VIDIOC_DQEVENT(r3, 0x80885659, &(0x7f0000000300)={0x0, @ctrl={0x0, 0x0, @value64}})

19:16:49 executing program 1:
setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f00000000c0)={0x0, 'veth0_to_bond\x00'}, 0x18)
socket(0x0, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0)
recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000007d40), 0x10)
bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x6, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x101}, [@generic={0x4, 0x0, 0x2}, @generic={0x0, 0x0, 0xe, 0x0, 0x81}, @jmp={0x5, 0x1, 0x0, 0x7, 0x6, 0x1}]}, &(0x7f0000000100)='syzkaller\x00', 0xe2, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fcntl$setstatus(r2, 0x4, 0x2000)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0x0, r2, 0x0, 0x5, &(0x7f0000000440)='f2fs\x00'}, 0x30)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$P9_RREADLINK(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="3a258211f663a7724bdef6a53bfce1e775d740627227b11e2daf85534aa6f5083067b0248878f07a91df1acc99e664c11cbf51b4f6bff473492cfc5ead68cb6a050655a837ad411cb73394239fdd9e33efb5b63c5ff85708d8994e34841e04ec5f4962c4636b7fb34f186b86bb0467bdd13133ef429bda82f9b8e15eae491432dd2a52707c9ff05a83380901aeeba6a468acc01591"], 0x95)
sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe)
r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
r4 = creat(&(0x7f0000000000)='./file0\x00', 0x0)
write$P9_RREMOVE(r4, &(0x7f0000000040)={0x7}, 0x7)
ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000200)={0x0, r4, 0x0, 0x1a0ffffffff})
ioctl$VIDIOC_DQEVENT(r3, 0x80885659, &(0x7f0000000300)={0x0, @ctrl={0x0, 0x0, @value64}})

[  143.245943][T10636] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 17)
[  143.346171][T10636] FAT-fs (loop0): Filesystem has been set read-only
[  143.364519][T10636] FAT-fs (loop0): error, fat_free: invalid cluster chain (i_pos 17)
19:16:50 executing program 4:
setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f00000000c0)={0x0, 'veth0_to_bond\x00'}, 0x18)
socket(0x0, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0)
recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000007d40), 0x10)
bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x6, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x101}, [@generic={0x4, 0x0, 0x2}, @generic={0x0, 0x0, 0xe, 0x0, 0x81}, @jmp={0x5, 0x1, 0x0, 0x7, 0x6, 0x1}]}, &(0x7f0000000100)='syzkaller\x00', 0xe2, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fcntl$setstatus(r2, 0x4, 0x2000)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0x0, r2, 0x0, 0x5, &(0x7f0000000440)='f2fs\x00'}, 0x30)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$P9_RREADLINK(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="3a258211f663a7724bdef6a53bfce1e775d740627227b11e2daf85534aa6f5083067b0248878f07a91df1acc99e664c11cbf51b4f6bff473492cfc5ead68cb6a050655a837ad411cb73394239fdd9e33efb5b63c5ff85708d8994e34841e04ec5f4962c4636b7fb34f186b86bb0467bdd13133ef429bda82f9b8e15eae491432dd2a52707c9ff05a83380901aeeba6a468acc01591"], 0x95)
sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe)
r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
r4 = creat(&(0x7f0000000000)='./file0\x00', 0x0)
write$P9_RREMOVE(r4, &(0x7f0000000040)={0x7}, 0x7)
ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000200)={0x0, r4, 0x0, 0x1a0ffffffff})
ioctl$VIDIOC_DQEVENT(r3, 0x80885659, &(0x7f0000000300)={0x0, @ctrl={0x0, 0x0, @value64}})

19:16:50 executing program 5:
setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f00000000c0)={0x0, 'veth0_to_bond\x00'}, 0x18)
socket(0x0, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0)
recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000007d40), 0x10)
bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x6, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x101}, [@generic={0x4, 0x0, 0x2}, @generic={0x0, 0x0, 0xe, 0x0, 0x81}, @jmp={0x5, 0x1, 0x0, 0x7, 0x6, 0x1}]}, &(0x7f0000000100)='syzkaller\x00', 0xe2, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fcntl$setstatus(r2, 0x4, 0x2000)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0x0, r2, 0x0, 0x5, &(0x7f0000000440)='f2fs\x00'}, 0x30)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$P9_RREADLINK(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="3a258211f663a7724bdef6a53bfce1e775d740627227b11e2daf85534aa6f5083067b0248878f07a91df1acc99e664c11cbf51b4f6bff473492cfc5ead68cb6a050655a837ad411cb73394239fdd9e33efb5b63c5ff85708d8994e34841e04ec5f4962c4636b7fb34f186b86bb0467bdd13133ef429bda82f9b8e15eae491432dd2a52707c9ff05a83380901aeeba6a468acc01591"], 0x95)
sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe)
r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
r4 = creat(&(0x7f0000000000)='./file0\x00', 0x0)
write$P9_RREMOVE(r4, &(0x7f0000000040)={0x7}, 0x7)
ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000200)={0x0, r4, 0x0, 0x1a0ffffffff})
ioctl$VIDIOC_DQEVENT(r3, 0x80885659, &(0x7f0000000300)={0x0, @ctrl={0x0, 0x0, @value64}})

[  143.514576][T10651] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 17)
[  143.534892][T10651] FAT-fs (loop2): Filesystem has been set read-only
[  143.545143][T10651] FAT-fs (loop2): error, fat_free: invalid cluster chain (i_pos 17)
19:16:50 executing program 0:
setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f00000000c0)={0x0, 'veth0_to_bond\x00'}, 0x18)
socket(0x0, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0)
recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000007d40), 0x10)
bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x6, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x101}, [@generic={0x4, 0x0, 0x2}, @generic={0x0, 0x0, 0xe, 0x0, 0x81}, @jmp={0x5, 0x1, 0x0, 0x7, 0x6, 0x1}]}, &(0x7f0000000100)='syzkaller\x00', 0xe2, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fcntl$setstatus(r2, 0x4, 0x2000)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0x0, r2, 0x0, 0x5, &(0x7f0000000440)='f2fs\x00'}, 0x30)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$P9_RREADLINK(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="3a258211f663a7724bdef6a53bfce1e775d740627227b11e2daf85534aa6f5083067b0248878f07a91df1acc99e664c11cbf51b4f6bff473492cfc5ead68cb6a050655a837ad411cb73394239fdd9e33efb5b63c5ff85708d8994e34841e04ec5f4962c4636b7fb34f186b86bb0467bdd13133ef429bda82f9b8e15eae491432dd2a52707c9ff05a83380901aeeba6a468acc01591"], 0x95)
sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe)
r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
r4 = creat(&(0x7f0000000000)='./file0\x00', 0x0)
write$P9_RREMOVE(r4, &(0x7f0000000040)={0x7}, 0x7)
ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000200)={0x0, r4, 0x0, 0x1a0ffffffff})
ioctl$VIDIOC_DQEVENT(r3, 0x80885659, &(0x7f0000000300)={0x0, @ctrl={0x0, 0x0, @value64}})

[  143.950850][T10667] FAT-fs (loop1): error, fat_get_cluster: invalid cluster chain (i_pos 17)
[  143.960321][T10667] FAT-fs (loop1): Filesystem has been set read-only
[  143.971081][T10667] FAT-fs (loop1): error, fat_free: invalid cluster chain (i_pos 17)
19:16:50 executing program 3:
setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f00000000c0)={0x0, 'veth0_to_bond\x00'}, 0x18)
socket(0x0, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0)
recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000007d40), 0x10)
bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x6, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x101}, [@generic={0x4, 0x0, 0x2}, @generic={0x0, 0x0, 0xe, 0x0, 0x81}, @jmp={0x5, 0x1, 0x0, 0x7, 0x6, 0x1}]}, &(0x7f0000000100)='syzkaller\x00', 0xe2, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fcntl$setstatus(r2, 0x4, 0x2000)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0x0, r2, 0x0, 0x5, &(0x7f0000000440)='f2fs\x00'}, 0x30)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$P9_RREADLINK(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="3a258211f663a7724bdef6a53bfce1e775d740627227b11e2daf85534aa6f5083067b0248878f07a91df1acc99e664c11cbf51b4f6bff473492cfc5ead68cb6a050655a837ad411cb73394239fdd9e33efb5b63c5ff85708d8994e34841e04ec5f4962c4636b7fb34f186b86bb0467bdd13133ef429bda82f9b8e15eae491432dd2a52707c9ff05a83380901aeeba6a468acc01591"], 0x95)
sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe)
r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
r4 = creat(&(0x7f0000000000)='./file0\x00', 0x0)
write$P9_RREMOVE(r4, &(0x7f0000000040)={0x7}, 0x7)
ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000200)={0x0, r4, 0x0, 0x1a0ffffffff})
ioctl$VIDIOC_DQEVENT(r3, 0x80885659, &(0x7f0000000300)={0x0, @ctrl={0x0, 0x0, @value64}})

19:16:50 executing program 2:
setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f00000000c0)={0x0, 'veth0_to_bond\x00'}, 0x18)
socket(0x0, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0)
recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000007d40), 0x10)
bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x6, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x101}, [@generic={0x4, 0x0, 0x2}, @generic={0x0, 0x0, 0xe, 0x0, 0x81}, @jmp={0x5, 0x1, 0x0, 0x7, 0x6, 0x1}]}, &(0x7f0000000100)='syzkaller\x00', 0xe2, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fcntl$setstatus(r2, 0x4, 0x2000)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0x0, r2, 0x0, 0x5, &(0x7f0000000440)='f2fs\x00'}, 0x30)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$P9_RREADLINK(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="3a258211f663a7724bdef6a53bfce1e775d740627227b11e2daf85534aa6f5083067b0248878f07a91df1acc99e664c11cbf51b4f6bff473492cfc5ead68cb6a050655a837ad411cb73394239fdd9e33efb5b63c5ff85708d8994e34841e04ec5f4962c4636b7fb34f186b86bb0467bdd13133ef429bda82f9b8e15eae491432dd2a52707c9ff05a83380901aeeba6a468acc01591"], 0x95)
sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe)
r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
r4 = creat(&(0x7f0000000000)='./file0\x00', 0x0)
write$P9_RREMOVE(r4, &(0x7f0000000040)={0x7}, 0x7)
ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000200)={0x0, r4, 0x0, 0x1a0ffffffff})
ioctl$VIDIOC_DQEVENT(r3, 0x80885659, &(0x7f0000000300)={0x0, @ctrl={0x0, 0x0, @value64}})

19:16:51 executing program 1:
setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f00000000c0)={0x0, 'veth0_to_bond\x00'}, 0x18)
socket(0x0, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0)
recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000007d40), 0x10)
bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x6, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x101}, [@generic={0x4, 0x0, 0x2}, @generic={0x0, 0x0, 0xe, 0x0, 0x81}, @jmp={0x5, 0x1, 0x0, 0x7, 0x6, 0x1}]}, &(0x7f0000000100)='syzkaller\x00', 0xe2, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fcntl$setstatus(r2, 0x4, 0x2000)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0x0, r2, 0x0, 0x5, &(0x7f0000000440)='f2fs\x00'}, 0x30)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$P9_RREADLINK(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="3a258211f663a7724bdef6a53bfce1e775d740627227b11e2daf85534aa6f5083067b0248878f07a91df1acc99e664c11cbf51b4f6bff473492cfc5ead68cb6a050655a837ad411cb73394239fdd9e33efb5b63c5ff85708d8994e34841e04ec5f4962c4636b7fb34f186b86bb0467bdd13133ef429bda82f9b8e15eae491432dd2a52707c9ff05a83380901aeeba6a468acc01591"], 0x95)
sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe)
r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
r4 = creat(&(0x7f0000000000)='./file0\x00', 0x0)
write$P9_RREMOVE(r4, &(0x7f0000000040)={0x7}, 0x7)
ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000200)={0x0, r4, 0x0, 0x1a0ffffffff})
ioctl$VIDIOC_DQEVENT(r3, 0x80885659, &(0x7f0000000300)={0x0, @ctrl={0x0, 0x0, @value64}})

19:16:51 executing program 4:
setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f00000000c0)={0x0, 'veth0_to_bond\x00'}, 0x18)
socket(0x0, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0)
recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000007d40), 0x10)
bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x6, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x101}, [@generic={0x4, 0x0, 0x2}, @generic={0x0, 0x0, 0xe, 0x0, 0x81}, @jmp={0x5, 0x1, 0x0, 0x7, 0x6, 0x1}]}, &(0x7f0000000100)='syzkaller\x00', 0xe2, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fcntl$setstatus(r2, 0x4, 0x2000)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0x0, r2, 0x0, 0x5, &(0x7f0000000440)='f2fs\x00'}, 0x30)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$P9_RREADLINK(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="3a258211f663a7724bdef6a53bfce1e775d740627227b11e2daf85534aa6f5083067b0248878f07a91df1acc99e664c11cbf51b4f6bff473492cfc5ead68cb6a050655a837ad411cb73394239fdd9e33efb5b63c5ff85708d8994e34841e04ec5f4962c4636b7fb34f186b86bb0467bdd13133ef429bda82f9b8e15eae491432dd2a52707c9ff05a83380901aeeba6a468acc01591"], 0x95)
sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe)
r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
r4 = creat(&(0x7f0000000000)='./file0\x00', 0x0)
write$P9_RREMOVE(r4, &(0x7f0000000040)={0x7}, 0x7)
ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000200)={0x0, r4, 0x0, 0x1a0ffffffff})
ioctl$VIDIOC_DQEVENT(r3, 0x80885659, &(0x7f0000000300)={0x0, @ctrl={0x0, 0x0, @value64}})

19:16:51 executing program 5:
setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f00000000c0)={0x0, 'veth0_to_bond\x00'}, 0x18)
socket(0x0, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0)
recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000007d40), 0x10)
bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x6, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x101}, [@generic={0x4, 0x0, 0x2}, @generic={0x0, 0x0, 0xe, 0x0, 0x81}, @jmp={0x5, 0x1, 0x0, 0x7, 0x6, 0x1}]}, &(0x7f0000000100)='syzkaller\x00', 0xe2, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fcntl$setstatus(r2, 0x4, 0x2000)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0x0, r2, 0x0, 0x5, &(0x7f0000000440)='f2fs\x00'}, 0x30)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$P9_RREADLINK(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="3a258211f663a7724bdef6a53bfce1e775d740627227b11e2daf85534aa6f5083067b0248878f07a91df1acc99e664c11cbf51b4f6bff473492cfc5ead68cb6a050655a837ad411cb73394239fdd9e33efb5b63c5ff85708d8994e34841e04ec5f4962c4636b7fb34f186b86bb0467bdd13133ef429bda82f9b8e15eae491432dd2a52707c9ff05a83380901aeeba6a468acc01591"], 0x95)
sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe)
r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
r4 = creat(&(0x7f0000000000)='./file0\x00', 0x0)
write$P9_RREMOVE(r4, &(0x7f0000000040)={0x7}, 0x7)
ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000200)={0x0, r4, 0x0, 0x1a0ffffffff})
ioctl$VIDIOC_DQEVENT(r3, 0x80885659, &(0x7f0000000300)={0x0, @ctrl={0x0, 0x0, @value64}})

[  144.862269][T10696] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17)
[  144.914874][T10696] FAT-fs (loop3): Filesystem has been set read-only
[  144.943522][T10696] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 17)
19:16:51 executing program 0:
setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f00000000c0)={0x0, 'veth0_to_bond\x00'}, 0x18)
socket(0x0, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0)
recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000007d40), 0x10)
bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x6, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x101}, [@generic={0x4, 0x0, 0x2}, @generic={0x0, 0x0, 0xe, 0x0, 0x81}, @jmp={0x5, 0x1, 0x0, 0x7, 0x6, 0x1}]}, &(0x7f0000000100)='syzkaller\x00', 0xe2, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fcntl$setstatus(r2, 0x4, 0x2000)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0x0, r2, 0x0, 0x5, &(0x7f0000000440)='f2fs\x00'}, 0x30)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$P9_RREADLINK(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="3a258211f663a7724bdef6a53bfce1e775d740627227b11e2daf85534aa6f5083067b0248878f07a91df1acc99e664c11cbf51b4f6bff473492cfc5ead68cb6a050655a837ad411cb73394239fdd9e33efb5b63c5ff85708d8994e34841e04ec5f4962c4636b7fb34f186b86bb0467bdd13133ef429bda82f9b8e15eae491432dd2a52707c9ff05a83380901aeeba6a468acc01591"], 0x95)
sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe)
r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
r4 = creat(&(0x7f0000000000)='./file0\x00', 0x0)
write$P9_RREMOVE(r4, &(0x7f0000000040)={0x7}, 0x7)
ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000200)={0x0, r4, 0x0, 0x1a0ffffffff})
ioctl$VIDIOC_DQEVENT(r3, 0x80885659, &(0x7f0000000300)={0x0, @ctrl={0x0, 0x0, @value64}})

19:16:51 executing program 2:
setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f00000000c0)={0x0, 'veth0_to_bond\x00'}, 0x18)
socket(0x0, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0)
recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000007d40), 0x10)
bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x6, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x101}, [@generic={0x4, 0x0, 0x2}, @generic={0x0, 0x0, 0xe, 0x0, 0x81}, @jmp={0x5, 0x1, 0x0, 0x7, 0x6, 0x1}]}, &(0x7f0000000100)='syzkaller\x00', 0xe2, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fcntl$setstatus(r2, 0x4, 0x2000)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0x0, r2, 0x0, 0x5, &(0x7f0000000440)='f2fs\x00'}, 0x30)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$P9_RREADLINK(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="3a258211f663a7724bdef6a53bfce1e775d740627227b11e2daf85534aa6f5083067b0248878f07a91df1acc99e664c11cbf51b4f6bff473492cfc5ead68cb6a050655a837ad411cb73394239fdd9e33efb5b63c5ff85708d8994e34841e04ec5f4962c4636b7fb34f186b86bb0467bdd13133ef429bda82f9b8e15eae491432dd2a52707c9ff05a83380901aeeba6a468acc01591"], 0x95)
sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe)
r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
r4 = creat(&(0x7f0000000000)='./file0\x00', 0x0)
write$P9_RREMOVE(r4, &(0x7f0000000040)={0x7}, 0x7)
ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000200)={0x0, r4, 0x0, 0x1a0ffffffff})
ioctl$VIDIOC_DQEVENT(r3, 0x80885659, &(0x7f0000000300)={0x0, @ctrl={0x0, 0x0, @value64}})

19:16:51 executing program 3:
setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f00000000c0)={0x0, 'veth0_to_bond\x00'}, 0x18)
socket(0x0, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0)
recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000007d40), 0x10)
bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x6, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x101}, [@generic={0x4, 0x0, 0x2}, @generic={0x0, 0x0, 0xe, 0x0, 0x81}, @jmp={0x5, 0x1, 0x0, 0x7, 0x6, 0x1}]}, &(0x7f0000000100)='syzkaller\x00', 0xe2, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fcntl$setstatus(r2, 0x4, 0x2000)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0x0, r2, 0x0, 0x5, &(0x7f0000000440)='f2fs\x00'}, 0x30)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$P9_RREADLINK(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="3a258211f663a7724bdef6a53bfce1e775d740627227b11e2daf85534aa6f5083067b0248878f07a91df1acc99e664c11cbf51b4f6bff473492cfc5ead68cb6a050655a837ad411cb73394239fdd9e33efb5b63c5ff85708d8994e34841e04ec5f4962c4636b7fb34f186b86bb0467bdd13133ef429bda82f9b8e15eae491432dd2a52707c9ff05a83380901aeeba6a468acc01591"], 0x95)
sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe)
r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
r4 = creat(&(0x7f0000000000)='./file0\x00', 0x0)
write$P9_RREMOVE(r4, &(0x7f0000000040)={0x7}, 0x7)
ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000200)={0x0, r4, 0x0, 0x1a0ffffffff})
ioctl$VIDIOC_DQEVENT(r3, 0x80885659, &(0x7f0000000300)={0x0, @ctrl={0x0, 0x0, @value64}})

[  145.527832][T10719] FAT-fs (loop4): error, fat_get_cluster: invalid cluster chain (i_pos 17)
[  145.587303][T10719] FAT-fs (loop4): Filesystem has been set read-only
[  145.596704][T10719] FAT-fs (loop4): error, fat_free: invalid cluster chain (i_pos 17)
19:16:52 executing program 4:
setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f00000000c0)={0x0, 'veth0_to_bond\x00'}, 0x18)
socket(0x0, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0)
recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000007d40), 0x10)
bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x6, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x101}, [@generic={0x4, 0x0, 0x2}, @generic={0x0, 0x0, 0xe, 0x0, 0x81}, @jmp={0x5, 0x1, 0x0, 0x7, 0x6, 0x1}]}, &(0x7f0000000100)='syzkaller\x00', 0xe2, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fcntl$setstatus(r2, 0x4, 0x2000)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0x0, r2, 0x0, 0x5, &(0x7f0000000440)='f2fs\x00'}, 0x30)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$P9_RREADLINK(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="3a258211f663a7724bdef6a53bfce1e775d740627227b11e2daf85534aa6f5083067b0248878f07a91df1acc99e664c11cbf51b4f6bff473492cfc5ead68cb6a050655a837ad411cb73394239fdd9e33efb5b63c5ff85708d8994e34841e04ec5f4962c4636b7fb34f186b86bb0467bdd13133ef429bda82f9b8e15eae491432dd2a52707c9ff05a83380901aeeba6a468acc01591"], 0x95)
sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe)
r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
r4 = creat(&(0x7f0000000000)='./file0\x00', 0x0)
write$P9_RREMOVE(r4, &(0x7f0000000040)={0x7}, 0x7)
ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000200)={0x0, r4, 0x0, 0x1a0ffffffff})
ioctl$VIDIOC_DQEVENT(r3, 0x80885659, &(0x7f0000000300)={0x0, @ctrl={0x0, 0x0, @value64}})

[  145.858197][T10742] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17)
[  145.867457][T10742] FAT-fs (loop3): Filesystem has been set read-only
[  145.876311][T10742] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 17)
[  145.890355][T10742] FAT-fs (loop3): error, fat_get_cluster: invalid cluster chain (i_pos 17)
19:16:52 executing program 1:
setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f00000000c0)={0x0, 'veth0_to_bond\x00'}, 0x18)
socket(0x0, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0)
recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000007d40), 0x10)
bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x6, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x101}, [@generic={0x4, 0x0, 0x2}, @generic={0x0, 0x0, 0xe, 0x0, 0x81}, @jmp={0x5, 0x1, 0x0, 0x7, 0x6, 0x1}]}, &(0x7f0000000100)='syzkaller\x00', 0xe2, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fcntl$setstatus(r2, 0x4, 0x2000)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0x0, r2, 0x0, 0x5, &(0x7f0000000440)='f2fs\x00'}, 0x30)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$P9_RREADLINK(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="3a258211f663a7724bdef6a53bfce1e775d740627227b11e2daf85534aa6f5083067b0248878f07a91df1acc99e664c11cbf51b4f6bff473492cfc5ead68cb6a050655a837ad411cb73394239fdd9e33efb5b63c5ff85708d8994e34841e04ec5f4962c4636b7fb34f186b86bb0467bdd13133ef429bda82f9b8e15eae491432dd2a52707c9ff05a83380901aeeba6a468acc01591"], 0x95)
sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe)
r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
r4 = creat(&(0x7f0000000000)='./file0\x00', 0x0)
write$P9_RREMOVE(r4, &(0x7f0000000040)={0x7}, 0x7)
ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000200)={0x0, r4, 0x0, 0x1a0ffffffff})
ioctl$VIDIOC_DQEVENT(r3, 0x80885659, &(0x7f0000000300)={0x0, @ctrl={0x0, 0x0, @value64}})

[  145.902845][T10742] FAT-fs (loop3): error, fat_free: invalid cluster chain (i_pos 17)
19:16:52 executing program 3:
setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f00000000c0)={0x0, 'veth0_to_bond\x00'}, 0x18)
socket(0x0, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0)
recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000007d40), 0x10)
bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x6, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x101}, [@generic={0x4, 0x0, 0x2}, @generic={0x0, 0x0, 0xe, 0x0, 0x81}, @jmp={0x5, 0x1, 0x0, 0x7, 0x6, 0x1}]}, &(0x7f0000000100)='syzkaller\x00', 0xe2, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fcntl$setstatus(r2, 0x4, 0x2000)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0x0, r2, 0x0, 0x5, &(0x7f0000000440)='f2fs\x00'}, 0x30)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$P9_RREADLINK(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="3a258211f663a7724bdef6a53bfce1e775d740627227b11e2daf85534aa6f5083067b0248878f07a91df1acc99e664c11cbf51b4f6bff473492cfc5ead68cb6a050655a837ad411cb73394239fdd9e33efb5b63c5ff85708d8994e34841e04ec5f4962c4636b7fb34f186b86bb0467bdd13133ef429bda82f9b8e15eae491432dd2a52707c9ff05a83380901aeeba6a468acc01591"], 0x95)
sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe)
r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
r4 = creat(&(0x7f0000000000)='./file0\x00', 0x0)
write$P9_RREMOVE(r4, &(0x7f0000000040)={0x7}, 0x7)
ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000200)={0x0, r4, 0x0, 0x1a0ffffffff})
ioctl$VIDIOC_DQEVENT(r3, 0x80885659, &(0x7f0000000300)={0x0, @ctrl={0x0, 0x0, @value64}})

19:16:52 executing program 5:
setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f00000000c0)={0x0, 'veth0_to_bond\x00'}, 0x18)
socket(0x0, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0)
recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000007d40), 0x10)
bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x6, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x101}, [@generic={0x4, 0x0, 0x2}, @generic={0x0, 0x0, 0xe, 0x0, 0x81}, @jmp={0x5, 0x1, 0x0, 0x7, 0x6, 0x1}]}, &(0x7f0000000100)='syzkaller\x00', 0xe2, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fcntl$setstatus(r2, 0x4, 0x2000)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0x0, r2, 0x0, 0x5, &(0x7f0000000440)='f2fs\x00'}, 0x30)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$P9_RREADLINK(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="3a258211f663a7724bdef6a53bfce1e775d740627227b11e2daf85534aa6f5083067b0248878f07a91df1acc99e664c11cbf51b4f6bff473492cfc5ead68cb6a050655a837ad411cb73394239fdd9e33efb5b63c5ff85708d8994e34841e04ec5f4962c4636b7fb34f186b86bb0467bdd13133ef429bda82f9b8e15eae491432dd2a52707c9ff05a83380901aeeba6a468acc01591"], 0x95)
sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe)
r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
r4 = creat(&(0x7f0000000000)='./file0\x00', 0x0)
write$P9_RREMOVE(r4, &(0x7f0000000040)={0x7}, 0x7)
ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000200)={0x0, r4, 0x0, 0x1a0ffffffff})
ioctl$VIDIOC_DQEVENT(r3, 0x80885659, &(0x7f0000000300)={0x0, @ctrl={0x0, 0x0, @value64}})

