n(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000280)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000600)=0x0) getpriority(0x2, r0) membarrier(0x2b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x3, 0x0, 0xb678, 0x1, 0x0, 0x3, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000100)='/dev/dmmidi#\x00', 0x80000000, 0x200002) r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x40, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r4 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r3, 0x400454ce, r5) r6 = userfaultfd(0x0) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r1, 0xfffffffffffffffe) ioctl$UFFDIO_API(r6, 0xc018aa3f, &(0x7f0000000080)) setsockopt$RDS_FREE_MR(r3, 0x114, 0x3, &(0x7f00000002c0)={{0x20a0, 0x4}, 0x1}, 0x10) r7 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000011000/0x2000)=nil, 0x2000, 0x0, 0x11, r7, 0x0) write$P9_RLOPEN(r7, &(0x7f0000000000)={0x18}, 0x18) ioctl$UFFDIO_REGISTER(r6, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r6, 0xc020aa04, &(0x7f0000000040)={{&(0x7f0000011000/0x1000)=nil, 0x1000}}) recvfrom$inet6(r3, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r4, 0x0) ioctl$RTC_IRQP_READ(r3, 0x8004700b, &(0x7f0000000040)) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x4e21, 0xfffffffffffffff9, @loopback, 0x20}, {0xa, 0x4e21, 0x0, @mcast1, 0x200}, 0x100000000, [0x9, 0x9, 0x80, 0x4, 0x80, 0x100000001, 0x6, 0x1]}, 0x5c) get_thread_area(&(0x7f00000004c0)={0x3, 0xffffffffffffffff, 0xffffffffffffffff, 0x6acbcdb8, 0xd1c, 0x79fe, 0x6, 0x80000000, 0x2, 0x1a}) ioctl$HDIO_GETGEO(r3, 0x301, &(0x7f00000005c0)) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r2, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x4e23, 0x3, @local, 0x1}, {0xa, 0x4e20, 0x1000, @mcast1, 0x7d}, 0x0, [0xfffffffffffffe00, 0x9, 0x7, 0x7a1, 0x20, 0x3, 0x2, 0x8]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x20000000, @local, 0x1000000000}, {0xa, 0x0, 0x0, @mcast1}, 0x2, [0x0, 0xa800000000000000, 0xfffffffffffffffb, 0x7]}, 0x20) 03:35:31 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = epoll_create1(0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000200)) socketpair$unix(0x1, 0x400000001, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000939ff4)) 03:35:31 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000280)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000600)=0x0) getpriority(0x2, r0) membarrier(0x2b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x3, 0x0, 0xb678, 0x1, 0x0, 0x3, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000100)='/dev/dmmidi#\x00', 0x80000000, 0x200002) r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x40, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r4 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r3, 0x400454ce, r5) r6 = userfaultfd(0x0) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r1, 0xfffffffffffffffe) ioctl$UFFDIO_API(r6, 0xc018aa3f, &(0x7f0000000080)) setsockopt$RDS_FREE_MR(r3, 0x114, 0x3, &(0x7f00000002c0)={{0x20a0, 0x4}, 0x1}, 0x10) r7 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000011000/0x2000)=nil, 0x2000, 0x0, 0x11, r7, 0x0) write$P9_RLOPEN(r7, &(0x7f0000000000)={0x18}, 0x18) ioctl$UFFDIO_REGISTER(r6, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r6, 0xc020aa04, &(0x7f0000000040)={{&(0x7f0000011000/0x1000)=nil, 0x1000}}) recvfrom$inet6(r3, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r4, 0x0) ioctl$RTC_IRQP_READ(r3, 0x8004700b, &(0x7f0000000040)) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x4e21, 0xfffffffffffffff9, @loopback, 0x20}, {0xa, 0x4e21, 0x0, @mcast1, 0x200}, 0x100000000, [0x9, 0x9, 0x80, 0x4, 0x80, 0x100000001, 0x6, 0x1]}, 0x5c) get_thread_area(&(0x7f00000004c0)={0x3, 0xffffffffffffffff, 0xffffffffffffffff, 0x6acbcdb8, 0xd1c, 0x79fe, 0x6, 0x80000000, 0x2, 0x1a}) ioctl$HDIO_GETGEO(r3, 0x301, &(0x7f00000005c0)) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r2, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x4e23, 0x3, @local, 0x1}, {0xa, 0x4e20, 0x1000, @mcast1, 0x7d}, 0x0, [0xfffffffffffffe00, 0x9, 0x7, 0x7a1, 0x20, 0x3, 0x2, 0x8]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x20000000, @local, 0x1000000000}, {0xa, 0x0, 0x0, @mcast1}, 0x2, [0x0, 0xa800000000000000, 0xfffffffffffffffb, 0x7]}, 0x20) 03:35:31 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000780)='./bus\x00', 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) ioctl$RTC_EPOCH_READ(0xffffffffffffffff, 0x8008700d, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) lremovexattr(&(0x7f0000000040)='./bus\x00', 0x0) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = socket$inet_tcp(0x2, 0x1, 0x0) capset(0x0, &(0x7f00000000c0)={0x0, 0x8, 0x0, 0x0, 0xfffffffffffffffc, 0x4}) setsockopt$IP_VS_SO_SET_EDIT(r3, 0x0, 0x60, &(0x7f0000000080)={0x0, @empty, 0x0, 0x0, 'none\x00', 0x0, 0x0, 0x100003f00}, 0x2c) ptrace$setopts(0x4206, r2, 0x0, 0x0) recvfrom$packet(r0, &(0x7f0000000400)=""/162, 0xa2, 0x10101, 0x0, 0x0) tkill(r2, 0x1e) wait4(0x0, 0x0, 0x0, 0x0) 03:35:31 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x30, 0x10}}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 03:35:31 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x0, 0x9}, 0x2c) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x4, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(0xffffffffffffffff, 0x40045731, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000080)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) pkey_alloc(0x0, 0x0) ioctl$KVM_GET_MSRS(0xffffffffffffffff, 0xc008ae88, &(0x7f0000000240)=ANY=[]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, 0x0}], 0x1, 0x0, &(0x7f0000000180), 0x0) ioctl$KVM_ASSIGN_PCI_DEVICE(r2, 0x8040ae69, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x4, 0x7}) mlock(&(0x7f0000ff2000/0x2000)=nil, 0x2000) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000240)=0x80) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0xb704, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000340)={0x3, 0xa, 0x1, "37b1494db15d1e3b81187eaa78114930d19090bfb0dc3223cb721a29de6b3559088f4f30d7a8a570540b4a25ae7ccd911484ac7926691d1f6a268afb", 0x15, "d1f5c8907f859a34d568a3a110c7022c8f53411d68fe959ebf208e6f1325b9faf43ed39f00038c89ce796da132908d8d89487174e375e8638d2d549b", 0x8}) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$assume_authority(0x10, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000780)={0x0, 0x7a, "505bce793d8931ef56c09c6ed7138db8a253db8c078c6fa0766d5817c1e0874cf57c20bacc5a8b2e36602a13e33134737819bf2ef840901a0aed4f57ad5ff063a5307199bb40e372894ebb43c10181045793468a9a4acc8940d861669c33eedf9673b186bfc3ada0fdcc35d962083a75463ecf0e7f3b4c67e05f"}, 0x0) clone(0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000200)) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0xc, 0x4, 0x4, 0x5, 0x0, r0}, 0x2c) 03:35:31 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000280)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000600)=0x0) getpriority(0x2, r0) membarrier(0x2b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x3, 0x0, 0xb678, 0x1, 0x0, 0x3, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000100)='/dev/dmmidi#\x00', 0x80000000, 0x200002) r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x40, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r4 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r3, 0x400454ce, r5) r6 = userfaultfd(0x0) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r1, 0xfffffffffffffffe) ioctl$UFFDIO_API(r6, 0xc018aa3f, &(0x7f0000000080)) setsockopt$RDS_FREE_MR(r3, 0x114, 0x3, &(0x7f00000002c0)={{0x20a0, 0x4}, 0x1}, 0x10) r7 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000011000/0x2000)=nil, 0x2000, 0x0, 0x11, r7, 0x0) write$P9_RLOPEN(r7, &(0x7f0000000000)={0x18}, 0x18) ioctl$UFFDIO_REGISTER(r6, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r6, 0xc020aa04, &(0x7f0000000040)={{&(0x7f0000011000/0x1000)=nil, 0x1000}}) recvfrom$inet6(r3, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r4, 0x0) ioctl$RTC_IRQP_READ(r3, 0x8004700b, &(0x7f0000000040)) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x4e21, 0xfffffffffffffff9, @loopback, 0x20}, {0xa, 0x4e21, 0x0, @mcast1, 0x200}, 0x100000000, [0x9, 0x9, 0x80, 0x4, 0x80, 0x100000001, 0x6, 0x1]}, 0x5c) get_thread_area(&(0x7f00000004c0)={0x3, 0xffffffffffffffff, 0xffffffffffffffff, 0x6acbcdb8, 0xd1c, 0x79fe, 0x6, 0x80000000, 0x2, 0x1a}) ioctl$HDIO_GETGEO(r3, 0x301, &(0x7f00000005c0)) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r2, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x4e23, 0x3, @local, 0x1}, {0xa, 0x4e20, 0x1000, @mcast1, 0x7d}, 0x0, [0xfffffffffffffe00, 0x9, 0x7, 0x7a1, 0x20, 0x3, 0x2, 0x8]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x20000000, @local, 0x1000000000}, {0xa, 0x0, 0x0, @mcast1}, 0x2, [0x0, 0xa800000000000000, 0xfffffffffffffffb, 0x7]}, 0x20) [ 1158.739186] audit: type=1804 audit(2000000131.600:824): pid=15912 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir969515295/syzkaller.tJdo0a/258/bus" dev="sda1" ino=17178 res=1 03:35:31 executing program 3: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$rxrpc(0x21, 0x2, 0xa) setsockopt$RXRPC_SECURITY_KEY(r0, 0x110, 0x1, &(0x7f0000000080)='ppp0\x00', 0x5) 03:35:31 executing program 4: r0 = socket(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xbf) mknod$loop(&(0x7f0000000140)='./file0\x00', 0xa, 0xffffffffffffffff) setxattr$security_capability(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.capability\x00', &(0x7f0000000280)=@v2, 0x14, 0x0) setresuid(r1, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 03:35:31 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000280)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000600)=0x0) getpriority(0x2, r0) membarrier(0x2b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x3, 0x0, 0xb678, 0x1, 0x0, 0x3, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000100)='/dev/dmmidi#\x00', 0x80000000, 0x200002) r2 = socket$inet6(0xa, 0x3, 0x3a) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x40, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000200)=0x400, 0x4) r4 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)=0x0) ioctl$TUNSETGROUP(r3, 0x400454ce, r5) r6 = userfaultfd(0x0) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r1, 0xfffffffffffffffe) ioctl$UFFDIO_API(r6, 0xc018aa3f, &(0x7f0000000080)) setsockopt$RDS_FREE_MR(r3, 0x114, 0x3, &(0x7f00000002c0)={{0x20a0, 0x4}, 0x1}, 0x10) r7 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000011000/0x2000)=nil, 0x2000, 0x0, 0x11, r7, 0x0) write$P9_RLOPEN(r7, &(0x7f0000000000)={0x18}, 0x18) ioctl$UFFDIO_REGISTER(r6, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r6, 0xc020aa04, &(0x7f0000000040)={{&(0x7f0000011000/0x1000)=nil, 0x1000}}) recvfrom$inet6(r3, &(0x7f0000000380)=""/216, 0xd8, 0x40000040, &(0x7f0000000480)={0xa, 0x4e24, 0x6, @ipv4={[], [], @rand_addr=0x5669}, 0x5}, 0x1c) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0xfffffffffffffffe, 0x12, r4, 0x0) ioctl$RTC_IRQP_READ(r3, 0x8004700b, &(0x7f0000000040)) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x4e21, 0xfffffffffffffff9, @loopback, 0x20}, {0xa, 0x4e21, 0x0, @mcast1, 0x200}, 0x100000000, [0x9, 0x9, 0x80, 0x4, 0x80, 0x100000001, 0x6, 0x1]}, 0x5c) get_thread_area(&(0x7f00000004c0)={0x3, 0xffffffffffffffff, 0xffffffffffffffff, 0x6acbcdb8, 0xd1c, 0x79fe, 0x6, 0x80000000, 0x2, 0x1a}) ioctl$HDIO_GETGEO(r3, 0x301, &(0x7f00000005c0)) setsockopt$inet6_int(r2, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r2, 0x29, 0xd2, &(0x7f0000000300)={{0xa, 0x4e23, 0x3, @local, 0x1}, {0xa, 0x4e20, 0x1000, @mcast1, 0x7d}, 0x0, [0xfffffffffffffe00, 0x9, 0x7, 0x7a1, 0x20, 0x3, 0x2, 0x8]}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x20000000, @local, 0x1000000000}, {0xa, 0x0, 0x0, @mcast1}, 0x2, [0x0, 0xa800000000000000, 0xfffffffffffffffb, 0x7]}, 0x20) 03:35:31 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") unshare(0x4000400) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) getsockopt$ax25_int(r1, 0x101, 0x7, &(0x7f0000000000), &(0x7f00000000c0)=0x4) [ 1159.026979] warning: `./file0' has both setuid-root and effective capabilities. Therefore not raising all capabilities. 03:35:31 executing program 3: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$rxrpc(0x21, 0x2, 0xa) setsockopt$RXRPC_SECURITY_KEY(r0, 0x110, 0x1, &(0x7f0000000080)='ppp0\x00', 0x5) 03:35:32 executing program 1: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x6f1a, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r1, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x9, 0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000800)='cpuacct.usage_all\x00', 0x0, 0x0) 03:35:32 executing program 0: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='nqw default'], 0x1, 0x0) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0x1f1, 0xfffffffffffffffe) 03:35:32 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setuid(r1) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') 03:35:32 executing program 3: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$rxrpc(0x21, 0x2, 0xa) setsockopt$RXRPC_SECURITY_KEY(r0, 0x110, 0x1, &(0x7f0000000080)='ppp0\x00', 0x5) 03:35:32 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8004700b, &(0x7f0000000040)) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000100)={{0xa, 0x4e21, 0xfffffffffffffff6, @loopback, 0x20}, {0xa, 0x4e21, 0x0, @mcast1, 0x10001}, 0x100000000, [0x9, 0x9, 0x80, 0x4, 0x80, 0x100000001, 0x6, 0x1]}, 0x5c) setsockopt$inet6_int(r0, 0x29, 0xc8, &(0x7f00000007c0), 0x4) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast1}, 0x0, [0x0, 0xa800000000000000, 0x2, 0x7]}, 0x5c) [ 1159.483724] encrypted_key: master key parameter is missing 03:35:32 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="000429bd7000fbdbdf25050000003800070008000200060000000c00030003000000000000000800020000000000080001000300000008000200000000000800010006000000480004001400070008000300ff01000008000400080000000c00010073797a30000000000c00070008000200020000000c00010073"], 0x1}}, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4138ae84, &(0x7f0000000280)) 03:35:32 executing program 3: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$rxrpc(0x21, 0x2, 0xa) setsockopt$RXRPC_SECURITY_KEY(r0, 0x110, 0x1, &(0x7f0000000080)='ppp0\x00', 0x5) 03:35:32 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) r3 = fcntl$dupfd(r0, 0x2, 0xffffffffffffffff) utimensat(r3, 0x0, 0x0, 0x0) 03:35:32 executing program 1: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x6f1a, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r1, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x9, 0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000800)='cpuacct.usage_all\x00', 0x0, 0x0) 03:35:32 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0xe, 0x4, 0x4000000004, 0x80006}, 0x2c) 03:35:32 executing program 3: perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0xc) 03:35:32 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="000429bd7000fbdbdf25050000003800070008000200060000000c00030003000000000000000800020000000000080001000300000008000200000000000800010006000000480004001400070008000300ff01000008000400080000000c00010073797a30000000000c00070008000200020000000c00010073"], 0x1}}, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4138ae84, &(0x7f0000000280)) 03:35:32 executing program 5: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200a5ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 03:35:32 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setuid(r1) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') 03:35:33 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=@newlink={0x28, 0x11, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 03:35:33 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000680)={0xa, 0x0, 0x0, @dev, 0x7}, 0x293) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r3, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) open(0x0, 0x141042, 0x0) 03:35:33 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x18}]}, &(0x7f0000000080)='GPL\x00'}, 0x23) 03:35:33 executing program 1: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x6f1a, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r1, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x9, 0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000800)='cpuacct.usage_all\x00', 0x0, 0x0) 03:35:33 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="000429bd7000fbdbdf25050000003800070008000200060000000c00030003000000000000000800020000000000080001000300000008000200000000000800010006000000480004001400070008000300ff01000008000400080000000c00010073797a30000000000c00070008000200020000000c00010073"], 0x1}}, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4138ae84, &(0x7f0000000280)) 03:35:33 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setuid(r1) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') 03:35:33 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x7d6, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002740)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, &(0x7f00000000c0)={'broute\x00'}, &(0x7f0000000140)=0x78) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f0000000040)=0x40, 0x4) 03:35:33 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r1, &(0x7f0000005fc0), 0x80000000000006a, 0x0) 03:35:33 executing program 5: socket$packet(0x11, 0x2, 0x300) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0xffffffffffffff42, 0x0, 0x0, &(0x7f0000000040)=ANY=[], 0xfffffe9b}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/packet\x00') socket$packet(0x11, 0x2, 0x300) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) 03:35:33 executing program 1: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x6f1a, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r2, r1, 0xd}, 0x10) bpf$BPF_PROG_ATTACH(0x9, 0x0, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000800)='cpuacct.usage_all\x00', 0x0, 0x0) 03:35:33 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setuid(r1) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') 03:35:33 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$TIPC_NL_BEARER_SET(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="000429bd7000fbdbdf25050000003800070008000200060000000c00030003000000000000000800020000000000080001000300000008000200000000000800010006000000480004001400070008000300ff01000008000400080000000c00010073797a30000000000c00070008000200020000000c00010073"], 0x1}}, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4138ae84, &(0x7f0000000280)) 03:35:33 executing program 4: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)="24000000200007021dfffd946f610500020000001f00000000000100080018000400ff7e", 0x24}], 0x1}, 0x0) 03:35:33 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x4, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r0, 0xc0205649, &(0x7f0000000100)={0x0, 0x1, 0x0, [], &(0x7f00000000c0)={0x98f905, 0x0, [], @ptr}}) 03:35:33 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {0x0}, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/219, 0xdb}], 0x1}}], 0x48}, 0x0) 03:35:33 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$FICLONE(r0, 0x40049409, r0) 03:35:33 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) openat$mixer(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_open_dev$evdev(0x0, 0x0, 0x0) dup(0xffffffffffffffff) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) fchdir(r2) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$RTC_EPOCH_READ(0xffffffffffffffff, 0x8008700d, 0x0) shmctl$SHM_LOCK(0x0, 0xb) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, 0x0) listen(r1, 0x0) 03:35:34 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x3, 0x6) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000000140), 0x10) setsockopt$inet_opts(r1, 0x0, 0xd, &(0x7f0000000000)="e6", 0x1) recvmmsg(r1, &(0x7f0000000180), 0x400000000000370, 0x6, &(0x7f0000000100)={0x77359400}) 03:35:34 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {0x0}, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/219, 0xdb}], 0x1}}], 0x48}, 0x0) 03:35:34 executing program 4: r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x201, 0x800000002009) r1 = memfd_create(&(0x7f0000000080)='#vmem1\x00', 0x0) write(r1, &(0x7f0000000300)="ce", 0x1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r1, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045503, &(0x7f00000000c0)) 03:35:34 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) ioctl$SG_SET_TIMEOUT(r4, 0x2201, &(0x7f0000000080)=0xffffffffffffff2e) sendmmsg(r2, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x200056d0, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) fchdir(r0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) get_mempolicy(&(0x7f0000000080), &(0x7f0000000140), 0x339, &(0x7f0000ffc000/0x4000)=nil, 0x0) 03:35:34 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usb(&(0x7f0000000280)='/dev/bus/usb/00#/00#\x00', 0x201, 0x8000000100079) ioctl$sock_inet_SIOCRTMSG(r0, 0x5514, 0x0) 03:35:34 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x7d6, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002740)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, &(0x7f00000000c0)={'broute\x00'}, &(0x7f0000000140)=0x78) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f0000000040)=0x40, 