19:16:52 executing program 0:
setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f00000000c0)={0x0, 'veth0_to_bond\x00'}, 0x18)
socket(0x0, 0x0, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0)
fchdir(r0)
r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0)
recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
connect$can_bcm(0xffffffffffffffff, &(0x7f0000007d40), 0x10)
bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x6, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x101}, [@generic={0x4, 0x0, 0x2}, @generic={0x0, 0x0, 0xe, 0x0, 0x81}, @jmp={0x5, 0x1, 0x0, 0x7, 0x6, 0x1}]}, &(0x7f0000000100)='syzkaller\x00', 0xe2, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fcntl$setstatus(r2, 0x4, 0x2000)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000980)={0x0, r2, 0x0, 0x5, &(0x7f0000000440)='f2fs\x00'}, 0x30)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$P9_RREADLINK(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="3a258211f663a7724bdef6a53bfce1e775d740627227b11e2daf85534aa6f5083067b0248878f07a91df1acc99e664c11cbf51b4f6bff473492cfc5ead68cb6a050655a837ad411cb73394239fdd9e33efb5b63c5ff85708d8994e34841e04ec5f4962c4636b7fb34f186b86bb0467bdd13133ef429bda82f9b8e15eae491432dd2a52707c9ff05a83380901aeeba6a468acc01591"], 0x95)
sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe)
r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0)
r4 = creat(&(0x7f0000000000)='./file0\x00', 0x0)
write$P9_RREMOVE(r4, &(0x7f0000000040)={0x7}, 0x7)
ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000200)={0x0, r4, 0x0, 0x1a0ffffffff})
ioctl$VIDIOC_DQEVENT(r3, 0x80885659, &(0x7f0000000300)={0x0, @ctrl={0x0, 0x0, @value64}})

[  146.252420][T10745] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 17)
[  146.279872][T10745] FAT-fs (loop2): Filesystem has been set read-only
[  146.295612][T10745] FAT-fs (loop2): error, fat_free: invalid cluster chain (i_pos 17)
[  146.325281][T10745] FAT-fs (loop2): error, fat_get_cluster: invalid cluster chain (i_pos 17)
[  146.336563][T10745] FAT-fs (loop2): error, fat_free: invalid cluster chain (i_pos 17)
19:16:53 executing program 2:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10)
r1 = socket(0x10, 0x80002, 0x0)
ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071")
r2 = accept$alg(r0, 0x0, 0x0)
sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2f5}], 0x30}, 0x0)
write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8)
recvmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0)

[  146.795610][T10780] FAT-fs (loop0): error, fat_get_cluster: invalid cluster chain (i_pos 17)
[  146.804484][T10780] FAT-fs (loop0): Filesystem has been set read-only
[  146.814508][T10780] FAT-fs (loop0): error, fat_free: invalid cluster chain (i_pos 17)
19:16:53 executing program 4:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10)
r1 = socket(0x10, 0x80002, 0x0)
ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071")
r2 = accept$alg(r0, 0x0, 0x0)
sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2f5}], 0x30}, 0x0)
write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8)
recvmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0)

19:16:54 executing program 0:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10)
r1 = socket(0x10, 0x80002, 0x0)
ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071")
r2 = accept$alg(r0, 0x0, 0x0)
sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2f5}], 0x30}, 0x0)
write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8)
recvmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0)

19:16:54 executing program 3:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10)
r1 = socket(0x10, 0x80002, 0x0)
ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071")
r2 = accept$alg(r0, 0x0, 0x0)
sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2f5}], 0x30}, 0x0)
write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8)
recvmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0)

19:16:54 executing program 2:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10)
r1 = socket(0x10, 0x80002, 0x0)
ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071")
r2 = accept$alg(r0, 0x0, 0x0)
sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2f5}], 0x30}, 0x0)
write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8)
recvmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0)

19:16:54 executing program 1:
r0 = socket$can_raw(0x1d, 0x3, 0x1)
r1 = socket(0x10, 0x80002, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000000)={'vxcan0\x00', <r2=>0x0})
bind$can_raw(r0, &(0x7f00000000c0)={0x1d, r2}, 0x10)
setsockopt$CAN_RAW_ERR_FILTER(r0, 0x65, 0x2, &(0x7f0000000040), 0x4)

19:16:54 executing program 4:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10)
r1 = socket(0x10, 0x80002, 0x0)
ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071")
r2 = accept$alg(r0, 0x0, 0x0)
sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2f5}], 0x30}, 0x0)
write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8)
recvmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0)

19:16:54 executing program 5:
r0 = socket$can_raw(0x1d, 0x3, 0x1)
r1 = socket(0x10, 0x80002, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000000)={'vxcan0\x00', <r2=>0x0})
bind$can_raw(r0, &(0x7f00000000c0)={0x1d, r2}, 0x10)
setsockopt$CAN_RAW_ERR_FILTER(r0, 0x65, 0x2, &(0x7f0000000040), 0x4)

19:16:54 executing program 2:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10)
r1 = socket(0x10, 0x80002, 0x0)
ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071")
r2 = accept$alg(r0, 0x0, 0x0)
sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2f5}], 0x30}, 0x0)
write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8)
recvmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0)

19:16:54 executing program 0:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10)
r1 = socket(0x10, 0x80002, 0x0)
ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071")
r2 = accept$alg(r0, 0x0, 0x0)
sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2f5}], 0x30}, 0x0)
write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8)
recvmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0)

19:16:54 executing program 3:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10)
r1 = socket(0x10, 0x80002, 0x0)
ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071")
r2 = accept$alg(r0, 0x0, 0x0)
sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2f5}], 0x30}, 0x0)
write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8)
recvmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0)

19:16:54 executing program 4:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10)
r1 = socket(0x10, 0x80002, 0x0)
ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071")
r2 = accept$alg(r0, 0x0, 0x0)
sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2f5}], 0x30}, 0x0)
write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8)
recvmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0)

19:16:54 executing program 1:
r0 = socket$can_raw(0x1d, 0x3, 0x1)
r1 = socket(0x10, 0x80002, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000000)={'vxcan0\x00', <r2=>0x0})
bind$can_raw(r0, &(0x7f00000000c0)={0x1d, r2}, 0x10)
setsockopt$CAN_RAW_ERR_FILTER(r0, 0x65, 0x2, &(0x7f0000000040), 0x4)

19:16:54 executing program 5:
r0 = socket$can_raw(0x1d, 0x3, 0x1)
r1 = socket(0x10, 0x80002, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000000)={'vxcan0\x00', <r2=>0x0})
bind$can_raw(r0, &(0x7f00000000c0)={0x1d, r2}, 0x10)
setsockopt$CAN_RAW_ERR_FILTER(r0, 0x65, 0x2, &(0x7f0000000040), 0x4)

19:16:54 executing program 2:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$IPT_SO_SET_REPLACE(r0, 0x104000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x2a0, 0x138, 0x0, 0x0, 0x138, 0x138, 0x208, 0x208, 0x208, 0x208, 0x208, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@time={{0x38, 'time\x00'}}, @common=@unspec=@ipvs={{0x48, 'ipvs\x00'}, {@ipv6=@empty}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp\x00'}}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@mcast1, [], 0x0, 0x0, 0x0, 0x0, 0x9, 0x9, 0x0, 0x2}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x300)

19:16:54 executing program 5:
r0 = socket$can_raw(0x1d, 0x3, 0x1)
r1 = socket(0x10, 0x80002, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000000)={'vxcan0\x00', <r2=>0x0})
bind$can_raw(r0, &(0x7f00000000c0)={0x1d, r2}, 0x10)
setsockopt$CAN_RAW_ERR_FILTER(r0, 0x65, 0x2, &(0x7f0000000040), 0x4)

19:16:54 executing program 0:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10)
r1 = socket(0x10, 0x80002, 0x0)
ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071")
r2 = accept$alg(r0, 0x0, 0x0)
sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2f5}], 0x30}, 0x0)
write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8)
recvmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0)

19:16:54 executing program 3:
r0 = socket$alg(0x26, 0x5, 0x0)
bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10)
r1 = socket(0x10, 0x80002, 0x0)
ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8696071")
r2 = accept$alg(r0, 0x0, 0x0)
sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2f5}], 0x30}, 0x0)
write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8)
recvmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f0000003580)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0)

19:16:54 executing program 4:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
getsockopt$inet6_buf(r0, 0x6, 0x1d, 0x0, &(0x7f0000000000)=0x1f4)

19:16:54 executing program 1:
r0 = socket$can_raw(0x1d, 0x3, 0x1)
r1 = socket(0x10, 0x80002, 0x0)
ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000000)={'vxcan0\x00', <r2=>0x0})
bind$can_raw(r0, &(0x7f00000000c0)={0x1d, r2}, 0x10)
setsockopt$CAN_RAW_ERR_FILTER(r0, 0x65, 0x2, &(0x7f0000000040), 0x4)

19:16:54 executing program 2:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$IPT_SO_SET_REPLACE(r0, 0x104000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x2a0, 0x138, 0x0, 0x0, 0x138, 0x138, 0x208, 0x208, 0x208, 0x208, 0x208, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@time={{0x38, 'time\x00'}}, @common=@unspec=@ipvs={{0x48, 'ipvs\x00'}, {@ipv6=@empty}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp\x00'}}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@mcast1, [], 0x0, 0x0, 0x0, 0x0, 0x9, 0x9, 0x0, 0x2}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x300)

19:16:54 executing program 5:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r2, 0x0)
mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r3, 0x0)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3)
syz_open_procfs(0x0, &(0x7f0000272000))

19:16:55 executing program 0:
syz_open_dev$midi(0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0)
mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
timer_settime(0x0, 0x2, &(0x7f00000001c0)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0)
r0 = eventfd2(0x0, 0x0)
ftruncate(r0, 0x2)
ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc020660b, 0x0)
renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0)
lstat(0x0, &(0x7f0000000600))
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000001500)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
r2 = socket$nl_netfilter(0x10, 0x3, 0xc)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
dup(r3)
getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240), 0x0)
prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3)
socket$nl_route(0x10, 0x3, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
accept$unix(r3, &(0x7f0000000680)=@abs, &(0x7f0000000180)=0x6e)
r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x1f, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5)
ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f0000000340)={0x0, 0x0, 0x8, 0x0, [], [{0x1f, 0x1, 0x660000000, 0x8, 0x1}, {0xc1, 0x2f2, 0x4, 0x4, 0x2, 0x5b7e799}], [[], [], [], [], [], [], [], []]})
ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0)

19:16:55 executing program 3:
r0 = syz_open_dev$dri(&(0x7f0000000140)='/dev/dri/card#\x00', 0x0, 0x0)
ioctl(r0, 0xffffffffffffffaa, &(0x7f0000000080))

19:16:55 executing program 1:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x28}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0xe}, 0x48)

19:16:55 executing program 4:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
getsockopt$inet6_buf(r0, 0x6, 0x1d, 0x0, &(0x7f0000000000)=0x1f4)

19:16:55 executing program 2:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$IPT_SO_SET_REPLACE(r0, 0x104000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x2a0, 0x138, 0x0, 0x0, 0x138, 0x138, 0x208, 0x208, 0x208, 0x208, 0x208, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@time={{0x38, 'time\x00'}}, @common=@unspec=@ipvs={{0x48, 'ipvs\x00'}, {@ipv6=@empty}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp\x00'}}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@mcast1, [], 0x0, 0x0, 0x0, 0x0, 0x9, 0x9, 0x0, 0x2}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x300)

19:16:55 executing program 4:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
getsockopt$inet6_buf(r0, 0x6, 0x1d, 0x0, &(0x7f0000000000)=0x1f4)

19:16:55 executing program 3:
r0 = syz_open_dev$dri(&(0x7f0000000140)='/dev/dri/card#\x00', 0x0, 0x0)
ioctl(r0, 0xffffffffffffffaa, &(0x7f0000000080))

19:16:55 executing program 5:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r2, 0x0)
mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r3, 0x0)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3)
syz_open_procfs(0x0, &(0x7f0000272000))

19:16:55 executing program 1:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x28}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0xe}, 0x48)

19:16:55 executing program 2:
r0 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$IPT_SO_SET_REPLACE(r0, 0x104000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x2a0, 0x138, 0x0, 0x0, 0x138, 0x138, 0x208, 0x208, 0x208, 0x208, 0x208, 0x3, 0x0, {[{{@uncond, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@unspec=@time={{0x38, 'time\x00'}}, @common=@unspec=@ipvs={{0x48, 'ipvs\x00'}, {@ipv6=@empty}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'snmp\x00'}}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@mcast1, [], 0x0, 0x0, 0x0, 0x0, 0x9, 0x9, 0x0, 0x2}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x300)

19:16:55 executing program 0:
syz_open_dev$midi(0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0)
mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
timer_settime(0x0, 0x2, &(0x7f00000001c0)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0)
r0 = eventfd2(0x0, 0x0)
ftruncate(r0, 0x2)
ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc020660b, 0x0)
renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0)
lstat(0x0, &(0x7f0000000600))
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000001500)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
r2 = socket$nl_netfilter(0x10, 0x3, 0xc)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
dup(r3)
getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240), 0x0)
prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3)
socket$nl_route(0x10, 0x3, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
accept$unix(r3, &(0x7f0000000680)=@abs, &(0x7f0000000180)=0x6e)
r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x1f, &(0x7f00000002c0)=ANY=[@ANYBLOB="850000000700000025000000000000009500000000000000a579753dec29fe276240f076750753bc7b952ab5ad939c403054d8465c13a24800a26b3c68cea54994e702d609331ab3c70aa6b030ed69efddccd23e793e8287051d4f5fef499e2a4ce758601229b94574e7825441222e81748b4ee09cc6fab89f552c75b3b144f5fc545ab790ef72fd2ca305f386142d783531ac34d0c99d62456cc766be4825548e08580000d70b991d746067c73f47457a8713e7b70a85bbdb07832000000000000000000000e680e667212bc3b0c353ebbffbc0b35e84e3db18dec7aa1862259d511d3f57d6a2737027d7f816ef8ac68ea2827824dbfaffea071b77"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5)
ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f0000000340)={0x0, 0x0, 0x8, 0x0, [], [{0x1f, 0x1, 0x660000000, 0x8, 0x1}, {0xc1, 0x2f2, 0x4, 0x4, 0x2, 0x5b7e799}], [[], [], [], [], [], [], [], []]})
ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0)

19:16:55 executing program 4:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
getsockopt$inet6_buf(r0, 0x6, 0x1d, 0x0, &(0x7f0000000000)=0x1f4)

19:16:55 executing program 3:
r0 = syz_open_dev$dri(&(0x7f0000000140)='/dev/dri/card#\x00', 0x0, 0x0)
ioctl(r0, 0xffffffffffffffaa, &(0x7f0000000080))

19:16:55 executing program 1:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x28}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0xe}, 0x48)

19:16:55 executing program 5:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r2, 0x0)
mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r3, 0x0)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3)
syz_open_procfs(0x0, &(0x7f0000272000))

19:16:55 executing program 2:
syz_open_dev$midi(0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0)
mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
timer_settime(0x0, 0x2, &(0x7f00000001c0)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0)
r0 = eventfd2(0x0, 0x0)
ftruncate(r0, 0x2)
ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc020660b, 0x0)
renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0)
lstat(0x0, &(0x7f0000000600))
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000001500)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
r2 = socket$nl_netfilter(0x10, 0x3, 0xc)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
dup(r3)
getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240), 0x0)
prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3)
socket$nl_route(0x10, 0x3, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
accept$unix(r3, &(0x7f0000000680)=@abs, &(0x7f0000000180)=0x6e)
r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x1f, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5)
ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f0000000340)={0x0, 0x0, 0x8, 0x0, [], [{0x1f, 0x1, 0x660000000, 0x8, 0x1}, {0xc1, 0x2f2, 0x4, 0x4, 0x2, 0x5b7e799}], [[], [], [], [], [], [], [], []]})
ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0)

19:16:55 executing program 4:
syz_open_dev$midi(0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0)
mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
timer_settime(0x0, 0x2, &(0x7f00000001c0)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0)
r0 = eventfd2(0x0, 0x0)
ftruncate(r0, 0x2)
ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc020660b, 0x0)
renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0)
lstat(0x0, &(0x7f0000000600))
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000001500)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
r2 = socket$nl_netfilter(0x10, 0x3, 0xc)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
dup(r3)
getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240), 0x0)
prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3)
socket$nl_route(0x10, 0x3, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
accept$unix(r3, &(0x7f0000000680)=@abs, &(0x7f0000000180)=0x6e)
r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x1f, &(0x7f00000002c0)=ANY=[@ANYBLOB="850000000700000025000000000000009500000000000000a579753dec29fe276240f076750753bc7b952ab5ad939c403054d8465c13a24800a26b3c68cea54994e702d609331ab3c70aa6b030ed69efddccd23e793e8287051d4f5fef499e2a4ce758601229b94574e7825441222e81748b4ee09cc6fab89f552c75b3b144f5fc545ab790ef72fd2ca305f386142d783531ac34d0c99d62456cc766be4825548e08580000d70b991d746067c73f47457a8713e7b70a85bbdb07832000000000000000000000e680e667212bc3b0c353ebbffbc0b35e84e3db18dec7aa1862259d511d3f57d6a2737027d7f816ef8ac68ea2827824dbfaffea071b77"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5)
ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f0000000340)={0x0, 0x0, 0x8, 0x0, [], [{0x1f, 0x1, 0x660000000, 0x8, 0x1}, {0xc1, 0x2f2, 0x4, 0x4, 0x2, 0x5b7e799}], [[], [], [], [], [], [], [], []]})
ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0)

19:16:56 executing program 3:
r0 = syz_open_dev$dri(&(0x7f0000000140)='/dev/dri/card#\x00', 0x0, 0x0)
ioctl(r0, 0xffffffffffffffaa, &(0x7f0000000080))

19:16:56 executing program 0:
syz_open_dev$midi(0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0)
mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
timer_settime(0x0, 0x2, &(0x7f00000001c0)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0)
r0 = eventfd2(0x0, 0x0)
ftruncate(r0, 0x2)
ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc020660b, 0x0)
renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0)
lstat(0x0, &(0x7f0000000600))
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000001500)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
r2 = socket$nl_netfilter(0x10, 0x3, 0xc)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
dup(r3)
getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240), 0x0)
prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3)
socket$nl_route(0x10, 0x3, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
accept$unix(r3, &(0x7f0000000680)=@abs, &(0x7f0000000180)=0x6e)
r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x1f, &(0x7f00000002c0)=ANY=[@ANYBLOB="850000000700000025000000000000009500000000000000a579753dec29fe276240f076750753bc7b952ab5ad939c403054d8465c13a24800a26b3c68cea54994e702d609331ab3c70aa6b030ed69efddccd23e793e8287051d4f5fef499e2a4ce758601229b94574e7825441222e81748b4ee09cc6fab89f552c75b3b144f5fc545ab790ef72fd2ca305f386142d783531ac34d0c99d62456cc766be4825548e08580000d70b991d746067c73f47457a8713e7b70a85bbdb07832000000000000000000000e680e667212bc3b0c353ebbffbc0b35e84e3db18dec7aa1862259d511d3f57d6a2737027d7f816ef8ac68ea2827824dbfaffea071b77"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5)
ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f0000000340)={0x0, 0x0, 0x8, 0x0, [], [{0x1f, 0x1, 0x660000000, 0x8, 0x1}, {0xc1, 0x2f2, 0x4, 0x4, 0x2, 0x5b7e799}], [[], [], [], [], [], [], [], []]})
ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0)

19:16:56 executing program 2:
syz_open_dev$midi(0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0)
mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
timer_settime(0x0, 0x2, &(0x7f00000001c0)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0)
r0 = eventfd2(0x0, 0x0)
ftruncate(r0, 0x2)
ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc020660b, 0x0)
renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0)
lstat(0x0, &(0x7f0000000600))
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000001500)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
r2 = socket$nl_netfilter(0x10, 0x3, 0xc)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
dup(r3)
getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240), 0x0)
prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3)
socket$nl_route(0x10, 0x3, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
accept$unix(r3, &(0x7f0000000680)=@abs, &(0x7f0000000180)=0x6e)
r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x1f, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5)
ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f0000000340)={0x0, 0x0, 0x8, 0x0, [], [{0x1f, 0x1, 0x660000000, 0x8, 0x1}, {0xc1, 0x2f2, 0x4, 0x4, 0x2, 0x5b7e799}], [[], [], [], [], [], [], [], []]})
ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0)

19:16:56 executing program 3:
syz_open_dev$midi(0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0)
mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
timer_settime(0x0, 0x2, &(0x7f00000001c0)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0)
r0 = eventfd2(0x0, 0x0)
ftruncate(r0, 0x2)
ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc020660b, 0x0)
renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0)
lstat(0x0, &(0x7f0000000600))
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000001500)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
r2 = socket$nl_netfilter(0x10, 0x3, 0xc)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
dup(r3)
getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240), 0x0)
prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3)
socket$nl_route(0x10, 0x3, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
accept$unix(r3, &(0x7f0000000680)=@abs, &(0x7f0000000180)=0x6e)
r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x1f, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5)
ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f0000000340)={0x0, 0x0, 0x8, 0x0, [], [{0x1f, 0x1, 0x660000000, 0x8, 0x1}, {0xc1, 0x2f2, 0x4, 0x4, 0x2, 0x5b7e799}], [[], [], [], [], [], [], [], []]})
ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0)

19:16:56 executing program 1:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x28}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0xe}, 0x48)

19:16:56 executing program 5:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r2, 0x0)
mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r3, 0x0)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3)
syz_open_procfs(0x0, &(0x7f0000272000))

[  149.659922][T10920] fuse: Bad value for 'fd'
19:16:56 executing program 0:
syz_open_dev$midi(0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0)
mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
timer_settime(0x0, 0x2, &(0x7f00000001c0)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0)
r0 = eventfd2(0x0, 0x0)
ftruncate(r0, 0x2)
ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc020660b, 0x0)
renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0)
lstat(0x0, &(0x7f0000000600))
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000001500)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
r2 = socket$nl_netfilter(0x10, 0x3, 0xc)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
dup(r3)
getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240), 0x0)
prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3)
socket$nl_route(0x10, 0x3, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
accept$unix(r3, &(0x7f0000000680)=@abs, &(0x7f0000000180)=0x6e)
r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x1f, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5)
ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f0000000340)={0x0, 0x0, 0x8, 0x0, [], [{0x1f, 0x1, 0x660000000, 0x8, 0x1}, {0xc1, 0x2f2, 0x4, 0x4, 0x2, 0x5b7e799}], [[], [], [], [], [], [], [], []]})
ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0)

19:16:56 executing program 4:
syz_open_dev$midi(0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0)
mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
timer_settime(0x0, 0x2, &(0x7f00000001c0)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0)
r0 = eventfd2(0x0, 0x0)
ftruncate(r0, 0x2)
ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc020660b, 0x0)
renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0)
lstat(0x0, &(0x7f0000000600))
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000001500)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
r2 = socket$nl_netfilter(0x10, 0x3, 0xc)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
dup(r3)
getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240), 0x0)
prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3)
socket$nl_route(0x10, 0x3, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
accept$unix(r3, &(0x7f0000000680)=@abs, &(0x7f0000000180)=0x6e)
r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x1f, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5)
ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f0000000340)={0x0, 0x0, 0x8, 0x0, [], [{0x1f, 0x1, 0x660000000, 0x8, 0x1}, {0xc1, 0x2f2, 0x4, 0x4, 0x2, 0x5b7e799}], [[], [], [], [], [], [], [], []]})
ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0)

19:16:56 executing program 5:
syz_open_dev$midi(0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0)
mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
timer_settime(0x0, 0x2, &(0x7f00000001c0)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0)
r0 = eventfd2(0x0, 0x0)
ftruncate(r0, 0x2)
ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc020660b, 0x0)
renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0)
lstat(0x0, &(0x7f0000000600))
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000001500)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
r2 = socket$nl_netfilter(0x10, 0x3, 0xc)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
dup(r3)
getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240), 0x0)
prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3)
socket$nl_route(0x10, 0x3, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
accept$unix(r3, &(0x7f0000000680)=@abs, &(0x7f0000000180)=0x6e)
r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x1f, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5)
ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f0000000340)={0x0, 0x0, 0x8, 0x0, [], [{0x1f, 0x1, 0x660000000, 0x8, 0x1}, {0xc1, 0x2f2, 0x4, 0x4, 0x2, 0x5b7e799}], [[], [], [], [], [], [], [], []]})
ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0)

19:16:56 executing program 2:
syz_open_dev$midi(0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0)
mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
timer_settime(0x0, 0x2, &(0x7f00000001c0)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0)
r0 = eventfd2(0x0, 0x0)
ftruncate(r0, 0x2)
ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc020660b, 0x0)
renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0)
lstat(0x0, &(0x7f0000000600))
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000001500)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
r2 = socket$nl_netfilter(0x10, 0x3, 0xc)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
dup(r3)
getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240), 0x0)
prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3)
socket$nl_route(0x10, 0x3, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
accept$unix(r3, &(0x7f0000000680)=@abs, &(0x7f0000000180)=0x6e)
r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x1f, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5)
ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f0000000340)={0x0, 0x0, 0x8, 0x0, [], [{0x1f, 0x1, 0x660000000, 0x8, 0x1}, {0xc1, 0x2f2, 0x4, 0x4, 0x2, 0x5b7e799}], [[], [], [], [], [], [], [], []]})
ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0)

19:16:56 executing program 1:
syz_open_dev$midi(0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0)
mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
timer_settime(0x0, 0x2, &(0x7f00000001c0)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0)
r0 = eventfd2(0x0, 0x0)
ftruncate(r0, 0x2)
ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc020660b, 0x0)
renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0)
lstat(0x0, &(0x7f0000000600))
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000001500)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
r2 = socket$nl_netfilter(0x10, 0x3, 0xc)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
dup(r3)
getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240), 0x0)
prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3)
socket$nl_route(0x10, 0x3, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
accept$unix(r3, &(0x7f0000000680)=@abs, &(0x7f0000000180)=0x6e)
r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x1f, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5)
ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f0000000340)={0x0, 0x0, 0x8, 0x0, [], [{0x1f, 0x1, 0x660000000, 0x8, 0x1}, {0xc1, 0x2f2, 0x4, 0x4, 0x2, 0x5b7e799}], [[], [], [], [], [], [], [], []]})
ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0)

[  150.043492][T10932] fuse: Bad value for 'fd'
19:16:56 executing program 3:
syz_open_dev$midi(0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0)
mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
timer_settime(0x0, 0x2, &(0x7f00000001c0)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0)
r0 = eventfd2(0x0, 0x0)
ftruncate(r0, 0x2)
ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc020660b, 0x0)
renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0)
lstat(0x0, &(0x7f0000000600))
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000001500)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
r2 = socket$nl_netfilter(0x10, 0x3, 0xc)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
dup(r3)
getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240), 0x0)
prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3)
socket$nl_route(0x10, 0x3, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
accept$unix(r3, &(0x7f0000000680)=@abs, &(0x7f0000000180)=0x6e)
r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x1f, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5)
ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f0000000340)={0x0, 0x0, 0x8, 0x0, [], [{0x1f, 0x1, 0x660000000, 0x8, 0x1}, {0xc1, 0x2f2, 0x4, 0x4, 0x2, 0x5b7e799}], [[], [], [], [], [], [], [], []]})
ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0)

[  150.171486][T10941] fuse: Bad value for 'fd'
19:16:57 executing program 4:
syz_open_dev$midi(0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0)
mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
timer_settime(0x0, 0x2, &(0x7f00000001c0)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0)
r0 = eventfd2(0x0, 0x0)
ftruncate(r0, 0x2)
ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc020660b, 0x0)
renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0)
lstat(0x0, &(0x7f0000000600))
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000001500)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
r2 = socket$nl_netfilter(0x10, 0x3, 0xc)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
dup(r3)
getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240), 0x0)
prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3)
socket$nl_route(0x10, 0x3, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
accept$unix(r3, &(0x7f0000000680)=@abs, &(0x7f0000000180)=0x6e)
r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x1f, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5)
ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f0000000340)={0x0, 0x0, 0x8, 0x0, [], [{0x1f, 0x1, 0x660000000, 0x8, 0x1}, {0xc1, 0x2f2, 0x4, 0x4, 0x2, 0x5b7e799}], [[], [], [], [], [], [], [], []]})
ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0)

[  150.398176][ T2640] tipc: TX() has been purged, node left!
[  150.507383][T10963] fuse: Bad value for 'fd'
19:16:57 executing program 5:
syz_open_dev$midi(0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0)
mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
timer_settime(0x0, 0x2, &(0x7f00000001c0)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0)
r0 = eventfd2(0x0, 0x0)
ftruncate(r0, 0x2)
ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc020660b, 0x0)
renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0)
lstat(0x0, &(0x7f0000000600))
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000001500)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
r2 = socket$nl_netfilter(0x10, 0x3, 0xc)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
dup(r3)
getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240), 0x0)
prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3)
socket$nl_route(0x10, 0x3, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
accept$unix(r3, &(0x7f0000000680)=@abs, &(0x7f0000000180)=0x6e)
r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x1f, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5)
ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f0000000340)={0x0, 0x0, 0x8, 0x0, [], [{0x1f, 0x1, 0x660000000, 0x8, 0x1}, {0xc1, 0x2f2, 0x4, 0x4, 0x2, 0x5b7e799}], [[], [], [], [], [], [], [], []]})
ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0)

19:16:57 executing program 1:
syz_open_dev$midi(0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0)
mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
timer_settime(0x0, 0x2, &(0x7f00000001c0)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0)
r0 = eventfd2(0x0, 0x0)
ftruncate(r0, 0x2)
ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc020660b, 0x0)
renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0)
lstat(0x0, &(0x7f0000000600))
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000001500)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
r2 = socket$nl_netfilter(0x10, 0x3, 0xc)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
dup(r3)
getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240), 0x0)
prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3)
socket$nl_route(0x10, 0x3, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
accept$unix(r3, &(0x7f0000000680)=@abs, &(0x7f0000000180)=0x6e)
r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x1f, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5)
ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f0000000340)={0x0, 0x0, 0x8, 0x0, [], [{0x1f, 0x1, 0x660000000, 0x8, 0x1}, {0xc1, 0x2f2, 0x4, 0x4, 0x2, 0x5b7e799}], [[], [], [], [], [], [], [], []]})
ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0)

19:16:58 executing program 3:
syz_open_dev$midi(0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0)
mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
timer_settime(0x0, 0x2, &(0x7f00000001c0)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0)
r0 = eventfd2(0x0, 0x0)
ftruncate(r0, 0x2)
ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc020660b, 0x0)
renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0)
lstat(0x0, &(0x7f0000000600))
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000001500)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
r2 = socket$nl_netfilter(0x10, 0x3, 0xc)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
dup(r3)
getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240), 0x0)
prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3)
socket$nl_route(0x10, 0x3, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
accept$unix(r3, &(0x7f0000000680)=@abs, &(0x7f0000000180)=0x6e)
r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x1f, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5)
ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f0000000340)={0x0, 0x0, 0x8, 0x0, [], [{0x1f, 0x1, 0x660000000, 0x8, 0x1}, {0xc1, 0x2f2, 0x4, 0x4, 0x2, 0x5b7e799}], [[], [], [], [], [], [], [], []]})
ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0)

19:16:58 executing program 2:
syz_open_dev$midi(0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0)
mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
timer_settime(0x0, 0x2, &(0x7f00000001c0)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0)
r0 = eventfd2(0x0, 0x0)
ftruncate(r0, 0x2)
ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc020660b, 0x0)
renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0)
lstat(0x0, &(0x7f0000000600))
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000001500)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
r2 = socket$nl_netfilter(0x10, 0x3, 0xc)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
dup(r3)
getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240), 0x0)
prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3)
socket$nl_route(0x10, 0x3, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
accept$unix(r3, &(0x7f0000000680)=@abs, &(0x7f0000000180)=0x6e)
r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x1f, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5)
ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f0000000340)={0x0, 0x0, 0x8, 0x0, [], [{0x1f, 0x1, 0x660000000, 0x8, 0x1}, {0xc1, 0x2f2, 0x4, 0x4, 0x2, 0x5b7e799}], [[], [], [], [], [], [], [], []]})
ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0)

[  151.879344][T10965] IPVS: ftp: loaded support on port[0] = 21
19:16:58 executing program 1:
syz_open_dev$midi(0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0)
mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
timer_settime(0x0, 0x2, &(0x7f00000001c0)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0)
r0 = eventfd2(0x0, 0x0)
ftruncate(r0, 0x2)
ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc020660b, 0x0)
renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0)
lstat(0x0, &(0x7f0000000600))
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000001500)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
r2 = socket$nl_netfilter(0x10, 0x3, 0xc)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
dup(r3)
getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240), 0x0)
prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3)
socket$nl_route(0x10, 0x3, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
accept$unix(r3, &(0x7f0000000680)=@abs, &(0x7f0000000180)=0x6e)
r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x1f, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5)
ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f0000000340)={0x0, 0x0, 0x8, 0x0, [], [{0x1f, 0x1, 0x660000000, 0x8, 0x1}, {0xc1, 0x2f2, 0x4, 0x4, 0x2, 0x5b7e799}], [[], [], [], [], [], [], [], []]})
ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0)

[  152.190059][T10965] chnl_net:caif_netlink_parms(): no params data found
[  152.263529][T10965] bridge0: port 1(bridge_slave_0) entered blocking state
[  152.270761][T10965] bridge0: port 1(bridge_slave_0) entered disabled state
[  152.278964][T10965] device bridge_slave_0 entered promiscuous mode
[  152.310543][T10965] bridge0: port 2(bridge_slave_1) entered blocking state
[  152.317689][T10965] bridge0: port 2(bridge_slave_1) entered disabled state
[  152.326461][T10965] device bridge_slave_1 entered promiscuous mode
[  152.343075][T10965] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[  152.354050][T10965] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[  152.398648][T10965] team0: Port device team_slave_0 added
[  152.406064][T10965] team0: Port device team_slave_1 added
[  152.466882][T10965] device hsr_slave_0 entered promiscuous mode
[  152.504688][T10965] device hsr_slave_1 entered promiscuous mode
[  152.544308][T10965] debugfs: Directory 'hsr0' with parent '/' already present!
[  152.595108][T10965] bridge0: port 2(bridge_slave_1) entered blocking state
[  152.602655][T10965] bridge0: port 2(bridge_slave_1) entered forwarding state
[  152.610177][T10965] bridge0: port 1(bridge_slave_0) entered blocking state
[  152.617246][T10965] bridge0: port 1(bridge_slave_0) entered forwarding state
[  152.673006][T10965] 8021q: adding VLAN 0 to HW filter on device bond0
[  152.684877][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  152.693167][   T12] bridge0: port 1(bridge_slave_0) entered disabled state
[  152.701636][   T12] bridge0: port 2(bridge_slave_1) entered disabled state
[  152.711168][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
[  152.723356][T10965] 8021q: adding VLAN 0 to HW filter on device team0
[  152.735780][ T2640] device bridge_slave_1 left promiscuous mode
[  152.742218][ T2640] bridge0: port 2(bridge_slave_1) entered disabled state
[  152.794926][ T2640] device bridge_slave_0 left promiscuous mode
[  152.801153][ T2640] bridge0: port 1(bridge_slave_0) entered disabled state
[  152.846355][ T2640] device veth1_vlan left promiscuous mode
[  152.852405][ T2640] device veth0_vlan left promiscuous mode
[  153.784580][ T2640] device hsr_slave_0 left promiscuous mode
[  153.824410][ T2640] device hsr_slave_1 left promiscuous mode
[  153.870322][ T2640] team0 (unregistering): Port device team_slave_1 removed
[  153.880744][ T2640] team0 (unregistering): Port device team_slave_0 removed
[  153.890623][ T2640] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface
[  153.927112][ T2640] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface
[  154.016172][ T2640] bond0 (unregistering): Released all slaves
[  154.108912][ T3059] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  154.117589][ T3059] bridge0: port 1(bridge_slave_0) entered blocking state
[  154.124647][ T3059] bridge0: port 1(bridge_slave_0) entered forwarding state
[  154.132595][ T3059] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  154.140961][ T3059] bridge0: port 2(bridge_slave_1) entered blocking state
[  154.148020][ T3059] bridge0: port 2(bridge_slave_1) entered forwarding state
[  154.157325][ T3059] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  154.166191][ T3059] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  154.182002][T10978] IPVS: ftp: loaded support on port[0] = 21
[  154.191796][T10976] IPVS: ftp: loaded support on port[0] = 21
[  154.199436][ T7950] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[  154.208440][ T7950] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  154.235474][ T3059] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[  154.243821][ T3059] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  154.307303][T10965] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[  154.318829][T10965] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  154.330212][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  154.338900][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  154.427292][ T7950] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  154.435109][ T7950] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[  154.461816][T10976] chnl_net:caif_netlink_parms(): no params data found
[  154.491115][T10978] chnl_net:caif_netlink_parms(): no params data found
[  154.518240][T10965] 8021q: adding VLAN 0 to HW filter on device batadv0
[  154.551721][T10976] bridge0: port 1(bridge_slave_0) entered blocking state
[  154.559339][T10976] bridge0: port 1(bridge_slave_0) entered disabled state
[  154.571483][T10976] device bridge_slave_0 entered promiscuous mode
[  154.585406][T10978] bridge0: port 1(bridge_slave_0) entered blocking state
[  154.592565][T10978] bridge0: port 1(bridge_slave_0) entered disabled state
[  154.601255][T10978] device bridge_slave_0 entered promiscuous mode
[  154.608975][T10976] bridge0: port 2(bridge_slave_1) entered blocking state
[  154.621188][T10976] bridge0: port 2(bridge_slave_1) entered disabled state
[  154.629413][T10976] device bridge_slave_1 entered promiscuous mode
[  154.641513][T10978] bridge0: port 2(bridge_slave_1) entered blocking state
[  154.649163][T10978] bridge0: port 2(bridge_slave_1) entered disabled state
[  154.663293][T10978] device bridge_slave_1 entered promiscuous mode
[  154.702422][T10976] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[  154.713847][T10978] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[  154.735960][ T7950] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready
[  154.745270][ T7950] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[  154.755597][T10976] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[  154.767807][T10978] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[  154.792960][T10976] team0: Port device team_slave_0 added
[  154.802828][T10965] device veth0_vlan entered promiscuous mode
[  154.815905][   T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready
[  154.824888][   T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[  154.834390][T10976] team0: Port device team_slave_1 added
[  154.848276][T10965] device veth1_vlan entered promiscuous mode
[  154.856949][T10978] team0: Port device team_slave_0 added
[  154.864761][   T17] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[  154.872760][   T17] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[  154.881215][   T17] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready
[  154.898583][T10978] team0: Port device team_slave_1 added
[  154.977564][T10978] device hsr_slave_0 entered promiscuous mode
[  155.024656][T10978] device hsr_slave_1 entered promiscuous mode
[  155.096513][T10976] device hsr_slave_0 entered promiscuous mode
[  155.127060][T10976] device hsr_slave_1 entered promiscuous mode
19:17:01 executing program 5:
syz_open_dev$midi(0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0)
mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
timer_settime(0x0, 0x2, &(0x7f00000001c0)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0)
r0 = eventfd2(0x0, 0x0)
ftruncate(r0, 0x2)
ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc020660b, 0x0)
renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0)
lstat(0x0, &(0x7f0000000600))
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000001500)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
r2 = socket$nl_netfilter(0x10, 0x3, 0xc)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
dup(r3)
getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240), 0x0)
prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3)
socket$nl_route(0x10, 0x3, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
accept$unix(r3, &(0x7f0000000680)=@abs, &(0x7f0000000180)=0x6e)
r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x1f, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5)
ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f0000000340)={0x0, 0x0, 0x8, 0x0, [], [{0x1f, 0x1, 0x660000000, 0x8, 0x1}, {0xc1, 0x2f2, 0x4, 0x4, 0x2, 0x5b7e799}], [[], [], [], [], [], [], [], []]})
ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0)

19:17:01 executing program 4:
syz_open_dev$midi(0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0)
mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
timer_settime(0x0, 0x2, &(0x7f00000001c0)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0)
r0 = eventfd2(0x0, 0x0)
ftruncate(r0, 0x2)
ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc020660b, 0x0)
renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0)
lstat(0x0, &(0x7f0000000600))
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000001500)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
r2 = socket$nl_netfilter(0x10, 0x3, 0xc)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
dup(r3)
getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240), 0x0)
prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3)
socket$nl_route(0x10, 0x3, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
accept$unix(r3, &(0x7f0000000680)=@abs, &(0x7f0000000180)=0x6e)
r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x1f, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5)
ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f0000000340)={0x0, 0x0, 0x8, 0x0, [], [{0x1f, 0x1, 0x660000000, 0x8, 0x1}, {0xc1, 0x2f2, 0x4, 0x4, 0x2, 0x5b7e799}], [[], [], [], [], [], [], [], []]})
ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0)

19:17:01 executing program 3:
syz_open_dev$midi(0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0)
mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
timer_settime(0x0, 0x2, &(0x7f00000001c0)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0)
r0 = eventfd2(0x0, 0x0)
ftruncate(r0, 0x2)
ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc020660b, 0x0)
renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0)
lstat(0x0, &(0x7f0000000600))
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000001500)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
r2 = socket$nl_netfilter(0x10, 0x3, 0xc)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
dup(r3)
getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240), 0x0)
prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3)
socket$nl_route(0x10, 0x3, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
accept$unix(r3, &(0x7f0000000680)=@abs, &(0x7f0000000180)=0x6e)
r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x1f, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5)
ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f0000000340)={0x0, 0x0, 0x8, 0x0, [], [{0x1f, 0x1, 0x660000000, 0x8, 0x1}, {0xc1, 0x2f2, 0x4, 0x4, 0x2, 0x5b7e799}], [[], [], [], [], [], [], [], []]})
ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0)

19:17:01 executing program 0:
syz_open_dev$midi(0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0)
mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
timer_settime(0x0, 0x2, &(0x7f00000001c0)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0)
r0 = eventfd2(0x0, 0x0)
ftruncate(r0, 0x2)
ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc020660b, 0x0)
renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0)
lstat(0x0, &(0x7f0000000600))
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000001500)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
r2 = socket$nl_netfilter(0x10, 0x3, 0xc)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
dup(r3)
getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240), 0x0)
prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3)
socket$nl_route(0x10, 0x3, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
accept$unix(r3, &(0x7f0000000680)=@abs, &(0x7f0000000180)=0x6e)
r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x1f, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5)
ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f0000000340)={0x0, 0x0, 0x8, 0x0, [], [{0x1f, 0x1, 0x660000000, 0x8, 0x1}, {0xc1, 0x2f2, 0x4, 0x4, 0x2, 0x5b7e799}], [[], [], [], [], [], [], [], []]})
ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0)

[  155.167827][T10976] debugfs: Directory 'hsr0' with parent '/' already present!
[  155.189024][ T7950] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready
[  155.396216][T10994] fuse: Bad value for 'fd'
[  155.437276][T10978] 8021q: adding VLAN 0 to HW filter on device bond0
[  155.455984][T10976] 8021q: adding VLAN 0 to HW filter on device bond0
[  155.468517][T10978] 8021q: adding VLAN 0 to HW filter on device team0
[  155.480867][ T3059] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  155.489464][ T3059] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  155.506003][ T7949] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  155.517851][ T7949] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  155.526458][ T7949] bridge0: port 1(bridge_slave_0) entered blocking state
19:17:02 executing program 0:
syz_open_dev$midi(0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0)
mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
timer_settime(0x0, 0x2, &(0x7f00000001c0)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0)
r0 = eventfd2(0x0, 0x0)
ftruncate(r0, 0x2)
ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc020660b, 0x0)
renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0)
lstat(0x0, &(0x7f0000000600))
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000001500)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
r2 = socket$nl_netfilter(0x10, 0x3, 0xc)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
dup(r3)
getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240), 0x0)
prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3)
socket$nl_route(0x10, 0x3, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
accept$unix(r3, &(0x7f0000000680)=@abs, &(0x7f0000000180)=0x6e)
r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x1f, &(0x7f00000002c0)=ANY=[@ANYBLOB="850000000700000025000000000000009500000000000000a579753dec29fe276240f076750753bc7b952ab5ad939c403054d8465c13a24800a26b3c68cea54994e702d609331ab3c70aa6b030ed69efddccd23e793e8287051d4f5fef499e2a4ce758601229b94574e7825441222e81748b4ee09cc6fab89f552c75b3b144f5fc545ab790ef72fd2ca305f386142d783531ac34d0c99d62456cc766be4825548e08580000d70b991d746067c73f47457a8713e7b70a85bbdb07832000000000000000000000e680e667212bc3b0c353ebbffbc0b35e84e3db18dec7aa1862259d511d3f57d6a2737027d7f816ef8ac68ea2827824dbfaffea071b77"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5)
ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f0000000340)={0x0, 0x0, 0x8, 0x0, [], [{0x1f, 0x1, 0x660000000, 0x8, 0x1}, {0xc1, 0x2f2, 0x4, 0x4, 0x2, 0x5b7e799}], [[], [], [], [], [], [], [], []]})
ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0)

[  155.533502][ T7949] bridge0: port 1(bridge_slave_0) entered forwarding state
[  155.557575][T10976] 8021q: adding VLAN 0 to HW filter on device team0
[  155.566393][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  155.578118][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  155.587789][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  155.596897][   T12] bridge0: port 2(bridge_slave_1) entered blocking state
[  155.603960][   T12] bridge0: port 2(bridge_slave_1) entered forwarding state
[  155.611733][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[  155.621013][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[  155.630172][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[  155.639081][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  155.648405][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  155.656217][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  155.759449][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  155.767833][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[  155.776629][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  155.785364][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  155.793763][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  155.802226][   T12] bridge0: port 1(bridge_slave_0) entered blocking state
[  155.809258][   T12] bridge0: port 1(bridge_slave_0) entered forwarding state
[  155.817470][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[  155.825795][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  155.833997][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  155.843267][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  155.851629][   T12] bridge0: port 2(bridge_slave_1) entered blocking state
19:17:02 executing program 0:
syz_open_dev$midi(0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0)
mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
timer_settime(0x0, 0x2, &(0x7f00000001c0)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0)
r0 = eventfd2(0x0, 0x0)
ftruncate(r0, 0x2)
ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc020660b, 0x0)
renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0)
lstat(0x0, &(0x7f0000000600))
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000001500)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
r2 = socket$nl_netfilter(0x10, 0x3, 0xc)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
dup(r3)
getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240), 0x0)
prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3)
socket$nl_route(0x10, 0x3, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
accept$unix(r3, &(0x7f0000000680)=@abs, &(0x7f0000000180)=0x6e)
r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x1f, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5)
ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f0000000340)={0x0, 0x0, 0x8, 0x0, [], [{0x1f, 0x1, 0x660000000, 0x8, 0x1}, {0xc1, 0x2f2, 0x4, 0x4, 0x2, 0x5b7e799}], [[], [], [], [], [], [], [], []]})
ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0)

[  155.858741][   T12] bridge0: port 2(bridge_slave_1) entered forwarding state
[  155.866760][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  155.875323][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  155.883594][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[  155.893272][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  155.901972][T10978] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
19:17:02 executing program 0:
syz_open_dev$midi(0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0)
mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
timer_settime(0x0, 0x2, &(0x7f00000001c0)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0)
r0 = eventfd2(0x0, 0x0)
ftruncate(r0, 0x2)
ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc020660b, 0x0)
renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0)
lstat(0x0, &(0x7f0000000600))
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000001500)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
r2 = socket$nl_netfilter(0x10, 0x3, 0xc)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
dup(r3)
getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240), 0x0)
prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3)
socket$nl_route(0x10, 0x3, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
accept$unix(r3, &(0x7f0000000680)=@abs, &(0x7f0000000180)=0x6e)
r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x1f, &(0x7f00000002c0)=ANY=[@ANYBLOB="850000000700000025000000000000009500000000000000a579753dec29fe276240f076750753bc7b952ab5ad939c403054d8465c13a24800a26b3c68cea54994e702d609331ab3c70aa6b030ed69efddccd23e793e8287051d4f5fef499e2a4ce758601229b94574e7825441222e81748b4ee09cc6fab89f552c75b3b144f5fc545ab790ef72fd2ca305f386142d783531ac34d0c99d62456cc766be4825548e08580000d70b991d746067c73f47457a8713e7b70a85bbdb07832000000000000000000000e680e667212bc3b0c353ebbffbc0b35e84e3db18dec7aa1862259d511d3f57d6a2737027d7f816ef8ac68ea2827824dbfaffea071b77"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5)
ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f0000000340)={0x0, 0x0, 0x8, 0x0, [], [{0x1f, 0x1, 0x660000000, 0x8, 0x1}, {0xc1, 0x2f2, 0x4, 0x4, 0x2, 0x5b7e799}], [[], [], [], [], [], [], [], []]})
ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0)

[  155.974936][ T7951] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[  155.984106][ T7951] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[  155.998671][ T7951] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  156.008796][ T7951] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[  156.018139][ T7951] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  156.037201][ T7951] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[  156.046143][ T7951] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  156.055066][ T7951] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  156.063553][ T7951] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  156.072447][ T7951] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  156.080166][ T7951] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[  156.088148][ T7951] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  156.098347][T10976] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  156.140662][T10978] 8021q: adding VLAN 0 to HW filter on device batadv0
[  156.164859][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  156.172371][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[  156.222290][T10976] 8021q: adding VLAN 0 to HW filter on device batadv0
[  156.258912][ T7950] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready
[  156.269059][ T7950] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[  156.288631][ T3059] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready
[  156.298206][ T3059] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[  156.326311][ T3059] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[  156.334090][ T3059] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[  156.388603][ T7951] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready
[  156.415507][ T7951] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[  156.436646][T10978] device veth0_vlan entered promiscuous mode
[  156.504909][ T7950] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready
[  156.513997][ T7950] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[  156.566622][T10978] device veth1_vlan entered promiscuous mode
[  156.675086][T10976] device veth0_vlan entered promiscuous mode
[  156.718054][T11021] IPVS: ftp: loaded support on port[0] = 21
[  156.725361][ T7950] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready
[  156.733475][ T7950] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[  156.766430][ T7950] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[  156.798689][T11032] IPVS: ftp: loaded support on port[0] = 21
[  156.945337][T10976] device veth1_vlan entered promiscuous mode
[  156.949280][T11033] IPVS: ftp: loaded support on port[0] = 21
[  157.388945][ T7951] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready
[  157.404869][ T7951] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready
19:17:04 executing program 1:
syz_open_dev$midi(0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0)
mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
timer_settime(0x0, 0x2, &(0x7f00000001c0)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0)
r0 = eventfd2(0x0, 0x0)
ftruncate(r0, 0x2)
ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc020660b, 0x0)
renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0)
lstat(0x0, &(0x7f0000000600))
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000001500)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
r2 = socket$nl_netfilter(0x10, 0x3, 0xc)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
dup(r3)
getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240), 0x0)
prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3)
socket$nl_route(0x10, 0x3, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
accept$unix(r3, &(0x7f0000000680)=@abs, &(0x7f0000000180)=0x6e)
r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x1f, &(0x7f00000002c0)=ANY=[@ANYBLOB="850000000700000025000000000000009500000000000000a579753dec29fe276240f076750753bc7b952ab5ad939c403054d8465c13a24800a26b3c68cea54994e702d609331ab3c70aa6b030ed69efddccd23e793e8287051d4f5fef499e2a4ce758601229b94574e7825441222e81748b4ee09cc6fab89f552c75b3b144f5fc545ab790ef72fd2ca305f386142d783531ac34d0c99d62456cc766be4825548e08580000d70b991d746067c73f47457a8713e7b70a85bbdb07832000000000000000000000e680e667212bc3b0c353ebbffbc0b35e84e3db18dec7aa1862259d511d3f57d6a2737027d7f816ef8ac68ea2827824dbfaffea071b77"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5)
ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f0000000340)={0x0, 0x0, 0x8, 0x0, [], [{0x1f, 0x1, 0x660000000, 0x8, 0x1}, {0xc1, 0x2f2, 0x4, 0x4, 0x2, 0x5b7e799}], [[], [], [], [], [], [], [], []]})
ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0)

[  157.449577][ T7951] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready
[  157.632800][T11043] IPVS: ftp: loaded support on port[0] = 21
[  157.698083][T11046] fuse: Bad value for 'fd'
19:17:04 executing program 2:
syz_open_dev$midi(0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0)
mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
timer_settime(0x0, 0x2, &(0x7f00000001c0)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0)
r0 = eventfd2(0x0, 0x0)
ftruncate(r0, 0x2)
ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc020660b, 0x0)
renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0)
lstat(0x0, &(0x7f0000000600))
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000001500)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
r2 = socket$nl_netfilter(0x10, 0x3, 0xc)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
dup(r3)
getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240), 0x0)
prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3)
socket$nl_route(0x10, 0x3, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
accept$unix(r3, &(0x7f0000000680)=@abs, &(0x7f0000000180)=0x6e)
r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x1f, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5)
ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f0000000340)={0x0, 0x0, 0x8, 0x0, [], [{0x1f, 0x1, 0x660000000, 0x8, 0x1}, {0xc1, 0x2f2, 0x4, 0x4, 0x2, 0x5b7e799}], [[], [], [], [], [], [], [], []]})
ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0)