0x4) 03:35:34 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='wchan\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[]}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x0) 03:35:34 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) ioctl$SG_SET_TIMEOUT(r4, 0x2201, &(0x7f0000000080)=0xffffffffffffff2e) sendmmsg(r2, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x200056d0, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) fchdir(r0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) get_mempolicy(&(0x7f0000000080), &(0x7f0000000140), 0x339, &(0x7f0000ffc000/0x4000)=nil, 0x0) 03:35:34 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x7d6, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002740)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, &(0x7f00000000c0)={'broute\x00'}, &(0x7f0000000140)=0x78) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f0000000040)=0x40, 0x4) 03:35:34 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {0x0}, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/219, 0xdb}], 0x1}}], 0x48}, 0x0) 03:35:34 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f00000000c0)=[{{0x0, 0x0, &(0x7f0000002580)=[{&(0x7f00000012c0)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/xfrm_stat\x00') preadv(r0, &(0x7f0000000480), 0x100000000000026f, 0x2) 03:35:34 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x7d6, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002740)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, &(0x7f00000000c0)={'broute\x00'}, &(0x7f0000000140)=0x78) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f0000000040)=0x40, 0x4) 03:35:34 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='wchan\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[]}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x0) 03:35:34 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x7d6, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002740)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, &(0x7f00000000c0)={'broute\x00'}, &(0x7f0000000140)=0x78) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f0000000040)=0x40, 0x4) 03:35:34 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {0x0}, &(0x7f00000006c0)=[{&(0x7f0000000540)=""/219, 0xdb}], 0x1}}], 0x48}, 0x0) 03:35:34 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000140)='#}\x00\x9a\x1b\xc2_R\xea\xd3\xddT\xd0\xec;\xa4\x9dV>\xa4\x11\xa4\xac\x9e\x1e\xac\xaaT\xd5\xd3\xf8<\xd7Yb\x04I\xdct,&\xe90\xa8\xaf\xff\xd3\xcd\xcd-\x90\'\xa2v\xbal\xa3l\"\xa0G\xebD\x1d\x8c\x8e\x15\x8d``\xb2\xdb\x9e\'\xef_\xde?i\xacl\x03\xaa\xdc(\x96\xbed\x9b\x1d\x95\x13\xbe\xe7\xb8\xa3\x13>\xdd}\x87\xc7Y\xf1\x92\xe3BIky\xe8\x85\xe9^\x1d\xb2\xd2Ycn\x9d\xafQ\xb1\x02\x99z\x81\xff\xc2\xdd)\xfe\'\xb8\"X@\xd6,\xb5\xa6\xa2\xe1:\xecG\x1d\xfe\x86\x85\xe7\xd4\xf6!C\xa3\xcf\xf3S\xeaA\xd7\x11\xc9O\x8e+\x94\x8c\x1f\xd6\x88\x97\xd0\xdd*\x90)\"\xda', 0x0) fsetxattr$trusted_overlay_origin(r0, &(0x7f0000000000)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) 03:35:34 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='wchan\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[]}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x0) 03:35:34 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x7d6, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002740)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, &(0x7f00000000c0)={'broute\x00'}, &(0x7f0000000140)=0x78) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f0000000040)=0x40, 0x4) 03:35:35 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = memfd_create(&(0x7f0000000040)='userloppp1ptoc\'\x00', 0x6) fcntl$addseals(r1, 0x409, 0x8) 03:35:35 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) ioctl$SG_SET_TIMEOUT(r4, 0x2201, &(0x7f0000000080)=0xffffffffffffff2e) sendmmsg(r2, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x200056d0, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) fchdir(r0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) get_mempolicy(&(0x7f0000000080), &(0x7f0000000140), 0x339, &(0x7f0000ffc000/0x4000)=nil, 0x0) 03:35:35 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000140)='#}\x00\x9a\x1b\xc2_R\xea\xd3\xddT\xd0\xec;\xa4\x9dV>\xa4\x11\xa4\xac\x9e\x1e\xac\xaaT\xd5\xd3\xf8<\xd7Yb\x04I\xdct,&\xe90\xa8\xaf\xff\xd3\xcd\xcd-\x90\'\xa2v\xbal\xa3l\"\xa0G\xebD\x1d\x8c\x8e\x15\x8d``\xb2\xdb\x9e\'\xef_\xde?i\xacl\x03\xaa\xdc(\x96\xbed\x9b\x1d\x95\x13\xbe\xe7\xb8\xa3\x13>\xdd}\x87\xc7Y\xf1\x92\xe3BIky\xe8\x85\xe9^\x1d\xb2\xd2Ycn\x9d\xafQ\xb1\x02\x99z\x81\xff\xc2\xdd)\xfe\'\xb8\"X@\xd6,\xb5\xa6\xa2\xe1:\xecG\x1d\xfe\x86\x85\xe7\xd4\xf6!C\xa3\xcf\xf3S\xeaA\xd7\x11\xc9O\x8e+\x94\x8c\x1f\xd6\x88\x97\xd0\xdd*\x90)\"\xda', 0x0) fsetxattr$trusted_overlay_origin(r0, &(0x7f0000000000)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) 03:35:35 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='wchan\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[]}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x0) 03:35:35 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r1, 0x10e, 0x800000000c, &(0x7f00007e0000)=""/4, &(0x7f0000000040)=0x4) 03:35:35 executing program 5: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000040)) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1\x00']) write$P9_RRENAME(r0, 0x0, 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 03:35:35 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x7d6, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002740)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, &(0x7f00000000c0)={'broute\x00'}, &(0x7f0000000140)=0x78) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f0000000040)=0x40, 0x4) 03:35:35 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000140)='#}\x00\x9a\x1b\xc2_R\xea\xd3\xddT\xd0\xec;\xa4\x9dV>\xa4\x11\xa4\xac\x9e\x1e\xac\xaaT\xd5\xd3\xf8<\xd7Yb\x04I\xdct,&\xe90\xa8\xaf\xff\xd3\xcd\xcd-\x90\'\xa2v\xbal\xa3l\"\xa0G\xebD\x1d\x8c\x8e\x15\x8d``\xb2\xdb\x9e\'\xef_\xde?i\xacl\x03\xaa\xdc(\x96\xbed\x9b\x1d\x95\x13\xbe\xe7\xb8\xa3\x13>\xdd}\x87\xc7Y\xf1\x92\xe3BIky\xe8\x85\xe9^\x1d\xb2\xd2Ycn\x9d\xafQ\xb1\x02\x99z\x81\xff\xc2\xdd)\xfe\'\xb8\"X@\xd6,\xb5\xa6\xa2\xe1:\xecG\x1d\xfe\x86\x85\xe7\xd4\xf6!C\xa3\xcf\xf3S\xeaA\xd7\x11\xc9O\x8e+\x94\x8c\x1f\xd6\x88\x97\xd0\xdd*\x90)\"\xda', 0x0) fsetxattr$trusted_overlay_origin(r0, &(0x7f0000000000)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) 03:35:35 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)=0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc) ptrace$setregset(0x4205, r0, 0x207, &(0x7f0000000280)={&(0x7f0000000240)}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) r1 = socket$inet6_udp(0xa, 0x2, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f00000003c0)=ANY=[@ANYPTR64=&(0x7f0000000380)=ANY=[]]], 0x8) ioctl$UI_DEV_DESTROY(0xffffffffffffffff, 0x5502) r2 = openat(0xffffffffffffff9c, &(0x7f0000000400)='./file0\x00', 0x40, 0x0) clock_gettime(0x0, &(0x7f0000000500)={0x0, 0x0}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000540)={0x0, @time={r3, r4+30000000}, 0x0, {0x0, 0x91}, 0x4d65, 0x0, 0x9}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f00000002c0)='cpuset\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1a1, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, 0x0) 03:35:35 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x9, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0585611, &(0x7f0000000180)={0x0, 0x9, "2a8f5865af49c7250671f832f1ce9782bf915349fd6618fbaf11b15f24f44d12", 0x0, 0x0, 0x0, 0x70effc, 0x100000001}) [ 1162.820495] overlayfs: failed to resolve './file1': -2 03:35:35 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000380)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_INTERRUPT(r2, 0x4004ae86, &(0x7f0000000300)) ioctl$KVM_INTERRUPT(r2, 0x4004ae86, &(0x7f0000000000)) 03:35:35 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000140)='#}\x00\x9a\x1b\xc2_R\xea\xd3\xddT\xd0\xec;\xa4\x9dV>\xa4\x11\xa4\xac\x9e\x1e\xac\xaaT\xd5\xd3\xf8<\xd7Yb\x04I\xdct,&\xe90\xa8\xaf\xff\xd3\xcd\xcd-\x90\'\xa2v\xbal\xa3l\"\xa0G\xebD\x1d\x8c\x8e\x15\x8d``\xb2\xdb\x9e\'\xef_\xde?i\xacl\x03\xaa\xdc(\x96\xbed\x9b\x1d\x95\x13\xbe\xe7\xb8\xa3\x13>\xdd}\x87\xc7Y\xf1\x92\xe3BIky\xe8\x85\xe9^\x1d\xb2\xd2Ycn\x9d\xafQ\xb1\x02\x99z\x81\xff\xc2\xdd)\xfe\'\xb8\"X@\xd6,\xb5\xa6\xa2\xe1:\xecG\x1d\xfe\x86\x85\xe7\xd4\xf6!C\xa3\xcf\xf3S\xeaA\xd7\x11\xc9O\x8e+\x94\x8c\x1f\xd6\x88\x97\xd0\xdd*\x90)\"\xda', 0x0) fsetxattr$trusted_overlay_origin(r0, &(0x7f0000000000)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) 03:35:35 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000cfd000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) socket$unix(0x1, 0x2, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) timer_create(0x0, 0x0, &(0x7f0000000140)) timer_create(0x0, 0x0, 0x0) timer_create(0x4, &(0x7f0000000680)={0x0, 0x8, 0x1}, &(0x7f00000006c0)) ioctl$VIDIOC_SUBDEV_G_FMT(0xffffffffffffffff, 0xc0585604, &(0x7f0000001b40)={0x1, 0x0, {0x0, 0x0, 0x301f, 0x0, 0x0, 0x6}}) timer_create(0x0, 0x0, 0x0) timer_create(0x6, 0x0, 0x0) get_thread_area(&(0x7f0000001b00)={0x0, 0x20001000, 0x0, 0x0, 0x7ff, 0x1, 0x0, 0x7, 0x4}) r1 = getpgid(0x0) symlinkat(&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000180)=0x3, 0x4) setpgid(0x0, r1) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000017c0)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}]}) bind$alg(0xffffffffffffffff, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'echainiv(ccm(serpent))\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r2 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000440), 0x80000) setsockopt$TIPC_DEST_DROPPABLE(r2, 0x10f, 0x81, &(0x7f0000000480)=0x7ff, 0x4) accept$alg(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000180), &(0x7f00000001c0)=0x4) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)) 03:35:36 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}}) ioctl$SG_SET_TIMEOUT(r4, 0x2201, &(0x7f0000000080)=0xffffffffffffff2e) sendmmsg(r2, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x200056d0, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) fchdir(r0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) get_mempolicy(&(0x7f0000000080), &(0x7f0000000140), 0x339, &(0x7f0000ffc000/0x4000)=nil, 0x0) 03:35:36 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}}}, 0x48) 03:35:36 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000380)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_INTERRUPT(r2, 0x4004ae86, &(0x7f0000000300)) ioctl$KVM_INTERRUPT(r2, 0x4004ae86, &(0x7f0000000000)) 03:35:36 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) waitid(0x3, 0x0, &(0x7f0000000040), 0x0, 0x0) 03:35:36 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') fchdir(r0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) 03:35:36 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000440)={{0x80}, 'port0\x00'}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(r0) 03:35:36 executing program 4: r0 = socket$nl_xfrm(0x11, 0x3, 0x6) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000180)={0x0, 0x7}, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000200)={0x263, &(0x7f00000001c0)}, 0x4) 03:35:37 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0xb, &(0x7f00000001c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) 03:35:37 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000380)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_INTERRUPT(r2, 0x4004ae86, &(0x7f0000000300)) ioctl$KVM_INTERRUPT(r2, 0x4004ae86, &(0x7f0000000000)) 03:35:37 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000000)=0x5, 0x4) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000580)=0x400, 0x4) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e20}, 0x1c) 03:35:37 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000580)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x1c, &(0x7f0000002440), 0x0, &(0x7f0000000440)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x4}}], 0x20}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) 03:35:37 executing program 1: r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f000021d000)={0x2, 0x4e21, @multicast1}, 0x10) syz_emit_ethernet(0x36d, &(0x7f0000000240)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x35f, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, @udp={0x0, 0x4e21, 0x8}}}}}, 0x0) syz_emit_ethernet(0x5c, &(0x7f0000359fd5)={@link_local, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x4e21, 0x8}}}}}, 0x0) 03:35:37 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)=0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc) ptrace$setregset(0x4205, r0, 0x207, &(0x7f0000000280)={&(0x7f0000000240)}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) r1 = socket$inet6_udp(0xa, 0x2, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f00000003c0)=ANY=[@ANYPTR64=&(0x7f0000000380)=ANY=[]]], 0x8) ioctl$UI_DEV_DESTROY(0xffffffffffffffff, 0x5502) r2 = openat(0xffffffffffffff9c, &(0x7f0000000400)='./file0\x00', 0x40, 0x0) clock_gettime(0x0, &(0x7f0000000500)={0x0, 0x0}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000540)={0x0, @time={r3, r4+30000000}, 0x0, {0x0, 0x91}, 0x4d65, 0x0, 0x9}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f00000002c0)='cpuset\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1a1, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, 0x0) 03:35:37 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f0000000480)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000340)='fuse\x00', 0x0, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) 03:35:37 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x806, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r1 = dup(r0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r1, &(0x7f0000000880)={'syz0\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) 03:35:37 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000380)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_INTERRUPT(r2, 0x4004ae86, &(0x7f0000000300)) ioctl$KVM_INTERRUPT(r2, 0x4004ae86, &(0x7f0000000000)) 03:35:37 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffff9c, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) unshare(0x8020000) restart_syscall() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) msgget$private(0x0, 0x0) connect$unix(r0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) clone(0x10062101, &(0x7f00000036c0), 0x0, 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) [ 1164.594302] input: syz1 as /devices/virtual/input/input49 03:35:37 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f0000000480)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000340)='fuse\x00', 0x0, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) [ 1164.695476] input: syz1 as /devices/virtual/input/input50 03:35:37 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffff9c, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) unshare(0x8020000) restart_syscall() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) msgget$private(0x0, 0x0) connect$unix(r0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) clone(0x10062101, &(0x7f00000036c0), 0x0, 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) 03:35:38 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip_tables_names\x00') lseek(r1, 0x3, 0x0) 03:35:38 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x125, 0x40000028, r2, 0x0) dup3(r1, r2, 0x0) 03:35:38 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffff9c, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) unshare(0x8020000) restart_syscall() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) msgget$private(0x0, 0x0) connect$unix(r0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) clone(0x10062101, &(0x7f00000036c0), 0x0, 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) 03:35:38 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)=0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc) ptrace$setregset(0x4205, r0, 0x207, &(0x7f0000000280)={&(0x7f0000000240)}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) r1 = socket$inet6_udp(0xa, 0x2, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f00000003c0)=ANY=[@ANYPTR64=&(0x7f0000000380)=ANY=[]]], 0x8) ioctl$UI_DEV_DESTROY(0xffffffffffffffff, 0x5502) r2 = openat(0xffffffffffffff9c, &(0x7f0000000400)='./file0\x00', 0x40, 0x0) clock_gettime(0x0, &(0x7f0000000500)={0x0, 0x0}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000540)={0x0, @time={r3, r4+30000000}, 0x0, {0x0, 0x91}, 0x4d65, 0x0, 0x9}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f00000002c0)='cpuset\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1a1, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, 0x0) 03:35:38 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x806, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r1 = dup(r0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r1, &(0x7f0000000880)={'syz0\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) 03:35:38 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f0000000480)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000340)='fuse\x00', 0x0, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) [ 1166.163076] input: syz1 as /devices/virtual/input/input51 03:35:39 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x806, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r1 = dup(r0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r1, &(0x7f0000000880)={'syz0\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) 03:35:39 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffff9c, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, 0x0, 0x0) unshare(0x8020000) restart_syscall() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) msgget$private(0x0, 0x0) connect$unix(r0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) clone(0x10062101, &(0x7f00000036c0), 0x0, 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) [ 1166.392491] input: syz1 as /devices/virtual/input/input52 03:35:39 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, 0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0xffffffff00000001, 0x8, 0x4}, 0x2f) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffff9c, 0x0) 03:35:39 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x400000) 03:35:39 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdirat(0xffffffffffffff9c, &(0x7f0000000480)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000340)='fuse\x00', 0x0, &(0x7f0000000740)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) 03:35:39 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x806, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r1 = dup(r0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r1, &(0x7f0000000880)={'syz0\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x45c) 03:35:39 executing program 1: socket$key(0xf, 0x3, 0x2) openat$urandom(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)}, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x8, 0x9}, 0xa) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, &(0x7f0000000100)) sched_setaffinity(0x0, 0x8, &(0x7f0000000480)=0x81) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {0x0, 0x4}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x4d2, 0x33}, 0x0, @in=@broadcast, 0x0, 0x1, 0x3, 0x6, 0x4762d17e}}, 0xe8) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x400000000000058, 0x0) [ 1166.648757] input: syz1 as /devices/virtual/input/input53 03:35:39 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001540)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000400)='net/ip6_mr_cache\x00') perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x199, 0x0) 03:35:39 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x400000) 03:35:39 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)=0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000440)=0xc) ptrace$setregset(0x4205, r0, 0x207, &(0x7f0000000280)={&(0x7f0000000240)}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) r1 = socket$inet6_udp(0xa, 0x2, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYPTR64=&(0x7f00000003c0)=ANY=[@ANYPTR64=&(0x7f0000000380)=ANY=[]]], 0x8) ioctl$UI_DEV_DESTROY(0xffffffffffffffff, 0x5502) r2 = openat(0xffffffffffffff9c, &(0x7f0000000400)='./file0\x00', 0x40, 0x0) clock_gettime(0x0, &(0x7f0000000500)={0x0, 0x0}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000540)={0x0, @time={r3, r4+30000000}, 0x0, {0x0, 0x91}, 0x4d65, 0x0, 0x9}) getpeername$packet(0xffffffffffffff9c, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f00000002c0)='cpuset\x00') preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1a1, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, 0x0) 03:35:39 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x2, 0x0) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$can_raw(0x1d, 0x3, 0x1) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) bind$can_raw(r0, &(0x7f0000000140), 0x10) setsockopt(r0, 0x65, 0x1, &(0x7f0000000700), 0x0) syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x0, 0x0) unshare(0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000d00), 0x0) 03:35:39 executing program 2: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, 0x0, 0x0) 03:35:39 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x400000) 03:35:39 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x6, 0x0) setsockopt$sock_attach_bpf(r1, 0x10d, 0xf, &(0x7f0000000000)=r0, 0x1) 03:35:40 executing program 1: socket$key(0xf, 0x3, 0x2) openat$urandom(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)}, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x8, 0x9}, 0xa) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, &(0x7f0000000100)) sched_setaffinity(0x0, 0x8, &(0x7f0000000480)=0x81) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {0x0, 0x4}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x4d2, 0x33}, 0x0, @in=@broadcast, 0x0, 0x1, 0x3, 0x6, 0x4762d17e}}, 0xe8) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x400000000000058, 0x0) 03:35:40 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8040}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x80800) r0 = socket$alg(0x26, 0x5, 0x0) pipe2(&(0x7f0000000240), 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000200)={0x0, 0x0, 0x6, 0x200000}, 0x10) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000900)) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2f5}], 0x30}, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000004700)=[{0x0}, {&(0x7f00000023c0)=""/49, 0x31}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3, &(0x7f0000004780)=""/245, 0xf5}, 0xba02000000000000}], 0x1, 0x0, &(0x7f0000008000)={0x0, 0x989680}) close(r1) lstat(&(0x7f0000000280)='./file0\x00', 0x0) r2 = syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x4100) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r2, 0x5460, &(0x7f00000002c0)={{}, {}, 0x0, 0xffffffffffffffff}) 03:35:40 executing program 4: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xfffffffffffffffd, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x3, 0x1) getsockopt(r0, 0xff, 0x1, &(0x7f0000000080)=""/166, &(0x7f0000000040)=0xffffffffffffffbb) 03:35:40 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x400000) 03:35:40 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getrusage(0xffffffffffffffff, &(0x7f0000000080)) 03:35:40 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/cuse\x00', 0x2, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000280)='ns/pid\x00') semget(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='security.ima\x00', &(0x7f0000000500)=@sha1={0x1, "1549c6a79f24f4d62dfc8d54ff2f57971d4014c3"}, 0x15, 0x2) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000680)='security.ima\x00', 0x0, 0x0, 0x98391aa8d00f7f6a) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vcs\x00', 0x0, 0x0) getsockname$tipc(r0, &(0x7f00000001c0)=@name, &(0x7f0000000240)=0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000005c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f0000000740)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000700)={&(0x7f00000006c0)={0x28, r1, 0x1, 0x70bd25, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x100000000000}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}]}]}, 0x28}}, 0x0) gettid() r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) lsetxattr$security_smack_transmute(0x0, &(0x7f0000000600)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000640)='TRUE', 0x4, 0x1) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000080)=0x5, 0x4) write$P9_RFLUSH(r2, 0x0, 0x0) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f0000000180), &(0x7f0000000440)=0x4) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb)={'\x06\x00'}, &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) r3 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ppoll(&(0x7f0000000100)=[{r3, 0x1}], 0x1, 0x0, &(0x7f0000000200), 0x8) ioctl$CAPI_GET_SERIAL(r2, 0xc0044308, &(0x7f00000002c0)=0xfff) ioctl(0xffffffffffffffff, 0x6, &(0x7f0000000000)="0adc1f023c123f3188a070") r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r3, 0xc04064a0, &(0x7f0000000780)={&(0x7f0000000300)=[0x0], &(0x7f0000000340)=[0x0, 0x0, 0x0], &(0x7f0000000380)=[0x0, 0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x1, 0x3, 0x2, 0x8}) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r4, 0x84, 0xc, &(0x7f0000000040)=0x4, 0x4) 03:35:40 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @multicast2}, 0x10) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, &(0x7f0000000100)) 03:35:40 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8040}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x80800) r0 = socket$alg(0x26, 0x5, 0x0) pipe2(&(0x7f0000000240), 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000200)={0x0, 0x0, 0x6, 0x200000}, 0x10) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000900)) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2f5}], 0x30}, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000004700)=[{0x0}, {&(0x7f00000023c0)=""/49, 0x31}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3, &(0x7f0000004780)=""/245, 0xf5}, 0xba02000000000000}], 0x1, 0x0, &(0x7f0000008000)={0x0, 0x989680}) close(r1) lstat(&(0x7f0000000280)='./file0\x00', 0x0) r2 = syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x4100) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r2, 0x5460, &(0x7f00000002c0)={{}, {}, 0x0, 0xffffffffffffffff}) 03:35:40 executing program 4: clock_nanosleep(0x0, 0x1, &(0x7f0000051ff0)={0x2000000000003}, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) r0 = gettid() mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x6, 0x100000000000031, 0xffffffffffffffff, 0x0) tkill(r0, 0x1000000000013) 03:35:40 executing program 5: r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f0000000080)='./control\x00', 0x0) close(r0) r1 = inotify_init1(0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x3ffd) r2 = gettid() fcntl$setown(r1, 0x8, r2) fcntl$setsig(r1, 0xa, 0x21) inotify_add_watch(r1, &(0x7f0000000140)='./control\x00', 0xa4000960) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x0) 03:35:40 executing program 1: socket$key(0xf, 0x3, 0x2) openat$urandom(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)}, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x8, 0x9}, 0xa) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, &(0x7f0000000100)) sched_setaffinity(0x0, 0x8, &(0x7f0000000480)=0x81) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {0x0, 0x4}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x4d2, 0x33}, 0x0, @in=@broadcast, 0x0, 0x1, 0x3, 0x6, 0x4762d17e}}, 0xe8) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x400000000000058, 0x0) 03:35:40 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8040}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x80800) r0 = socket$alg(0x26, 0x5, 0x0) pipe2(&(0x7f0000000240), 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000200)={0x0, 0x0, 0x6, 0x200000}, 0x10) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000900)) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2f5}], 0x30}, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000004700)=[{0x0}, {&(0x7f00000023c0)=""/49, 0x31}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3, &(0x7f0000004780)=""/245, 0xf5}, 0xba02000000000000}], 0x1, 0x0, &(0x7f0000008000)={0x0, 0x989680}) close(r1) lstat(&(0x7f0000000280)='./file0\x00', 0x0) r2 = syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x4100) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r2, 0x5460, &(0x7f00000002c0)={{}, {}, 0x0, 0xffffffffffffffff}) 03:35:40 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8040}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x80800) r0 = socket$alg(0x26, 0x5, 0x0) pipe2(&(0x7f0000000240), 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000200)={0x0, 0x0, 0x6, 0x200000}, 0x10) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000900)) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2f5}], 0x30}, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000004700)=[{0x0}, {&(0x7f00000023c0)=""/49, 0x31}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3, &(0x7f0000004780)=""/245, 0xf5}, 0xba02000000000000}], 0x1, 0x0, &(0x7f0000008000)={0x0, 0x989680}) close(r1) lstat(&(0x7f0000000280)='./file0\x00', 0x0) r2 = syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x4100) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r2, 0x5460, &(0x7f00000002c0)={{}, {}, 0x0, 0xffffffffffffffff}) 03:35:41 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, &(0x7f0000000140)={[{@jqfmt_vfsv1='jqfmt=vfsv1'}]}) 03:35:41 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8040}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x80800) r0 = socket$alg(0x26, 0x5, 0x0) pipe2(&(0x7f0000000240), 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000200)={0x0, 0x0, 0x6, 0x200000}, 0x10) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000900)) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2f5}], 0x30}, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000004700)=[{0x0}, {&(0x7f00000023c0)=""/49, 0x31}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3, &(0x7f0000004780)=""/245, 0xf5}, 0xba02000000000000}], 0x1, 0x0, &(0x7f0000008000)={0x0, 0x989680}) close(r1) lstat(&(0x7f0000000280)='./file0\x00', 0x0) r2 = syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x4100) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r2, 0x5460, &(0x7f00000002c0)={{}, {}, 0x0, 0xffffffffffffffff}) 03:35:41 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8040}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x80800) r0 = socket$alg(0x26, 0x5, 0x0) pipe2(&(0x7f0000000240), 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000200)={0x0, 0x0, 0x6, 0x200000}, 0x10) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000900)) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2f5}], 0x30}, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000004700)=[{0x0}, {&(0x7f00000023c0)=""/49, 0x31}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3, &(0x7f0000004780)=""/245, 0xf5}, 0xba02000000000000}], 0x1, 0x0, &(0x7f0000008000)={0x0, 0x989680}) close(r1) lstat(&(0x7f0000000280)='./file0\x00', 0x0) r2 = syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x4100) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r2, 0x5460, &(0x7f00000002c0)={{}, {}, 0x0, 0xffffffffffffffff}) 03:35:41 executing program 5: r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) keyctl$setperm(0x5, r0, 0x0) perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x1, 0x2) ioctl$int_in(r1, 0x800040c004500a, &(0x7f0000000040)=0x80000002) ioctl$int_in(r1, 0x5421, &(0x7f0000000200)=0x4) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f00000000c0)={0xffffffffffffffd3, 0x2, 0x10000000d000000, {0x300000000000000}}, 0xfffffefd) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x220000, 0x0) 03:35:41 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8040}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x80800) r0 = socket$alg(0x26, 0x5, 0x0) pipe2(&(0x7f0000000240), 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000200)={0x0, 0x0, 0x6, 0x200000}, 0x10) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000900)) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2f5}], 0x30}, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000004700)=[{0x0}, {&(0x7f00000023c0)=""/49, 0x31}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3, &(0x7f0000004780)=""/245, 0xf5}, 0xba02000000000000}], 0x1, 0x0, &(0x7f0000008000)={0x0, 0x989680}) close(r1) lstat(&(0x7f0000000280)='./file0\x00', 0x0) r2 = syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x4100) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r2, 0x5460, &(0x7f00000002c0)={{}, {}, 0x0, 0xffffffffffffffff}) 03:35:41 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x90}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 03:35:41 executing program 5: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4000, 0x0) preadv(r0, &(0x7f0000001500)=[{0x0, 0xf0ff7f}, {&(0x7f00000003c0)=""/14, 0xe}, {&(0x7f0000001480)=""/101, 0x65}], 0x3, 0x0) 03:35:41 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8040}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x80800) r0 = socket$alg(0x26, 0x5, 0x0) pipe2(&(0x7f0000000240), 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000200)={0x0, 0x0, 0x6, 0x200000}, 0x10) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000900)) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2f5}], 0x30}, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000004700)=[{0x0}, {&(0x7f00000023c0)=""/49, 0x31}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3, &(0x7f0000004780)=""/245, 0xf5}, 0xba02000000000000}], 0x1, 0x0, &(0x7f0000008000)={0x0, 0x989680}) close(r1) lstat(&(0x7f0000000280)='./file0\x00', 0x0) r2 = syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x4100) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r2, 0x5460, &(0x7f00000002c0)={{}, {}, 0x0, 0xffffffffffffffff}) 03:35:41 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8040}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x80800) r0 = socket$alg(0x26, 0x5, 0x0) pipe2(&(0x7f0000000240), 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000200)={0x0, 0x0, 0x6, 0x200000}, 0x10) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000900)) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2f5}], 0x30}, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000004700)=[{0x0}, {&(0x7f00000023c0)=""/49, 0x31}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3, &(0x7f0000004780)=""/245, 0xf5}, 0xba02000000000000}], 0x1, 0x0, &(0x7f0000008000)={0x0, 0x989680}) close(r1) lstat(&(0x7f0000000280)='./file0\x00', 0x0) r2 = syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x4100) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r2, 0x5460, &(0x7f00000002c0)={{}, {}, 0x0, 0xffffffffffffffff}) 03:35:41 executing program 1: socket$key(0xf, 0x3, 0x2) openat$urandom(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)}, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x8, 0x9}, 0xa) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, &(0x7f0000000100)) sched_setaffinity(0x0, 0x8, &(0x7f0000000480)=0x81) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {0x0, 0x4}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x4d2, 0x33}, 0x0, @in=@broadcast, 0x0, 0x1, 0x3, 0x6, 0x4762d17e}}, 0xe8) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r0, &(0x7f0000007e00), 0x400000000000058, 0x0) 03:35:41 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000003000/0x18000)=nil, &(0x7f0000000340)=[@textreal={0x8, &(0x7f0000000040)="66b9800000c00f326635010000000f30dfb900000f018cc760ba4000ec0fc7a8d65f0fc75a0dbaa10066ed660fe7150fae4baaba2100b80020ef", 0x3a}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:35:41 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8040}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x80800) r0 = socket$alg(0x26, 0x5, 0x0) pipe2(&(0x7f0000000240), 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000200)={0x0, 0x0, 0x6, 0x200000}, 0x10) bpf$OBJ_PIN_MAP(0x6, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000900)) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2f5}], 0x30}, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000004700)=[{0x0}, {&(0x7f00000023c0)=""/49, 0x31}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3, &(0x7f0000004780)=""/245, 0xf5}, 0xba02000000000000}], 0x1, 0x0, &(0x7f0000008000)={0x0, 0x989680}) close(r1) lstat(&(0x7f0000000280)='./file0\x00', 0x0) r2 = syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x4100) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r2, 0x5460, &(0x7f00000002c0)={{}, {}, 0x0, 0xffffffffffffffff}) 03:35:41 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x29, 0x5, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f0000000180)=0xc) ioctl$TUNSETOWNER(r0, 0x400454cc, r2) 03:35:41 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f00000000c0)={'bridge0\x00\x00\x00\x00\x80\x00', &(0x7f0000000140)=@ethtool_cmd={0x11, 0x0, 0x2}}) 03:35:41 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c12a41d88b070") r1 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f00000000c0)={0x0, 0x60, "ca6e06e1a76677989b77e914a380dd66a0e1b2ac59f324d21481d6c23e62e1b3480c46c47ba6224516c1224042a322d29b255c4edd80547592575c2e04d40504ee445844607ff7797085158fd42444516a18c71efc8aff885b119e9ed85ad6c2"}, 0x0) bind$can_raw(r1, &(0x7f00000005c0), 0x10) setsockopt(r1, 0x65, 0x1, &(0x7f0000000080), 0x1d0) 03:35:41 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21}, {0xa, 0x0, 0x0, @mcast1}, r1}}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000003c0)={0x3, 0x40, 0xfa00, {{0x2, 0x4e21, 0x0, @loopback}, {0xa, 0x0, 0x0, @mcast1}, r2}}, 0x48) 03:35:41 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000080)=[{0x28, 0x0, 0x0, 0xfffff03c}, {0x80000006}]}, 0x10) 03:35:41 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000000)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000080)={0x200000000bf}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000400)={{0x80000001}}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0bc5310, &(0x7f0000000300)) r1 = gettid() timer_create(0x0, &(0x7f00000002c0)={0x0, 0x12}, &(0x7f00000001c0)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{}, {0x0, 0x1c9c380}}, 0x0) tkill(r1, 0x1000000000013) 03:35:41 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x9}], 0x30}, 0x0) write$binfmt_script(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="24bed4c50c24cf72da"], 0x9) recvmmsg(r2, &(0x7f0000004ec0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/84, 0xf}, {&(0x7f0000000780)=""/98, 0x1ac}, {&(0x7f0000000280)=""/112, 0x70}, {&(0x7f0000000340)=""/249, 0xf9}], 0x4, &(0x7f0000000440)=""/45, 0x2d}}], 0x4000000000000e9, 0x0, &(0x7f0000000640)={0x77359400}) 03:35:41 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c12a41d88b070") r1 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f00000000c0)={0x0, 0x60, "ca6e06e1a76677989b77e914a380dd66a0e1b2ac59f324d21481d6c23e62e1b3480c46c47ba6224516c1224042a322d29b255c4edd80547592575c2e04d40504ee445844607ff7797085158fd42444516a18c71efc8aff885b119e9ed85ad6c2"}, 0x0) bind$can_raw(r1, &(0x7f00000005c0), 0x10) setsockopt(r1, 0x65, 0x1, &(0x7f0000000080), 0x1d0) [ 1169.147974] net_ratelimit: 16 callbacks suppressed [ 1169.147983] protocol 88fb is buggy, dev hsr_slave_0 [ 1169.158068] protocol 88fb is buggy, dev hsr_slave_1 03:35:42 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000040)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes128\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, 0x0, 0x0) r2 = accept$alg(r1, 0x0, 0x0) recvmsg(r2, &(0x7f0000000000)={0x0, 0x349, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0x1000}], 0x1}, 0x0) 03:35:42 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)) lchown(0x0, r0, 0x0) sysfs$2(0x2, 0x8, 0x0) r1 = memfd_create(&(0x7f0000000140)='proc}GPLeth0^wlan0#:\x00', 0x0) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() socket$netlink(0x10, 0x3, 0xe) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) membarrier(0x20, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mixer\x00', 0x0, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x400001000) tkill(r2, 0x20) 03:35:42 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x0, 0x9}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x28, &(0x7f00000000c0)}, 0xffffffffffffffe7) socket$nl_xfrm(0x10, 0x3, 0x6) r1 = syz_open_procfs(0x0, 0x0) capset(&(0x7f00000003c0), 0x0) fstatfs(r1, &(0x7f0000000440)=""/100) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4001, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ptmx\x00', 0x1000000000, 0x0) r3 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, 0x0) request_key(0x0, &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)='\x00', 0x0) close(r2) syz_genetlink_get_family_id$ipvs(0x0) r4 = socket$inet6(0xa, 0xf, 0x8010000000000084) bind$inet6(r4, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f0000e33fe0)='X', 0x1, 0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0xfe7c) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xffef) sendto$inet6(0xffffffffffffffff, &(0x7f0000000200)="ad", 0x1, 0x0, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x2) personality(0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)) socket(0xfffffffc, 0x5, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={0xffffffffffffffff, &(0x7f0000000040)}, 0x10) 03:35:42 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c12a41d88b070") r1 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f00000000c0)={0x0, 0x60, "ca6e06e1a76677989b77e914a380dd66a0e1b2ac59f324d21481d6c23e62e1b3480c46c47ba6224516c1224042a322d29b255c4edd80547592575c2e04d40504ee445844607ff7797085158fd42444516a18c71efc8aff885b119e9ed85ad6c2"}, 0x0) bind$can_raw(r1, &(0x7f00000005c0), 0x10) setsockopt(r1, 0x65, 0x1, &(0x7f0000000080), 0x1d0) 03:35:42 executing program 2: r0 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x8, 0x40) ioctl$KVM_SET_DEBUGREGS(r0, 0x4080aea2, &(0x7f00000001c0)={[0x0, 0x0, 0xf000], 0x4, 0x4c}) r1 = openat(0xffffffffffffffff, 0x0, 0xa4000, 0x0) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(0xffffffffffffffff, 0x110, 