19:17:04 executing program 1:
syz_open_dev$midi(0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0)
mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
timer_settime(0x0, 0x2, &(0x7f00000001c0)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0)
r0 = eventfd2(0x0, 0x0)
ftruncate(r0, 0x2)
ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc020660b, 0x0)
renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0)
lstat(0x0, &(0x7f0000000600))
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000001500)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
r2 = socket$nl_netfilter(0x10, 0x3, 0xc)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
dup(r3)
getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240), 0x0)
prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3)
socket$nl_route(0x10, 0x3, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
accept$unix(r3, &(0x7f0000000680)=@abs, &(0x7f0000000180)=0x6e)
r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x1f, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5)
ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f0000000340)={0x0, 0x0, 0x8, 0x0, [], [{0x1f, 0x1, 0x660000000, 0x8, 0x1}, {0xc1, 0x2f2, 0x4, 0x4, 0x2, 0x5b7e799}], [[], [], [], [], [], [], [], []]})
ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0)

[  158.289332][T11070] fuse: Bad value for 'fd'
[  158.324512][T11032] chnl_net:caif_netlink_parms(): no params data found
[  158.602412][T11021] chnl_net:caif_netlink_parms(): no params data found
19:17:05 executing program 1:
syz_open_dev$midi(0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0)
mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
timer_settime(0x0, 0x2, &(0x7f00000001c0)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0)
r0 = eventfd2(0x0, 0x0)
ftruncate(r0, 0x2)
ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc020660b, 0x0)
renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0)
lstat(0x0, &(0x7f0000000600))
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000001500)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
r2 = socket$nl_netfilter(0x10, 0x3, 0xc)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
dup(r3)
getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240), 0x0)
prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3)
socket$nl_route(0x10, 0x3, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
accept$unix(r3, &(0x7f0000000680)=@abs, &(0x7f0000000180)=0x6e)
r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x1f, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5)
ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f0000000340)={0x0, 0x0, 0x8, 0x0, [], [{0x1f, 0x1, 0x660000000, 0x8, 0x1}, {0xc1, 0x2f2, 0x4, 0x4, 0x2, 0x5b7e799}], [[], [], [], [], [], [], [], []]})
ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0)

[  158.643509][T11033] chnl_net:caif_netlink_parms(): no params data found
19:17:05 executing program 2:
syz_open_dev$midi(0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0)
mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
timer_settime(0x0, 0x2, &(0x7f00000001c0)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0)
r0 = eventfd2(0x0, 0x0)
ftruncate(r0, 0x2)
ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc020660b, 0x0)
renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0)
lstat(0x0, &(0x7f0000000600))
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000001500)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
r2 = socket$nl_netfilter(0x10, 0x3, 0xc)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
dup(r3)
getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240), 0x0)
prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3)
socket$nl_route(0x10, 0x3, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
accept$unix(r3, &(0x7f0000000680)=@abs, &(0x7f0000000180)=0x6e)
r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x1f, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5)
ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f0000000340)={0x0, 0x0, 0x8, 0x0, [], [{0x1f, 0x1, 0x660000000, 0x8, 0x1}, {0xc1, 0x2f2, 0x4, 0x4, 0x2, 0x5b7e799}], [[], [], [], [], [], [], [], []]})
ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0)

[  159.480216][T11032] bridge0: port 1(bridge_slave_0) entered blocking state
[  159.488044][T11032] bridge0: port 1(bridge_slave_0) entered disabled state
[  159.534457][T11032] device bridge_slave_0 entered promiscuous mode
[  159.554259][T11021] bridge0: port 1(bridge_slave_0) entered blocking state
[  159.561331][T11021] bridge0: port 1(bridge_slave_0) entered disabled state
[  159.610329][T11021] device bridge_slave_0 entered promiscuous mode
[  159.631641][T11032] bridge0: port 2(bridge_slave_1) entered blocking state
[  159.691765][T11032] bridge0: port 2(bridge_slave_1) entered disabled state
[  159.724268][T11032] device bridge_slave_1 entered promiscuous mode
[  159.774920][T11021] bridge0: port 2(bridge_slave_1) entered blocking state
[  159.782016][T11021] bridge0: port 2(bridge_slave_1) entered disabled state
[  159.845042][T11021] device bridge_slave_1 entered promiscuous mode
[  160.071778][T11033] bridge0: port 1(bridge_slave_0) entered blocking state
[  160.084243][T11033] bridge0: port 1(bridge_slave_0) entered disabled state
[  160.151350][T11033] device bridge_slave_0 entered promiscuous mode
[  160.202334][T11043] chnl_net:caif_netlink_parms(): no params data found
[  160.364301][T11033] bridge0: port 2(bridge_slave_1) entered blocking state
[  160.371377][T11033] bridge0: port 2(bridge_slave_1) entered disabled state
[  160.395066][T11033] device bridge_slave_1 entered promiscuous mode
[  160.433987][T11032] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[  160.477283][T11021] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[  160.680202][T11032] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[  160.733457][T11033] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[  160.782849][T11021] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[  160.800998][T11033] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[  160.952981][T11032] team0: Port device team_slave_0 added
[  160.988768][T11032] team0: Port device team_slave_1 added
[  161.023163][T11021] team0: Port device team_slave_0 added
[  161.040864][T11033] team0: Port device team_slave_0 added
[  161.049492][T11033] team0: Port device team_slave_1 added
[  161.070914][T11043] bridge0: port 1(bridge_slave_0) entered blocking state
[  161.078926][T11043] bridge0: port 1(bridge_slave_0) entered disabled state
[  161.111615][T11043] device bridge_slave_0 entered promiscuous mode
[  161.132752][T11021] team0: Port device team_slave_1 added
[  161.186990][T11032] device hsr_slave_0 entered promiscuous mode
[  161.224593][T11032] device hsr_slave_1 entered promiscuous mode
[  161.264314][T11032] debugfs: Directory 'hsr0' with parent '/' already present!
[  161.271855][T11043] bridge0: port 2(bridge_slave_1) entered blocking state
[  161.291079][T11043] bridge0: port 2(bridge_slave_1) entered disabled state
[  161.315122][T11043] device bridge_slave_1 entered promiscuous mode
[  161.466129][T11043] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[  161.503185][T11043] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[  161.786798][T11033] device hsr_slave_0 entered promiscuous mode
[  161.834657][T11033] device hsr_slave_1 entered promiscuous mode
[  161.874267][T11033] debugfs: Directory 'hsr0' with parent '/' already present!
[  161.906706][T11021] device hsr_slave_0 entered promiscuous mode
[  161.944656][T11021] device hsr_slave_1 entered promiscuous mode
[  162.000057][T11021] debugfs: Directory 'hsr0' with parent '/' already present!
[  162.318466][T11043] team0: Port device team_slave_0 added
[  162.400287][T11043] team0: Port device team_slave_1 added
[  162.627258][T11043] device hsr_slave_0 entered promiscuous mode
[  162.680203][T11043] device hsr_slave_1 entered promiscuous mode
[  162.740609][T11043] debugfs: Directory 'hsr0' with parent '/' already present!
[  162.808188][T11032] 8021q: adding VLAN 0 to HW filter on device bond0
[  162.872662][T11032] 8021q: adding VLAN 0 to HW filter on device team0
[  162.910655][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  162.924874][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  162.980529][T11033] 8021q: adding VLAN 0 to HW filter on device bond0
[  163.000472][ T2505] tipc: TX() has been purged, node left!
[  163.015835][ T2505] tipc: TX() has been purged, node left!
[  163.047805][T11021] 8021q: adding VLAN 0 to HW filter on device bond0
[  163.065746][ T3059] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  163.103269][ T2505] tipc: TX() has been purged, node left!
[  163.104693][ T3059] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  163.124554][ T2505] tipc: TX() has been purged, node left!
[  163.154617][ T2505] tipc: TX() has been purged, node left!
[  163.180717][ T3059] bridge0: port 1(bridge_slave_0) entered blocking state
[  163.187841][ T3059] bridge0: port 1(bridge_slave_0) entered forwarding state
[  163.244842][ T3059] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  163.304727][ T3059] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  163.360698][ T3059] bridge0: port 2(bridge_slave_1) entered blocking state
[  163.367849][ T3059] bridge0: port 2(bridge_slave_1) entered forwarding state
[  163.444984][ T3059] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[  163.484655][ T3059] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[  163.493748][ T3059] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[  163.575226][ T3059] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  163.614352][ T3059] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[  163.623294][ T3059] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  163.712717][T11033] 8021q: adding VLAN 0 to HW filter on device team0
[  163.792756][T11032] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network
[  163.831483][T11032] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[  164.978233][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  165.012107][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  165.034661][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  165.051778][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  165.059839][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[  165.075295][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  165.091173][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  165.100525][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  165.141910][T11021] 8021q: adding VLAN 0 to HW filter on device team0
[  165.290749][ T3059] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  165.299054][ T3059] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  165.308174][ T3059] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  165.316785][ T3059] bridge0: port 1(bridge_slave_0) entered blocking state
[  165.323817][ T3059] bridge0: port 1(bridge_slave_0) entered forwarding state
[  165.332194][ T3059] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  165.341082][ T3059] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  165.349766][ T3059] bridge0: port 2(bridge_slave_1) entered blocking state
[  165.356920][ T3059] bridge0: port 2(bridge_slave_1) entered forwarding state
[  165.365178][ T3059] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[  165.374562][ T3059] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[  165.383588][ T3059] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[  165.392434][ T3059] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  165.401093][ T3059] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  165.408967][ T3059] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  165.417053][ T3059] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  165.425224][ T3059] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  165.585370][ T3059] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[  165.594547][ T3059] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  165.603292][ T3059] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[  165.611995][ T3059] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  165.620423][ T3059] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  165.629442][ T3059] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  165.638151][ T3059] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  165.646007][ T3059] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[  165.653724][ T3059] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  165.662603][ T3059] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  165.670895][ T3059] bridge0: port 1(bridge_slave_0) entered blocking state
[  165.677957][ T3059] bridge0: port 1(bridge_slave_0) entered forwarding state
[  165.686099][ T3059] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  165.695132][ T3059] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  165.703396][ T3059] bridge0: port 2(bridge_slave_1) entered blocking state
[  165.710600][ T3059] bridge0: port 2(bridge_slave_1) entered forwarding state
[  165.719167][ T3059] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  165.732762][T11032] 8021q: adding VLAN 0 to HW filter on device batadv0
[  165.875975][T11033] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  165.892834][T11043] 8021q: adding VLAN 0 to HW filter on device bond0
[  165.902310][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[  165.911660][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[  165.934138][T11043] 8021q: adding VLAN 0 to HW filter on device team0
[  166.080610][T11033] 8021q: adding VLAN 0 to HW filter on device batadv0
[  166.089269][ T7950] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  166.102893][ T7950] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  166.111044][ T7950] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  166.119041][ T7950] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[  166.142508][ T7950] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[  166.161104][ T7950] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  166.175854][ T7950] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  166.184898][ T7950] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  166.193211][ T7950] bridge0: port 1(bridge_slave_0) entered blocking state
[  166.200254][ T7950] bridge0: port 1(bridge_slave_0) entered forwarding state
[  166.208284][ T7950] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[  166.216923][ T7950] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  166.225966][ T7950] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  166.234946][ T7950] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  166.243359][ T7950] bridge0: port 2(bridge_slave_1) entered blocking state
[  166.250405][ T7950] bridge0: port 2(bridge_slave_1) entered forwarding state
[  166.258233][ T7950] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[  166.266903][ T7950] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  166.275290][ T7950] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  166.283707][ T7950] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  166.292134][ T7950] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  166.300565][ T7950] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  166.435861][ T2410] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[  166.451769][T11021] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  166.472061][ T7951] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[  166.481932][ T7951] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[  166.491048][ T7951] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  166.499973][ T7951] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[  166.509000][ T7951] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  166.518767][ T7950] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  166.542217][T11043] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network
[  166.553023][T11043] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[  166.704681][ T3059] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[  166.713196][ T3059] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  166.722262][ T3059] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  166.731138][ T3059] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  166.739856][ T3059] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  166.747526][ T3059] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[  166.755095][ T3059] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready
[  166.764134][ T3059] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[  166.773005][ T3059] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready
[  166.781892][ T3059] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[  166.798995][T11032] device veth0_vlan entered promiscuous mode
[  166.809292][ T3059] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  166.820405][ T3059] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready
[  166.829337][ T3059] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[  166.838232][ T3059] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[  166.846253][ T3059] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[  166.860876][T11021] 8021q: adding VLAN 0 to HW filter on device batadv0
[  166.997737][T11032] device veth1_vlan entered promiscuous mode
[  167.011310][T11033] device veth0_vlan entered promiscuous mode
[  167.040938][ T7951] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready
[  167.060238][ T7951] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready
[  167.069005][ T7951] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[  167.078013][ T7951] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  167.085567][ T7951] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[  167.093661][ T7951] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[  167.101906][ T7951] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[  167.112833][T11043] 8021q: adding VLAN 0 to HW filter on device batadv0
[  167.128585][T11033] device veth1_vlan entered promiscuous mode
[  167.277467][ T3059] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready
[  167.286691][ T3059] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[  167.312544][ T3059] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready
[  167.327673][ T3059] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[  167.339193][ T2505] device bridge_slave_1 left promiscuous mode
[  167.345929][ T2505] bridge0: port 2(bridge_slave_1) entered disabled state
[  167.384714][ T2505] device bridge_slave_0 left promiscuous mode
[  167.390906][ T2505] bridge0: port 1(bridge_slave_0) entered disabled state
[  167.436712][ T2505] device bridge_slave_1 left promiscuous mode
[  167.442955][ T2505] bridge0: port 2(bridge_slave_1) entered disabled state
[  167.494966][ T2505] device bridge_slave_0 left promiscuous mode
[  167.501135][ T2505] bridge0: port 1(bridge_slave_0) entered disabled state
[  167.557466][ T2505] device bridge_slave_1 left promiscuous mode
[  167.563688][ T2505] bridge0: port 2(bridge_slave_1) entered disabled state
[  167.594736][ T2505] device bridge_slave_0 left promiscuous mode
[  167.600990][ T2505] bridge0: port 1(bridge_slave_0) entered disabled state
[  167.656798][ T2505] device bridge_slave_1 left promiscuous mode
[  167.663092][ T2505] bridge0: port 2(bridge_slave_1) entered disabled state
[  167.694949][ T2505] device bridge_slave_0 left promiscuous mode
[  167.701269][ T2505] bridge0: port 1(bridge_slave_0) entered disabled state
[  167.746623][ T2505] device bridge_slave_1 left promiscuous mode
[  167.752953][ T2505] bridge0: port 2(bridge_slave_1) entered disabled state
[  167.794918][ T2505] device bridge_slave_0 left promiscuous mode
[  167.801167][ T2505] bridge0: port 1(bridge_slave_0) entered disabled state
[  167.854929][ T2505] device veth1_vlan left promiscuous mode
[  167.860888][ T2505] device veth0_vlan left promiscuous mode
[  167.867206][ T2505] device veth1_vlan left promiscuous mode
[  167.873042][ T2505] device veth0_vlan left promiscuous mode
[  167.879155][ T2505] device veth1_vlan left promiscuous mode
[  167.884971][ T2505] device veth0_vlan left promiscuous mode
[  167.891224][ T2505] device veth1_vlan left promiscuous mode
[  167.897187][ T2505] device veth0_vlan left promiscuous mode
[  167.903269][ T2505] device veth1_vlan left promiscuous mode
[  167.909144][ T2505] device veth0_vlan left promiscuous mode
[  172.084496][ T2505] device hsr_slave_0 left promiscuous mode
[  172.124340][ T2505] device hsr_slave_1 left promiscuous mode
[  172.171335][ T2505] team0 (unregistering): Port device team_slave_1 removed
[  172.181963][ T2505] team0 (unregistering): Port device team_slave_0 removed
[  172.192344][ T2505] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface
[  172.248172][ T2505] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface
[  172.326476][ T2505] bond0 (unregistering): Released all slaves
[  172.554750][ T2505] device hsr_slave_0 left promiscuous mode
[  172.594372][ T2505] device hsr_slave_1 left promiscuous mode
[  172.671321][ T2505] team0 (unregistering): Port device team_slave_1 removed
[  172.682027][ T2505] team0 (unregistering): Port device team_slave_0 removed
[  172.692517][ T2505] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface
[  172.748708][ T2505] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface
[  172.809394][ T2505] bond0 (unregistering): Released all slaves
[  173.004752][ T2505] device hsr_slave_0 left promiscuous mode
[  173.044501][ T2505] device hsr_slave_1 left promiscuous mode
[  173.091725][ T2505] team0 (unregistering): Port device team_slave_1 removed
[  173.102637][ T2505] team0 (unregistering): Port device team_slave_0 removed
[  173.112853][ T2505] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface
[  173.148638][ T2505] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface
[  173.219376][ T2505] bond0 (unregistering): Released all slaves
[  173.414706][ T2505] device hsr_slave_0 left promiscuous mode
[  173.454772][ T2505] device hsr_slave_1 left promiscuous mode
[  173.502379][ T2505] team0 (unregistering): Port device team_slave_1 removed
[  173.513271][ T2505] team0 (unregistering): Port device team_slave_0 removed
[  173.523597][ T2505] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface
[  173.578686][ T2505] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface
[  173.658414][ T2505] bond0 (unregistering): Released all slaves
[  173.894622][ T2505] device hsr_slave_0 left promiscuous mode
[  173.954365][ T2505] device hsr_slave_1 left promiscuous mode
[  174.000211][ T2505] team0 (unregistering): Port device team_slave_1 removed
[  174.010958][ T2505] team0 (unregistering): Port device team_slave_0 removed
[  174.021289][ T2505] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface
[  174.068434][ T2505] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface
[  174.149391][ T2505] bond0 (unregistering): Released all slaves
[  174.217271][T11021] device veth0_vlan entered promiscuous mode
[  174.231155][ T7949] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[  174.240869][ T7949] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[  174.274317][ T7949] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready
[  174.283338][ T7949] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[  174.338055][T11043] device veth0_vlan entered promiscuous mode
[  174.345783][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready
[  174.393125][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[  174.412767][T11021] device veth1_vlan entered promiscuous mode
[  174.428279][T11043] device veth1_vlan entered promiscuous mode
[  174.435484][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[  174.448582][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[  174.456955][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready
19:17:21 executing program 0:
syz_open_dev$midi(0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0)
mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
timer_settime(0x0, 0x2, &(0x7f00000001c0)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0)
r0 = eventfd2(0x0, 0x0)
ftruncate(r0, 0x2)
ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc020660b, 0x0)
renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0)
lstat(0x0, &(0x7f0000000600))
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000001500)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
r2 = socket$nl_netfilter(0x10, 0x3, 0xc)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
dup(r3)
getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240), 0x0)
prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3)
socket$nl_route(0x10, 0x3, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
accept$unix(r3, &(0x7f0000000680)=@abs, &(0x7f0000000180)=0x6e)
r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x1f, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5)
ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f0000000340)={0x0, 0x0, 0x8, 0x0, [], [{0x1f, 0x1, 0x660000000, 0x8, 0x1}, {0xc1, 0x2f2, 0x4, 0x4, 0x2, 0x5b7e799}], [[], [], [], [], [], [], [], []]})
ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0)

19:17:21 executing program 2:
syz_open_dev$midi(0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0)
mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
timer_settime(0x0, 0x2, &(0x7f00000001c0)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0)
r0 = eventfd2(0x0, 0x0)
ftruncate(r0, 0x2)
ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc020660b, 0x0)
renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0)
lstat(0x0, &(0x7f0000000600))
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000001500)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
r2 = socket$nl_netfilter(0x10, 0x3, 0xc)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
dup(r3)
getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240), 0x0)
prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3)
socket$nl_route(0x10, 0x3, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
accept$unix(r3, &(0x7f0000000680)=@abs, &(0x7f0000000180)=0x6e)
r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x1f, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5)
ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f0000000340)={0x0, 0x0, 0x8, 0x0, [], [{0x1f, 0x1, 0x660000000, 0x8, 0x1}, {0xc1, 0x2f2, 0x4, 0x4, 0x2, 0x5b7e799}], [[], [], [], [], [], [], [], []]})
ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0)

19:17:21 executing program 1:
syz_open_dev$midi(0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0)
mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
timer_settime(0x0, 0x2, &(0x7f00000001c0)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0)
r0 = eventfd2(0x0, 0x0)
ftruncate(r0, 0x2)
ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc020660b, 0x0)
renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0)
lstat(0x0, &(0x7f0000000600))
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000001500)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
r2 = socket$nl_netfilter(0x10, 0x3, 0xc)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
dup(r3)
getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240), 0x0)
prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3)
socket$nl_route(0x10, 0x3, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
accept$unix(r3, &(0x7f0000000680)=@abs, &(0x7f0000000180)=0x6e)
r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x1f, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5)
ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f0000000340)={0x0, 0x0, 0x8, 0x0, [], [{0x1f, 0x1, 0x660000000, 0x8, 0x1}, {0xc1, 0x2f2, 0x4, 0x4, 0x2, 0x5b7e799}], [[], [], [], [], [], [], [], []]})
ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0)

19:17:21 executing program 5:
syz_open_dev$midi(0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0)
mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
timer_settime(0x0, 0x2, &(0x7f00000001c0)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0)
r0 = eventfd2(0x0, 0x0)
ftruncate(r0, 0x2)
ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc020660b, 0x0)
renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0)
lstat(0x0, &(0x7f0000000600))
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000001500)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
r2 = socket$nl_netfilter(0x10, 0x3, 0xc)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
dup(r3)
getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240), 0x0)
prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3)
socket$nl_route(0x10, 0x3, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
accept$unix(r3, &(0x7f0000000680)=@abs, &(0x7f0000000180)=0x6e)
r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x1f, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5)
ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f0000000340)={0x0, 0x0, 0x8, 0x0, [], [{0x1f, 0x1, 0x660000000, 0x8, 0x1}, {0xc1, 0x2f2, 0x4, 0x4, 0x2, 0x5b7e799}], [[], [], [], [], [], [], [], []]})
ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0)

19:17:21 executing program 3:
syz_open_dev$midi(0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0)
mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
timer_settime(0x0, 0x2, &(0x7f00000001c0)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0)
r0 = eventfd2(0x0, 0x0)
ftruncate(r0, 0x2)
ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc020660b, 0x0)
renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0)
lstat(0x0, &(0x7f0000000600))
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000001500)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
r2 = socket$nl_netfilter(0x10, 0x3, 0xc)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
dup(r3)
getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240), 0x0)
prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3)
socket$nl_route(0x10, 0x3, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
accept$unix(r3, &(0x7f0000000680)=@abs, &(0x7f0000000180)=0x6e)
r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x1f, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5)
ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f0000000340)={0x0, 0x0, 0x8, 0x0, [], [{0x1f, 0x1, 0x660000000, 0x8, 0x1}, {0xc1, 0x2f2, 0x4, 0x4, 0x2, 0x5b7e799}], [[], [], [], [], [], [], [], []]})
ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0)

19:17:21 executing program 4:
syz_open_dev$midi(0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0)
mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
timer_settime(0x0, 0x2, &(0x7f00000001c0)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0)
r0 = eventfd2(0x0, 0x0)
ftruncate(r0, 0x2)
ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc020660b, 0x0)
renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0)
lstat(0x0, &(0x7f0000000600))
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000001500)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
r2 = socket$nl_netfilter(0x10, 0x3, 0xc)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
dup(r3)
getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240), 0x0)
prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3)
socket$nl_route(0x10, 0x3, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
accept$unix(r3, &(0x7f0000000680)=@abs, &(0x7f0000000180)=0x6e)
r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x1f, &(0x7f00000002c0)=ANY=[@ANYBLOB="850000000700000025000000000000009500000000000000a579753dec29fe276240f076750753bc7b952ab5ad939c403054d8465c13a24800a26b3c68cea54994e702d609331ab3c70aa6b030ed69efddccd23e793e8287051d4f5fef499e2a4ce758601229b94574e7825441222e81748b4ee09cc6fab89f552c75b3b144f5fc545ab790ef72fd2ca305f386142d783531ac34d0c99d62456cc766be4825548e08580000d70b991d746067c73f47457a8713e7b70a85bbdb07832000000000000000000000e680e667212bc3b0c353ebbffbc0b35e84e3db18dec7aa1862259d511d3f57d6a2737027d7f816ef8ac68ea2827824dbfaffea071b77"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5)
ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f0000000340)={0x0, 0x0, 0x8, 0x0, [], [{0x1f, 0x1, 0x660000000, 0x8, 0x1}, {0xc1, 0x2f2, 0x4, 0x4, 0x2, 0x5b7e799}], [[], [], [], [], [], [], [], []]})
ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0)

[  174.996113][T11214] fuse: Bad value for 'fd'
[  175.007752][T11216] fuse: Bad value for 'fd'
[  175.038911][T11215] fuse: Bad value for 'fd'
[  175.098237][T11218] fuse: Bad value for 'fd'
19:17:21 executing program 4:
syz_open_dev$midi(0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0)
mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
timer_settime(0x0, 0x2, &(0x7f00000001c0)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0)
r0 = eventfd2(0x0, 0x0)
ftruncate(r0, 0x2)
ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc020660b, 0x0)
renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0)
lstat(0x0, &(0x7f0000000600))
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000001500)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
r2 = socket$nl_netfilter(0x10, 0x3, 0xc)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
dup(r3)
getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240), 0x0)
prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3)
socket$nl_route(0x10, 0x3, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
accept$unix(r3, &(0x7f0000000680)=@abs, &(0x7f0000000180)=0x6e)
r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x1f, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5)
ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f0000000340)={0x0, 0x0, 0x8, 0x0, [], [{0x1f, 0x1, 0x660000000, 0x8, 0x1}, {0xc1, 0x2f2, 0x4, 0x4, 0x2, 0x5b7e799}], [[], [], [], [], [], [], [], []]})
ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0)

19:17:21 executing program 3:
syz_open_dev$midi(0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0)
mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
timer_settime(0x0, 0x2, &(0x7f00000001c0)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0)
r0 = eventfd2(0x0, 0x0)
ftruncate(r0, 0x2)
ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc020660b, 0x0)
renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0)
lstat(0x0, &(0x7f0000000600))
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000001500)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
r2 = socket$nl_netfilter(0x10, 0x3, 0xc)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
dup(r3)
getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240), 0x0)
prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3)
socket$nl_route(0x10, 0x3, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
accept$unix(r3, &(0x7f0000000680)=@abs, &(0x7f0000000180)=0x6e)
r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x1f, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5)
ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f0000000340)={0x0, 0x0, 0x8, 0x0, [], [{0x1f, 0x1, 0x660000000, 0x8, 0x1}, {0xc1, 0x2f2, 0x4, 0x4, 0x2, 0x5b7e799}], [[], [], [], [], [], [], [], []]})
ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0)

19:17:21 executing program 0:
syz_open_dev$midi(0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0)
mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
timer_settime(0x0, 0x2, &(0x7f00000001c0)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0)
r0 = eventfd2(0x0, 0x0)
ftruncate(r0, 0x2)
ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc020660b, 0x0)
renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0)
lstat(0x0, &(0x7f0000000600))
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000001500)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
r2 = socket$nl_netfilter(0x10, 0x3, 0xc)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
dup(r3)
getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240), 0x0)
prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3)
socket$nl_route(0x10, 0x3, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
accept$unix(r3, &(0x7f0000000680)=@abs, &(0x7f0000000180)=0x6e)
r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x1f, &(0x7f00000002c0)=ANY=[@ANYBLOB="850000000700000025000000000000009500000000000000a579753dec29fe276240f076750753bc7b952ab5ad939c403054d8465c13a24800a26b3c68cea54994e702d609331ab3c70aa6b030ed69efddccd23e793e8287051d4f5fef499e2a4ce758601229b94574e7825441222e81748b4ee09cc6fab89f552c75b3b144f5fc545ab790ef72fd2ca305f386142d783531ac34d0c99d62456cc766be4825548e08580000d70b991d746067c73f47457a8713e7b70a85bbdb07832000000000000000000000e680e667212bc3b0c353ebbffbc0b35e84e3db18dec7aa1862259d511d3f57d6a2737027d7f816ef8ac68ea2827824dbfaffea071b77"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5)
ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f0000000340)={0x0, 0x0, 0x8, 0x0, [], [{0x1f, 0x1, 0x660000000, 0x8, 0x1}, {0xc1, 0x2f2, 0x4, 0x4, 0x2, 0x5b7e799}], [[], [], [], [], [], [], [], []]})
ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0)

[  175.277988][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready
19:17:22 executing program 5:
syz_open_dev$midi(0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0)
mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
timer_settime(0x0, 0x2, &(0x7f00000001c0)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0)
r0 = eventfd2(0x0, 0x0)
ftruncate(r0, 0x2)
ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc020660b, 0x0)
renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0)
lstat(0x0, &(0x7f0000000600))
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000001500)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
r2 = socket$nl_netfilter(0x10, 0x3, 0xc)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
dup(r3)
getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240), 0x0)
prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3)
socket$nl_route(0x10, 0x3, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
accept$unix(r3, &(0x7f0000000680)=@abs, &(0x7f0000000180)=0x6e)
r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x1f, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5)
ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f0000000340)={0x0, 0x0, 0x8, 0x0, [], [{0x1f, 0x1, 0x660000000, 0x8, 0x1}, {0xc1, 0x2f2, 0x4, 0x4, 0x2, 0x5b7e799}], [[], [], [], [], [], [], [], []]})
ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0)

19:17:22 executing program 4:
syz_open_dev$midi(0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0)
mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
timer_settime(0x0, 0x2, &(0x7f00000001c0)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0)
r0 = eventfd2(0x0, 0x0)
ftruncate(r0, 0x2)
ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc020660b, 0x0)
renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0)
lstat(0x0, &(0x7f0000000600))
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000001500)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
r2 = socket$nl_netfilter(0x10, 0x3, 0xc)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
dup(r3)
getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240), 0x0)
prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3)
socket$nl_route(0x10, 0x3, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
accept$unix(r3, &(0x7f0000000680)=@abs, &(0x7f0000000180)=0x6e)
r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x1f, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5)
ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f0000000340)={0x0, 0x0, 0x8, 0x0, [], [{0x1f, 0x1, 0x660000000, 0x8, 0x1}, {0xc1, 0x2f2, 0x4, 0x4, 0x2, 0x5b7e799}], [[], [], [], [], [], [], [], []]})
ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0)

19:17:22 executing program 3:
syz_open_dev$midi(0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0)
mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
timer_settime(0x0, 0x2, &(0x7f00000001c0)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0)
r0 = eventfd2(0x0, 0x0)
ftruncate(r0, 0x2)
ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc020660b, 0x0)
renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0)
lstat(0x0, &(0x7f0000000600))
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000001500)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
r2 = socket$nl_netfilter(0x10, 0x3, 0xc)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
dup(r3)
getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240), 0x0)
prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3)
socket$nl_route(0x10, 0x3, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
accept$unix(r3, &(0x7f0000000680)=@abs, &(0x7f0000000180)=0x6e)
r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x1f, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5)
ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f0000000340)={0x0, 0x0, 0x8, 0x0, [], [{0x1f, 0x1, 0x660000000, 0x8, 0x1}, {0xc1, 0x2f2, 0x4, 0x4, 0x2, 0x5b7e799}], [[], [], [], [], [], [], [], []]})
ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0)

19:17:22 executing program 4:
syz_open_dev$midi(0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0)
mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
timer_settime(0x0, 0x2, &(0x7f00000001c0)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0)
r0 = eventfd2(0x0, 0x0)
ftruncate(r0, 0x2)
ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc020660b, 0x0)
renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0)
lstat(0x0, &(0x7f0000000600))
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000001500)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
r2 = socket$nl_netfilter(0x10, 0x3, 0xc)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
dup(r3)
getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240), 0x0)
prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3)
socket$nl_route(0x10, 0x3, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
accept$unix(r3, &(0x7f0000000680)=@abs, &(0x7f0000000180)=0x6e)
r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x1f, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5)
ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f0000000340)={0x0, 0x0, 0x8, 0x0, [], [{0x1f, 0x1, 0x660000000, 0x8, 0x1}, {0xc1, 0x2f2, 0x4, 0x4, 0x2, 0x5b7e799}], [[], [], [], [], [], [], [], []]})
ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0)

[  176.124009][T11227] IPVS: ftp: loaded support on port[0] = 21
[  176.204270][T11227] chnl_net:caif_netlink_parms(): no params data found
[  176.228438][T11228] IPVS: ftp: loaded support on port[0] = 21
[  176.245483][T11227] bridge0: port 1(bridge_slave_0) entered blocking state
[  176.252567][T11227] bridge0: port 1(bridge_slave_0) entered disabled state
[  176.264905][T11227] device bridge_slave_0 entered promiscuous mode
[  176.279648][T11227] bridge0: port 2(bridge_slave_1) entered blocking state
[  176.286765][T11227] bridge0: port 2(bridge_slave_1) entered disabled state
[  176.299358][T11227] device bridge_slave_1 entered promiscuous mode
[  176.323512][T11227] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[  176.339543][T11227] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[  176.370521][T11227] team0: Port device team_slave_0 added
[  176.382377][T11227] team0: Port device team_slave_1 added
[  176.438168][T11227] device hsr_slave_0 entered promiscuous mode
[  176.504678][T11227] device hsr_slave_1 entered promiscuous mode
[  176.554319][T11227] debugfs: Directory 'hsr0' with parent '/' already present!
[  176.602311][T11228] chnl_net:caif_netlink_parms(): no params data found
[  176.635031][T11228] bridge0: port 1(bridge_slave_0) entered blocking state
[  176.642110][T11228] bridge0: port 1(bridge_slave_0) entered disabled state
[  176.650331][T11228] device bridge_slave_0 entered promiscuous mode
[  176.662578][T11228] bridge0: port 2(bridge_slave_1) entered blocking state
[  176.670559][T11228] bridge0: port 2(bridge_slave_1) entered disabled state
[  176.678621][T11228] device bridge_slave_1 entered promiscuous mode
[  176.699081][T11228] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[  176.710256][T11228] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[  176.731319][T11228] team0: Port device team_slave_0 added
[  176.738276][T11228] team0: Port device team_slave_1 added
[  176.807717][T11228] device hsr_slave_0 entered promiscuous mode
[  176.854805][T11228] device hsr_slave_1 entered promiscuous mode
[  176.894317][T11228] debugfs: Directory 'hsr0' with parent '/' already present!
[  176.910931][T11232] IPVS: ftp: loaded support on port[0] = 21
[  176.916997][T11227] 8021q: adding VLAN 0 to HW filter on device bond0
[  176.947210][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
[  176.962610][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  176.970429][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  176.979192][T11227] 8021q: adding VLAN 0 to HW filter on device team0
[  176.995033][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  177.003681][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  177.012120][   T12] bridge0: port 1(bridge_slave_0) entered blocking state
[  177.019173][   T12] bridge0: port 1(bridge_slave_0) entered forwarding state
[  177.030123][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  177.049976][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  177.059029][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  177.067849][   T12] bridge0: port 2(bridge_slave_1) entered blocking state
[  177.074901][   T12] bridge0: port 2(bridge_slave_1) entered forwarding state
[  177.107863][ T2410] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  177.127626][T11209] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  177.136818][T11209] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  177.146598][T11209] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  177.159282][ T2505] tipc: TX() has been purged, node left!
[  177.171241][ T2410] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  177.203033][T11227] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  177.210588][ T2505] tipc: TX() has been purged, node left!
[  177.217145][ T2505] tipc: TX() has been purged, node left!
[  177.224615][ T2505] tipc: TX() has been purged, node left!
[  177.231420][ T2505] tipc: TX() has been purged, node left!
[  177.242023][ T2505] tipc: TX() has been purged, node left!
[  177.247428][T11227] 8021q: adding VLAN 0 to HW filter on device batadv0
[  177.259666][ T2505] tipc: TX() has been purged, node left!
[  177.264289][ T2410] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  177.272790][ T2410] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[  177.286161][T11232] chnl_net:caif_netlink_parms(): no params data found
[  177.301145][T11228] 8021q: adding VLAN 0 to HW filter on device bond0
[  177.328819][T11228] 8021q: adding VLAN 0 to HW filter on device team0
[  177.341553][ T3059] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  177.349573][ T3059] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  177.376196][ T2410] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  177.388522][ T2410] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  177.397107][ T2410] bridge0: port 1(bridge_slave_0) entered blocking state
[  177.404219][ T2410] bridge0: port 1(bridge_slave_0) entered forwarding state
[  177.412497][ T2410] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  177.426292][T11232] bridge0: port 1(bridge_slave_0) entered blocking state
[  177.433388][T11232] bridge0: port 1(bridge_slave_0) entered disabled state
[  177.441935][T11232] device bridge_slave_0 entered promiscuous mode
[  177.449893][T11232] bridge0: port 2(bridge_slave_1) entered blocking state
[  177.457322][T11232] bridge0: port 2(bridge_slave_1) entered disabled state
[  177.465222][T11232] device bridge_slave_1 entered promiscuous mode
[  177.485431][T11232] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[  177.500309][ T7949] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  177.508932][ T7949] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  177.517944][ T7949] bridge0: port 2(bridge_slave_1) entered blocking state
[  177.525045][ T7949] bridge0: port 2(bridge_slave_1) entered forwarding state
[  177.533066][ T7949] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready
[  177.541907][ T7949] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[  177.554362][   T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[  177.563384][   T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[  177.574424][T11232] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[  177.953412][T11232] team0: Port device team_slave_0 added
[  177.960889][ T3059] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[  177.969425][ T3059] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  177.978731][ T3059] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[  177.987453][ T3059] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  178.169879][T11232] team0: Port device team_slave_1 added
[  178.185938][ T3059] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  178.193810][ T3059] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[  178.202347][ T3059] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  178.215056][   T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready
[  178.223386][   T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[  178.266518][T11232] device hsr_slave_0 entered promiscuous mode
[  178.314686][T11232] device hsr_slave_1 entered promiscuous mode
[  178.354306][T11232] debugfs: Directory 'hsr0' with parent '/' already present!
[  178.363224][T11227] device veth0_vlan entered promiscuous mode
[  178.373653][ T2410] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[  178.386581][ T2410] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[  178.394893][ T2410] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  178.403395][ T2410] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  178.584750][T11228] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  178.600980][T11227] device veth1_vlan entered promiscuous mode
[  178.810952][ T3059] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  178.818629][ T3059] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
19:17:25 executing program 2:
syz_open_dev$midi(0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0)
mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
timer_settime(0x0, 0x2, &(0x7f00000001c0)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0)
r0 = eventfd2(0x0, 0x0)
ftruncate(r0, 0x2)
ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc020660b, 0x0)
renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0)
lstat(0x0, &(0x7f0000000600))
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000001500)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
r2 = socket$nl_netfilter(0x10, 0x3, 0xc)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
dup(r3)
getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240), 0x0)
prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3)
socket$nl_route(0x10, 0x3, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
accept$unix(r3, &(0x7f0000000680)=@abs, &(0x7f0000000180)=0x6e)
r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x1f, &(0x7f00000002c0)=ANY=[@ANYBLOB="850000000700000025000000000000009500000000000000a579753dec29fe276240f076750753bc7b952ab5ad939c403054d8465c13a24800a26b3c68cea54994e702d609331ab3c70aa6b030ed69efddccd23e793e8287051d4f5fef499e2a4ce758601229b94574e7825441222e81748b4ee09cc6fab89f552c75b3b144f5fc545ab790ef72fd2ca305f386142d783531ac34d0c99d62456cc766be4825548e08580000d70b991d746067c73f47457a8713e7b70a85bbdb07832000000000000000000000e680e667212bc3b0c353ebbffbc0b35e84e3db18dec7aa1862259d511d3f57d6a2737027d7f816ef8ac68ea2827824dbfaffea071b77"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5)
ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f0000000340)={0x0, 0x0, 0x8, 0x0, [], [{0x1f, 0x1, 0x660000000, 0x8, 0x1}, {0xc1, 0x2f2, 0x4, 0x4, 0x2, 0x5b7e799}], [[], [], [], [], [], [], [], []]})
ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0)

[  179.091860][T11228] 8021q: adding VLAN 0 to HW filter on device batadv0
[  179.177301][T11247] fuse: Bad value for 'fd'
[  179.345957][T11232] 8021q: adding VLAN 0 to HW filter on device bond0
[  179.378652][T11232] 8021q: adding VLAN 0 to HW filter on device team0
[  179.400697][ T3059] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  179.408837][ T3059] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  179.658734][ T2410] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  179.667459][ T2410] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  179.684598][ T2410] bridge0: port 1(bridge_slave_0) entered blocking state
[  179.691701][ T2410] bridge0: port 1(bridge_slave_0) entered forwarding state
[  179.703630][ T2410] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  179.712311][ T2410] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  179.720673][ T2410] bridge0: port 2(bridge_slave_1) entered blocking state
[  179.727755][ T2410] bridge0: port 2(bridge_slave_1) entered forwarding state
[  179.736737][ T2410] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  179.926959][ T3059] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready
[  179.935872][ T3059] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[  179.965777][T11228] device veth0_vlan entered promiscuous mode
[  180.144053][ T7949] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[  180.152834][ T7949] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready
[  180.161317][ T7949] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[  180.170453][ T7949] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[  180.179431][ T7949] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[  180.188176][ T7949] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  180.197068][ T7949] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[  180.205776][ T7949] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  180.214949][ T7949] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[  180.223449][ T7949] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  180.232192][ T7949] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  180.240853][ T7949] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  180.250025][T11232] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  180.264371][T11228] device veth1_vlan entered promiscuous mode
[  180.273697][ T7949] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[  180.281669][ T7949] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[  180.289599][ T7949] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready
[  180.297730][ T7949] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  180.320918][ T2505] device bridge_slave_1 left promiscuous mode
[  180.327372][ T2505] bridge0: port 2(bridge_slave_1) entered disabled state
[  180.355954][ T2505] device bridge_slave_0 left promiscuous mode
[  180.388831][ T2505] bridge0: port 1(bridge_slave_0) entered disabled state
[  180.447341][ T2505] device bridge_slave_1 left promiscuous mode
[  180.453733][ T2505] bridge0: port 2(bridge_slave_1) entered disabled state
[  180.504849][ T2505] device bridge_slave_0 left promiscuous mode
[  180.511064][ T2505] bridge0: port 1(bridge_slave_0) entered disabled state
19:17:27 executing program 1:
syz_open_dev$midi(0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0)
mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
timer_settime(0x0, 0x2, &(0x7f00000001c0)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0)
r0 = eventfd2(0x0, 0x0)
ftruncate(r0, 0x2)
ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc020660b, 0x0)
renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0)
lstat(0x0, &(0x7f0000000600))
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000001500)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
r2 = socket$nl_netfilter(0x10, 0x3, 0xc)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
dup(r3)
getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240), 0x0)
prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3)
socket$nl_route(0x10, 0x3, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
accept$unix(r3, &(0x7f0000000680)=@abs, &(0x7f0000000180)=0x6e)
r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x1f, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5)
ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f0000000340)={0x0, 0x0, 0x8, 0x0, [], [{0x1f, 0x1, 0x660000000, 0x8, 0x1}, {0xc1, 0x2f2, 0x4, 0x4, 0x2, 0x5b7e799}], [[], [], [], [], [], [], [], []]})
ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0)

19:17:27 executing program 0:
syz_open_dev$midi(0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0)
mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
timer_settime(0x0, 0x2, &(0x7f00000001c0)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0)
r0 = eventfd2(0x0, 0x0)
ftruncate(r0, 0x2)
ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc020660b, 0x0)
renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0)
lstat(0x0, &(0x7f0000000600))
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000001500)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
r2 = socket$nl_netfilter(0x10, 0x3, 0xc)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
dup(r3)
getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240), 0x0)
prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3)
socket$nl_route(0x10, 0x3, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
accept$unix(r3, &(0x7f0000000680)=@abs, &(0x7f0000000180)=0x6e)
r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x1f, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5)
ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f0000000340)={0x0, 0x0, 0x8, 0x0, [], [{0x1f, 0x1, 0x660000000, 0x8, 0x1}, {0xc1, 0x2f2, 0x4, 0x4, 0x2, 0x5b7e799}], [[], [], [], [], [], [], [], []]})
ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0)

19:17:27 executing program 3:
syz_open_dev$midi(0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0)
mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
timer_settime(0x0, 0x2, &(0x7f00000001c0)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0)
r0 = eventfd2(0x0, 0x0)
ftruncate(r0, 0x2)
ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc020660b, 0x0)
renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0)
lstat(0x0, &(0x7f0000000600))
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000001500)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
r2 = socket$nl_netfilter(0x10, 0x3, 0xc)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
dup(r3)
getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240), 0x0)
prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3)
socket$nl_route(0x10, 0x3, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
accept$unix(r3, &(0x7f0000000680)=@abs, &(0x7f0000000180)=0x6e)
r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x1f, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5)
ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f0000000340)={0x0, 0x0, 0x8, 0x0, [], [{0x1f, 0x1, 0x660000000, 0x8, 0x1}, {0xc1, 0x2f2, 0x4, 0x4, 0x2, 0x5b7e799}], [[], [], [], [], [], [], [], []]})
ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0)

19:17:27 executing program 2:
syz_open_dev$midi(0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0)
mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
timer_settime(0x0, 0x2, &(0x7f00000001c0)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0)
r0 = eventfd2(0x0, 0x0)
ftruncate(r0, 0x2)
ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc020660b, 0x0)
renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0)
lstat(0x0, &(0x7f0000000600))
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000001500)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
r2 = socket$nl_netfilter(0x10, 0x3, 0xc)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
dup(r3)
getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240), 0x0)
prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3)
socket$nl_route(0x10, 0x3, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
accept$unix(r3, &(0x7f0000000680)=@abs, &(0x7f0000000180)=0x6e)
r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x1f, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5)
ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f0000000340)={0x0, 0x0, 0x8, 0x0, [], [{0x1f, 0x1, 0x660000000, 0x8, 0x1}, {0xc1, 0x2f2, 0x4, 0x4, 0x2, 0x5b7e799}], [[], [], [], [], [], [], [], []]})
ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0)

19:17:27 executing program 5:
syz_open_dev$midi(0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0)
mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
timer_settime(0x0, 0x2, &(0x7f00000001c0)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0)
r0 = eventfd2(0x0, 0x0)
ftruncate(r0, 0x2)
ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc020660b, 0x0)
renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0)
lstat(0x0, &(0x7f0000000600))
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000001500)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
r2 = socket$nl_netfilter(0x10, 0x3, 0xc)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
dup(r3)
getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240), 0x0)
prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3)
socket$nl_route(0x10, 0x3, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
accept$unix(r3, &(0x7f0000000680)=@abs, &(0x7f0000000180)=0x6e)
r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x1f, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5)
ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f0000000340)={0x0, 0x0, 0x8, 0x0, [], [{0x1f, 0x1, 0x660000000, 0x8, 0x1}, {0xc1, 0x2f2, 0x4, 0x4, 0x2, 0x5b7e799}], [[], [], [], [], [], [], [], []]})
ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0)

[  180.550547][ T2505] device bridge_slave_1 left promiscuous mode
[  180.559490][ T2505] bridge0: port 2(bridge_slave_1) entered disabled state
[  180.597642][ T2505] device bridge_slave_0 left promiscuous mode
[  180.603923][ T2505] bridge0: port 1(bridge_slave_0) entered disabled state
[  180.667825][ T2505] device bridge_slave_1 left promiscuous mode
[  180.674075][ T2505] bridge0: port 2(bridge_slave_1) entered disabled state
[  180.679554][T11259] fuse: Bad value for 'fd'
19:17:27 executing program 1:
syz_open_dev$midi(0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0)
mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
timer_settime(0x0, 0x2, &(0x7f00000001c0)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0)
r0 = eventfd2(0x0, 0x0)
ftruncate(r0, 0x2)
ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc020660b, 0x0)
renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0)
lstat(0x0, &(0x7f0000000600))
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000001500)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
r2 = socket$nl_netfilter(0x10, 0x3, 0xc)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
dup(r3)
getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240), 0x0)
prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3)
socket$nl_route(0x10, 0x3, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
accept$unix(r3, &(0x7f0000000680)=@abs, &(0x7f0000000180)=0x6e)
r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x1f, &(0x7f00000002c0)=ANY=[@ANYBLOB="850000000700000025000000000000009500000000000000a579753dec29fe276240f076750753bc7b952ab5ad939c403054d8465c13a24800a26b3c68cea54994e702d609331ab3c70aa6b030ed69efddccd23e793e8287051d4f5fef499e2a4ce758601229b94574e7825441222e81748b4ee09cc6fab89f552c75b3b144f5fc545ab790ef72fd2ca305f386142d783531ac34d0c99d62456cc766be4825548e08580000d70b991d746067c73f47457a8713e7b70a85bbdb07832000000000000000000000e680e667212bc3b0c353ebbffbc0b35e84e3db18dec7aa1862259d511d3f57d6a2737027d7f816ef8ac68ea2827824dbfaffea071b77"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5)
ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f0000000340)={0x0, 0x0, 0x8, 0x0, [], [{0x1f, 0x1, 0x660000000, 0x8, 0x1}, {0xc1, 0x2f2, 0x4, 0x4, 0x2, 0x5b7e799}], [[], [], [], [], [], [], [], []]})
ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0)

[  180.724839][ T2505] device bridge_slave_0 left promiscuous mode
[  180.731117][ T2505] bridge0: port 1(bridge_slave_0) entered disabled state
[  180.777347][ T2505] device bridge_slave_1 left promiscuous mode
[  180.783570][ T2505] bridge0: port 2(bridge_slave_1) entered disabled state
[  180.824978][ T2505] device bridge_slave_0 left promiscuous mode
[  180.831139][ T2505] bridge0: port 1(bridge_slave_0) entered disabled state
[  180.877109][ T2505] device bridge_slave_1 left promiscuous mode
[  180.883272][ T2505] bridge0: port 2(bridge_slave_1) entered disabled state
[  180.934773][ T2505] device bridge_slave_0 left promiscuous mode
[  180.940967][ T2505] bridge0: port 1(bridge_slave_0) entered disabled state
[  180.996961][ T2505] device bridge_slave_1 left promiscuous mode
[  181.003181][ T2505] bridge0: port 2(bridge_slave_1) entered disabled state
[  181.064793][ T2505] device bridge_slave_0 left promiscuous mode
[  181.071001][ T2505] bridge0: port 1(bridge_slave_0) entered disabled state
[  181.125897][ T2505] device veth1_vlan left promiscuous mode
[  181.131668][ T2505] device veth0_vlan left promiscuous mode
[  181.137851][ T2505] device veth1_vlan left promiscuous mode
[  181.143632][ T2505] device veth0_vlan left promiscuous mode
[  181.149641][ T2505] device veth1_vlan left promiscuous mode
[  181.156698][ T2505] device veth0_vlan left promiscuous mode
[  181.162505][ T2505] device veth1_vlan left promiscuous mode
[  181.168831][ T2505] device veth0_vlan left promiscuous mode
[  181.174991][ T2505] device veth1_vlan left promiscuous mode
[  181.180712][ T2505] device veth0_vlan left promiscuous mode
[  181.186774][ T2505] device veth1_vlan left promiscuous mode
[  181.192536][ T2505] device veth0_vlan left promiscuous mode
[  181.198420][ T2505] device veth1_vlan left promiscuous mode
[  181.204148][ T2505] device veth0_vlan left promiscuous mode
[  187.004565][ T2505] device hsr_slave_0 left promiscuous mode
[  187.044372][ T2505] device hsr_slave_1 left promiscuous mode
[  187.091756][ T2505] team0 (unregistering): Port device team_slave_1 removed
[  187.102137][ T2505] team0 (unregistering): Port device team_slave_0 removed
[  187.112407][ T2505] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface
[  187.157964][ T2505] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface
[  187.258028][ T2505] bond0 (unregistering): Released all slaves
[  187.484490][ T2505] device hsr_slave_0 left promiscuous mode
[  187.554459][ T2505] device hsr_slave_1 left promiscuous mode
[  187.610635][ T2505] team0 (unregistering): Port device team_slave_1 removed
[  187.621930][ T2505] team0 (unregistering): Port device team_slave_0 removed
[  187.632082][ T2505] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface
[  187.687441][ T2505] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface
[  187.766698][ T2505] bond0 (unregistering): Released all slaves
[  188.024464][ T2505] device hsr_slave_0 left promiscuous mode
[  188.074315][ T2505] device hsr_slave_1 left promiscuous mode
[  188.140842][ T2505] team0 (unregistering): Port device team_slave_1 removed
[  188.151192][ T2505] team0 (unregistering): Port device team_slave_0 removed
[  188.161177][ T2505] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface
[  188.217820][ T2505] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface
[  188.287216][ T2505] bond0 (unregistering): Released all slaves
[  188.494681][ T2505] device hsr_slave_0 left promiscuous mode
[  188.534364][ T2505] device hsr_slave_1 left promiscuous mode
[  188.581177][ T2505] team0 (unregistering): Port device team_slave_1 removed
[  188.591756][ T2505] team0 (unregistering): Port device team_slave_0 removed
[  188.601908][ T2505] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface
[  188.657776][ T2505] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface
[  188.757781][ T2505] bond0 (unregistering): Released all slaves
[  188.954595][ T2505] device hsr_slave_0 left promiscuous mode
[  189.024433][ T2505] device hsr_slave_1 left promiscuous mode
[  189.073022][ T2505] team0 (unregistering): Port device team_slave_1 removed
[  189.083099][ T2505] team0 (unregistering): Port device team_slave_0 removed
[  189.093540][ T2505] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface
[  189.148059][ T2505] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface
[  189.238756][ T2505] bond0 (unregistering): Released all slaves
[  189.474646][ T2505] device hsr_slave_0 left promiscuous mode
[  189.524297][ T2505] device hsr_slave_1 left promiscuous mode
[  189.601084][ T2505] team0 (unregistering): Port device team_slave_1 removed
[  189.611759][ T2505] team0 (unregistering): Port device team_slave_0 removed
[  189.622115][ T2505] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface
[  189.678024][ T2505] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface
[  189.736082][ T2505] bond0 (unregistering): Released all slaves
[  189.914589][ T2505] device hsr_slave_0 left promiscuous mode
[  189.954357][ T2505] device hsr_slave_1 left promiscuous mode
[  190.000670][ T2505] team0 (unregistering): Port device team_slave_1 removed
[  190.011244][ T2505] team0 (unregistering): Port device team_slave_0 removed
[  190.021031][ T2505] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface
[  190.058335][ T2505] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface
[  190.138133][ T2505] bond0 (unregistering): Released all slaves
[  190.272506][T11232] 8021q: adding VLAN 0 to HW filter on device batadv0
[  190.284965][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready
[  190.299044][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  190.306751][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
19:17:37 executing program 1:
syz_open_dev$midi(0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0)
mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
timer_settime(0x0, 0x2, &(0x7f00000001c0)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0)
r0 = eventfd2(0x0, 0x0)
ftruncate(r0, 0x2)
ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc020660b, 0x0)
renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0)
lstat(0x0, &(0x7f0000000600))
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000001500)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
r2 = socket$nl_netfilter(0x10, 0x3, 0xc)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
dup(r3)
getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240), 0x0)
prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3)
socket$nl_route(0x10, 0x3, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
accept$unix(r3, &(0x7f0000000680)=@abs, &(0x7f0000000180)=0x6e)
r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x1f, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5)
ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f0000000340)={0x0, 0x0, 0x8, 0x0, [], [{0x1f, 0x1, 0x660000000, 0x8, 0x1}, {0xc1, 0x2f2, 0x4, 0x4, 0x2, 0x5b7e799}], [[], [], [], [], [], [], [], []]})
ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0)