0x3) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000080)) r2 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) r3 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) r4 = openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r5 = openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(r4, 0x801c581f, &(0x7f0000000340)={0x0, 0x8001, 0x34ad}) setsockopt$inet_sctp6_SCTP_NODELAY(r5, 0x84, 0x3, 0x0, 0x0) ioctl$VIDIOC_G_EDID(r5, 0xc0285628, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r6, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) accept4(r3, &(0x7f00000000c0)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @loopback}}, &(0x7f0000000140)=0x80, 0x800) listen(r6, 0x5) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) r8 = accept4(r6, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r7, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r8, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x54}, 0x98) ioctl$DRM_IOCTL_SET_MASTER(r1, 0x641e) r9 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x3) listen(r9, 0x0) syz_open_dev$sndtimer(&(0x7f0000000180)='/dev/snd/timer\x00', 0x0, 0x402000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r2, 0x0, 0x0) clone(0x802102081ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_dev$sndmidi(&(0x7f0000000000)='/dev/snd/midiC#D#\x00', 0x1, 0x200) 03:35:42 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000240)='gfs2\x00', &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a00)={[{@nosuiddir='nosuiddir'}]}) 03:35:42 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c12a41d88b070") r1 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f00000000c0)={0x0, 0x60, "ca6e06e1a76677989b77e914a380dd66a0e1b2ac59f324d21481d6c23e62e1b3480c46c47ba6224516c1224042a322d29b255c4edd80547592575c2e04d40504ee445844607ff7797085158fd42444516a18c71efc8aff885b119e9ed85ad6c2"}, 0x0) bind$can_raw(r1, &(0x7f00000005c0), 0x10) setsockopt(r1, 0x65, 0x1, &(0x7f0000000080), 0x1d0) [ 1169.476945] gfs2: not a GFS2 filesystem 03:35:42 executing program 1: r0 = signalfd(0xffffffffffffffff, &(0x7f00007b5000), 0x8) r1 = inotify_init1(0x0) fcntl$setstatus(r1, 0x4, 0x72109c5fef5d34d3) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") dup2(r0, r1) 03:35:42 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$isdn_base(0x22, 0x3, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r4, &(0x7f000026c000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 03:35:43 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000004fee)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x80084121, 0x0) 03:35:43 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c12a41d88b070") r1 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x1f, 0x0) ioctl(r1, 0xefefeef7bfffffaa, 0x0) 03:35:43 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1}, 0x0) 03:35:43 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x0, 0x9}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x28, &(0x7f00000000c0)}, 0xffffffffffffffe7) socket$nl_xfrm(0x10, 0x3, 0x6) r1 = syz_open_procfs(0x0, 0x0) capset(&(0x7f00000003c0), 0x0) fstatfs(r1, &(0x7f0000000440)=""/100) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4001, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ptmx\x00', 0x1000000000, 0x0) r3 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, 0x0) request_key(0x0, &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)='\x00', 0x0) close(r2) syz_genetlink_get_family_id$ipvs(0x0) r4 = socket$inet6(0xa, 0xf, 0x8010000000000084) bind$inet6(r4, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f0000e33fe0)='X', 0x1, 0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0xfe7c) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xffef) sendto$inet6(0xffffffffffffffff, &(0x7f0000000200)="ad", 0x1, 0x0, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x2) personality(0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)) socket(0xfffffffc, 0x5, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={0xffffffffffffffff, &(0x7f0000000040)}, 0x10) 03:35:43 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) close(r0) openat$cuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/cuse\x00', 0x121102, 0x0) io_setup(0x2005, &(0x7f0000000100)=0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000540)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000000)="10000000030000000000000000000000", 0x10}]) 03:35:43 executing program 5: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bind$bt_sco(r0, &(0x7f0000000040), 0x8) listen(r0, 0x0) ioctl$sock_SIOCINQ(r0, 0x541b, 0x0) 03:35:43 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1}, 0x0) 03:35:43 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f00000005c0)={"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"}) ioctl$KVM_SIGNAL_MSI(r1, 0x4020aea5, &(0x7f0000000040)={0x10f00d, 0x0, 0x2}) 03:35:43 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) dup3(r2, r0, 0x0) 03:35:43 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) close(r0) openat$cuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/cuse\x00', 0x121102, 0x0) io_setup(0x2005, &(0x7f0000000100)=0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000540)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000000)="10000000030000000000000000000000", 0x10}]) 03:35:43 executing program 5: r0 = memfd_create(&(0x7f0000000380)='fdin\x1f\xa2/3\x00', 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000400)="0de076c40ed8c85e6ae59b5c04ec09532228695186ac9b394578008833d761b9dad791283a657f47") preadv(0xffffffffffffffff, &(0x7f0000000480), 0x1000000000000287, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setlease(r1, 0x400, 0x1) ioctl$NBD_SET_TIMEOUT(r1, 0xab09, 0x3) syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x5e5, 0x141) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000a00)=@assoc_value, 0x0) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x100) mkdirat(r2, &(0x7f0000000140)='./bus\x00', 0x80) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) open(&(0x7f0000000080)='./bus\x00', 0x0, 0x21) setsockopt$inet_mreqsrc(r0, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r3, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x5, 0x4500000000000003, 0x2200, 0x0, 0xa0008000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xebffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./bus\x00', 0x0, 0x4002, &(0x7f0000000440)=ANY=[@ANYBLOB="2c6163636573733d636c69656e742c66736e6100653d6664696e1fa22f1c002c00b517d8572d3b177467ed3a8c2f4ae4ecd9668b2bf25e600eae4a772177639e234d3064a40796ba26bfacda4564c2aed22b13bbc0be39"]) write$RDMA_USER_CM_CMD_GET_EVENT(r3, &(0x7f0000000100)={0xc, 0x8, 0xfa00, {0x0}}, 0x10) msgget$private(0x0, 0x80) ioctl$EVIOCSFF(r2, 0x40304580, &(0x7f0000000040)={0x56, 0x0, 0x2, {0x1, 0x10000}, {0x2, 0x2}, @ramp={0x1, 0x0, {0x7fffffff, 0x7fffffff, 0x3, 0x7}}}) ioctl$TIOCSCTTY(r2, 0x540e, 0x1) 03:35:43 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x0, 0x9}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x28, &(0x7f00000000c0)}, 0xffffffffffffffe7) socket$nl_xfrm(0x10, 0x3, 0x6) r1 = syz_open_procfs(0x0, 0x0) capset(&(0x7f00000003c0), 0x0) fstatfs(r1, &(0x7f0000000440)=""/100) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4001, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ptmx\x00', 0x1000000000, 0x0) r3 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, 0x0) request_key(0x0, &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)='\x00', 0x0) close(r2) syz_genetlink_get_family_id$ipvs(0x0) r4 = socket$inet6(0xa, 0xf, 0x8010000000000084) bind$inet6(r4, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f0000e33fe0)='X', 0x1, 0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0xfe7c) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xffef) sendto$inet6(0xffffffffffffffff, &(0x7f0000000200)="ad", 0x1, 0x0, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x2) personality(0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)) socket(0xfffffffc, 0x5, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={0xffffffffffffffff, &(0x7f0000000040)}, 0x10) 03:35:43 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1}, 0x0) 03:35:43 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmsg(r1, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f00000013c0)=""/4096, 0x1000}], 0x1}, 0x0) 03:35:43 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) dup3(r2, r0, 0x0) [ 1170.728499] audit: type=1804 audit(2000000143.580:825): pid=17044 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/file0/file0/file0/file0/root/syzkaller-testdir580031397/syzkaller.IeBvJH/515/bus" dev="sda1" ino=17257 res=1 03:35:43 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) close(r0) openat$cuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/cuse\x00', 0x121102, 0x0) io_setup(0x2005, &(0x7f0000000100)=0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000540)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000000)="10000000030000000000000000000000", 0x10}]) [ 1170.894133] audit: type=1804 audit(2000000143.750:826): pid=17048 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/file0/file0/file0/file0/root/syzkaller-testdir580031397/syzkaller.IeBvJH/515/bus" dev="sda1" ino=17257 res=1 03:35:43 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_int(r0, 0x0, 0x7, &(0x7f0000000040), 0x4) 03:35:43 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x0, 0x9}, 0x2c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r0, 0x28, &(0x7f00000000c0)}, 0xffffffffffffffe7) socket$nl_xfrm(0x10, 0x3, 0x6) r1 = syz_open_procfs(0x0, 0x0) capset(&(0x7f00000003c0), 0x0) fstatfs(r1, &(0x7f0000000440)=""/100) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4001, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ptmx\x00', 0x1000000000, 0x0) r3 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, 0x0) request_key(0x0, &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)='\x00', 0x0) close(r2) syz_genetlink_get_family_id$ipvs(0x0) r4 = socket$inet6(0xa, 0xf, 0x8010000000000084) bind$inet6(r4, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f0000e33fe0)='X', 0x1, 0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0xfe7c) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xffef) sendto$inet6(0xffffffffffffffff, &(0x7f0000000200)="ad", 0x1, 0x0, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x2) personality(0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) stat(&(0x7f0000000280)='./file1\x00', &(0x7f00000002c0)) socket(0xfffffffc, 0x5, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={0xffffffffffffffff, &(0x7f0000000040)}, 0x10) 03:35:43 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f00000005c0)={"14fa7cb35e223bb1c1526ddebc2fdda406b0e96e61a5ea2db368f167a1533ddd1128389a65f4bcada1abef815982a24cbc82caf546e935513ed287a59bdda810adb72a72c8ebf4b609761785994e6cc11fb5318ae93cd0f9691aea22f238f8067ae5c703219d4307b7aa4ac19149b929efad19e41c8eb9fdfad9f33400587792a44412edab377f43fec40aae8f53743b6858578864f61c061795f36fa6014dbcce0867d8eaa122cfed8bcf5fd92283da7a917461a45839e63fabda9e419db111b06c03180c5cbf64bdff0419a2ac012be8571b7f9045a5ef7d7d7e30b9642cc061c2f7a9fa46931340076e0cb70ba054f50296840933fb0361725a4b9bb425cc71e89b93924f544d2d20a03747d2e74d98220f439320a893a41a890e9287504eb3c0e7e7452c0701b26c501f1d1925f427dc58e8080fe0961e8f865da004017094591d9e72a5c074e78d2b230fcf081442634099709b310c93e4cbd09aaf4157c8508245868b1fb6980b4f00cd5cea1ac31f0efae75bb47b9f031fbfa9fade49f595682fc20f46ef4bb5811d5c5a0c37f952335cc0fe8e0e41af7ea4f65280e3877c61b58021a95ad48fa5a9508458529ad6bafae931361b718df55cbd48aed78c870ae8aaa118a6711ea5bfcc30cf8f3edd4324f2d046f39a8bb812e736010b323a37b9d6a99a645ec23a05307109d26be17125698aab30af1ba2720598f4046bcd1e8a94ef41de6fa61edcc62fc00b8d2022ef23269cdd192ad28f741ac9863039760ba472553249863fbfd69200f284d64d7888ab43d926e98e3247776ae2b1eabd54315594720900b5cfb795ce60c4129e31176bcf29bfb97675e74d6e4cd87499ade621a9e2c2e8db01b50c30e7317ba00f1aad9cbd4f27df61ad556039bae35a167cab306d60245111d38a1e373827cc889a21423d118b962035232dc6dbe9b0247aa8811edc1a840525bf686c2b6b6aeb1d49cf99fe9d5a9cbab4324268ed9fdcb01f12f4a59e2a76fd483127eb965672369499d193af6993eee1029344836a8979cda2a4e2a6eb2913f0d294d8bff6b0d1ff8b0d85ab418f04175ed1da4417a8bdcc31a1528edba937e922ef25c88c253b91d027c7c67045524a1faa0f2c6fb8f48ad42bba5e09e702b77f8c4785981654e694636b7a7bdf90c9cb0b9dddb44c30af7cf1499768f39e6b4b281db4123fbed14ff2a2100c5299852be18ef56c19b437f5b43132119b9be8a4525dee332d0c60b9cbb6e2444fbcb9955d6f195002e99dda4c346fd1b9aa2e72fcc3f7ad0f59b3bd30124526cefa60cf94b0f8e77c950000000001000000876a460f8ce103753b1e162b8318605c7d237813a93ec56d3b8aae82e04a423222e3f552afdceb92313d6f4f00"}) ioctl$KVM_SIGNAL_MSI(r1, 0x4020aea5, &(0x7f0000000040)={0x10f00d, 0x0, 0x2}) 03:35:43 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) dup3(r2, r0, 0x0) [ 1171.021110] audit: type=1804 audit(2000000143.750:827): pid=17048 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/file0/file0/file0/file0/root/syzkaller-testdir580031397/syzkaller.IeBvJH/515/bus" dev="sda1" ino=17257 res=1 03:35:43 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) close(r0) openat$cuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/cuse\x00', 0x121102, 0x0) io_setup(0x2005, &(0x7f0000000100)=0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000540)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000000)="10000000030000000000000000000000", 0x10}]) [ 1171.071113] audit: type=1804 audit(2000000143.750:828): pid=17160 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/file0/file0/file0/file0/root/syzkaller-testdir580031397/syzkaller.IeBvJH/515/bus" dev="sda1" ino=17257 res=1 03:35:44 executing program 1: r0 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0x4}}}]}, 0x3c}}, 0x0) 03:35:44 executing program 5: r0 = memfd_create(&(0x7f0000000380)='fdin\x1f\xa2/3\x00', 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000400)="0de076c40ed8c85e6ae59b5c04ec09532228695186ac9b394578008833d761b9dad791283a657f47") preadv(0xffffffffffffffff, &(0x7f0000000480), 0x1000000000000287, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setlease(r1, 0x400, 0x1) ioctl$NBD_SET_TIMEOUT(r1, 0xab09, 0x3) syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x5e5, 0x141) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000a00)=@assoc_value, 0x0) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x100) mkdirat(r2, &(0x7f0000000140)='./bus\x00', 0x80) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) open(&(0x7f0000000080)='./bus\x00', 0x0, 0x21) setsockopt$inet_mreqsrc(r0, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r3, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x5, 0x4500000000000003, 0x2200, 0x0, 0xa0008000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xebffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./bus\x00', 0x0, 0x4002, &(0x7f0000000440)=ANY=[@ANYBLOB="2c6163636573733d636c69656e742c66736e6100653d6664696e1fa22f1c002c00b517d8572d3b177467ed3a8c2f4ae4ecd9668b2bf25e600eae4a772177639e234d3064a40796ba26bfacda4564c2aed22b13bbc0be39"]) write$RDMA_USER_CM_CMD_GET_EVENT(r3, &(0x7f0000000100)={0xc, 0x8, 0xfa00, {0x0}}, 0x10) msgget$private(0x0, 0x80) ioctl$EVIOCSFF(r2, 0x40304580, &(0x7f0000000040)={0x56, 0x0, 0x2, {0x1, 0x10000}, {0x2, 0x2}, @ramp={0x1, 0x0, {0x7fffffff, 0x7fffffff, 0x3, 0x7}}}) ioctl$TIOCSCTTY(r2, 0x540e, 0x1) [ 1171.254715] Disabled LAPIC found during irq injection 03:35:44 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) dup3(r2, r0, 0x0) 03:35:44 executing program 3: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@cache_fscache='cache=fscache'}]}}) 03:35:44 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f00000005c0)={"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"}) ioctl$KVM_SIGNAL_MSI(r1, 0x4020aea5, &(0x7f0000000040)={0x10f00d, 0x0, 0x2}) 03:35:44 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'bridge0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={&(0x7f0000000200), 0xc, &(0x7f0000000280)={&(0x7f0000000240)=@delneigh={0x28, 0x1d, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, r2, 0x0, 0xf0ffffffffffff}, [@NDA_LLADDR={0xa, 0x2, @dev}]}, 0x28}}, 0x0) 03:35:44 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = syz_open_dev$dspn(&(0x7f0000000140)='/dev/dsp#\x00', 0x80000000003, 0x0) ioctl$int_in(r1, 0x800000c0045006, &(0x7f00000000c0)=0x80000000009) ioctl$int_in(r1, 0x800000c0045002, &(0x7f0000000080)) [ 1171.525612] audit: type=1804 audit(2000000144.380:829): pid=17189 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/file0/file0/file0/file0/root/syzkaller-testdir580031397/syzkaller.IeBvJH/516/bus" dev="sda1" ino=17158 res=1 03:35:44 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) syz_open_dev$usb(0x0, 0x0, 0x0) bind$alg(r0, &(0x7f0000000b40)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) clock_gettime(0x0, &(0x7f0000000900)) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2f5}], 0x30}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000004700)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f00000023c0)=""/49, 0x31}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3}}], 0x1, 0x0, &(0x7f0000008000)={0x0, 0x989680}) [ 1171.668806] Disabled LAPIC found during irq injection 03:35:44 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x40) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, &(0x7f00000001c0)={0x0, 0xd68268a}, &(0x7f0000000200)=0x8) recvfrom$netrom(r0, &(0x7f00000024c0)=""/4096, 0x1000, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000001600)={r1, @in={{0x2, 0x4e21, @multicast1}}, 0x100, 0xb467, 0x10000, 0x2, 0x80}, 0x98) r2 = socket(0x10, 0x100000000002, 0x0) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000001700), &(0x7f0000001740)=0x3) socket$alg(0x26, 0x5, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, 0x0, 0x0) sendto$inet6(r3, &(0x7f000087dffe)='F', 0x1, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(r3, 0x0, &(0x7f00000041c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000740)={0xffffffffffffffff, r3}) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) fanotify_init(0x4, 0x8000001000) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) renameat(0xffffffffffffffff, &(0x7f0000000240)='.