[  190.374999][T11265] IPVS: ftp: loaded support on port[0] = 21
[  190.379139][T11266] IPVS: ftp: loaded support on port[0] = 21
[  190.402474][T11267] IPVS: ftp: loaded support on port[0] = 21
[  190.405680][T11264] IPVS: ftp: loaded support on port[0] = 21
19:17:37 executing program 1:
syz_open_dev$midi(0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0)
mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
timer_settime(0x0, 0x2, &(0x7f00000001c0)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0)
r0 = eventfd2(0x0, 0x0)
ftruncate(r0, 0x2)
ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc020660b, 0x0)
renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0)
lstat(0x0, &(0x7f0000000600))
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000001500)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
r2 = socket$nl_netfilter(0x10, 0x3, 0xc)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
dup(r3)
getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240), 0x0)
prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3)
socket$nl_route(0x10, 0x3, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
accept$unix(r3, &(0x7f0000000680)=@abs, &(0x7f0000000180)=0x6e)
r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x1f, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5)
ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f0000000340)={0x0, 0x0, 0x8, 0x0, [], [{0x1f, 0x1, 0x660000000, 0x8, 0x1}, {0xc1, 0x2f2, 0x4, 0x4, 0x2, 0x5b7e799}], [[], [], [], [], [], [], [], []]})
ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0)

[  190.513569][   T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready
[  190.534957][   T27] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[  190.619149][T11265] chnl_net:caif_netlink_parms(): no params data found
[  190.639808][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready
[  190.648445][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[  190.658328][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[  190.666587][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[  190.701905][T11232] device veth0_vlan entered promiscuous mode
[  190.758663][T11232] device veth1_vlan entered promiscuous mode
[  190.785310][T11264] chnl_net:caif_netlink_parms(): no params data found
[  190.794382][T11265] bridge0: port 1(bridge_slave_0) entered blocking state
[  190.801467][T11265] bridge0: port 1(bridge_slave_0) entered disabled state
[  190.809281][T11265] device bridge_slave_0 entered promiscuous mode
[  190.837313][T11265] bridge0: port 2(bridge_slave_1) entered blocking state
[  190.844821][T11265] bridge0: port 2(bridge_slave_1) entered disabled state
[  190.852395][T11265] device bridge_slave_1 entered promiscuous mode
[  190.859802][T11266] chnl_net:caif_netlink_parms(): no params data found
[  190.908911][T11266] bridge0: port 1(bridge_slave_0) entered blocking state
[  190.916433][T11266] bridge0: port 1(bridge_slave_0) entered disabled state
[  190.924229][T11266] device bridge_slave_0 entered promiscuous mode
[  190.931594][T11267] chnl_net:caif_netlink_parms(): no params data found
[  190.946764][T11265] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[  190.967294][T11266] bridge0: port 2(bridge_slave_1) entered blocking state
[  190.976048][T11266] bridge0: port 2(bridge_slave_1) entered disabled state
[  190.983838][T11266] device bridge_slave_1 entered promiscuous mode
[  190.995254][T11265] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[  191.020908][T11265] team0: Port device team_slave_0 added
[  191.027744][T11265] team0: Port device team_slave_1 added
[  191.033457][T11264] bridge0: port 1(bridge_slave_0) entered blocking state
[  191.051613][T11264] bridge0: port 1(bridge_slave_0) entered disabled state
[  191.065008][T11264] device bridge_slave_0 entered promiscuous mode
[  191.073148][T11264] bridge0: port 2(bridge_slave_1) entered blocking state
[  191.080698][T11264] bridge0: port 2(bridge_slave_1) entered disabled state
[  191.088915][T11264] device bridge_slave_1 entered promiscuous mode
[  191.141532][T11266] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[  191.176648][T11265] device hsr_slave_0 entered promiscuous mode
[  191.214457][T11265] device hsr_slave_1 entered promiscuous mode
[  191.261043][T11264] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[  191.273639][T11264] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[  191.284824][T11266] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[  191.301751][ T7949] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready
19:17:38 executing program 4:
syz_open_dev$midi(0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0)
mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
timer_settime(0x0, 0x2, &(0x7f00000001c0)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0)
r0 = eventfd2(0x0, 0x0)
ftruncate(r0, 0x2)
ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc020660b, 0x0)
renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0)
lstat(0x0, &(0x7f0000000600))
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000001500)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
r2 = socket$nl_netfilter(0x10, 0x3, 0xc)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
dup(r3)
getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240), 0x0)
prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3)
socket$nl_route(0x10, 0x3, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
accept$unix(r3, &(0x7f0000000680)=@abs, &(0x7f0000000180)=0x6e)
r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x1f, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5)
ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f0000000340)={0x0, 0x0, 0x8, 0x0, [], [{0x1f, 0x1, 0x660000000, 0x8, 0x1}, {0xc1, 0x2f2, 0x4, 0x4, 0x2, 0x5b7e799}], [[], [], [], [], [], [], [], []]})
ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0)

[  191.313156][ T7949] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready
[  191.366329][T11266] team0: Port device team_slave_0 added
[  191.379843][T11267] bridge0: port 1(bridge_slave_0) entered blocking state
[  191.387345][T11267] bridge0: port 1(bridge_slave_0) entered disabled state
[  191.395661][T11267] device bridge_slave_0 entered promiscuous mode
[  191.403931][T11264] team0: Port device team_slave_0 added
[  191.404621][T11282] fuse: Bad value for 'fd'
[  191.412052][T11264] team0: Port device team_slave_1 added
[  191.435983][T11266] team0: Port device team_slave_1 added
[  191.451328][T11267] bridge0: port 2(bridge_slave_1) entered blocking state
[  191.459030][T11267] bridge0: port 2(bridge_slave_1) entered disabled state
[  191.467374][T11267] device bridge_slave_1 entered promiscuous mode
19:17:38 executing program 4:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r2, 0x0)
mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r3, 0x0)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3)
syz_open_procfs(0x0, &(0x7f0000272000))

[  191.716640][T11266] device hsr_slave_0 entered promiscuous mode
[  191.757162][T11266] device hsr_slave_1 entered promiscuous mode
[  191.784289][T11266] debugfs: Directory 'hsr0' with parent '/' already present!
[  191.793565][T11267] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[  191.836368][T11264] device hsr_slave_0 entered promiscuous mode
[  191.874663][T11264] device hsr_slave_1 entered promiscuous mode
[  191.914298][T11264] debugfs: Directory 'hsr0' with parent '/' already present!
19:17:38 executing program 4:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r2, 0x0)
mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r3, 0x0)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3)
syz_open_procfs(0x0, &(0x7f0000272000))

19:17:38 executing program 4:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r2, 0x0)
mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r3, 0x0)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3)
syz_open_procfs(0x0, &(0x7f0000272000))

[  192.073307][T11267] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[  192.093965][T11267] team0: Port device team_slave_0 added
[  192.105166][T11284] IPVS: ftp: loaded support on port[0] = 21
[  192.224171][T11267] team0: Port device team_slave_1 added
[  192.316531][T11267] device hsr_slave_0 entered promiscuous mode
[  192.374586][T11267] device hsr_slave_1 entered promiscuous mode
[  192.434240][T11267] debugfs: Directory 'hsr0' with parent '/' already present!
[  192.527380][T11265] 8021q: adding VLAN 0 to HW filter on device bond0
[  192.579656][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  192.588244][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  192.607795][T11265] 8021q: adding VLAN 0 to HW filter on device team0
[  192.665452][ T7951] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  192.673961][ T7951] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  192.694827][ T7951] bridge0: port 1(bridge_slave_0) entered blocking state
[  192.701969][ T7951] bridge0: port 1(bridge_slave_0) entered forwarding state
[  192.725360][ T7951] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  192.742909][T11266] 8021q: adding VLAN 0 to HW filter on device bond0
[  192.765950][T11266] 8021q: adding VLAN 0 to HW filter on device team0
[  192.776578][ T7949] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  192.786113][ T7949] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  192.794816][ T7949] bridge0: port 2(bridge_slave_1) entered blocking state
[  192.801934][ T7949] bridge0: port 2(bridge_slave_1) entered forwarding state
[  192.809855][ T7949] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  192.817819][ T7949] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  192.834778][T11284] chnl_net:caif_netlink_parms(): no params data found
[  192.849730][ T3059] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[  192.859792][ T3059] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[  192.868894][ T3059] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  192.878022][ T3059] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  192.886710][ T3059] bridge0: port 1(bridge_slave_0) entered blocking state
[  192.893737][ T3059] bridge0: port 1(bridge_slave_0) entered forwarding state
[  192.906409][T11264] 8021q: adding VLAN 0 to HW filter on device bond0
[  192.916541][ T3059] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  192.927235][ T3059] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[  192.936990][ T3059] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  192.946308][ T3059] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[  192.955205][ T3059] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  192.963627][ T3059] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  192.972260][ T3059] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  192.980639][ T3059] bridge0: port 2(bridge_slave_1) entered blocking state
[  192.987677][ T3059] bridge0: port 2(bridge_slave_1) entered forwarding state
[  192.999345][ T7949] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  193.022401][T11287] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[  193.031732][T11287] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[  193.041408][T11287] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[  193.050369][T11287] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  193.060008][T11287] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  193.073070][T11265] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network
[  193.084292][T11265] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[  193.116533][T11287] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[  193.128873][T11287] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  193.138672][T11287] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  193.151156][T11287] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  193.160554][T11287] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[  193.173263][T11287] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  193.183044][T11287] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[  193.196518][T11287] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  193.208238][T11287] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  193.230906][T11264] 8021q: adding VLAN 0 to HW filter on device team0
[  193.243313][T11266] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[  193.260852][T11266] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  193.273960][ T7951] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  193.286796][ T7951] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  193.295902][ T7951] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  193.304962][ T7951] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  193.353041][T11267] 8021q: adding VLAN 0 to HW filter on device bond0
[  193.365314][T11284] bridge0: port 1(bridge_slave_0) entered blocking state
[  193.372606][T11284] bridge0: port 1(bridge_slave_0) entered disabled state
[  193.381826][T11284] device bridge_slave_0 entered promiscuous mode
[  193.390482][T11284] bridge0: port 2(bridge_slave_1) entered blocking state
[  193.397848][T11284] bridge0: port 2(bridge_slave_1) entered disabled state
[  193.406109][T11284] device bridge_slave_1 entered promiscuous mode
[  193.423949][T11289] IPVS: ftp: loaded support on port[0] = 21
[  193.430187][ T7949] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  193.439043][ T7949] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  193.452008][ T7949] bridge0: port 1(bridge_slave_0) entered blocking state
[  193.459232][ T7949] bridge0: port 1(bridge_slave_0) entered forwarding state
[  193.467708][ T7949] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  193.476303][ T7949] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  193.485103][ T7949] bridge0: port 2(bridge_slave_1) entered blocking state
[  193.492183][ T7949] bridge0: port 2(bridge_slave_1) entered forwarding state
[  193.500826][ T7949] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[  193.510046][ T7949] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[  193.519389][ T7949] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[  193.528438][ T7949] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  193.538723][ T7949] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  193.547268][ T7949] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  193.561164][T11266] 8021q: adding VLAN 0 to HW filter on device batadv0
[  193.586007][T11284] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[  193.616414][ T3059] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  193.623938][ T3059] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[  193.645752][ T3059] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  193.653424][ T3059] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[  193.661263][ T3059] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  193.669577][ T3059] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  193.679552][T11265] 8021q: adding VLAN 0 to HW filter on device batadv0
[  193.709542][T11284] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[  193.722882][T11267] 8021q: adding VLAN 0 to HW filter on device team0
[  193.733177][T11287] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[  193.742371][T11287] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  193.753017][T11287] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[  193.761648][T11287] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  193.786949][T11284] team0: Port device team_slave_0 added
[  193.794094][T11284] team0: Port device team_slave_1 added
[  193.807580][T11264] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[  193.819506][T11264] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  193.831848][ T7951] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  193.841634][ T7951] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  193.850259][ T7951] bridge0: port 1(bridge_slave_0) entered blocking state
[  193.857453][ T7951] bridge0: port 1(bridge_slave_0) entered forwarding state
[  193.866063][ T7951] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  193.874889][ T7951] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  193.883135][ T7951] bridge0: port 2(bridge_slave_1) entered blocking state
[  193.890303][ T7951] bridge0: port 2(bridge_slave_1) entered forwarding state
[  193.898017][ T7951] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  193.906629][ T7951] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  193.940670][T11287] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  193.953754][T11287] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[  193.962897][T11287] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[  194.036382][T11284] device hsr_slave_0 entered promiscuous mode
[  194.074524][T11284] device hsr_slave_1 entered promiscuous mode
[  194.124408][T11284] debugfs: Directory 'hsr0' with parent '/' already present!
[  194.159248][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready
[  194.168277][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[  194.177028][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[  194.185919][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  194.194591][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[  194.203239][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  194.212128][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[  194.221088][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  194.229664][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  194.238103][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  194.250104][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  194.258277][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready
[  194.266763][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[  194.275716][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[  194.283618][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[  194.324777][T11267] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  194.333910][T11223] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready
[  194.344558][T11223] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[  194.357826][T11264] 8021q: adding VLAN 0 to HW filter on device batadv0
[  194.370143][T11266] device veth0_vlan entered promiscuous mode
[  194.394058][T11289] chnl_net:caif_netlink_parms(): no params data found
[  194.407375][ T3059] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  194.416060][ T3059] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[  194.427775][T11265] device veth0_vlan entered promiscuous mode
[  194.439827][T11266] device veth1_vlan entered promiscuous mode
[  194.450811][ T3059] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready
[  194.459103][ T2505] tipc: TX() has been purged, node left!
[  194.460137][ T3059] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready
[  194.472912][ T2505] tipc: TX() has been purged, node left!
[  194.473445][ T3059] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[  194.489302][ T2505] tipc: TX() has been purged, node left!
[  194.495909][T11267] 8021q: adding VLAN 0 to HW filter on device batadv0
[  194.516274][T11265] device veth1_vlan entered promiscuous mode
[  194.530798][ T3059] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready
[  194.539378][ T3059] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[  194.548190][ T3059] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[  194.556942][ T3059] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready
[  194.573273][ T3059] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  194.581089][ T3059] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
19:17:41 executing program 0:
syz_open_dev$midi(0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0)
mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
timer_settime(0x0, 0x2, &(0x7f00000001c0)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0)
r0 = eventfd2(0x0, 0x0)
ftruncate(r0, 0x2)
ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc020660b, 0x0)
renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0)
lstat(0x0, &(0x7f0000000600))
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000001500)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
r2 = socket$nl_netfilter(0x10, 0x3, 0xc)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
dup(r3)
getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240), 0x0)
prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3)
socket$nl_route(0x10, 0x3, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
accept$unix(r3, &(0x7f0000000680)=@abs, &(0x7f0000000180)=0x6e)
r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x1f, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5)
ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f0000000340)={0x0, 0x0, 0x8, 0x0, [], [{0x1f, 0x1, 0x660000000, 0x8, 0x1}, {0xc1, 0x2f2, 0x4, 0x4, 0x2, 0x5b7e799}], [[], [], [], [], [], [], [], []]})
ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0)

[  194.951059][T11320] fuse: Bad value for 'fd'
19:17:41 executing program 5:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r2, 0x0)
mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r3, 0x0)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3)
syz_open_procfs(0x0, &(0x7f0000272000))

[  195.063454][T11289] bridge0: port 1(bridge_slave_0) entered blocking state
[  195.070702][T11289] bridge0: port 1(bridge_slave_0) entered disabled state
[  195.079368][T11289] device bridge_slave_0 entered promiscuous mode
[  195.088291][T11289] bridge0: port 2(bridge_slave_1) entered blocking state
[  195.100841][T11289] bridge0: port 2(bridge_slave_1) entered disabled state
[  195.109393][T11289] device bridge_slave_1 entered promiscuous mode
[  195.123384][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready
[  195.132821][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[  195.145792][T11264] device veth0_vlan entered promiscuous mode
[  195.276734][T11287] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready
[  195.285263][T11287] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[  195.293889][T11287] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[  195.302245][T11287] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[  195.312562][T11264] device veth1_vlan entered promiscuous mode
[  195.389021][T11289] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[  195.400728][T11289] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[  195.526395][T11289] team0: Port device team_slave_0 added
[  195.624733][T11289] team0: Port device team_slave_1 added
[  195.648382][T11287] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready
[  195.656801][T11287] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready
[  195.667313][T11287] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready
[  195.676697][T11287] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[  195.710008][T11284] 8021q: adding VLAN 0 to HW filter on device bond0
[  195.781333][T11289] device hsr_slave_0 entered promiscuous mode
19:17:42 executing program 3:
syz_open_dev$midi(0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0)
mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
timer_settime(0x0, 0x2, &(0x7f00000001c0)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0)
r0 = eventfd2(0x0, 0x0)
ftruncate(r0, 0x2)
ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc020660b, 0x0)
renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0)
lstat(0x0, &(0x7f0000000600))
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000001500)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
r2 = socket$nl_netfilter(0x10, 0x3, 0xc)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
dup(r3)
getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240), 0x0)
prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3)
socket$nl_route(0x10, 0x3, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
accept$unix(r3, &(0x7f0000000680)=@abs, &(0x7f0000000180)=0x6e)
r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x1f, &(0x7f00000002c0)=ANY=[@ANYBLOB="850000000700000025000000000000009500000000000000a579753dec29fe276240f076750753bc7b952ab5ad939c403054d8465c13a24800a26b3c68cea54994e702d609331ab3c70aa6b030ed69efddccd23e793e8287051d4f5fef499e2a4ce758601229b94574e7825441222e81748b4ee09cc6fab89f552c75b3b144f5fc545ab790ef72fd2ca305f386142d783531ac34d0c99d62456cc766be4825548e08580000d70b991d746067c73f47457a8713e7b70a85bbdb07832000000000000000000000e680e667212bc3b0c353ebbffbc0b35e84e3db18dec7aa1862259d511d3f57d6a2737027d7f816ef8ac68ea2827824dbfaffea071b77"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5)
ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f0000000340)={0x0, 0x0, 0x8, 0x0, [], [{0x1f, 0x1, 0x660000000, 0x8, 0x1}, {0xc1, 0x2f2, 0x4, 0x4, 0x2, 0x5b7e799}], [[], [], [], [], [], [], [], []]})
ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0)

[  195.834936][T11289] device hsr_slave_1 entered promiscuous mode
[  195.876863][T11289] debugfs: Directory 'hsr0' with parent '/' already present!
[  195.910826][T11330] fuse: Bad value for 'fd'
[  196.010746][T11284] 8021q: adding VLAN 0 to HW filter on device team0
[  196.032217][T11287] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  196.044731][T11287] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  196.052677][T11287] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready
[  196.065292][T11287] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[  196.074407][T11287] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[  196.082639][T11287] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[  196.091199][T11267] device veth0_vlan entered promiscuous mode
[  196.194330][ T3059] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  196.203000][ T3059] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  196.211931][ T3059] bridge0: port 1(bridge_slave_0) entered blocking state
[  196.219166][ T3059] bridge0: port 1(bridge_slave_0) entered forwarding state
[  196.304414][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  196.312848][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  196.325439][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  196.333907][   T12] bridge0: port 2(bridge_slave_1) entered blocking state
[  196.341050][   T12] bridge0: port 2(bridge_slave_1) entered forwarding state
[  196.349120][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[  196.359919][T11267] device veth1_vlan entered promiscuous mode
[  196.464676][ T7949] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready
[  196.472815][ T7949] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[  196.482235][ T7949] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[  196.490926][ T7949] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  196.520440][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready
[  196.528891][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  196.537672][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[  196.546907][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  196.706876][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[  196.722024][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  196.734266][T11223] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  196.747683][T11223] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
19:17:43 executing program 0:
syz_open_dev$midi(0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0)
mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
timer_settime(0x0, 0x2, &(0x7f00000001c0)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0)
r0 = eventfd2(0x0, 0x0)
ftruncate(r0, 0x2)
ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc020660b, 0x0)
renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0)
lstat(0x0, &(0x7f0000000600))
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000001500)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
r2 = socket$nl_netfilter(0x10, 0x3, 0xc)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
dup(r3)
getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240), 0x0)
prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3)
socket$nl_route(0x10, 0x3, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
accept$unix(r3, &(0x7f0000000680)=@abs, &(0x7f0000000180)=0x6e)
r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x1f, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5)
ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f0000000340)={0x0, 0x0, 0x8, 0x0, [], [{0x1f, 0x1, 0x660000000, 0x8, 0x1}, {0xc1, 0x2f2, 0x4, 0x4, 0x2, 0x5b7e799}], [[], [], [], [], [], [], [], []]})
ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0)

19:17:43 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r2, 0x0)
mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r3, 0x0)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3)
syz_open_procfs(0x0, &(0x7f0000272000))

19:17:43 executing program 5:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r2, 0x0)
mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r3, 0x0)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3)
syz_open_procfs(0x0, &(0x7f0000272000))

19:17:43 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r2, 0x0)
mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r3, 0x0)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3)
syz_open_procfs(0x0, &(0x7f0000272000))

[  196.852397][T11284] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  196.867052][T11289] 8021q: adding VLAN 0 to HW filter on device bond0
[  196.905301][ T2505] device bridge_slave_1 left promiscuous mode
[  196.911484][ T2505] bridge0: port 2(bridge_slave_1) entered disabled state
[  196.944765][ T2505] device bridge_slave_0 left promiscuous mode
[  196.951099][ T2505] bridge0: port 1(bridge_slave_0) entered disabled state
[  196.990870][ T2505] device bridge_slave_1 left promiscuous mode
[  196.997129][ T2505] bridge0: port 2(bridge_slave_1) entered disabled state
[  197.045012][ T2505] device bridge_slave_0 left promiscuous mode
[  197.051364][ T2505] bridge0: port 1(bridge_slave_0) entered disabled state
[  197.097076][ T2505] device bridge_slave_1 left promiscuous mode
[  197.103411][ T2505] bridge0: port 2(bridge_slave_1) entered disabled state
[  197.144977][ T2505] device bridge_slave_0 left promiscuous mode
[  197.151170][ T2505] bridge0: port 1(bridge_slave_0) entered disabled state
[  197.200764][ T2505] device veth1_vlan left promiscuous mode
[  197.206930][ T2505] device veth0_vlan left promiscuous mode
[  197.213000][ T2505] device veth1_vlan left promiscuous mode
[  197.219103][ T2505] device veth0_vlan left promiscuous mode
[  197.225167][ T2505] device veth1_vlan left promiscuous mode
[  197.230997][ T2505] device veth0_vlan left promiscuous mode
[  199.815022][ T2505] device hsr_slave_0 left promiscuous mode
[  199.854352][ T2505] device hsr_slave_1 left promiscuous mode
[  199.911484][ T2505] team0 (unregistering): Port device team_slave_1 removed
[  199.922852][ T2505] team0 (unregistering): Port device team_slave_0 removed
[  199.933200][ T2505] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface
[  199.978712][ T2505] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface
[  200.048335][ T2505] bond0 (unregistering): Released all slaves
[  200.244674][ T2505] device hsr_slave_0 left promiscuous mode
[  200.294709][ T2505] device hsr_slave_1 left promiscuous mode
[  200.351316][ T2505] team0 (unregistering): Port device team_slave_1 removed
[  200.361685][ T2505] team0 (unregistering): Port device team_slave_0 removed
[  200.371605][ T2505] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface
[  200.397697][ T2505] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface
[  200.467735][ T2505] bond0 (unregistering): Released all slaves
[  200.634684][ T2505] device hsr_slave_0 left promiscuous mode
[  200.684383][ T2505] device hsr_slave_1 left promiscuous mode
[  200.730870][ T2505] team0 (unregistering): Port device team_slave_1 removed
[  200.741667][ T2505] team0 (unregistering): Port device team_slave_0 removed
[  200.751685][ T2505] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface
[  200.797695][ T2505] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface
[  200.877591][ T2505] bond0 (unregistering): Released all slaves
[  201.004581][T11287] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  201.011994][T11287] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[  201.024941][T11284] 8021q: adding VLAN 0 to HW filter on device batadv0
[  201.033231][T11289] 8021q: adding VLAN 0 to HW filter on device team0
[  201.053316][T11342] IPVS: ftp: loaded support on port[0] = 21
[  201.067011][T11287] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  201.084761][T11343] IPVS: ftp: loaded support on port[0] = 21
[  201.104144][T11287] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  201.131761][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  201.149373][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  201.157806][   T12] bridge0: port 1(bridge_slave_0) entered blocking state
[  201.164879][   T12] bridge0: port 1(bridge_slave_0) entered forwarding state
[  201.173372][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  201.182096][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  201.190460][   T12] bridge0: port 2(bridge_slave_1) entered blocking state
[  201.197581][   T12] bridge0: port 2(bridge_slave_1) entered forwarding state
[  201.206437][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[  201.215462][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[  201.224381][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  201.246278][T11287] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[  201.261349][T11287] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  201.270532][T11287] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[  201.279290][T11287] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  201.288186][T11287] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[  201.296650][T11287] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  201.306323][ T7950] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  201.335995][ T7950] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  201.344720][ T7950] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  201.354338][T11289] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  201.394895][T11287] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  201.402345][T11287] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[  201.434906][T11289] 8021q: adding VLAN 0 to HW filter on device batadv0
[  201.442442][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready
[  201.451685][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[  201.470849][T11287] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready
[  201.479252][T11287] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[  201.494292][T11287] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[  201.502089][T11287] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[  201.510217][T11343] chnl_net:caif_netlink_parms(): no params data found
[  201.634433][T11284] device veth0_vlan entered promiscuous mode
[  201.651108][T11284] device veth1_vlan entered promiscuous mode
[  201.776676][T11342] chnl_net:caif_netlink_parms(): no params data found
[  201.787362][T11343] bridge0: port 1(bridge_slave_0) entered blocking state
[  201.794685][T11343] bridge0: port 1(bridge_slave_0) entered disabled state
[  201.802413][T11343] device bridge_slave_0 entered promiscuous mode
[  201.819654][T11343] bridge0: port 2(bridge_slave_1) entered blocking state
[  201.826996][T11343] bridge0: port 2(bridge_slave_1) entered disabled state
[  201.835306][T11343] device bridge_slave_1 entered promiscuous mode
[  201.877017][T11287] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready
[  201.909305][T11287] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready
[  201.952106][T11287] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready
[  201.999087][T11287] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[  202.028066][T11343] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[  202.055468][T11342] bridge0: port 1(bridge_slave_0) entered blocking state
[  202.070218][T11342] bridge0: port 1(bridge_slave_0) entered disabled state
[  202.079036][T11342] device bridge_slave_0 entered promiscuous mode
[  202.091922][T11343] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
19:17:48 executing program 1:
syz_open_dev$midi(0x0, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0)
mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
timer_settime(0x0, 0x2, &(0x7f00000001c0)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0)
r0 = eventfd2(0x0, 0x0)
ftruncate(r0, 0x2)
ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc020660b, 0x0)
renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0)
lstat(0x0, &(0x7f0000000600))
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000001500)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
r2 = socket$nl_netfilter(0x10, 0x3, 0xc)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
dup(r3)
getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240), 0x0)
prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1)
ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200)
ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3)
socket$nl_route(0x10, 0x3, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
accept$unix(r3, &(0x7f0000000680)=@abs, &(0x7f0000000180)=0x6e)
r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x1f, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78)
ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5)
ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f0000000340)={0x0, 0x0, 0x8, 0x0, [], [{0x1f, 0x1, 0x660000000, 0x8, 0x1}, {0xc1, 0x2f2, 0x4, 0x4, 0x2, 0x5b7e799}], [[], [], [], [], [], [], [], []]})
ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, 0x0)