//ile0\x00', 0xffffffffffffffff, 0x0) setsockopt$XDP_UMEM_REG(r2, 0x11b, 0x4, &(0x7f0000000340)={&(0x7f0000003800)=""/4096, 0x23000, 0x1000, 0x5}, 0x18) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, 0x0, &(0x7f0000000300)) 03:35:44 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f00000005c0)={"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"}) ioctl$KVM_SIGNAL_MSI(r1, 0x4020aea5, &(0x7f0000000040)={0x10f00d, 0x0, 0x2}) 03:35:44 executing program 5: r0 = memfd_create(&(0x7f0000000380)='fdin\x1f\xa2/3\x00', 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000400)="0de076c40ed8c85e6ae59b5c04ec09532228695186ac9b394578008833d761b9dad791283a657f47") preadv(0xffffffffffffffff, &(0x7f0000000480), 0x1000000000000287, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setlease(r1, 0x400, 0x1) ioctl$NBD_SET_TIMEOUT(r1, 0xab09, 0x3) syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x5e5, 0x141) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000a00)=@assoc_value, 0x0) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x100) mkdirat(r2, &(0x7f0000000140)='./bus\x00', 0x80) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) open(&(0x7f0000000080)='./bus\x00', 0x0, 0x21) setsockopt$inet_mreqsrc(r0, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r3, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x5, 0x4500000000000003, 0x2200, 0x0, 0xa0008000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xebffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./bus\x00', 0x0, 0x4002, &(0x7f0000000440)=ANY=[@ANYBLOB="2c6163636573733d636c69656e742c66736e6100653d6664696e1fa22f1c002c00b517d8572d3b177467ed3a8c2f4ae4ecd9668b2bf25e600eae4a772177639e234d3064a40796ba26bfacda4564c2aed22b13bbc0be39"]) write$RDMA_USER_CM_CMD_GET_EVENT(r3, &(0x7f0000000100)={0xc, 0x8, 0xfa00, {0x0}}, 0x10) msgget$private(0x0, 0x80) ioctl$EVIOCSFF(r2, 0x40304580, &(0x7f0000000040)={0x56, 0x0, 0x2, {0x1, 0x10000}, {0x2, 0x2}, @ramp={0x1, 0x0, {0x7fffffff, 0x7fffffff, 0x3, 0x7}}}) ioctl$TIOCSCTTY(r2, 0x540e, 0x1) 03:35:44 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) syz_open_dev$usb(0x0, 0x0, 0x0) bind$alg(r0, &(0x7f0000000b40)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) clock_gettime(0x0, &(0x7f0000000900)) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2f5}], 0x30}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000004700)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f00000023c0)=""/49, 0x31}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3}}], 0x1, 0x0, &(0x7f0000008000)={0x0, 0x989680}) 03:35:44 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) syz_open_dev$usb(0x0, 0x0, 0x0) bind$alg(r0, &(0x7f0000000b40)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) clock_gettime(0x0, &(0x7f0000000900)) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2f5}], 0x30}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000004700)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f00000023c0)=""/49, 0x31}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3}}], 0x1, 0x0, &(0x7f0000008000)={0x0, 0x989680}) [ 1171.950609] Disabled LAPIC found during irq injection 03:35:44 executing program 3: openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x800, 0x111) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, &(0x7f0000000600), 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000680)={0xa, 0x0, 0x0, @dev, 0x7}, 0x293) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x200000, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r3, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f00000002c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000640)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f0000000480), 0x4) getegid() ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4004240b, &(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10200, 0x0, 0x2, 0x799, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x3, 0x0, 0x4f20fb6f, 0x1, 0x3, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x4, 0x10000, 0x0, 0x3, 0x0, @perf_config_ext={0x1, 0x9}, 0x0, 0x3, 0x0, 0x3, 0x0, 0x800, 0x1ff}) ioctl$sock_ifreq(0xffffffffffffffff, 0x8924, &(0x7f0000000000)={'bridge0\x00', @ifru_settings={0x1, 0x8, @fr_pvc=0x0}}) memfd_create(&(0x7f00000001c0)='\x00\xa5s\xa1\x12\xb4\x9e\xcf\xebW\x83\x80\x7f\v]\xa0\xc4\xf8\xd7\xedxo\r\xe8\xff\xeb\xdf:W\xe5\x19*9\xaf\xa8\xdc\f\xd4\xec\xc3\xd1\xef\xd39\x82\xb6\xd2\xa2\xebPi+\xd7\x0f[\xa0\x9b\x05\x0f\xed\xdf\xe6V0\xf1\xe2\x81\xf6^`\x97F\xe7\xaf\xaa\xd32\r\x00\x00\xe8ov\xaf\"q3\xbd\x01\r._\x15\xed\x9c\xaeOm', 0x2) syz_read_part_table(0x0, 0x1, &(0x7f0000001340)=[{&(0x7f0000000180)="f231de1502d7e7d1c5c68df4213be4f1a6e6b2558d96a2448e8c79abe5bac64d788f51aa326bf229ae2b24aac1b6221a52a315cf414e77d7b88d4cc02362f7979fc9fd5bb41684b08eb23271c9a0bdfbce7c08ca864bb4262237680c031471deeecb2685df3fb430622dacc4c6b0a64736de5afd7eb0a4f430328334bae0a85aeb5dfa2b4be5193ab0fd6c9497bd3cfdc81f604cb9c3182f0d269cc3a2a8762b4d18129c8839a438dc95effd7284dff2679658dd2d0bba7e3f70d3a3542eb8ab1e665c2188ece83419438073b5c4e3a03504127c09ed9c683ad7a32081519749db3aed8b2c0de6621edd9feeb089c17a66ed366efd1e195ec2ff7be677de2e71d5b3ed14d1171769036360422c630de9145c7f309f0f07be1c0558867bcc6a6f529e16053577f3c886518ef98d0721b380a22b70032e3202a2e6bfcd", 0x13c, 0x7}]) 03:35:44 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) syz_open_dev$usb(0x0, 0x0, 0x0) bind$alg(r0, &(0x7f0000000b40)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) clock_gettime(0x0, &(0x7f0000000900)) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2f5}], 0x30}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000004700)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f00000023c0)=""/49, 0x31}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3}}], 0x1, 0x0, &(0x7f0000008000)={0x0, 0x989680}) 03:35:44 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) syz_open_dev$usb(0x0, 0x0, 0x0) bind$alg(r0, &(0x7f0000000b40)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) clock_gettime(0x0, &(0x7f0000000900)) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2f5}], 0x30}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000004700)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f00000023c0)=""/49, 0x31}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3}}], 0x1, 0x0, &(0x7f0000008000)={0x0, 0x989680}) [ 1172.038672] audit: type=1804 audit(2000000144.900:830): pid=17234 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/file0/file0/file0/file0/root/syzkaller-testdir580031397/syzkaller.IeBvJH/517/bus" dev="sda1" ino=17208 res=1 03:35:44 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x40) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, &(0x7f00000001c0)={0x0, 0xd68268a}, &(0x7f0000000200)=0x8) recvfrom$netrom(r0, &(0x7f00000024c0)=""/4096, 0x1000, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000001600)={r1, @in={{0x2, 0x4e21, @multicast1}}, 0x100, 0xb467, 0x10000, 0x2, 0x80}, 0x98) r2 = socket(0x10, 0x100000000002, 0x0) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000001700), &(0x7f0000001740)=0x3) socket$alg(0x26, 0x5, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, 0x0, 0x0) sendto$inet6(r3, &(0x7f000087dffe)='F', 0x1, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(r3, 0x0, &(0x7f00000041c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000740)={0xffffffffffffffff, r3}) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) fanotify_init(0x4, 0x8000001000) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) renameat(0xffffffffffffffff, &(0x7f0000000240)='.//ile0\x00', 0xffffffffffffffff, 0x0) setsockopt$XDP_UMEM_REG(r2, 0x11b, 0x4, &(0x7f0000000340)={&(0x7f0000003800)=""/4096, 0x23000, 0x1000, 0x5}, 0x18) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, 0x0, &(0x7f0000000300)) [ 1172.082179] audit: type=1804 audit(2000000144.920:831): pid=17227 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/file0/file0/file0/file0/root/syzkaller-testdir580031397/syzkaller.IeBvJH/517/bus" dev="sda1" ino=17208 res=1 03:35:45 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0xffd2) unlink(0x0) get_mempolicy(&(0x7f0000000040), &(0x7f0000000100), 0xffffffffffffffff, &(0x7f0000ffd000/0x1000)=nil, 0x2) 03:35:45 executing program 5: r0 = memfd_create(&(0x7f0000000380)='fdin\x1f\xa2/3\x00', 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000400)="0de076c40ed8c85e6ae59b5c04ec09532228695186ac9b394578008833d761b9dad791283a657f47") preadv(0xffffffffffffffff, &(0x7f0000000480), 0x1000000000000287, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setlease(r1, 0x400, 0x1) ioctl$NBD_SET_TIMEOUT(r1, 0xab09, 0x3) syz_open_dev$usb(&(0x7f0000000200)='/dev/bus/usb/00#/00#\x00', 0x5e5, 0x141) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000a00)=@assoc_value, 0x0) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x100) mkdirat(r2, &(0x7f0000000140)='./bus\x00', 0x80) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) open(&(0x7f0000000080)='./bus\x00', 0x0, 0x21) setsockopt$inet_mreqsrc(r0, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r3, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x5, 0x4500000000000003, 0x2200, 0x0, 0xa0008000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xebffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000240)='./bus\x00', 0x0, 0x4002, &(0x7f0000000440)=ANY=[@ANYBLOB="2c6163636573733d636c69656e742c66736e6100653d6664696e1fa22f1c002c00b517d8572d3b177467ed3a8c2f4ae4ecd9668b2bf25e600eae4a772177639e234d3064a40796ba26bfacda4564c2aed22b13bbc0be39"]) write$RDMA_USER_CM_CMD_GET_EVENT(r3, &(0x7f0000000100)={0xc, 0x8, 0xfa00, {0x0}}, 0x10) msgget$private(0x0, 0x80) ioctl$EVIOCSFF(r2, 0x40304580, &(0x7f0000000040)={0x56, 0x0, 0x2, {0x1, 0x10000}, {0x2, 0x2}, @ramp={0x1, 0x0, {0x7fffffff, 0x7fffffff, 0x3, 0x7}}}) ioctl$TIOCSCTTY(r2, 0x540e, 0x1) 03:35:45 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0xffd2) unlink(0x0) get_mempolicy(&(0x7f0000000040), &(0x7f0000000100), 0xffffffffffffffff, &(0x7f0000ffd000/0x1000)=nil, 0x2) 03:35:45 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) syz_open_dev$usb(0x0, 0x0, 0x0) bind$alg(r0, &(0x7f0000000b40)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) clock_gettime(0x0, &(0x7f0000000900)) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2f5}], 0x30}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000004700)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f00000023c0)=""/49, 0x31}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3}}], 0x1, 0x0, &(0x7f0000008000)={0x0, 0x989680}) 03:35:45 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) syz_open_dev$usb(0x0, 0x0, 0x0) bind$alg(r0, &(0x7f0000000b40)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) clock_gettime(0x0, &(0x7f0000000900)) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2f5}], 0x30}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000007e00)=[{{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000004700)=[{&(0x7f00000012c0)=""/167, 0xa7}, {&(0x7f00000023c0)=""/49, 0x31}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3}}], 0x1, 0x0, &(0x7f0000008000)={0x0, 0x989680}) [ 1172.437587] __loop_clr_fd: partition scan of loop3 failed (rc=-22) 03:35:45 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x40) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, &(0x7f00000001c0)={0x0, 0xd68268a}, &(0x7f0000000200)=0x8) recvfrom$netrom(r0, &(0x7f00000024c0)=""/4096, 0x1000, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000001600)={r1, @in={{0x2, 0x4e21, @multicast1}}, 0x100, 0xb467, 0x10000, 0x2, 0x80}, 0x98) r2 = socket(0x10, 0x100000000002, 0x0) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000001700), &(0x7f0000001740)=0x3) socket$alg(0x26, 0x5, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, 0x0, 0x0) sendto$inet6(r3, &(0x7f000087dffe)='F', 0x1, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(r3, 0x0, &(0x7f00000041c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000740)={0xffffffffffffffff, r3}) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) fanotify_init(0x4, 0x8000001000) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) renameat(0xffffffffffffffff, &(0x7f0000000240)='.//ile0\x00', 0xffffffffffffffff, 0x0) setsockopt$XDP_UMEM_REG(r2, 0x11b, 0x4, &(0x7f0000000340)={&(0x7f0000003800)=""/4096, 0x23000, 0x1000, 0x5}, 0x18) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, 0x0, &(0x7f0000000300)) [ 1172.552104] audit: type=1804 audit(2000000145.410:832): pid=17260 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/file0/file0/file0/file0/root/syzkaller-testdir580031397/syzkaller.IeBvJH/518/bus" dev="sda1" ino=17174 res=1 03:35:45 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0xffd2) unlink(0x0) get_mempolicy(&(0x7f0000000040), &(0x7f0000000100), 0xffffffffffffffff, &(0x7f0000ffd000/0x1000)=nil, 0x2) 03:35:45 executing program 4: pipe(&(0x7f0000000080)) write(0xffffffffffffffff, &(0x7f00000001c0), 0xffffffea) r0 = socket(0x40000000015, 0x805, 0x0) bind$inet(r0, &(0x7f00000a9000)={0x2, 0x1, @loopback}, 0x10) [ 1172.738387] __loop_clr_fd: partition scan of loop3 failed (rc=-22) 03:35:45 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xa, &(0x7f0000000040)=0x1, 0x4) poll(&(0x7f0000000000)=[{r0}], 0x1, 0x0) 03:35:45 executing program 0: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000080)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0xffffff84, 0x0, @local, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) geteuid() bpf$OBJ_GET_PROG(0x7, &(0x7f0000000700)={&(0x7f0000000340)='./file0\x00'}, 0x10) syz_kvm_setup_cpu$x86(r0, r1, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000180)="0f00db670f01df66b8000000000f23d80f21f86635400000f00f23f80f09b800008ee00f009a00000f212b0f01c30f21b00f1af9", 0x34}], 0x6c, 0x10, &(0x7f0000000040), 0x0) 03:35:45 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000fc7000)={0x5, 0x2, 0x4000000000080, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={r0, &(0x7f0000fcbfff)='X', 0x0}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x13, 0xe, 0x1f) setsockopt$inet6_udp_int(r1, 0x11, 0x6e, &(0x7f0000000200)=0x4, 0x4) ftruncate(0xffffffffffffffff, 0x7fff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r0, &(0x7f0000000040)="81e2431c239564e4f85210693a5d016436f9e188f6866020346b7b072be039e9ce4b6df0bbea21bff31a", 0x0}, 0x18) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000001300)=""/4096) fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000140)={0x5c10, 0x1f}) fremovexattr(r2, &(0x7f00000000c0)=@known='user.syz\x00') bpf$MAP_UPDATE_ELEM(0x2, &(0x7f000051e000)={r0, &(0x7f0000fc5000), 0x0}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={r0, &(0x7f0000f4d000), 0x0}, 0x18) 03:35:45 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0xffd2) unlink(0x0) get_mempolicy(&(0x7f0000000040), &(0x7f0000000100), 0xffffffffffffffff, &(0x7f0000ffd000/0x1000)=nil, 0x2) 03:35:45 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x40) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, &(0x7f00000001c0)={0x0, 0xd68268a}, &(0x7f0000000200)=0x8) recvfrom$netrom(r0, &(0x7f00000024c0)=""/4096, 0x1000, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000001600)={r1, @in={{0x2, 0x4e21, @multicast1}}, 0x100, 0xb467, 0x10000, 0x2, 0x80}, 0x98) r2 = socket(0x10, 0x100000000002, 0x0) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000001700), &(0x7f0000001740)=0x3) socket$alg(0x26, 0x5, 0x0) syz_mount_image$msdos(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, 0x0, 0x0) sendto$inet6(r3, &(0x7f000087dffe)='F', 0x1, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(r3, 0x0, &(0x7f00000041c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000740)={0xffffffffffffffff, r3}) writev(0xffffffffffffffff, &(0x7f0000000000), 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) fanotify_init(0x4, 0x8000001000) mkdirat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) renameat(0xffffffffffffffff, &(0x7f0000000240)='.//ile0\x00', 0xffffffffffffffff, 0x0) setsockopt$XDP_UMEM_REG(r2, 0x11b, 0x4, &(0x7f0000000340)={&(0x7f0000003800)=""/4096, 0x23000, 0x1000, 0x5}, 0x18) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, 0x0, &(0x7f0000000300)) 03:35:45 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r2) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3}, 0x2c) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f00000000c0), 0x100000192) 03:35:45 executing program 0: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000080)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0xffffff84, 0x0, @local, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) geteuid() bpf$OBJ_GET_PROG(0x7, &(0x7f0000000700)={&(0x7f0000000340)='./file0\x00'}, 0x10) syz_kvm_setup_cpu$x86(r0, r1, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000180)="0f00db670f01df66b8000000000f23d80f21f86635400000f00f23f80f09b800008ee00f009a00000f212b0f01c30f21b00f1af9", 0x34}], 0x6c, 0x10, &(0x7f0000000040), 0x0) 03:35:45 executing program 3: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r0, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1000}], 0x1) 03:35:46 executing program 2: syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[{@codepage={'codepage', 0x3d, 'iso8859-4'}}, {@codepage={'codepage', 0x3d, 'iso8859-5'}}]}) 03:35:46 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000fc7000)={0x5, 0x2, 0x4000000000080, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={r0, &(0x7f0000fcbfff)='X', 0x0}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x13, 0xe, 0x1f) setsockopt$inet6_udp_int(r1, 0x11, 0x6e, &(0x7f0000000200)=0x4, 0x4) ftruncate(0xffffffffffffffff, 0x7fff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r0, &(0x7f0000000040)="81e2431c239564e4f85210693a5d016436f9e188f6866020346b7b072be039e9ce4b6df0bbea21bff31a", 0x0}, 0x18) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000001300)=""/4096) fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000140)={0x5c10, 0x1f}) fremovexattr(r2, &(0x7f00000000c0)=@known='user.syz\x00') bpf$MAP_UPDATE_ELEM(0x2, &(0x7f000051e000)={r0, &(0x7f0000fc5000), 0x0}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={r0, &(0x7f0000f4d000), 0x0}, 0x18) 03:35:46 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x4) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c2d023c126285718070") bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x3, 0x16, &(0x7f0000000140)=ANY=[@ANYBLOB="61124c000000000061138c0000000000bf2000000000000045000000080000003d0301000000000095000000000000006916000000000000bf67000000000000570600000f0000006706000002000000070600000ee60000bf050000000000001f650000000000006707000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffbd43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 03:35:46 executing program 0: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000080)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0xffffff84, 0x0, @local, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) geteuid() bpf$OBJ_GET_PROG(0x7, &(0x7f0000000700)={&(0x7f0000000340)='./file0\x00'}, 0x10) syz_kvm_setup_cpu$x86(r0, r1, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000180)="0f00db670f01df66b8000000000f23d80f21f86635400000f00f23f80f09b800008ee00f009a00000f212b0f01c30f21b00f1af9", 0x34}], 0x6c, 0x10, &(0x7f0000000040), 0x0) 03:35:46 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0x0) 03:35:46 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x5) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000080)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000040)='hsr0\x00', 0x10) r2 = accept(r0, 0x0, 0x0) write$binfmt_misc(r2, &(0x7f0000000000)=ANY=[@ANYBLOB='s'], 0x1) 03:35:46 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000fc7000)={0x5, 0x2, 0x4000000000080, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={r0, &(0x7f0000fcbfff)='X', 0x0}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x13, 0xe, 0x1f) setsockopt$inet6_udp_int(r1, 0x11, 0x6e, &(0x7f0000000200)=0x4, 0x4) ftruncate(0xffffffffffffffff, 0x7fff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r0, &(0x7f0000000040)="81e2431c239564e4f85210693a5d016436f9e188f6866020346b7b072be039e9ce4b6df0bbea21bff31a", 0x0}, 0x18) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000001300)=""/4096) fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000140)={0x5c10, 0x1f}) fremovexattr(r2, &(0x7f00000000c0)=@known='user.syz\x00') bpf$MAP_UPDATE_ELEM(0x2, &(0x7f000051e000)={r0, &(0x7f0000fc5000), 0x0}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={r0, &(0x7f0000f4d000), 0x0}, 0x18) 03:35:46 executing program 0: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000080)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0xffffff84, 0x0, @local, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) geteuid() bpf$OBJ_GET_PROG(0x7, &(0x7f0000000700)={&(0x7f0000000340)='./file0\x00'}, 0x10) syz_kvm_setup_cpu$x86(r0, r1, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000180)="0f00db670f01df66b8000000000f23d80f21f86635400000f00f23f80f09b800008ee00f009a00000f212b0f01c30f21b00f1af9", 0x34}], 0x6c, 0x10, &(0x7f0000000040), 0x0) 03:35:46 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0x0) 03:35:46 executing program 3: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r0, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1000}], 0x1) 03:35:46 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x40}) read(r0, &(0x7f0000000000)=""/128, 0x80) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000004fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1e, 0x8031, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f00000003c0)={{&(0x7f0000ffb000/0x3000)=nil, 0x3000}, 0x1}) socketpair$unix(0x1, 0x0, 0x0, 0x0) 03:35:46 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000fc7000)={0x5, 0x2, 0x4000000000080, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000fcb000)={r0, &(0x7f0000fcbfff)='X', 0x0}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x13, 0xe, 0x1f) setsockopt$inet6_udp_int(r1, 0x11, 0x6e, &(0x7f0000000200)=0x4, 0x4) ftruncate(0xffffffffffffffff, 0x7fff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000d83ff8)=0x13, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r0, &(0x7f0000000040)="81e2431c239564e4f85210693a5d016436f9e188f6866020346b7b072be039e9ce4b6df0bbea21bff31a", 0x0}, 0x18) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net\x00') shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000001300)=""/4096) fsetxattr(r2, &(0x7f0000000280)=@known='user.syz\x00', &(0x7f00000002c0)='\x00', 0x398, 0x0) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000140)={0x5c10, 0x1f}) fremovexattr(r2, &(0x7f00000000c0)=@known='user.syz\x00') bpf$MAP_UPDATE_ELEM(0x2, &(0x7f000051e000)={r0, &(0x7f0000fc5000), 0x0}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000dc3000)={r0, &(0x7f0000f4d000), 0x0}, 0x18) 03:35:46 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0x0) 03:35:46 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x89b0, &(0x7f00000000c0)={'veth1_to_bond\x00', 0x0}) close(r2) close(r1) 03:35:46 executing program 2: getsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, 0x0, &(0x7f0000000280)) ioctl$VIDIOC_TRY_DECODER_CMD(0xffffffffffffffff, 0x8004550f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, &(0x7f0000000000), 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0), 0x4) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000340)=""/113) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x10, 0xa00}, 0xc, &(0x7f00000001c0)={&(0x7f00000005c0)=@newlink={0x34, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f0000000080)={0xfe08}, 0x351b21c22502589) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f00000000c0)) getsockname$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs, &(0x7f0000000140)=0x6e) 03:35:46 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) mlock2(&(0x7f0000318000/0x1000)=nil, 0x1000, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) bind$tipc(0xffffffffffffffff, 0x0, 0x0) 03:35:46 executing program 3: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r0, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1000}], 0x1) 03:35:46 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0x0) 03:35:46 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x89b0, &(0x7f00000000c0)={'veth1_to_bond\x00', 0x0}) close(r2) close(r1) 03:35:46 executing program 5: splice(0xffffffffffffffff, &(0x7f0000000140), 0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) creat(&(0x7f0000000280)='./bus\x00', 0x800000000000000) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r3 = accept4$alg(r2, 0x0, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0xfffffdea) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) r4 = open(&(0x7f00000000c0)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r4, 0x0) 03:35:47 executing program 3: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r0, &(0x7f0000000300)=[{&(0x7f0000001400)=""/4096, 0x1000}], 0x1) 03:35:47 executing program 1: r0 = socket(0xa, 0x1, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bond_slave_0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000b80)=@deltclass={0x24, 0x29, 0x201, 0x0, 0x0, {0x0, r2, {}, {0xffff, 0xffff}}}, 0x24}}, 0x0) 03:35:47 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, &(0x7f0000002000)={0x0, 0x0, &(0x7f0000001fc0)={&(0x7f0000001f80)={0x1c, 0x0, 0x100, 0x70bd2c}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)) sendmsg$NBD_CMD_STATUS(r0, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) stat(0x0, 0x0) 03:35:47 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x89b0, &(0x7f00000000c0)={'veth1_to_bond\x00', 0x0}) close(r2) close(r1) 03:35:47 executing program 5: splice(0xffffffffffffffff, &(0x7f0000000140), 0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) creat(&(0x7f0000000280)='./bus\x00', 0x800000000000000) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r3 = accept4$alg(r2, 0x0, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0xfffffdea) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) r4 = open(&(0x7f00000000c0)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r4, 0x0) 03:35:47 executing program 3: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128l-generic\x00'}, 0x58) vmsplice(r1, &(0x7f0000001600)=[{&(0x7f0000000440)="62f56b8de134341d5bcfad84a07869dd", 0x10}], 0x1, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea5400c2", 0x10) splice(r0, 0x0, r3, 0x0, 0x1ea71, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) recvfrom$netrom(r3, &(0x7f0000001640)=""/4096, 0x1000, 0x0, 0x0, 0x0) 03:35:47 executing program 2: getsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, 0x0, &(0x7f0000000280)) ioctl$VIDIOC_TRY_DECODER_CMD(0xffffffffffffffff, 0x8004550f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, &(0x7f0000000000), 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0), 0x4) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000340)=""/113) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x10, 0xa00}, 0xc, &(0x7f00000001c0)={&(0x7f00000005c0)=@newlink={0x34, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f0000000080)={0xfe08}, 0x351b21c22502589) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f00000000c0)) getsockname$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs, &(0x7f0000000140)=0x6e) 03:35:47 executing program 1: r0 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r0, &(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x300, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x32) 03:35:47 executing program 3: getsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, 0x0, &(0x7f0000000280)) ioctl$VIDIOC_TRY_DECODER_CMD(0xffffffffffffffff, 0x8004550f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, &(0x7f0000000000), 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0), 0x4) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000340)=""/113) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x10, 0xa00}, 0xc, &(0x7f00000001c0)={&(0x7f00000005c0)=@newlink={0x34, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f0000000080)={0xfe08}, 0x351b21c22502589) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f00000000c0)) getsockname$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs, &(0x7f0000000140)=0x6e) 03:35:48 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x89b0, &(0x7f00000000c0)={'veth1_to_bond\x00', 0x0}) close(r2) close(r1) 03:35:48 executing program 1: getsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, 0x0, &(0x7f0000000280)) ioctl$VIDIOC_TRY_DECODER_CMD(0xffffffffffffffff, 0x8004550f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, &(0x7f0000000000), 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0), 0x4) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000340)=""/113) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x10, 0xa00}, 0xc, &(0x7f00000001c0)={&(0x7f00000005c0)=@newlink={0x34, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f0000000080)={0xfe08}, 0x351b21c22502589) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f00000000c0)) getsockname$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs, &(0x7f0000000140)=0x6e) 03:35:48 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, &(0x7f0000002000)={0x0, 0x0, &(0x7f0000001fc0)={&(0x7f0000001f80)={0x1c, 0x0, 0x100, 0x70bd2c}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)) sendmsg$NBD_CMD_STATUS(r0, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) stat(0x0, 0x0) 03:35:48 executing program 5: splice(0xffffffffffffffff, &(0x7f0000000140), 0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) creat(&(0x7f0000000280)='./bus\x00', 0x800000000000000) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r3 = accept4$alg(r2, 0x0, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0xfffffdea) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) r4 = open(&(0x7f00000000c0)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r4, 0x0) 03:35:48 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, &(0x7f0000002000)={0x0, 0x0, &(0x7f0000001fc0)={&(0x7f0000001f80)={0x1c, 0x0, 0x100, 0x70bd2c}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)) sendmsg$NBD_CMD_STATUS(r0, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) stat(0x0, 0x0) 03:35:48 executing program 5: splice(0xffffffffffffffff, &(0x7f0000000140), 0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) creat(&(0x7f0000000280)='./bus\x00', 0x800000000000000) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r3 = accept4$alg(r2, 0x0, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0xfffffdea) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) r4 = open(&(0x7f00000000c0)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r4, 0x0) 03:35:48 executing program 2: getsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, 0x0, &(0x7f0000000280)) ioctl$VIDIOC_TRY_DECODER_CMD(0xffffffffffffffff, 0x8004550f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, &(0x7f0000000000), 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0), 0x4) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000340)=""/113) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x10, 0xa00}, 0xc, &(0x7f00000001c0)={&(0x7f00000005c0)=@newlink={0x34, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f0000000080)={0xfe08}, 0x351b21c22502589) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f00000000c0)) getsockname$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs, &(0x7f0000000140)=0x6e) 03:35:48 executing program 3: getsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, 0x0, &(0x7f0000000280)) ioctl$VIDIOC_TRY_DECODER_CMD(0xffffffffffffffff, 0x8004550f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, &(0x7f0000000000), 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0), 0x4) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000340)=""/113) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x10, 0xa00}, 0xc, &(0x7f00000001c0)={&(0x7f00000005c0)=@newlink={0x34, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f0000000080)={0xfe08}, 0x351b21c22502589) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f00000000c0)) getsockname$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs, &(0x7f0000000140)=0x6e) 03:35:48 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, &(0x7f0000002000)={0x0, 0x0, &(0x7f0000001fc0)={&(0x7f0000001f80)={0x1c, 0x0, 0x100, 0x70bd2c}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)) sendmsg$NBD_CMD_STATUS(r0, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) stat(0x0, 0x0) 03:35:48 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, &(0x7f0000002000)={0x0, 0x0, &(0x7f0000001fc0)={&(0x7f0000001f80)={0x1c, 0x0, 0x100, 0x70bd2c}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)) sendmsg$NBD_CMD_STATUS(r0, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) stat(0x0, 0x0) 03:35:48 executing program 0: bind$bt_l2cap(0xffffffffffffffff, &(0x7f00000001c0), 0xe) fcntl$getown(0xffffffffffffffff, 0x9) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x0) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000180)=""/217, 0x20000259}], 0x1) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) socket$inet6(0xa, 0x80807, 0x1f) 03:35:48 executing program 1: getsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, 0x0, &(0x7f0000000280)) ioctl$VIDIOC_TRY_DECODER_CMD(0xffffffffffffffff, 0x8004550f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, &(0x7f0000000000), 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0), 0x4) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000340)=""/113) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x10, 0xa00}, 0xc, &(0x7f00000001c0)={&(0x7f00000005c0)=@newlink={0x34, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f0000000080)={0xfe08}, 0x351b21c22502589) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f00000000c0)) getsockname$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs, &(0x7f0000000140)=0x6e) 03:35:49 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000680)={0xa, 0x0, 0x0, @dev, 0x7}, 0x293) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x13, r3, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4004240b, 0x0) syz_read_part_table(0x0, 0x0, 0x0) 03:35:49 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, &(0x7f0000002000)={0x0, 0x0, &(0x7f0000001fc0)={&(0x7f0000001f80)={0x1c, 0x0, 0x100, 0x70bd2c}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)) sendmsg$NBD_CMD_STATUS(r0, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) stat(0x0, 0x0) 03:35:49 executing program 2: getsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, 0x0, &(0x7f0000000280)) ioctl$VIDIOC_TRY_DECODER_CMD(0xffffffffffffffff, 0x8004550f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, &(0x7f0000000000), 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0), 0x4) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000340)=""/113) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x10, 0xa00}, 0xc, &(0x7f00000001c0)={&(0x7f00000005c0)=@newlink={0x34, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f0000000080)={0xfe08}, 0x351b21c22502589) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f00000000c0)) getsockname$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs, &(0x7f0000000140)=0x6e) 03:35:49 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, &(0x7f0000002000)={0x0, 0x0, &(0x7f0000001fc0)={&(0x7f0000001f80)={0x1c, 0x0, 0x100, 0x70bd2c}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)) sendmsg$NBD_CMD_STATUS(r0, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) stat(0x0, 0x0) 03:35:49 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000680)={0xa, 0x0, 0x0, @dev, 0x7}, 0x293) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x13, r3, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4004240b, 0x0) syz_read_part_table(0x0, 0x0, 0x0) 03:35:49 executing program 3: getsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, 0x0, &(0x7f0000000280)) ioctl$VIDIOC_TRY_DECODER_CMD(0xffffffffffffffff, 0x8004550f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, &(0x7f0000000000), 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0), 0x4) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000340)=""/113) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x10, 0xa00}, 0xc, &(0x7f00000001c0)={&(0x7f00000005c0)=@newlink={0x34, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f0000000080)={0xfe08}, 0x351b21c22502589) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f00000000c0)) getsockname$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs, &(0x7f0000000140)=0x6e) 03:35:49 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000680)={0xa, 0x0, 0x0, @dev, 0x7}, 0x293) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x13, r3, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4004240b, 0x0) syz_read_part_table(0x0, 0x0, 0x0) 03:35:49 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000680)={0xa, 0x0, 0x0, @dev, 0x7}, 0x293) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x13, r3, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4004240b, 0x0) syz_read_part_table(0x0, 0x0, 0x0) 03:35:50 executing program 1: getsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, 0x0, &(0x7f0000000280)) ioctl$VIDIOC_TRY_DECODER_CMD(0xffffffffffffffff, 0x8004550f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, &(0x7f0000000000), 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000002c0), 0x4) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000340)=""/113) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x10, 0xa00}, 0xc, &(0x7f00000001c0)={&(0x7f00000005c0)=@newlink={0x34, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) write$P9_RLINK(0xffffffffffffffff, &(0x7f0000000080)={0xfe08}, 0x351b21c22502589) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f00000000c0)) getsockname$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs, &(0x7f0000000140)=0x6e) 03:35:50 executing program 0: bind$bt_l2cap(0xffffffffffffffff, &(0x7f00000001c0), 0xe) fcntl$getown(0xffffffffffffffff, 0x9) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x0) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000180)=""/217, 0x20000259}], 0x1) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) socket$inet6(0xa, 0x80807, 0x1f) 03:35:50 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000680)={0xa, 0x0, 0x0, @dev, 0x7}, 0x293) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x13, r3, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4004240b, 0x0) syz_read_part_table(0x0, 0x0, 0x0) 03:35:50 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000680)={0xa, 0x0, 0x0, @dev, 0x7}, 0x293) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x13, r3, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4004240b, 0x0) syz_read_part_table(0x0, 0x0, 0x0) 03:35:50 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000680)={0xa, 0x0, 0x0, @dev, 0x7}, 0x293) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x13, r3, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4004240b, 0x0) syz_read_part_table(0x0, 0x0, 0x0) 03:35:50 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r2, 0x4010ae67, &(0x7f0000000100)={0x0, 0x100000}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000040)=ANY=[@ANYBLOB="0f6f5a"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000028000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_RUN(r3, 0xae80, 0x0) 03:35:50 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$VHOST_GET_FEATURES(r1, 0x80304d65, &(0x7f0000000340)) 03:35:50 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000002c0)={0x0, 0x0, 0x9}, 0x0) getpgrp(0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={0x0, r1, 0x0, 0x7, &(0x7f0000000300)='$\'self\x00', 0xffffffffffffffff}, 0x30) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f00000004c0)=0x0) r4 = syz_open_procfs(r3, &(0x7f0000000740)='net/dev\x00') fcntl$setstatus(r4, 0x4, 0x14400) mprotect(&(0x7f0000107000/0x2000)=nil, 0x2000, 0xfffffffffffffff9) poll(&(0x7f0000000400)=[{r1, 0x1}, {}, {}], 0x3, 0x8) pread64(r4, &(0x7f0000003c00)=""/4096, 0xffffff72, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], &(0x7f0000000340)=""/144, 0x90) ioctl$KVM_IRQ_LINE(r4, 0x4008ae61, &(0x7f0000000000)={0x0, 0x9}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00', r2}, 0x10) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000640)=[{0x0, 0x0, 0x0}], 0x1, 0x4010) r5 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000180)={0x0, 0x40000001, 0x1000000006, 0x2}, &(0x7f0000000900)=0x33) ioctl$KVM_CREATE_IRQCHIP(r5, 0xae60) ioctl$KVM_CREATE_PIT2(r5, 0x4040ae77, &(0x7f0000000140)) getsockopt$bt_l2cap_L2CAP_OPTIONS(r4, 0x6, 0x1, &(0x7f0000000100), 0x0) dup2(r0, r5) syz_emit_ethernet(0x30, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @local, [], {@llc_tr={0x11, {@snap={0x0, 0x1, "ed", "80da46", 0x89ff, "5873867110c22f81a95a544d15c962a6faf92bb1cc24dae03057"}}}}}, 0x0) ioctl$VIDIOC_ENUMAUDOUT(r4, 0xc0345642, &(0x7f00000000c0)={0x0, "5955cfc07bb325514a645aa1542ff1fc33dc7170fe80af668aadb01ec2059c66", 0x2, 0x1}) socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r4, 0x84, 0x6b, &(0x7f0000000240)=[@in={0x2, 0x4e21, @dev}, @in6={0xa, 0x4e20, 0x1f, @mcast1, 0x4}, @in={0x2, 0x4e24, @broadcast}, @in6={0xa, 0x4e21, 0x8393, @local, 0x2}], 0x58) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) 03:35:50 executing program 5: r0 = socket$inet(0x2, 0x100000000805, 0x0) listen(r0, 0x200000003d) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f00000000c0)=0x8042d0, 0x4) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000745ffc), &(0x7f0000b96000)=0x4) 03:35:50 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) openat$vimc1(0xffffffffffffff9c, 0x0, 0x2, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000180)) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) socket$packet(0x11, 0x7ffffffffffffffc, 0x300) ioctl$VHOST_VSOCK_SET_GUEST_CID(0xffffffffffffffff, 0x4008af60, 0x0) r0 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x8c) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x13}}}, 0x1c) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000001000)=ANY=[@ANYBLOB="7b1af8ff0000000069a2f8ff0000966f1503db0cfd2a0000bf"], 0x0}, 0x48) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r3 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000788000)=0x2, 0x4) bind$packet(r3, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r3, 0x107, 0x5, &(0x7f0000001000), 0xc5) r4 = accept4(r1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r4, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0xc9, 0x0, {0x2600}}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) connect$vsock_dgram(r0, &(0x7f0000000200)={0x28, 0x0, 0x0, @my}, 0x10) 03:35:50 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000008380)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1400000000000000000000000200000037000000"], 0x14}}], 0x1, 0x0) connect$inet(r1, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x331, 0x0) 03:35:50 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x2, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r2}}, 0x48) 03:35:51 executing program 0: bind$bt_l2cap(0xffffffffffffffff, &(0x7f00000001c0), 0xe) fcntl$getown(0xffffffffffffffff, 0x9) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x0) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000180)=""/217, 0x20000259}], 0x1) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) socket$inet6(0xa, 0x80807, 0x1f) 03:35:51 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000280)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205647, &(0x7f0000000040)={0x0, 0x1, 0x0, [], &(0x7f0000000000)={0xf0f046, 0x0, [], @p_u8=0x0}}) 03:35:51 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_SIOCGIFCONF(r0, 0x400448cc, 0x0) 03:35:51 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x2, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r2}}, 0x48) 03:35:51 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000280)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205647, &(0x7f0000000040)={0x0, 0x1, 0x0, [], &(0x7f0000000000)={0xf0f046, 0x0, [], @p_u8=0x0}}) 03:35:51 executing program 0: bind$bt_l2cap(0xffffffffffffffff, &(0x7f00000001c0), 0xe) fcntl$getown(0xffffffffffffffff, 0x9) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x246) write$P9_RLERRORu(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff80"], 0x2) close(r0) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x0) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000180)=""/217, 0x20000259}], 0x1) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) socket$inet6(0xa, 0x80807, 0x1f) 03:35:51 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[{0x408, 0x1, 