19:17:48 executing program 5:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r2, 0x0)
mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r3, 0x0)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3)
syz_open_procfs(0x0, &(0x7f0000272000))

19:17:48 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r2, 0x0)
mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r3, 0x0)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3)
syz_open_procfs(0x0, &(0x7f0000272000))

[  202.131640][T11289] device veth0_vlan entered promiscuous mode
[  202.155176][T11342] bridge0: port 2(bridge_slave_1) entered blocking state
[  202.162256][T11342] bridge0: port 2(bridge_slave_1) entered disabled state
[  202.178458][T11342] device bridge_slave_1 entered promiscuous mode
[  202.203014][T11287] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready
[  202.213592][T11287] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[  202.248928][T11343] team0: Port device team_slave_0 added
[  202.258837][T11289] device veth1_vlan entered promiscuous mode
[  202.270849][T11223] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[  202.281036][T11223] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
19:17:49 executing program 5:
r0 = syz_open_dev$dri(&(0x7f0000000140)='/dev/dri/card#\x00', 0x0, 0x0)
ioctl(r0, 0xffffffffffffffaa, &(0x7f0000000080))

[  202.307324][T11223] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready
[  202.321875][T11369] fuse: Bad value for 'fd'
[  202.327370][T11342] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[  202.348532][T11342] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[  202.393068][T11343] team0: Port device team_slave_1 added
[  202.440949][T11342] team0: Port device team_slave_0 added
[  202.516917][T11343] device hsr_slave_0 entered promiscuous mode
[  202.554676][T11343] device hsr_slave_1 entered promiscuous mode
19:17:49 executing program 1:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
getsockopt$inet6_buf(r0, 0x6, 0x1d, 0x0, &(0x7f0000000000)=0x1f4)

19:17:49 executing program 2:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r2, 0x0)
mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r3, 0x0)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3)
syz_open_procfs(0x0, &(0x7f0000272000))

19:17:49 executing program 5:
r0 = syz_open_dev$dri(&(0x7f0000000140)='/dev/dri/card#\x00', 0x0, 0x0)
ioctl(r0, 0xffffffffffffffaa, &(0x7f0000000080))

[  202.594336][T11343] debugfs: Directory 'hsr0' with parent '/' already present!
[  202.609317][T11342] team0: Port device team_slave_1 added
19:17:49 executing program 4:
r0 = gettid()
r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003)
write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf45f1f8eddb8ee3370fa2f84c99f10cc6297fa1b9b3853c78451363"], 0x1f)
ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0)
r2 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6)
ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x800448d2, 0x0)
socket$inet_icmp_raw(0x2, 0x3, 0x1)
prctl$PR_CAPBSET_DROP(0x18, 0x9)
openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x42, 0x4008001, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, r0)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x200000000005}, 0x8000, 0x0, 0x0, 0x13}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
getpeername$packet(0xffffffffffffffff, &(0x7f0000001880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000002200)=0xe8)
socket$inet_udp(0x2, 0x2, 0x0)
r3 = syz_open_procfs(0x0, 0x0)
sendfile(0xffffffffffffffff, r3, &(0x7f0000000180)=0x74000000, 0x5)
r4 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0)
fcntl$setlease(r4, 0x400, 0x0)
clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)

[  202.879553][T11342] device hsr_slave_0 entered promiscuous mode
[  202.924645][T11342] device hsr_slave_1 entered promiscuous mode
[  202.964305][T11342] debugfs: Directory 'hsr0' with parent '/' already present!
[  203.077050][T11343] 8021q: adding VLAN 0 to HW filter on device bond0
[  203.102094][T11223] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready
[  203.139903][T11343] 8021q: adding VLAN 0 to HW filter on device team0
[  203.148409][T11287] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  203.156870][T11287] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  203.190281][T11223] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  203.199686][T11223] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  203.212638][T11223] bridge0: port 1(bridge_slave_0) entered blocking state
[  203.219851][T11223] bridge0: port 1(bridge_slave_0) entered forwarding state
[  203.232046][T11223] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  203.240937][T11223] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  203.249660][T11223] bridge0: port 2(bridge_slave_1) entered blocking state
[  203.257318][T11223] bridge0: port 2(bridge_slave_1) entered forwarding state
[  203.265533][T11223] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[  203.274675][T11223] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[  203.283888][T11223] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[  203.292770][T11223] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  203.303730][T11223] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  203.311860][T11223] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  203.329453][T11342] 8021q: adding VLAN 0 to HW filter on device bond0
[  203.341096][T11287] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[  203.349836][T11287] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  203.363854][T11343] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network
[  203.375370][T11343] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[  203.390822][T11287] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[  203.399596][T11287] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  203.408400][T11287] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  203.417620][T11287] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  203.433597][T11287] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  203.441554][T11287] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  203.449589][T11287] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  203.459892][T11342] 8021q: adding VLAN 0 to HW filter on device team0
[  203.475807][T11343] 8021q: adding VLAN 0 to HW filter on device batadv0
[  203.483561][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  203.491185][   T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[  203.506795][T11223] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  203.516196][T11223] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  203.525162][T11223] bridge0: port 1(bridge_slave_0) entered blocking state
[  203.532380][T11223] bridge0: port 1(bridge_slave_0) entered forwarding state
[  203.541090][T11223] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  203.549949][T11223] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  203.558931][T11223] bridge0: port 2(bridge_slave_1) entered blocking state
[  203.566005][T11223] bridge0: port 2(bridge_slave_1) entered forwarding state
[  203.585105][T11223] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  203.593342][T11223] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[  203.602662][T11223] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[  203.611599][T11223] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[  203.620793][T11223] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  203.630033][T11223] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[  203.638991][T11223] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  203.648122][T11223] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[  203.656758][T11223] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  203.665341][T11223] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  203.677511][T11342] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[  203.689223][T11342] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  203.697344][T11223] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  203.705970][ T2505] tipc: TX() has been purged, node left!
[  203.706023][T11223] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  203.719767][ T2505] tipc: TX() has been purged, node left!
[  203.728786][ T7950] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready
[  203.737888][ T7950] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[  203.757405][T11387] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready
[  203.764314][ T2505] tipc: TX() has been purged, node left!
[  203.766059][T11387] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[  203.780102][T11387] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[  203.788049][T11387] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[  203.797937][T11343] device veth0_vlan entered promiscuous mode
[  203.815292][T11342] 8021q: adding VLAN 0 to HW filter on device batadv0
[  203.823346][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  203.831246][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[  203.841938][T11343] device veth1_vlan entered promiscuous mode
[  204.169009][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready
[  204.184920][    T5] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready
[  204.213897][T11342] device veth0_vlan entered promiscuous mode
[  204.220955][T11387] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready
[  204.237803][T11387] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[  204.258339][T11387] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready
[  204.267134][T11387] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[  204.276801][T11387] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[  204.284984][T11387] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[  204.296379][T11342] device veth1_vlan entered promiscuous mode
19:17:51 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r2, 0x0)
mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r3, 0x0)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3)
syz_open_procfs(0x0, &(0x7f0000272000))

19:17:51 executing program 5:
r0 = syz_open_dev$dri(&(0x7f0000000140)='/dev/dri/card#\x00', 0x0, 0x0)
ioctl(r0, 0xffffffffffffffaa, &(0x7f0000000080))

19:17:51 executing program 1:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
getsockopt$inet6_buf(r0, 0x6, 0x1d, 0x0, &(0x7f0000000000)=0x1f4)

19:17:51 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$inet6(0xa, 0x2, 0x0)
r1 = socket$packet(0x11, 0x3, 0x300)
openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'veth0\x00', <r2=>0x0})
r3 = socket$inet6(0xa, 0x1000000000002, 0x0)
ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000040)={@remote, 0x0, r2})
setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000080)={@remote, r2}, 0x14)

19:17:51 executing program 0:
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
fcntl$setstatus(r0, 0x4, 0x42000)
r1 = socket$inet_tcp(0x2, 0x1, 0x0)
bind$inet(r1, &(0x7f0000e13000)={0x2, 0x4e20, @multicast1}, 0x10)
setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000972ffc)=0x1, 0x4)
connect$inet(r1, &(0x7f0000606ff0)={0x2, 0x4e20, @loopback}, 0x10)
setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, 0x0, 0x0)
sendmmsg(r1, &(0x7f0000008ec0)=[{{0x0, 0x0, &(0x7f0000001e80)=[{&(0x7f0000001b80)="03", 0x1}], 0x1}, 0x7fffffff}, {{0x0, 0x0, &(0x7f0000002740)=[{&(0x7f0000004cc0)="86", 0x7ffff000}], 0x1, &(0x7f0000000180)=ANY=[@ANYBLOB="1000000000000000000000000000000010000000000000000001000000000000e84839c5dacf0639404eef7c79dd4274a31ff8437f1a6e10997ab56ba0d8a53aedec32e463bf7bb3c399c066c9c700000000b4486d2eac8986600cb629ab1813d0d95d8cfaa5ffb7cd2c1a028d70ed11d748ca316b24f1cce69df4fbc242b3176eef682d2309e7095fa347890d3c389cab3544b93dded55fcef5bf783cf35e59e243e4138df81a6dc11eae88726763758e165f6d21206cccef43edec4fd0f600000000"], 0x20, 0x11}, 0x6}], 0x2, 0x40440c0)

19:17:51 executing program 5:
socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = fcntl$dupfd(r1, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
setitimer(0x2, &(0x7f0000000080)={{0x77359400}, {0x500000000000}}, 0x0)
getitimer(0x2, &(0x7f0000000000))

19:17:51 executing program 5:
socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = fcntl$dupfd(r1, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
setitimer(0x2, &(0x7f0000000080)={{0x77359400}, {0x500000000000}}, 0x0)
getitimer(0x2, &(0x7f0000000000))

[  204.828728][T11417] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based  firewall rule not found. Use the iptables CT target to attach helpers instead.
19:17:51 executing program 3:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r2, 0x0)
mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r3, 0x0)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3)
syz_open_procfs(0x0, &(0x7f0000272000))

19:17:51 executing program 0:
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
fcntl$setstatus(r0, 0x4, 0x42000)
r1 = socket$inet_tcp(0x2, 0x1, 0x0)
bind$inet(r1, &(0x7f0000e13000)={0x2, 0x4e20, @multicast1}, 0x10)
setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000972ffc)=0x1, 0x4)
connect$inet(r1, &(0x7f0000606ff0)={0x2, 0x4e20, @loopback}, 0x10)
setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, 0x0, 0x0)
sendmmsg(r1, &(0x7f0000008ec0)=[{{0x0, 0x0, &(0x7f0000001e80)=[{&(0x7f0000001b80)="03", 0x1}], 0x1}, 0x7fffffff}, {{0x0, 0x0, &(0x7f0000002740)=[{&(0x7f0000004cc0)="86", 0x7ffff000}], 0x1, &(0x7f0000000180)=ANY=[@ANYBLOB="1000000000000000000000000000000010000000000000000001000000000000e84839c5dacf0639404eef7c79dd4274a31ff8437f1a6e10997ab56ba0d8a53aedec32e463bf7bb3c399c066c9c700000000b4486d2eac8986600cb629ab1813d0d95d8cfaa5ffb7cd2c1a028d70ed11d748ca316b24f1cce69df4fbc242b3176eef682d2309e7095fa347890d3c389cab3544b93dded55fcef5bf783cf35e59e243e4138df81a6dc11eae88726763758e165f6d21206cccef43edec4fd0f600000000"], 0x20, 0x11}, 0x6}], 0x2, 0x40440c0)

19:17:51 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$inet6(0xa, 0x2, 0x0)
r1 = socket$packet(0x11, 0x3, 0x300)
openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'veth0\x00', <r2=>0x0})
r3 = socket$inet6(0xa, 0x1000000000002, 0x0)
ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000040)={@remote, 0x0, r2})
setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000080)={@remote, r2}, 0x14)

19:17:51 executing program 5:
socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = fcntl$dupfd(r1, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
setitimer(0x2, &(0x7f0000000080)={{0x77359400}, {0x500000000000}}, 0x0)
getitimer(0x2, &(0x7f0000000000))

[  205.349175][T11387] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready
[  205.359626][T11387] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready
[  205.677320][ T2505] device bridge_slave_1 left promiscuous mode
[  205.683574][ T2505] bridge0: port 2(bridge_slave_1) entered disabled state
[  205.725004][ T2505] device bridge_slave_0 left promiscuous mode
[  205.731319][ T2505] bridge0: port 1(bridge_slave_0) entered disabled state
19:17:52 executing program 4:
r0 = gettid()
r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003)
write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf45f1f8eddb8ee3370fa2f84c99f10cc6297fa1b9b3853c78451363"], 0x1f)
ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0)
r2 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6)
ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x800448d2, 0x0)
socket$inet_icmp_raw(0x2, 0x3, 0x1)
prctl$PR_CAPBSET_DROP(0x18, 0x9)
openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x42, 0x4008001, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, r0)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x200000000005}, 0x8000, 0x0, 0x0, 0x13}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
getpeername$packet(0xffffffffffffffff, &(0x7f0000001880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000002200)=0xe8)
socket$inet_udp(0x2, 0x2, 0x0)
r3 = syz_open_procfs(0x0, 0x0)
sendfile(0xffffffffffffffff, r3, &(0x7f0000000180)=0x74000000, 0x5)
r4 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0)
fcntl$setlease(r4, 0x400, 0x0)
clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)

19:17:52 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$inet6(0xa, 0x2, 0x0)
r1 = socket$packet(0x11, 0x3, 0x300)
openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'veth0\x00', <r2=>0x0})
r3 = socket$inet6(0xa, 0x1000000000002, 0x0)
ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000040)={@remote, 0x0, r2})
setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000080)={@remote, r2}, 0x14)

19:17:52 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$inet6(0xa, 0x2, 0x0)
r1 = socket$packet(0x11, 0x3, 0x300)
openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'veth0\x00', <r2=>0x0})
r3 = socket$inet6(0xa, 0x1000000000002, 0x0)
ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000040)={@remote, 0x0, r2})
setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000080)={@remote, r2}, 0x14)

[  205.822196][ T2505] device bridge_slave_1 left promiscuous mode
[  205.856656][ T2505] bridge0: port 2(bridge_slave_1) entered disabled state
[  205.894355][    C1] net_ratelimit: 2 callbacks suppressed
[  205.894365][    C1] protocol 88fb is buggy, dev hsr_slave_0
[  205.905738][    C1] protocol 88fb is buggy, dev hsr_slave_1
[  205.911632][    C1] protocol 88fb is buggy, dev hsr_slave_0
[  205.917456][    C1] protocol 88fb is buggy, dev hsr_slave_1
[  205.924377][ T2505] device bridge_slave_0 left promiscuous mode
[  205.930670][ T2505] bridge0: port 1(bridge_slave_0) entered disabled state
[  205.977321][ T2505] device bridge_slave_1 left promiscuous mode
[  205.983551][ T2505] bridge0: port 2(bridge_slave_1) entered disabled state
[  206.037657][ T2505] device bridge_slave_0 left promiscuous mode
[  206.043909][ T2505] bridge0: port 1(bridge_slave_0) entered disabled state
[  206.064380][    C1] protocol 88fb is buggy, dev hsr_slave_0
[  206.070183][    C1] protocol 88fb is buggy, dev hsr_slave_1
[  206.101172][ T2505] device veth1_vlan left promiscuous mode
[  206.107075][ T2505] device veth0_vlan left promiscuous mode
[  206.112968][ T2505] device veth1_vlan left promiscuous mode
[  206.118744][ T2505] device veth0_vlan left promiscuous mode
[  206.124771][ T2505] device veth1_vlan left promiscuous mode
[  206.130495][ T2505] device veth0_vlan left promiscuous mode
[  206.144437][    C1] protocol 88fb is buggy, dev hsr_slave_0
[  206.150237][    C1] protocol 88fb is buggy, dev hsr_slave_1
[  206.214682][    C1] protocol 88fb is buggy, dev hsr_slave_0
[  206.220455][    C1] protocol 88fb is buggy, dev hsr_slave_1
[  208.684602][ T2505] device hsr_slave_0 left promiscuous mode
[  208.724294][ T2505] device hsr_slave_1 left promiscuous mode
[  208.771567][ T2505] team0 (unregistering): Port device team_slave_1 removed
[  208.782860][ T2505] team0 (unregistering): Port device team_slave_0 removed
[  208.793099][ T2505] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface
[  208.838150][ T2505] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface
[  208.897663][ T2505] bond0 (unregistering): Released all slaves
[  209.104702][ T2505] device hsr_slave_0 left promiscuous mode
[  209.164411][ T2505] device hsr_slave_1 left promiscuous mode
[  209.221310][ T2505] team0 (unregistering): Port device team_slave_1 removed
[  209.231721][ T2505] team0 (unregistering): Port device team_slave_0 removed
[  209.241686][ T2505] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface
[  209.287997][ T2505] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface
[  209.347143][ T2505] bond0 (unregistering): Released all slaves
[  209.564612][ T2505] device hsr_slave_0 left promiscuous mode
[  209.604334][ T2505] device hsr_slave_1 left promiscuous mode
[  209.660980][ T2505] team0 (unregistering): Port device team_slave_1 removed
[  209.672500][ T2505] team0 (unregistering): Port device team_slave_0 removed
[  209.683403][ T2505] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface
[  209.738163][ T2505] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface
[  209.809885][ T2505] bond0 (unregistering): Released all slaves
[  209.920059][T11447] IPVS: ftp: loaded support on port[0] = 21
[  209.993004][T11447] chnl_net:caif_netlink_parms(): no params data found
[  210.040292][T11447] bridge0: port 1(bridge_slave_0) entered blocking state
[  210.050188][T11447] bridge0: port 1(bridge_slave_0) entered disabled state
[  210.058500][T11447] device bridge_slave_0 entered promiscuous mode
[  210.068271][T11447] bridge0: port 2(bridge_slave_1) entered blocking state
[  210.075423][T11447] bridge0: port 2(bridge_slave_1) entered disabled state
[  210.083098][T11447] device bridge_slave_1 entered promiscuous mode
[  210.099490][T11447] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[  210.110074][T11447] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[  210.129635][T11447] team0: Port device team_slave_0 added
[  210.136506][T11447] team0: Port device team_slave_1 added
[  210.186610][T11447] device hsr_slave_0 entered promiscuous mode
[  210.224536][T11447] device hsr_slave_1 entered promiscuous mode
[  210.451811][T11447] bridge0: port 2(bridge_slave_1) entered blocking state
[  210.458972][T11447] bridge0: port 2(bridge_slave_1) entered forwarding state
[  210.466280][T11447] bridge0: port 1(bridge_slave_0) entered blocking state
[  210.473406][T11447] bridge0: port 1(bridge_slave_0) entered forwarding state
[  210.508984][T11447] 8021q: adding VLAN 0 to HW filter on device bond0
[  210.521754][T11223] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  210.530589][T11223] bridge0: port 1(bridge_slave_0) entered disabled state
[  210.538961][T11223] bridge0: port 2(bridge_slave_1) entered disabled state
[  210.552462][T11447] 8021q: adding VLAN 0 to HW filter on device team0
[  210.564501][T11223] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  210.572960][T11223] bridge0: port 1(bridge_slave_0) entered blocking state
[  210.580057][T11223] bridge0: port 1(bridge_slave_0) entered forwarding state
[  210.608387][T11287] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  210.617568][T11287] bridge0: port 2(bridge_slave_1) entered blocking state
[  210.624635][T11287] bridge0: port 2(bridge_slave_1) entered forwarding state
[  210.634105][T11287] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  210.643939][T11287] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  210.652738][T11287] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  210.661082][T11287] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  210.671297][T11447] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  210.679481][T11223] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  210.694568][T11223] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready
[  210.702119][T11223] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready
[  210.713758][T11447] 8021q: adding VLAN 0 to HW filter on device batadv0
[  210.774840][T11223] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[  210.794105][T11447] device veth0_vlan entered promiscuous mode
[  210.801843][T11287] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[  210.811224][T11287] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[  210.819204][T11287] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[  210.831196][T11447] device veth1_vlan entered promiscuous mode
[  210.838922][T11223] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready
19:17:57 executing program 1:
r0 = socket$inet6_tcp(0xa, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
getsockopt$inet6_buf(r0, 0x6, 0x1d, 0x0, &(0x7f0000000000)=0x1f4)

19:17:57 executing program 0:
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
fcntl$setstatus(r0, 0x4, 0x42000)
r1 = socket$inet_tcp(0x2, 0x1, 0x0)
bind$inet(r1, &(0x7f0000e13000)={0x2, 0x4e20, @multicast1}, 0x10)
setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000972ffc)=0x1, 0x4)
connect$inet(r1, &(0x7f0000606ff0)={0x2, 0x4e20, @loopback}, 0x10)
setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, 0x0, 0x0)
sendmmsg(r1, &(0x7f0000008ec0)=[{{0x0, 0x0, &(0x7f0000001e80)=[{&(0x7f0000001b80)="03", 0x1}], 0x1}, 0x7fffffff}, {{0x0, 0x0, &(0x7f0000002740)=[{&(0x7f0000004cc0)="86", 0x7ffff000}], 0x1, &(0x7f0000000180)=ANY=[@ANYBLOB="1000000000000000000000000000000010000000000000000001000000000000e84839c5dacf0639404eef7c79dd4274a31ff8437f1a6e10997ab56ba0d8a53aedec32e463bf7bb3c399c066c9c700000000b4486d2eac8986600cb629ab1813d0d95d8cfaa5ffb7cd2c1a028d70ed11d748ca316b24f1cce69df4fbc242b3176eef682d2309e7095fa347890d3c389cab3544b93dded55fcef5bf783cf35e59e243e4138df81a6dc11eae88726763758e165f6d21206cccef43edec4fd0f600000000"], 0x20, 0x11}, 0x6}], 0x2, 0x40440c0)

19:17:57 executing program 5:
socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = fcntl$dupfd(r1, 0x0, r0)
ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200)
setitimer(0x2, &(0x7f0000000080)={{0x77359400}, {0x500000000000}}, 0x0)
getitimer(0x2, &(0x7f0000000000))

19:17:57 executing program 4:
r0 = gettid()
r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003)
write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf45f1f8eddb8ee3370fa2f84c99f10cc6297fa1b9b3853c78451363"], 0x1f)
ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0)
r2 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6)
ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x800448d2, 0x0)
socket$inet_icmp_raw(0x2, 0x3, 0x1)
prctl$PR_CAPBSET_DROP(0x18, 0x9)
openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x42, 0x4008001, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, r0)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x200000000005}, 0x8000, 0x0, 0x0, 0x13}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
getpeername$packet(0xffffffffffffffff, &(0x7f0000001880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000002200)=0xe8)
socket$inet_udp(0x2, 0x2, 0x0)
r3 = syz_open_procfs(0x0, 0x0)
sendfile(0xffffffffffffffff, r3, &(0x7f0000000180)=0x74000000, 0x5)
r4 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0)
fcntl$setlease(r4, 0x400, 0x0)
clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)

19:17:57 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$inet6(0xa, 0x2, 0x0)
r1 = socket$packet(0x11, 0x3, 0x300)
openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'veth0\x00', <r2=>0x0})
r3 = socket$inet6(0xa, 0x1000000000002, 0x0)
ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000040)={@remote, 0x0, r2})
setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000080)={@remote, r2}, 0x14)

19:17:57 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$inet6(0xa, 0x2, 0x0)
r1 = socket$packet(0x11, 0x3, 0x300)
openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'veth0\x00', <r2=>0x0})
r3 = socket$inet6(0xa, 0x1000000000002, 0x0)
ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000040)={@remote, 0x0, r2})
setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000080)={@remote, r2}, 0x14)