0x1, "9ba662eb2ed3f8d4d563d1a5adbd1c4715ef1c18398c2a40038f00d60e2877bd7fa03c5aaf964bae8faa343277199a918865227eb8fe766ff191cdbd0c330a15048b5c2ae2db02907ad5e8eaa067a3696cfeada00b6fa636fc9ea4de2a28adb9881852cea1c8cc186fbf84fd26dbb9f849e333e9a131ffbce5a2cda7790a23d3dd0ef1e903f43690e1216ff5b4f3b6e0f41469dd1230ea685b32568dd47a936ec1a591c06a2b13118c3f98624aaf64e4f0e1a51c45c37963912fc7e50916cb843bd898d6a3b1b1229f3cbe682e6dedca63a6e8c964b8fb398b1268e96211274283b9bd81704775ebac7aa9e943dcf0fe240869f4e3e2605167dc3a5ba76614ecd2a142b65263101b83cd7638a2e62fabf93d8fb1eac6b7d9021282a3e33ee2742939de4063c5be6dc19d415c05f6aacedf49283a1de4142aed64362431f22f9748065246c8871d03d8bc4f2000da090216c507fa340e6158a7ac80aa2856f0dd295d5392e242068aaff3f7bab58b8377dcc646d37838ebc6ae521a72a6fff6d16af28648ff69a73720fdea244eacf71e469946dea84761711d7e7454636137dcbec327646e1264629f33db8b1fb02fea3e8560cf05c7af3edbbad1d2f63c3d285dbfa9117e8232da8a222b7811e94e39727c67157980ff010ffaa11a2cd6beeca23a2b92ef68e4ce3f744c0930d00e3a97baccf80c0005a5d7197e16e3bc1eedbc87c66cd17c324f74959ff2f7d43f3163e7cd1423d9be79bcf5370b8ebe4cb300321d3a9628269c64ab5a54116000b30e7c365dcb79f7e0c3c7a98c111b18f23aade3b1ef76c4d1054d58fcf693999fb8cd1d3bf36cb953722b3f5adc55c8a5a879b036cd2de237bb79512d68459e05cd46768d1e0d830a19afc905e22d4802181921f569c4e67a70e384928c40907f368c713f4675d899c8edbaf65858c1fbaaa3c328baabd8dc46066914bc07cba4db6b6332d315486000441205b3cd69b80390540197d1df1efd5fb7f8adb034870c91a84a437d3e177d58c9a48234bc2b4863666b09af10e0237fef560de2b6b3000b173ec3d9d0400196022084c43ecfe0287a3723201291e5707bc8c648a10fce62a30c304ae0c37e3c7ba908c2587b0afcbe71c5d5fc5db67a5e65797b89af59e9fb81f29261b1aecd95bd6539a3846dccfea6a54065a35a6cb0ed6802193dfba4a1c7944fc72cad3fa8ff620a806b41fa836f9f04873d20e863e2400b01c1e2382b9bfc8507e5493d1c356b4ab9c73fac86d952dd7b44a85a0ccffb8dfb284c40533eda7eefd4dea708b684bbd8d98589d33ac76479b155180dbad1615bd8c0b19ef8371b038089c7b1926aace5f5012efd4675da9ff753f7fec7913644467f4963cd3a83978e7118d25df7a4819f7a93d9a7b4eab45e15677c1751795303c4"}], 0x408}, 0x0) sendmmsg(r0, &(0x7f0000000040), 0x324fad809d5a9cf, 0x0) 03:35:51 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x2, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r2}}, 0x48) 03:35:51 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000280)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205647, &(0x7f0000000040)={0x0, 0x1, 0x0, [], &(0x7f0000000000)={0xf0f046, 0x0, [], @p_u8=0x0}}) [ 1179.147979] protocol 88fb is buggy, dev hsr_slave_0 [ 1179.153372] protocol 88fb is buggy, dev hsr_slave_1 03:35:52 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) openat$vimc1(0xffffffffffffff9c, 0x0, 0x2, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000180)) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) socket$packet(0x11, 0x7ffffffffffffffc, 0x300) ioctl$VHOST_VSOCK_SET_GUEST_CID(0xffffffffffffffff, 0x4008af60, 0x0) r0 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x8c) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x13}}}, 0x1c) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000001000)=ANY=[@ANYBLOB="7b1af8ff0000000069a2f8ff0000966f1503db0cfd2a0000bf"], 0x0}, 0x48) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r3 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000788000)=0x2, 0x4) bind$packet(r3, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r3, 0x107, 0x5, &(0x7f0000001000), 0xc5) r4 = accept4(r1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r4, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0xc9, 0x0, {0x2600}}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) connect$vsock_dgram(r0, &(0x7f0000000200)={0x28, 0x0, 0x0, @my}, 0x10) 03:35:52 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x2, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r2}}, 0x48) 03:35:52 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newsa={0xf0, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0], [], @broadcast}, 0x0, 0x32}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}}, 0xf0}}, 0x0) 03:35:52 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000280)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205647, &(0x7f0000000040)={0x0, 0x1, 0x0, [], &(0x7f0000000000)={0xf0f046, 0x0, [], @p_u8=0x0}}) 03:35:52 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000008380)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1400000000000000000000000200000037000000"], 0x14}}], 0x1, 0x0) connect$inet(r1, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x331, 0x0) 03:35:52 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockname(r0, 0x0, &(0x7f0000000000)) 03:35:52 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getdents(r0, &(0x7f00000000c0)=""/4096, 0xc9b) 03:35:52 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, 0x0) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=ANY=[@ANYBLOB='G']}) close(r2) close(0xffffffffffffffff) 03:35:52 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000300)=@hci, 0x2b) sendmsg$can_bcm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x5, 0x3, 0x0, {0x0, 0x7530}, {}, {}, 0x3, @can={{}, 0x0, 0x0, 0x0, 0x0, "8e52afa466fec4ab"}}, 0x20000088}}, 0x0) 03:35:52 executing program 0: clone(0x2102007ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='ns\x00') exit(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) getdents64(r0, 0x0, 0xcf439d1089c06c03) [ 1179.547277] protocol 88fb is buggy, dev hsr_slave_0 [ 1179.552387] protocol 88fb is buggy, dev hsr_slave_1 03:35:52 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, 0x0) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=ANY=[@ANYBLOB='G']}) close(r2) close(0xffffffffffffffff) 03:35:52 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) openat$vimc1(0xffffffffffffff9c, 0x0, 0x2, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000180)) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) socket$packet(0x11, 0x7ffffffffffffffc, 0x300) ioctl$VHOST_VSOCK_SET_GUEST_CID(0xffffffffffffffff, 0x4008af60, 0x0) r0 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x8c) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x13}}}, 0x1c) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000001000)=ANY=[@ANYBLOB="7b1af8ff0000000069a2f8ff0000966f1503db0cfd2a0000bf"], 0x0}, 0x48) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r3 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000788000)=0x2, 0x4) bind$packet(r3, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r3, 0x107, 0x5, &(0x7f0000001000), 0xc5) r4 = accept4(r1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r4, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0xc9, 0x0, {0x2600}}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) connect$vsock_dgram(r0, &(0x7f0000000200)={0x28, 0x0, 0x0, @my}, 0x10) 03:35:52 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000300)=@hci, 0x2b) sendmsg$can_bcm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x5, 0x3, 0x0, {0x0, 0x7530}, {}, {}, 0x3, @can={{}, 0x0, 0x0, 0x0, 0x0, "8e52afa466fec4ab"}}, 0x20000088}}, 0x0) 03:35:52 executing program 1: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) openat$vhci(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vhci\x00', 0x6) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RLERRORu(r2, &(0x7f0000000740)=ANY=[@ANYBLOB="ff81"], 0x2) sendfile(r0, r2, &(0x7f0000d83ff8), 0x3) 03:35:52 executing program 0: clone(0x2102007ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='ns\x00') exit(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) getdents64(r0, 0x0, 0xcf439d1089c06c03) 03:35:52 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, 0x0) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=ANY=[@ANYBLOB='G']}) close(r2) close(0xffffffffffffffff) 03:35:52 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000008380)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1400000000000000000000000200000037000000"], 0x14}}], 0x1, 0x0) connect$inet(r1, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x331, 0x0) 03:35:52 executing program 0: clone(0x2102007ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='ns\x00') exit(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) getdents64(r0, 0x0, 0xcf439d1089c06c03) 03:35:52 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000300)=@hci, 0x2b) sendmsg$can_bcm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x5, 0x3, 0x0, {0x0, 0x7530}, {}, {}, 0x3, @can={{}, 0x0, 0x0, 0x0, 0x0, "8e52afa466fec4ab"}}, 0x20000088}}, 0x0) 03:35:52 executing program 1: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x33, &(0x7f00000a2000)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) 03:35:52 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, 0x0) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth1_to_bond:\x00', &(0x7f0000000100)=ANY=[@ANYBLOB='G']}) close(r2) close(0xffffffffffffffff) [ 1180.107279] protocol 88fb is buggy, dev hsr_slave_0 [ 1180.112397] protocol 88fb is buggy, dev hsr_slave_1 [ 1180.117591] protocol 88fb is buggy, dev hsr_slave_0 [ 1180.122649] protocol 88fb is buggy, dev hsr_slave_1 [ 1180.127809] protocol 88fb is buggy, dev hsr_slave_0 [ 1180.132867] protocol 88fb is buggy, dev hsr_slave_1 03:35:53 executing program 0: clone(0x2102007ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='ns\x00') exit(0x0) wait4(0x0, 0x0, 0x40000000, 0x0) getdents64(r0, 0x0, 0xcf439d1089c06c03) 03:35:53 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000440), 0x3) 03:35:53 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) openat$vimc1(0xffffffffffffff9c, 0x0, 0x2, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000180)) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) socket$packet(0x11, 0x7ffffffffffffffc, 0x300) ioctl$VHOST_VSOCK_SET_GUEST_CID(0xffffffffffffffff, 0x4008af60, 0x0) r0 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x8c) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x13}}}, 0x1c) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000001000)=ANY=[@ANYBLOB="7b1af8ff0000000069a2f8ff0000966f1503db0cfd2a0000bf"], 0x0}, 0x48) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r3 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000788000)=0x2, 0x4) bind$packet(r3, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r3, 0x107, 0x5, &(0x7f0000001000), 0xc5) r4 = accept4(r1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r4, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0xc9, 0x0, {0x2600}}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) connect$vsock_dgram(r0, &(0x7f0000000200)={0x28, 0x0, 0x0, @my}, 0x10) 03:35:53 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000300)=@hci, 0x2b) sendmsg$can_bcm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x5, 0x3, 0x0, {0x0, 0x7530}, {}, {}, 0x3, @can={{}, 0x0, 0x0, 0x0, 0x0, "8e52afa466fec4ab"}}, 0x20000088}}, 0x0) 03:35:53 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") syz_emit_ethernet(0x300b00, &(0x7f0000000000)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300008, 0x0, 0x0, @ipv4={[0x6], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x7, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 03:35:53 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, 0x0, &(0x7f0000000480)=0x54) 03:35:53 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'bond_slave_0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="46000000048be0bb3f00d65c07001000c6704dd48e815c1617aebbf0677609da8e14f5d9c8ed0e8f9abe8a6d2506b85f2d3c92fb9d88201fe0db2709595c52d900fbba8cd3cb69c003b2330e22627bb65b91ec0d63771e09384ea5ded2a52b4e9941ad6e21b524814eb4194974388d8f04dbfd85d6610c85b4eb447cd3e29323b877cda4361ee7aaaea5cb10bbd951ce3f00aebc2c401c4c78af1c8b1b01e009496395e8af373aa5a04e8d459ca7ed52465432d27ef325528019f5aaa1c56ac429da26cc0110731c123e9b975924c0"]}) r1 = semget(0x2, 0x3, 0x4) semctl$SEM_INFO(r1, 0x0, 0x13, &(0x7f0000000200)=""/160) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f0000000080)={'veth1_to_team\x00', {0x2, 0x4e20}}) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0xf, 0x0, 0x0) 03:35:53 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x80000000001, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f0, &(0x7f0000000300)='0\x00') 03:35:53 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getdents64(r1, &(0x7f0000000480)=""/4096, 0x18) getdents64(r1, &(0x7f0000000240)=""/196, 0xc4) 03:35:53 executing program 5: socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f3, &(0x7f0000000080)='tunl0\x00') pread64(r0, &(0x7f0000000680)=""/193, 0xc1, 0x48) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000540), &(0x7f0000000580)=0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = add_key$user(&(0x7f0000000c80)='user\x00', &(0x7f0000000cc0)={'syz', 0x1}, &(0x7f0000000d00)="162a4f3b4d507941e5f9822086525ca7e97d9d550abc12f4dbdc00463d899794d1ad23f837c005ba134bf35846f3eab5e1ad476df068db97f1cc598962e6d238607052475415d368b9f02feab156325a181fdc6c5dda840475886d749e0391eda135cf3cd9400e82901f6670fdbec90f07e67332c03afffc5e15ea0704e6a09a041aea657c86d385c11d679ae0ce1b8e0b8cb13d0e0231140f847904b1e5b84cdfb6dd92a61acd59ab310e39d888423d0947469c390dd6c58a5e919e8b1a9ea1f7a6e5ca2f", 0xc5, 0xfffffffffffffffe) keyctl$get_security(0x11, r2, &(0x7f0000000e00)=""/150, 0x96) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/qat_adf_ctl\x00', 0x80, 0x0) write$input_event(r3, &(0x7f0000000c40)={{0x0, 0x2710}, 0x2, 0x862b, 0xfffffffffffffffe}, 0x18) r4 = syz_open_dev$sndpcmc(&(0x7f0000000280)='/dev/snd/pcmC#D#c\x00', 0x20, 0x2) sendto(0xffffffffffffffff, &(0x7f0000000440), 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000240)='\x00') ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000380)={'team0\x00', &(0x7f0000000ec0)=ANY=[@ANYBLOB="370000001f0000000900000000000000000000003f00000005000000000000f46e114e7d39b1aa4d9e46d23ef3eb1cfc383e0ab73f22407b44b59504117722f8352e70f790965e82558dd1e1605257dd8d38a18304cb4182e561780736d23ad616584add9185e24b723ba2f9453c94b2233be8ede133fb8ff84fa12e32913c695065748f4fb6bf2fa3424addcab864f54734eedda74208c9ac75857f7f05482fb71a418d66e9c72e90cb49e85c93"]}) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) ioctl$KVM_DIRTY_TLB(r4, 0x4010aeaa, &(0x7f0000000440)={0x80000000, 0x80}) r5 = add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x1}, &(0x7f0000000140)="bf288f885d8a1d787a5a1457f7575fcad426660d2b107109824ff6513a914e2d280cf5031342d180b770138fbfe64b63bd9a1d2ad08cb5b22f65349059ced0984d0ca07fed1b1bbcdcbf073ff2c37daad254b59ddf84664458f089688f2dc04a6f0f752cdf8aeec0252e5386cfef07282d0658c81e12f807e5e25d75748644975fc5bbc0a6bb6b5bec67aff151acdd54c9169f6272b67508ff47545082b0978d21", 0xa1, 0xffffffffffffffff) add_key(&(0x7f0000000040)='cifs.spnego\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000a00)="b1039752b31f27a4126a2ff3fe", 0xd, r5) syz_mount_image$msdos(&(0x7f0000000500)='msdos\x00', &(0x7f00000005c0)='./file0\x00', 0xfff, 0x1, &(0x7f0000000600)=[{&(0x7f0000000800), 0x0, 0x10000}], 0x0, 0x0) dup(0xffffffffffffffff) syz_open_dev$media(&(0x7f00000003c0)='/dev/media#\x00', 0x1, 0x83) 03:35:53 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000008380)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1400000000000000000000000200000037000000"], 0x14}}], 0x1, 0x0) connect$inet(r1, &(0x7f0000000480)={0x2, 0x0, @multicast1}, 0x10) sendmmsg(r1, &(0x7f0000007fc0), 0x331, 0x0) 03:35:53 executing program 3: ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x8c) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x13}}}, 0x1c) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r2 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r2, 0x107, 0xa, &(0x7f0000788000)=0x2, 0x4) bind$packet(r2, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r2, 0x107, 0x5, &(0x7f0000001000), 0xc5) r3 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0xc9, 0x0, {0x2600}}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) 03:35:53 executing program 5: socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f3, &(0x7f0000000080)='tunl0\x00') pread64(r0, &(0x7f0000000680)=""/193, 0xc1, 0x48) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000540), &(0x7f0000000580)=0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = add_key$user(&(0x7f0000000c80)='user\x00', &(0x7f0000000cc0)={'syz', 0x1}, &(0x7f0000000d00)="162a4f3b4d507941e5f9822086525ca7e97d9d550abc12f4dbdc00463d899794d1ad23f837c005ba134bf35846f3eab5e1ad476df068db97f1cc598962e6d238607052475415d368b9f02feab156325a181fdc6c5dda840475886d749e0391eda135cf3cd9400e82901f6670fdbec90f07e67332c03afffc5e15ea0704e6a09a041aea657c86d385c11d679ae0ce1b8e0b8cb13d0e0231140f847904b1e5b84cdfb6dd92a61acd59ab310e39d888423d0947469c390dd6c58a5e919e8b1a9ea1f7a6e5ca2f", 0xc5, 0xfffffffffffffffe) keyctl$get_security(0x11, r2, &(0x7f0000000e00)=""/150, 0x96) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/qat_adf_ctl\x00', 0x80, 0x0) write$input_event(r3, &(0x7f0000000c40)={{0x0, 0x2710}, 0x2, 0x862b, 0xfffffffffffffffe}, 0x18) r4 = syz_open_dev$sndpcmc(&(0x7f0000000280)='/dev/snd/pcmC#D#c\x00', 0x20, 0x2) sendto(0xffffffffffffffff, &(0x7f0000000440), 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000240)='\x00') ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000380)={'team0\x00', &(0x7f0000000ec0)=ANY=[@ANYBLOB="370000001f0000000900000000000000000000003f00000005000000000000f46e114e7d39b1aa4d9e46d23ef3eb1cfc383e0ab73f22407b44b59504117722f8352e70f790965e82558dd1e1605257dd8d38a18304cb4182e561780736d23ad616584add9185e24b723ba2f9453c94b2233be8ede133fb8ff84fa12e32913c695065748f4fb6bf2fa3424addcab864f54734eedda74208c9ac75857f7f05482fb71a418d66e9c72e90cb49e85c93"]}) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) ioctl$KVM_DIRTY_TLB(r4, 0x4010aeaa, &(0x7f0000000440)={0x80000000, 0x80}) r5 = add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x1}, &(0x7f0000000140)="bf288f885d8a1d787a5a1457f7575fcad426660d2b107109824ff6513a914e2d280cf5031342d180b770138fbfe64b63bd9a1d2ad08cb5b22f65349059ced0984d0ca07fed1b1bbcdcbf073ff2c37daad254b59ddf84664458f089688f2dc04a6f0f752cdf8aeec0252e5386cfef07282d0658c81e12f807e5e25d75748644975fc5bbc0a6bb6b5bec67aff151acdd54c9169f6272b67508ff47545082b0978d21", 0xa1, 0xffffffffffffffff) add_key(&(0x7f0000000040)='cifs.spnego\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000a00)="b1039752b31f27a4126a2ff3fe", 0xd, r5) syz_mount_image$msdos(&(0x7f0000000500)='msdos\x00', &(0x7f00000005c0)='./file0\x00', 0xfff, 0x1, &(0x7f0000000600)=[{&(0x7f0000000800), 0x0, 0x10000}], 0x0, 0x0) dup(0xffffffffffffffff) syz_open_dev$media(&(0x7f00000003c0)='/dev/media#\x00', 0x1, 0x83) 03:35:53 executing program 1: socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f3, &(0x7f0000000080)='tunl0\x00') pread64(r0, &(0x7f0000000680)=""/193, 0xc1, 0x48) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000540), &(0x7f0000000580)=0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = add_key$user(&(0x7f0000000c80)='user\x00', &(0x7f0000000cc0)={'syz', 0x1}, &(0x7f0000000d00)="162a4f3b4d507941e5f9822086525ca7e97d9d550abc12f4dbdc00463d899794d1ad23f837c005ba134bf35846f3eab5e1ad476df068db97f1cc598962e6d238607052475415d368b9f02feab156325a181fdc6c5dda840475886d749e0391eda135cf3cd9400e82901f6670fdbec90f07e67332c03afffc5e15ea0704e6a09a041aea657c86d385c11d679ae0ce1b8e0b8cb13d0e0231140f847904b1e5b84cdfb6dd92a61acd59ab310e39d888423d0947469c390dd6c58a5e919e8b1a9ea1f7a6e5ca2f", 0xc5, 0xfffffffffffffffe) keyctl$get_security(0x11, r2, &(0x7f0000000e00)=""/150, 0x96) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/qat_adf_ctl\x00', 0x80, 0x0) write$input_event(r3, &(0x7f0000000c40)={{0x0, 0x2710}, 0x2, 0x862b, 0xfffffffffffffffe}, 0x18) r4 = syz_open_dev$sndpcmc(&(0x7f0000000280)='/dev/snd/pcmC#D#c\x00', 0x20, 0x2) sendto(0xffffffffffffffff, &(0x7f0000000440), 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000240)='\x00') ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000380)={'team0\x00', &(0x7f0000000ec0)=ANY=[@ANYBLOB="370000001f0000000900000000000000000000003f00000005000000000000f46e114e7d39b1aa4d9e46d23ef3eb1cfc383e0ab73f22407b44b59504117722f8352e70f790965e82558dd1e1605257dd8d38a18304cb4182e561780736d23ad616584add9185e24b723ba2f9453c94b2233be8ede133fb8ff84fa12e32913c695065748f4fb6bf2fa3424addcab864f54734eedda74208c9ac75857f7f05482fb71a418d66e9c72e90cb49e85c93"]}) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) ioctl$KVM_DIRTY_TLB(r4, 0x4010aeaa, &(0x7f0000000440)={0x80000000, 0x80}) r5 = add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x1}, &(0x7f0000000140)="bf288f885d8a1d787a5a1457f7575fcad426660d2b107109824ff6513a914e2d280cf5031342d180b770138fbfe64b63bd9a1d2ad08cb5b22f65349059ced0984d0ca07fed1b1bbcdcbf073ff2c37daad254b59ddf84664458f089688f2dc04a6f0f752cdf8aeec0252e5386cfef07282d0658c81e12f807e5e25d75748644975fc5bbc0a6bb6b5bec67aff151acdd54c9169f6272b67508ff47545082b0978d21", 0xa1, 0xffffffffffffffff) add_key(&(0x7f0000000040)='cifs.spnego\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000a00)="b1039752b31f27a4126a2ff3fe", 0xd, r5) syz_mount_image$msdos(&(0x7f0000000500)='msdos\x00', &(0x7f00000005c0)='./file0\x00', 0xfff, 0x1, &(0x7f0000000600)=[{&(0x7f0000000800), 0x0, 0x10000}], 0x0, 0x0) dup(0xffffffffffffffff) syz_open_dev$media(&(0x7f00000003c0)='/dev/media#\x00', 0x1, 0x83) [ 1181.462091] FAT-fs (loop1): bogus number of reserved sectors [ 1181.499672] FAT-fs (loop1): Can't find a valid FAT filesystem 03:35:54 executing program 3: ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x8c) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x13}}}, 0x1c) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r2 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r2, 0x107, 0xa, &(0x7f0000788000)=0x2, 0x4) bind$packet(r2, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r2, 0x107, 0x5, &(0x7f0000001000), 0xc5) r3 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0xc9, 0x0, {0x2600}}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) 03:35:54 executing program 0: socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f3, &(0x7f0000000080)='tunl0\x00') pread64(r0, &(0x7f0000000680)=""/193, 0xc1, 