[  210.944988][T11223] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready
[  211.114345][    C1] protocol 88fb is buggy, dev hsr_slave_0
[  211.120363][    C1] protocol 88fb is buggy, dev hsr_slave_1
19:17:57 executing program 5:
r0 = gettid()
r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003)
write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf45f1f8eddb8ee3370fa2f84c99f10cc6297fa1b9b3853c78451363"], 0x1f)
ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0)
r2 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6)
ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x800448d2, 0x0)
socket$inet_icmp_raw(0x2, 0x3, 0x1)
prctl$PR_CAPBSET_DROP(0x18, 0x9)
openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x42, 0x4008001, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, r0)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x200000000005}, 0x8000, 0x0, 0x0, 0x13}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
getpeername$packet(0xffffffffffffffff, &(0x7f0000001880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000002200)=0xe8)
socket$inet_udp(0x2, 0x2, 0x0)
r3 = syz_open_procfs(0x0, 0x0)
sendfile(0xffffffffffffffff, r3, &(0x7f0000000180)=0x74000000, 0x5)
r4 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0)
fcntl$setlease(r4, 0x400, 0x0)
clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)

19:17:57 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$inet6(0xa, 0x2, 0x0)
r1 = socket$packet(0x11, 0x3, 0x300)
openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'veth0\x00', <r2=>0x0})
r3 = socket$inet6(0xa, 0x1000000000002, 0x0)
ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000040)={@remote, 0x0, r2})
setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000080)={@remote, r2}, 0x14)

19:17:57 executing program 2:
r0 = gettid()
r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003)
write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf45f1f8eddb8ee3370fa2f84c99f10cc6297fa1b9b3853c78451363"], 0x1f)
ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0)
r2 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6)
ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x800448d2, 0x0)
socket$inet_icmp_raw(0x2, 0x3, 0x1)
prctl$PR_CAPBSET_DROP(0x18, 0x9)
openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x42, 0x4008001, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, r0)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x200000000005}, 0x8000, 0x0, 0x0, 0x13}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
getpeername$packet(0xffffffffffffffff, &(0x7f0000001880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000002200)=0xe8)
socket$inet_udp(0x2, 0x2, 0x0)
r3 = syz_open_procfs(0x0, 0x0)
sendfile(0xffffffffffffffff, r3, &(0x7f0000000180)=0x74000000, 0x5)
r4 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0)
fcntl$setlease(r4, 0x400, 0x0)
clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)

19:17:57 executing program 4:
r0 = gettid()
r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003)
write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf45f1f8eddb8ee3370fa2f84c99f10cc6297fa1b9b3853c78451363"], 0x1f)
ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0)
r2 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6)
ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x800448d2, 0x0)
socket$inet_icmp_raw(0x2, 0x3, 0x1)
prctl$PR_CAPBSET_DROP(0x18, 0x9)
openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x42, 0x4008001, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, r0)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x200000000005}, 0x8000, 0x0, 0x0, 0x13}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
getpeername$packet(0xffffffffffffffff, &(0x7f0000001880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000002200)=0xe8)
socket$inet_udp(0x2, 0x2, 0x0)
r3 = syz_open_procfs(0x0, 0x0)
sendfile(0xffffffffffffffff, r3, &(0x7f0000000180)=0x74000000, 0x5)
r4 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0)
fcntl$setlease(r4, 0x400, 0x0)
clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)

19:17:58 executing program 1:
r0 = gettid()
r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003)
write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf45f1f8eddb8ee3370fa2f84c99f10cc6297fa1b9b3853c78451363"], 0x1f)
ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0)
r2 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6)
ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x800448d2, 0x0)
socket$inet_icmp_raw(0x2, 0x3, 0x1)
prctl$PR_CAPBSET_DROP(0x18, 0x9)
openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x42, 0x4008001, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, r0)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x200000000005}, 0x8000, 0x0, 0x0, 0x13}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
getpeername$packet(0xffffffffffffffff, &(0x7f0000001880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000002200)=0xe8)
socket$inet_udp(0x2, 0x2, 0x0)
r3 = syz_open_procfs(0x0, 0x0)
sendfile(0xffffffffffffffff, r3, &(0x7f0000000180)=0x74000000, 0x5)
r4 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0)
fcntl$setlease(r4, 0x400, 0x0)
clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)

19:17:58 executing program 0:
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
fcntl$setstatus(r0, 0x4, 0x42000)
r1 = socket$inet_tcp(0x2, 0x1, 0x0)
bind$inet(r1, &(0x7f0000e13000)={0x2, 0x4e20, @multicast1}, 0x10)
setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000972ffc)=0x1, 0x4)
connect$inet(r1, &(0x7f0000606ff0)={0x2, 0x4e20, @loopback}, 0x10)
setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, 0x0, 0x0)
sendmmsg(r1, &(0x7f0000008ec0)=[{{0x0, 0x0, &(0x7f0000001e80)=[{&(0x7f0000001b80)="03", 0x1}], 0x1}, 0x7fffffff}, {{0x0, 0x0, &(0x7f0000002740)=[{&(0x7f0000004cc0)="86", 0x7ffff000}], 0x1, &(0x7f0000000180)=ANY=[@ANYBLOB="1000000000000000000000000000000010000000000000000001000000000000e84839c5dacf0639404eef7c79dd4274a31ff8437f1a6e10997ab56ba0d8a53aedec32e463bf7bb3c399c066c9c700000000b4486d2eac8986600cb629ab1813d0d95d8cfaa5ffb7cd2c1a028d70ed11d748ca316b24f1cce69df4fbc242b3176eef682d2309e7095fa347890d3c389cab3544b93dded55fcef5bf783cf35e59e243e4138df81a6dc11eae88726763758e165f6d21206cccef43edec4fd0f600000000"], 0x20, 0x11}, 0x6}], 0x2, 0x40440c0)

19:17:58 executing program 5:
r0 = gettid()
r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003)
write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf45f1f8eddb8ee3370fa2f84c99f10cc6297fa1b9b3853c78451363"], 0x1f)
ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0)
r2 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6)
ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x800448d2, 0x0)
socket$inet_icmp_raw(0x2, 0x3, 0x1)
prctl$PR_CAPBSET_DROP(0x18, 0x9)
openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x42, 0x4008001, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, r0)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x200000000005}, 0x8000, 0x0, 0x0, 0x13}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
getpeername$packet(0xffffffffffffffff, &(0x7f0000001880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000002200)=0xe8)
socket$inet_udp(0x2, 0x2, 0x0)
r3 = syz_open_procfs(0x0, 0x0)
sendfile(0xffffffffffffffff, r3, &(0x7f0000000180)=0x74000000, 0x5)
r4 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0)
fcntl$setlease(r4, 0x400, 0x0)
clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)

19:17:58 executing program 3:
r0 = gettid()
r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003)
write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf45f1f8eddb8ee3370fa2f84c99f10cc6297fa1b9b3853c78451363"], 0x1f)
ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0)
r2 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6)
ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x800448d2, 0x0)
socket$inet_icmp_raw(0x2, 0x3, 0x1)
prctl$PR_CAPBSET_DROP(0x18, 0x9)
openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x42, 0x4008001, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, r0)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x200000000005}, 0x8000, 0x0, 0x0, 0x13}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
getpeername$packet(0xffffffffffffffff, &(0x7f0000001880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000002200)=0xe8)
socket$inet_udp(0x2, 0x2, 0x0)
r3 = syz_open_procfs(0x0, 0x0)
sendfile(0xffffffffffffffff, r3, &(0x7f0000000180)=0x74000000, 0x5)
r4 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0)
fcntl$setlease(r4, 0x400, 0x0)
clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)

19:17:58 executing program 2:
r0 = gettid()
r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003)
write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf45f1f8eddb8ee3370fa2f84c99f10cc6297fa1b9b3853c78451363"], 0x1f)
ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0)
r2 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6)
ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x800448d2, 0x0)
socket$inet_icmp_raw(0x2, 0x3, 0x1)
prctl$PR_CAPBSET_DROP(0x18, 0x9)
openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x42, 0x4008001, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, r0)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x200000000005}, 0x8000, 0x0, 0x0, 0x13}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
getpeername$packet(0xffffffffffffffff, &(0x7f0000001880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000002200)=0xe8)
socket$inet_udp(0x2, 0x2, 0x0)
r3 = syz_open_procfs(0x0, 0x0)
sendfile(0xffffffffffffffff, r3, &(0x7f0000000180)=0x74000000, 0x5)
r4 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0)
fcntl$setlease(r4, 0x400, 0x0)
clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)

19:17:58 executing program 0:
r0 = gettid()
r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003)
write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf45f1f8eddb8ee3370fa2f84c99f10cc6297fa1b9b3853c78451363"], 0x1f)
ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0)
r2 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6)
ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x800448d2, 0x0)
socket$inet_icmp_raw(0x2, 0x3, 0x1)
prctl$PR_CAPBSET_DROP(0x18, 0x9)
openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x42, 0x4008001, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, r0)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x200000000005}, 0x8000, 0x0, 0x0, 0x13}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
getpeername$packet(0xffffffffffffffff, &(0x7f0000001880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000002200)=0xe8)
socket$inet_udp(0x2, 0x2, 0x0)
r3 = syz_open_procfs(0x0, 0x0)
sendfile(0xffffffffffffffff, r3, &(0x7f0000000180)=0x74000000, 0x5)
r4 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0)
fcntl$setlease(r4, 0x400, 0x0)
clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)

19:17:58 executing program 4:
r0 = gettid()
r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003)
write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf45f1f8eddb8ee3370fa2f84c99f10cc6297fa1b9b3853c78451363"], 0x1f)
ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0)
r2 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6)
ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x800448d2, 0x0)
socket$inet_icmp_raw(0x2, 0x3, 0x1)
prctl$PR_CAPBSET_DROP(0x18, 0x9)
openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x42, 0x4008001, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, r0)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x200000000005}, 0x8000, 0x0, 0x0, 0x13}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
getpeername$packet(0xffffffffffffffff, &(0x7f0000001880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000002200)=0xe8)
socket$inet_udp(0x2, 0x2, 0x0)
r3 = syz_open_procfs(0x0, 0x0)
sendfile(0xffffffffffffffff, r3, &(0x7f0000000180)=0x74000000, 0x5)
r4 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0)
fcntl$setlease(r4, 0x400, 0x0)
clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)

19:17:58 executing program 3:
r0 = gettid()
r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003)
write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf45f1f8eddb8ee3370fa2f84c99f10cc6297fa1b9b3853c78451363"], 0x1f)
ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0)
r2 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6)
ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x800448d2, 0x0)
socket$inet_icmp_raw(0x2, 0x3, 0x1)
prctl$PR_CAPBSET_DROP(0x18, 0x9)
openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x42, 0x4008001, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, r0)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x200000000005}, 0x8000, 0x0, 0x0, 0x13}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
getpeername$packet(0xffffffffffffffff, &(0x7f0000001880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000002200)=0xe8)
socket$inet_udp(0x2, 0x2, 0x0)
r3 = syz_open_procfs(0x0, 0x0)
sendfile(0xffffffffffffffff, r3, &(0x7f0000000180)=0x74000000, 0x5)
r4 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0)
fcntl$setlease(r4, 0x400, 0x0)
clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)

19:17:58 executing program 4:
r0 = gettid()
r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003)
write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf45f1f8eddb8ee3370fa2f84c99f10cc6297fa1b9b3853c78451363"], 0x1f)
ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0)
r2 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6)
ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x800448d2, 0x0)
socket$inet_icmp_raw(0x2, 0x3, 0x1)
prctl$PR_CAPBSET_DROP(0x18, 0x9)
openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x42, 0x4008001, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, r0)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x200000000005}, 0x8000, 0x0, 0x0, 0x13}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
getpeername$packet(0xffffffffffffffff, &(0x7f0000001880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000002200)=0xe8)
socket$inet_udp(0x2, 0x2, 0x0)
r3 = syz_open_procfs(0x0, 0x0)
sendfile(0xffffffffffffffff, r3, &(0x7f0000000180)=0x74000000, 0x5)
r4 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0)
fcntl$setlease(r4, 0x400, 0x0)
clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)

19:17:59 executing program 4:
r0 = gettid()
r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003)
write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf45f1f8eddb8ee3370fa2f84c99f10cc6297fa1b9b3853c78451363"], 0x1f)
ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0)
r2 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6)
ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x800448d2, 0x0)
socket$inet_icmp_raw(0x2, 0x3, 0x1)
prctl$PR_CAPBSET_DROP(0x18, 0x9)
openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x42, 0x4008001, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, r0)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x200000000005}, 0x8000, 0x0, 0x0, 0x13}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
getpeername$packet(0xffffffffffffffff, &(0x7f0000001880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000002200)=0xe8)
socket$inet_udp(0x2, 0x2, 0x0)
r3 = syz_open_procfs(0x0, 0x0)
sendfile(0xffffffffffffffff, r3, &(0x7f0000000180)=0x74000000, 0x5)
r4 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0)
fcntl$setlease(r4, 0x400, 0x0)
clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)

19:17:59 executing program 4:
r0 = gettid()
r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003)
write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf45f1f8eddb8ee3370fa2f84c99f10cc6297fa1b9b3853c78451363"], 0x1f)
ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0)
r2 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6)
ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x800448d2, 0x0)
socket$inet_icmp_raw(0x2, 0x3, 0x1)
prctl$PR_CAPBSET_DROP(0x18, 0x9)
openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x42, 0x4008001, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, r0)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x200000000005}, 0x8000, 0x0, 0x0, 0x13}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
getpeername$packet(0xffffffffffffffff, &(0x7f0000001880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000002200)=0xe8)
socket$inet_udp(0x2, 0x2, 0x0)
r3 = syz_open_procfs(0x0, 0x0)
sendfile(0xffffffffffffffff, r3, &(0x7f0000000180)=0x74000000, 0x5)
r4 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0)
fcntl$setlease(r4, 0x400, 0x0)
clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)

19:17:59 executing program 4:
r0 = gettid()
r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003)
write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf45f1f8eddb8ee3370fa2f84c99f10cc6297fa1b9b3853c78451363"], 0x1f)
ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0)
r2 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6)
ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x800448d2, 0x0)
socket$inet_icmp_raw(0x2, 0x3, 0x1)
prctl$PR_CAPBSET_DROP(0x18, 0x9)
openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x42, 0x4008001, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, r0)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x200000000005}, 0x8000, 0x0, 0x0, 0x13}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
getpeername$packet(0xffffffffffffffff, &(0x7f0000001880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000002200)=0xe8)
socket$inet_udp(0x2, 0x2, 0x0)
r3 = syz_open_procfs(0x0, 0x0)
sendfile(0xffffffffffffffff, r3, &(0x7f0000000180)=0x74000000, 0x5)
r4 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0)
fcntl$setlease(r4, 0x400, 0x0)
clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)

19:18:01 executing program 1:
r0 = gettid()
r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003)
write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf45f1f8eddb8ee3370fa2f84c99f10cc6297fa1b9b3853c78451363"], 0x1f)
ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0)
r2 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6)
ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x800448d2, 0x0)
socket$inet_icmp_raw(0x2, 0x3, 0x1)
prctl$PR_CAPBSET_DROP(0x18, 0x9)
openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x42, 0x4008001, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, r0)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x200000000005}, 0x8000, 0x0, 0x0, 0x13}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
getpeername$packet(0xffffffffffffffff, &(0x7f0000001880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000002200)=0xe8)
socket$inet_udp(0x2, 0x2, 0x0)
r3 = syz_open_procfs(0x0, 0x0)
sendfile(0xffffffffffffffff, r3, &(0x7f0000000180)=0x74000000, 0x5)
r4 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0)
fcntl$setlease(r4, 0x400, 0x0)
clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)

19:18:01 executing program 4:
r0 = gettid()
r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003)
write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf45f1f8eddb8ee3370fa2f84c99f10cc6297fa1b9b3853c78451363"], 0x1f)
ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0)
r2 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6)
ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x800448d2, 0x0)
socket$inet_icmp_raw(0x2, 0x3, 0x1)
prctl$PR_CAPBSET_DROP(0x18, 0x9)
openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x42, 0x4008001, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, r0)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x200000000005}, 0x8000, 0x0, 0x0, 0x13}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
getpeername$packet(0xffffffffffffffff, &(0x7f0000001880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000002200)=0xe8)
socket$inet_udp(0x2, 0x2, 0x0)
r3 = syz_open_procfs(0x0, 0x0)
sendfile(0xffffffffffffffff, r3, &(0x7f0000000180)=0x74000000, 0x5)
r4 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0)
fcntl$setlease(r4, 0x400, 0x0)
clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)

19:18:01 executing program 5:
r0 = gettid()
r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003)
write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf45f1f8eddb8ee3370fa2f84c99f10cc6297fa1b9b3853c78451363"], 0x1f)
ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0)
r2 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6)
ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x800448d2, 0x0)
socket$inet_icmp_raw(0x2, 0x3, 0x1)
prctl$PR_CAPBSET_DROP(0x18, 0x9)
openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x42, 0x4008001, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, r0)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x200000000005}, 0x8000, 0x0, 0x0, 0x13}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
getpeername$packet(0xffffffffffffffff, &(0x7f0000001880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000002200)=0xe8)
socket$inet_udp(0x2, 0x2, 0x0)
r3 = syz_open_procfs(0x0, 0x0)
sendfile(0xffffffffffffffff, r3, &(0x7f0000000180)=0x74000000, 0x5)
r4 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0)
fcntl$setlease(r4, 0x400, 0x0)
clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)

19:18:01 executing program 4:
r0 = gettid()
r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003)
write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf45f1f8eddb8ee3370fa2f84c99f10cc6297fa1b9b3853c78451363"], 0x1f)
ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0)
r2 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6)
ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x800448d2, 0x0)
socket$inet_icmp_raw(0x2, 0x3, 0x1)
prctl$PR_CAPBSET_DROP(0x18, 0x9)
openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x42, 0x4008001, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, r0)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x200000000005}, 0x8000, 0x0, 0x0, 0x13}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
getpeername$packet(0xffffffffffffffff, &(0x7f0000001880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000002200)=0xe8)
socket$inet_udp(0x2, 0x2, 0x0)
r3 = syz_open_procfs(0x0, 0x0)
sendfile(0xffffffffffffffff, r3, &(0x7f0000000180)=0x74000000, 0x5)
r4 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0)
fcntl$setlease(r4, 0x400, 0x0)
clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)

19:18:01 executing program 2:
r0 = gettid()
r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003)
write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf45f1f8eddb8ee3370fa2f84c99f10cc6297fa1b9b3853c78451363"], 0x1f)
ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0)
r2 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6)
ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x800448d2, 0x0)
socket$inet_icmp_raw(0x2, 0x3, 0x1)
prctl$PR_CAPBSET_DROP(0x18, 0x9)
openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x42, 0x4008001, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, r0)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x200000000005}, 0x8000, 0x0, 0x0, 0x13}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
getpeername$packet(0xffffffffffffffff, &(0x7f0000001880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000002200)=0xe8)
socket$inet_udp(0x2, 0x2, 0x0)
r3 = syz_open_procfs(0x0, 0x0)
sendfile(0xffffffffffffffff, r3, &(0x7f0000000180)=0x74000000, 0x5)
r4 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0)
fcntl$setlease(r4, 0x400, 0x0)
clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)

19:18:01 executing program 1:
r0 = gettid()
r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003)
write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf45f1f8eddb8ee3370fa2f84c99f10cc6297fa1b9b3853c78451363"], 0x1f)
ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0)
r2 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6)
ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x800448d2, 0x0)
socket$inet_icmp_raw(0x2, 0x3, 0x1)
prctl$PR_CAPBSET_DROP(0x18, 0x9)
openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x42, 0x4008001, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, r0)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x200000000005}, 0x8000, 0x0, 0x0, 0x13}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
getpeername$packet(0xffffffffffffffff, &(0x7f0000001880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000002200)=0xe8)
socket$inet_udp(0x2, 0x2, 0x0)
r3 = syz_open_procfs(0x0, 0x0)
sendfile(0xffffffffffffffff, r3, &(0x7f0000000180)=0x74000000, 0x5)
r4 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0)
fcntl$setlease(r4, 0x400, 0x0)
clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)

19:18:01 executing program 0:
r0 = gettid()
r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003)
write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf45f1f8eddb8ee3370fa2f84c99f10cc6297fa1b9b3853c78451363"], 0x1f)
ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0)
r2 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6)
ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x800448d2, 0x0)
socket$inet_icmp_raw(0x2, 0x3, 0x1)
prctl$PR_CAPBSET_DROP(0x18, 0x9)
openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x42, 0x4008001, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, r0)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x200000000005}, 0x8000, 0x0, 0x0, 0x13}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
getpeername$packet(0xffffffffffffffff, &(0x7f0000001880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000002200)=0xe8)
socket$inet_udp(0x2, 0x2, 0x0)
r3 = syz_open_procfs(0x0, 0x0)
sendfile(0xffffffffffffffff, r3, &(0x7f0000000180)=0x74000000, 0x5)
r4 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0)
fcntl$setlease(r4, 0x400, 0x0)
clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)

19:18:01 executing program 3:
r0 = gettid()
r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003)
write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf45f1f8eddb8ee3370fa2f84c99f10cc6297fa1b9b3853c78451363"], 0x1f)
ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0)
r2 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6)
ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x800448d2, 0x0)
socket$inet_icmp_raw(0x2, 0x3, 0x1)
prctl$PR_CAPBSET_DROP(0x18, 0x9)
openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x42, 0x4008001, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, r0)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x200000000005}, 0x8000, 0x0, 0x0, 0x13}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
getpeername$packet(0xffffffffffffffff, &(0x7f0000001880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000002200)=0xe8)
socket$inet_udp(0x2, 0x2, 0x0)
r3 = syz_open_procfs(0x0, 0x0)
sendfile(0xffffffffffffffff, r3, &(0x7f0000000180)=0x74000000, 0x5)
r4 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0)
fcntl$setlease(r4, 0x400, 0x0)
clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)

19:18:02 executing program 2:
r0 = gettid()
r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003)
write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf45f1f8eddb8ee3370fa2f84c99f10cc6297fa1b9b3853c78451363"], 0x1f)
ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0)
r2 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6)
ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x800448d2, 0x0)
socket$inet_icmp_raw(0x2, 0x3, 0x1)
prctl$PR_CAPBSET_DROP(0x18, 0x9)
openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x42, 0x4008001, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x5}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
prctl$PR_SET_PTRACER(0x59616d61, r0)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x200000000005}, 0x8000, 0x0, 0x0, 0x13}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
close(r1)
getpeername$packet(0xffffffffffffffff, &(0x7f0000001880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000002100)={{{@in=@remote, @in=@multicast2}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f0000002200)=0xe8)
socket$inet_udp(0x2, 0x2, 0x0)
r3 = syz_open_procfs(0x0, 0x0)
sendfile(0xffffffffffffffff, r3, &(0x7f0000000180)=0x74000000, 0x5)
r4 = open(&(0x7f00000001c0)='./file0\x00', 0x80040, 0x0)
fcntl$setlease(r4, 0x400, 0x0)
clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0)
ptrace$setopts(0x4206, r0, 0x0, 0x0)

[  215.390230][T11572] ==================================================================
[  215.398365][T11572] BUG: KCSAN: data-race in taskstats_exit / taskstats_exit
[  215.405706][T11572] 
[  215.408192][T11572] read to 0xffff888103021a50 of 8 bytes by task 11571 on cpu 1:
[  215.415981][T11572]  taskstats_exit+0xb2/0x720
[  215.420648][T11572]  do_exit+0x281/0x18c0
[  215.424793][T11572]  do_group_exit+0xb4/0x1c0
[  215.429347][T11572]  __x64_sys_exit_group+0x2e/0x30
[  215.434501][T11572]  do_syscall_64+0xcc/0x3a0
[  215.439120][T11572]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  215.444990][T11572] 
[  215.447307][T11572] write to 0xffff888103021a50 of 8 bytes by task 11572 on cpu 0:
[  215.456158][T11572]  taskstats_exit+0x6b7/0x720
[  215.460820][T11572]  do_exit+0x281/0x18c0
[  215.464955][T11572]  do_group_exit+0xb4/0x1c0
[  215.469449][T11572]  get_signal+0x2a2/0x1320
[  215.473846][T11572]  do_signal+0x2f/0x6c0
[  215.478008][T11572]  exit_to_usermode_loop+0x250/0x2c0
[  215.483277][T11572]  do_syscall_64+0x384/0x3a0
[  215.487862][T11572]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  215.493738][T11572] 
[  215.496058][T11572] Reported by Kernel Concurrency Sanitizer on:
[  215.502210][T11572] CPU: 0 PID: 11572 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0
[  215.510865][T11572] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  215.521207][T11572] ==================================================================
[  215.529399][T11572] Kernel panic - not syncing: panic_on_warn set ...
[  215.535987][T11572] CPU: 0 PID: 11572 Comm: syz-executor.2 Not tainted 5.5.0-rc1-syzkaller #0
[  215.544635][T11572] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  215.556726][T11572] Call Trace:
[  215.560005][T11572]  dump_stack+0x11d/0x181
[  215.564431][T11572]  panic+0x210/0x640
[  215.568319][T11572]  ? do_one_initcall+0x52/0x3e8
[  215.573172][T11572]  ? vprintk_func+0x8d/0x140
[  215.577920][T11572]  kcsan_report.cold+0xc/0xd
[  215.582862][T11572]  kcsan_setup_watchpoint+0x3fe/0x460
[  215.588252][T11572]  __tsan_unaligned_write8+0xc7/0x110
[  215.593621][T11572]  taskstats_exit+0x6b7/0x720
[  215.598302][T11572]  do_exit+0x281/0x18c0
[  215.602446][T11572]  ? __sanitizer_cov_trace_switch+0x49/0x80
[  215.608342][T11572]  do_group_exit+0xb4/0x1c0
[  215.613073][T11572]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[  215.619428][T11572]  get_signal+0x2a2/0x1320
[  215.623979][T11572]  ? __read_once_size.constprop.0+0x12/0x20
[  215.629865][T11572]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[  215.636107][T11572]  do_signal+0x2f/0x6c0
[  215.640247][T11572]  ? __read_once_size+0x5a/0xe0
[  215.645086][T11572]  ? __sanitizer_cov_trace_cmp8+0x18/0x20
[  215.650808][T11572]  exit_to_usermode_loop+0x250/0x2c0
[  215.656102][T11572]  do_syscall_64+0x384/0x3a0
[  215.660682][T11572]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[  215.666587][T11572] RIP: 0033:0x45af49
[  215.670587][T11572] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[  215.690184][T11572] RSP: 002b:00007f2263e75cf8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca
[  215.700269][T11572] RAX: fffffffffffffe00 RBX: 000000000075bf28 RCX: 000000000045af49
[  215.708372][T11572] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 000000000075bf28
[  215.716633][T11572] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  215.724729][T11572] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000075bf2c
[  215.732930][T11572] R13: 00007ffee5d7bc0f R14: 00007f2263e769c0 R15: 000000000075bf2c
[  216.851974][T11572] Shutting down cpus with NMI
[  216.858024][T11572] Kernel Offset: disabled
[  216.862349][T11572] Rebooting in 86400 seconds..