0x48) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000540), &(0x7f0000000580)=0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = add_key$user(&(0x7f0000000c80)='user\x00', &(0x7f0000000cc0)={'syz', 0x1}, &(0x7f0000000d00)="162a4f3b4d507941e5f9822086525ca7e97d9d550abc12f4dbdc00463d899794d1ad23f837c005ba134bf35846f3eab5e1ad476df068db97f1cc598962e6d238607052475415d368b9f02feab156325a181fdc6c5dda840475886d749e0391eda135cf3cd9400e82901f6670fdbec90f07e67332c03afffc5e15ea0704e6a09a041aea657c86d385c11d679ae0ce1b8e0b8cb13d0e0231140f847904b1e5b84cdfb6dd92a61acd59ab310e39d888423d0947469c390dd6c58a5e919e8b1a9ea1f7a6e5ca2f", 0xc5, 0xfffffffffffffffe) keyctl$get_security(0x11, r2, &(0x7f0000000e00)=""/150, 0x96) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/qat_adf_ctl\x00', 0x80, 0x0) write$input_event(r3, &(0x7f0000000c40)={{0x0, 0x2710}, 0x2, 0x862b, 0xfffffffffffffffe}, 0x18) r4 = syz_open_dev$sndpcmc(&(0x7f0000000280)='/dev/snd/pcmC#D#c\x00', 0x20, 0x2) sendto(0xffffffffffffffff, &(0x7f0000000440), 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000240)='\x00') ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000380)={'team0\x00', &(0x7f0000000ec0)=ANY=[@ANYBLOB="370000001f0000000900000000000000000000003f00000005000000000000f46e114e7d39b1aa4d9e46d23ef3eb1cfc383e0ab73f22407b44b59504117722f8352e70f790965e82558dd1e1605257dd8d38a18304cb4182e561780736d23ad616584add9185e24b723ba2f9453c94b2233be8ede133fb8ff84fa12e32913c695065748f4fb6bf2fa3424addcab864f54734eedda74208c9ac75857f7f05482fb71a418d66e9c72e90cb49e85c93"]}) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) ioctl$KVM_DIRTY_TLB(r4, 0x4010aeaa, &(0x7f0000000440)={0x80000000, 0x80}) r5 = add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x1}, &(0x7f0000000140)="bf288f885d8a1d787a5a1457f7575fcad426660d2b107109824ff6513a914e2d280cf5031342d180b770138fbfe64b63bd9a1d2ad08cb5b22f65349059ced0984d0ca07fed1b1bbcdcbf073ff2c37daad254b59ddf84664458f089688f2dc04a6f0f752cdf8aeec0252e5386cfef07282d0658c81e12f807e5e25d75748644975fc5bbc0a6bb6b5bec67aff151acdd54c9169f6272b67508ff47545082b0978d21", 0xa1, 0xffffffffffffffff) add_key(&(0x7f0000000040)='cifs.spnego\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000a00)="b1039752b31f27a4126a2ff3fe", 0xd, r5) syz_mount_image$msdos(&(0x7f0000000500)='msdos\x00', &(0x7f00000005c0)='./file0\x00', 0xfff, 0x1, &(0x7f0000000600)=[{&(0x7f0000000800), 0x0, 0x10000}], 0x0, 0x0) dup(0xffffffffffffffff) syz_open_dev$media(&(0x7f00000003c0)='/dev/media#\x00', 0x1, 0x83) 03:35:54 executing program 5: socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f3, &(0x7f0000000080)='tunl0\x00') pread64(r0, &(0x7f0000000680)=""/193, 0xc1, 0x48) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000540), &(0x7f0000000580)=0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = add_key$user(&(0x7f0000000c80)='user\x00', &(0x7f0000000cc0)={'syz', 0x1}, &(0x7f0000000d00)="162a4f3b4d507941e5f9822086525ca7e97d9d550abc12f4dbdc00463d899794d1ad23f837c005ba134bf35846f3eab5e1ad476df068db97f1cc598962e6d238607052475415d368b9f02feab156325a181fdc6c5dda840475886d749e0391eda135cf3cd9400e82901f6670fdbec90f07e67332c03afffc5e15ea0704e6a09a041aea657c86d385c11d679ae0ce1b8e0b8cb13d0e0231140f847904b1e5b84cdfb6dd92a61acd59ab310e39d888423d0947469c390dd6c58a5e919e8b1a9ea1f7a6e5ca2f", 0xc5, 0xfffffffffffffffe) keyctl$get_security(0x11, r2, &(0x7f0000000e00)=""/150, 0x96) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/qat_adf_ctl\x00', 0x80, 0x0) write$input_event(r3, &(0x7f0000000c40)={{0x0, 0x2710}, 0x2, 0x862b, 0xfffffffffffffffe}, 0x18) r4 = syz_open_dev$sndpcmc(&(0x7f0000000280)='/dev/snd/pcmC#D#c\x00', 0x20, 0x2) sendto(0xffffffffffffffff, &(0x7f0000000440), 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000240)='\x00') ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000380)={'team0\x00', &(0x7f0000000ec0)=ANY=[@ANYBLOB="370000001f0000000900000000000000000000003f00000005000000000000f46e114e7d39b1aa4d9e46d23ef3eb1cfc383e0ab73f22407b44b59504117722f8352e70f790965e82558dd1e1605257dd8d38a18304cb4182e561780736d23ad616584add9185e24b723ba2f9453c94b2233be8ede133fb8ff84fa12e32913c695065748f4fb6bf2fa3424addcab864f54734eedda74208c9ac75857f7f05482fb71a418d66e9c72e90cb49e85c93"]}) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) ioctl$KVM_DIRTY_TLB(r4, 0x4010aeaa, &(0x7f0000000440)={0x80000000, 0x80}) r5 = add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x1}, &(0x7f0000000140)="bf288f885d8a1d787a5a1457f7575fcad426660d2b107109824ff6513a914e2d280cf5031342d180b770138fbfe64b63bd9a1d2ad08cb5b22f65349059ced0984d0ca07fed1b1bbcdcbf073ff2c37daad254b59ddf84664458f089688f2dc04a6f0f752cdf8aeec0252e5386cfef07282d0658c81e12f807e5e25d75748644975fc5bbc0a6bb6b5bec67aff151acdd54c9169f6272b67508ff47545082b0978d21", 0xa1, 0xffffffffffffffff) add_key(&(0x7f0000000040)='cifs.spnego\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000a00)="b1039752b31f27a4126a2ff3fe", 0xd, r5) syz_mount_image$msdos(&(0x7f0000000500)='msdos\x00', &(0x7f00000005c0)='./file0\x00', 0xfff, 0x1, &(0x7f0000000600)=[{&(0x7f0000000800), 0x0, 0x10000}], 0x0, 0x0) dup(0xffffffffffffffff) syz_open_dev$media(&(0x7f00000003c0)='/dev/media#\x00', 0x1, 0x83) 03:35:54 executing program 4: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = socket(0x11, 0x2, 0x5) r5 = gettid() perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r5, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$tipc(r4, 0x0, &(0x7f0000000080)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000008c0)={{{@in6=@remote, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000006c0)='./file0/file0\x00', &(0x7f00000007c0)) r7 = getpgid(0x0) connect$bt_l2cap(r0, &(0x7f0000000340)={0x1f, 0x1, {0xccce, 0x7, 0x80000001, 0x8, 0x7, 0x5}, 0xe0, 0x6}, 0xe) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000840)={{0x0, r2, r3, r6, r3, 0x4c1078b5631b409f, 0xb}, 0xb8fb, 0xffc, 0x3, 0x8000, r7, r7, 0x81}) r8 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000000) sendmsg(r0, &(0x7f0000001b40)={&(0x7f00000003c0)=@sco={0x1f, {0x7, 0x8000, 0x0, 0x0, 0x7ff, 0x8}}, 0x80, &(0x7f0000001a00)=[{&(0x7f0000000600)='t\x00\x00', 0x3}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000040)="2d41d358b8361e7d73e3e48513a08593", 0xffffffbd) ioctl$BLKTRACESETUP(r8, 0xc0481273, &(0x7f0000000080)={[], 0x2, 0x400, 0x200, 0x0, 0x1}) setsockopt$inet6_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f0000000100)='lp@', 0xffffffffffffffcd) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2000, 0x8000000000e, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x8000000000000000, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x7, 0xfffffffffffffffe, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r1, 0x0) r9 = add_key(&(0x7f00000002c0)='.request_key_auth\x00', &(0x7f0000000480)={'syz', 0x2}, &(0x7f0000000540)="f8fd8d8cc6a7f60cbf12c4712b9a67849bcf030bd87ba1706b188aec1ff87cc5b3202395528f4dbb504bdd2a93e2f896c7bd1041a75cccb8b7f688f7bc1ccf910aacbccf14cddb359390c9e7a64a", 0x4e, 0xfffffffffffffffc) r10 = add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, r9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440), 0x0, r10) io_setup(0x2, &(0x7f00000001c0)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000440)='IPVS\x00') memfd_create(&(0x7f0000000f40)='3\x00\x1e\x18J\xb6\t\xca\xd3\x00O9\x143\xd3ty\xf9 \n\x13S+\xefB\xff\x00D\xb8\xeb\fo\xf8\xbdv\xaf\xf6\x18\x1eE\x1eYQc\x94\xd2\xc8#\x9e0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f3, &(0x7f0000000080)='tunl0\x00') pread64(r0, &(0x7f0000000680)=""/193, 0xc1, 0x48) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000540), &(0x7f0000000580)=0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = add_key$user(&(0x7f0000000c80)='user\x00', &(0x7f0000000cc0)={'syz', 0x1}, &(0x7f0000000d00)="162a4f3b4d507941e5f9822086525ca7e97d9d550abc12f4dbdc00463d899794d1ad23f837c005ba134bf35846f3eab5e1ad476df068db97f1cc598962e6d238607052475415d368b9f02feab156325a181fdc6c5dda840475886d749e0391eda135cf3cd9400e82901f6670fdbec90f07e67332c03afffc5e15ea0704e6a09a041aea657c86d385c11d679ae0ce1b8e0b8cb13d0e0231140f847904b1e5b84cdfb6dd92a61acd59ab310e39d888423d0947469c390dd6c58a5e919e8b1a9ea1f7a6e5ca2f", 0xc5, 0xfffffffffffffffe) keyctl$get_security(0x11, r2, &(0x7f0000000e00)=""/150, 0x96) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/qat_adf_ctl\x00', 0x80, 0x0) write$input_event(r3, &(0x7f0000000c40)={{0x0, 0x2710}, 0x2, 0x862b, 0xfffffffffffffffe}, 0x18) r4 = syz_open_dev$sndpcmc(&(0x7f0000000280)='/dev/snd/pcmC#D#c\x00', 0x20, 0x2) sendto(0xffffffffffffffff, &(0x7f0000000440), 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000240)='\x00') ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000380)={'team0\x00', &(0x7f0000000ec0)=ANY=[@ANYBLOB="370000001f0000000900000000000000000000003f00000005000000000000f46e114e7d39b1aa4d9e46d23ef3eb1cfc383e0ab73f22407b44b59504117722f8352e70f790965e82558dd1e1605257dd8d38a18304cb4182e561780736d23ad616584add9185e24b723ba2f9453c94b2233be8ede133fb8ff84fa12e32913c695065748f4fb6bf2fa3424addcab864f54734eedda74208c9ac75857f7f05482fb71a418d66e9c72e90cb49e85c93"]}) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) ioctl$KVM_DIRTY_TLB(r4, 0x4010aeaa, &(0x7f0000000440)={0x80000000, 0x80}) r5 = add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x1}, &(0x7f0000000140)="bf288f885d8a1d787a5a1457f7575fcad426660d2b107109824ff6513a914e2d280cf5031342d180b770138fbfe64b63bd9a1d2ad08cb5b22f65349059ced0984d0ca07fed1b1bbcdcbf073ff2c37daad254b59ddf84664458f089688f2dc04a6f0f752cdf8aeec0252e5386cfef07282d0658c81e12f807e5e25d75748644975fc5bbc0a6bb6b5bec67aff151acdd54c9169f6272b67508ff47545082b0978d21", 0xa1, 0xffffffffffffffff) add_key(&(0x7f0000000040)='cifs.spnego\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000a00)="b1039752b31f27a4126a2ff3fe", 0xd, r5) syz_mount_image$msdos(&(0x7f0000000500)='msdos\x00', &(0x7f00000005c0)='./file0\x00', 0xfff, 0x1, &(0x7f0000000600)=[{&(0x7f0000000800), 0x0, 0x10000}], 0x0, 0x0) dup(0xffffffffffffffff) syz_open_dev$media(&(0x7f00000003c0)='/dev/media#\x00', 0x1, 0x83) 03:35:54 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getflags(r0, 0x1) r1 = syz_open_dev$sndctrl(&(0x7f0000000640)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r1, 0x80045530, &(0x7f0000002b80)=""/4096) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x2f0080, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x400003, 0x300) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r4, &(0x7f0000000100)={0x2, 0x2}, 0x10) ioctl$sock_FIOSETOWN(r4, 0x8901, &(0x7f0000000580)=0xffffffffffffffff) ioctl$int_in(r4, 0x5452, &(0x7f0000000040)=0x19b) sendto$inet(r4, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @local}, 0x10) sendto$inet(r4, &(0x7f0000000280)="a5fe9e7be7060871618b23a8d86d12156655aa50100792f46b647308d3e2a67328969288734cc698158a84b40408261762639ee5e5881d4fb471fcb9639d30513ab42a04f920d8c1fa0c6ed49b0028fda44d1e69121bd2ff68125d42c7beccab2998e3392614583dd729cd341292ded369a34c4c75e12e8e0f519531fc8f11e74b74f2e5ad24cd0ab65395a2307394f48438306edcbb2ad2261f7535abea9833df32f75d92d392390bcfef75c9923a1745b53c", 0xb3, 0x8801, 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000080)={'bond_slave_0\x00', 0x4000}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) ioctl$RTC_EPOCH_SET(r2, 0x4008700e, 0xc2fe) openat$tun(0xffffffffffffff9c, &(0x7f0000000380)='/dev/net/tun\x00', 0x0, 0x0) syz_open_dev$dri(&(0x7f0000001080)='/dev/dri/card#\x00', 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000140)={0x800, 0x10000, 0x8200, 0x1, 0x6, 0x80000001, 0x3ff, 0x1, 0x0}, &(0x7f0000000200)=0x20) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000003c0)={r5, @in6={{0xa, 0x4e21, 0x100000001, @mcast2, 0x80}}, 0x7, 0x53, 0x2, 0x100, 0x44}, 0x98) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x4000, 0x0) quotactl(0x0, 0x0, 0x0, 0x0) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x2, 0x0) write$binfmt_misc(r3, &(0x7f0000000480)=ANY=[@ANYBLOB="73797a30631cee5d21a669cdea93b9d8d4d594fdd6da263438f85e4a45f6393a24ed971733b8bdc6f5099d97090a9f085d8754d4e8d4284848e44f7601b55c01ea188afabe6f9d3e57bbea10636c433bfbbd4e0f5a320725638b1a52d142253f96c003665ec62a8d514aa7b2e0254a9d6d1d700727b3ed17b5"], 0x79) socketpair$unix(0x1, 0x7, 0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x9) ioctl$RTC_AIE_ON(r6, 0x7001) 03:35:54 executing program 1: socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f3, &(0x7f0000000080)='tunl0\x00') pread64(r0, &(0x7f0000000680)=""/193, 0xc1, 0x48) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000540), &(0x7f0000000580)=0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = add_key$user(&(0x7f0000000c80)='user\x00', &(0x7f0000000cc0)={'syz', 0x1}, &(0x7f0000000d00)="162a4f3b4d507941e5f9822086525ca7e97d9d550abc12f4dbdc00463d899794d1ad23f837c005ba134bf35846f3eab5e1ad476df068db97f1cc598962e6d238607052475415d368b9f02feab156325a181fdc6c5dda840475886d749e0391eda135cf3cd9400e82901f6670fdbec90f07e67332c03afffc5e15ea0704e6a09a041aea657c86d385c11d679ae0ce1b8e0b8cb13d0e0231140f847904b1e5b84cdfb6dd92a61acd59ab310e39d888423d0947469c390dd6c58a5e919e8b1a9ea1f7a6e5ca2f", 0xc5, 0xfffffffffffffffe) keyctl$get_security(0x11, r2, &(0x7f0000000e00)=""/150, 0x96) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/qat_adf_ctl\x00', 0x80, 0x0) write$input_event(r3, &(0x7f0000000c40)={{0x0, 0x2710}, 0x2, 0x862b, 0xfffffffffffffffe}, 0x18) r4 = syz_open_dev$sndpcmc(&(0x7f0000000280)='/dev/snd/pcmC#D#c\x00', 0x20, 0x2) sendto(0xffffffffffffffff, &(0x7f0000000440), 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000240)='\x00') ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000380)={'team0\x00', &(0x7f0000000ec0)=ANY=[@ANYBLOB="370000001f0000000900000000000000000000003f00000005000000000000f46e114e7d39b1aa4d9e46d23ef3eb1cfc383e0ab73f22407b44b59504117722f8352e70f790965e82558dd1e1605257dd8d38a18304cb4182e561780736d23ad616584add9185e24b723ba2f9453c94b2233be8ede133fb8ff84fa12e32913c695065748f4fb6bf2fa3424addcab864f54734eedda74208c9ac75857f7f05482fb71a418d66e9c72e90cb49e85c93"]}) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) ioctl$KVM_DIRTY_TLB(r4, 0x4010aeaa, &(0x7f0000000440)={0x80000000, 0x80}) r5 = add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x1}, &(0x7f0000000140)="bf288f885d8a1d787a5a1457f7575fcad426660d2b107109824ff6513a914e2d280cf5031342d180b770138fbfe64b63bd9a1d2ad08cb5b22f65349059ced0984d0ca07fed1b1bbcdcbf073ff2c37daad254b59ddf84664458f089688f2dc04a6f0f752cdf8aeec0252e5386cfef07282d0658c81e12f807e5e25d75748644975fc5bbc0a6bb6b5bec67aff151acdd54c9169f6272b67508ff47545082b0978d21", 0xa1, 0xffffffffffffffff) add_key(&(0x7f0000000040)='cifs.spnego\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000a00)="b1039752b31f27a4126a2ff3fe", 0xd, r5) syz_mount_image$msdos(&(0x7f0000000500)='msdos\x00', &(0x7f00000005c0)='./file0\x00', 0xfff, 0x1, &(0x7f0000000600)=[{&(0x7f0000000800), 0x0, 0x10000}], 0x0, 0x0) dup(0xffffffffffffffff) syz_open_dev$media(&(0x7f00000003c0)='/dev/media#\x00', 0x1, 0x83) 03:35:54 executing program 5: socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f3, &(0x7f0000000080)='tunl0\x00') pread64(r0, &(0x7f0000000680)=""/193, 0xc1, 0x48) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000540), &(0x7f0000000580)=0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = add_key$user(&(0x7f0000000c80)='user\x00', &(0x7f0000000cc0)={'syz', 0x1}, &(0x7f0000000d00)="162a4f3b4d507941e5f9822086525ca7e97d9d550abc12f4dbdc00463d899794d1ad23f837c005ba134bf35846f3eab5e1ad476df068db97f1cc598962e6d238607052475415d368b9f02feab156325a181fdc6c5dda840475886d749e0391eda135cf3cd9400e82901f6670fdbec90f07e67332c03afffc5e15ea0704e6a09a041aea657c86d385c11d679ae0ce1b8e0b8cb13d0e0231140f847904b1e5b84cdfb6dd92a61acd59ab310e39d888423d0947469c390dd6c58a5e919e8b1a9ea1f7a6e5ca2f", 0xc5, 0xfffffffffffffffe) keyctl$get_security(0x11, r2, &(0x7f0000000e00)=""/150, 0x96) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/qat_adf_ctl\x00', 0x80, 0x0) write$input_event(r3, &(0x7f0000000c40)={{0x0, 0x2710}, 0x2, 0x862b, 0xfffffffffffffffe}, 0x18) r4 = syz_open_dev$sndpcmc(&(0x7f0000000280)='/dev/snd/pcmC#D#c\x00', 0x20, 0x2) sendto(0xffffffffffffffff, &(0x7f0000000440), 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000240)='\x00') ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000380)={'team0\x00', &(0x7f0000000ec0)=ANY=[@ANYBLOB="370000001f0000000900000000000000000000003f00000005000000000000f46e114e7d39b1aa4d9e46d23ef3eb1cfc383e0ab73f22407b44b59504117722f8352e70f790965e82558dd1e1605257dd8d38a18304cb4182e561780736d23ad616584add9185e24b723ba2f9453c94b2233be8ede133fb8ff84fa12e32913c695065748f4fb6bf2fa3424addcab864f54734eedda74208c9ac75857f7f05482fb71a418d66e9c72e90cb49e85c93"]}) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) ioctl$KVM_DIRTY_TLB(r4, 0x4010aeaa, &(0x7f0000000440)={0x80000000, 0x80}) r5 = add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x1}, &(0x7f0000000140)="bf288f885d8a1d787a5a1457f7575fcad426660d2b107109824ff6513a914e2d280cf5031342d180b770138fbfe64b63bd9a1d2ad08cb5b22f65349059ced0984d0ca07fed1b1bbcdcbf073ff2c37daad254b59ddf84664458f089688f2dc04a6f0f752cdf8aeec0252e5386cfef07282d0658c81e12f807e5e25d75748644975fc5bbc0a6bb6b5bec67aff151acdd54c9169f6272b67508ff47545082b0978d21", 0xa1, 0xffffffffffffffff) add_key(&(0x7f0000000040)='cifs.spnego\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000a00)="b1039752b31f27a4126a2ff3fe", 0xd, r5) syz_mount_image$msdos(&(0x7f0000000500)='msdos\x00', &(0x7f00000005c0)='./file0\x00', 0xfff, 0x1, &(0x7f0000000600)=[{&(0x7f0000000800), 0x0, 0x10000}], 0x0, 0x0) dup(0xffffffffffffffff) syz_open_dev$media(&(0x7f00000003c0)='/dev/media#\x00', 0x1, 0x83) 03:35:54 executing program 0: socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f3, &(0x7f0000000080)='tunl0\x00') pread64(r0, &(0x7f0000000680)=""/193, 0xc1, 0x48) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000540), &(0x7f0000000580)=0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = add_key$user(&(0x7f0000000c80)='user\x00', &(0x7f0000000cc0)={'syz', 0x1}, &(0x7f0000000d00)="162a4f3b4d507941e5f9822086525ca7e97d9d550abc12f4dbdc00463d899794d1ad23f837c005ba134bf35846f3eab5e1ad476df068db97f1cc598962e6d238607052475415d368b9f02feab156325a181fdc6c5dda840475886d749e0391eda135cf3cd9400e82901f6670fdbec90f07e67332c03afffc5e15ea0704e6a09a041aea657c86d385c11d679ae0ce1b8e0b8cb13d0e0231140f847904b1e5b84cdfb6dd92a61acd59ab310e39d888423d0947469c390dd6c58a5e919e8b1a9ea1f7a6e5ca2f", 0xc5, 0xfffffffffffffffe) keyctl$get_security(0x11, r2, &(0x7f0000000e00)=""/150, 0x96) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/qat_adf_ctl\x00', 0x80, 0x0) write$input_event(r3, &(0x7f0000000c40)={{0x0, 0x2710}, 0x2, 0x862b, 0xfffffffffffffffe}, 0x18) r4 = syz_open_dev$sndpcmc(&(0x7f0000000280)='/dev/snd/pcmC#D#c\x00', 0x20, 0x2) sendto(0xffffffffffffffff, &(0x7f0000000440), 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000240)='\x00') ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000380)={'team0\x00', &(0x7f0000000ec0)=ANY=[@ANYBLOB="370000001f0000000900000000000000000000003f00000005000000000000f46e114e7d39b1aa4d9e46d23ef3eb1cfc383e0ab73f22407b44b59504117722f8352e70f790965e82558dd1e1605257dd8d38a18304cb4182e561780736d23ad616584add9185e24b723ba2f9453c94b2233be8ede133fb8ff84fa12e32913c695065748f4fb6bf2fa3424addcab864f54734eedda74208c9ac75857f7f05482fb71a418d66e9c72e90cb49e85c93"]}) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) ioctl$KVM_DIRTY_TLB(r4, 0x4010aeaa, &(0x7f0000000440)={0x80000000, 0x80}) r5 = add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x1}, &(0x7f0000000140)="bf288f885d8a1d787a5a1457f7575fcad426660d2b107109824ff6513a914e2d280cf5031342d180b770138fbfe64b63bd9a1d2ad08cb5b22f65349059ced0984d0ca07fed1b1bbcdcbf073ff2c37daad254b59ddf84664458f089688f2dc04a6f0f752cdf8aeec0252e5386cfef07282d0658c81e12f807e5e25d75748644975fc5bbc0a6bb6b5bec67aff151acdd54c9169f6272b67508ff47545082b0978d21", 0xa1, 0xffffffffffffffff) add_key(&(0x7f0000000040)='cifs.spnego\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000a00)="b1039752b31f27a4126a2ff3fe", 0xd, r5) syz_mount_image$msdos(&(0x7f0000000500)='msdos\x00', &(0x7f00000005c0)='./file0\x00', 0xfff, 0x1, &(0x7f0000000600)=[{&(0x7f0000000800), 0x0, 0x10000}], 0x0, 0x0) dup(0xffffffffffffffff) syz_open_dev$media(&(0x7f00000003c0)='/dev/media#\x00', 0x1, 0x83) 03:35:54 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getflags(r0, 0x1) r1 = syz_open_dev$sndctrl(&(0x7f0000000640)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r1, 0x80045530, &(0x7f0000002b80)=""/4096) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x2f0080, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x400003, 0x300) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r4, &(0x7f0000000100)={0x2, 0x2}, 0x10) ioctl$sock_FIOSETOWN(r4, 0x8901, &(0x7f0000000580)=0xffffffffffffffff) ioctl$int_in(r4, 0x5452, &(0x7f0000000040)=0x19b) sendto$inet(r4, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @local}, 0x10) sendto$inet(r4, &(0x7f0000000280)="a5fe9e7be7060871618b23a8d86d12156655aa50100792f46b647308d3e2a67328969288734cc698158a84b40408261762639ee5e5881d4fb471fcb9639d30513ab42a04f920d8c1fa0c6ed49b0028fda44d1e69121bd2ff68125d42c7beccab2998e3392614583dd729cd341292ded369a34c4c75e12e8e0f519531fc8f11e74b74f2e5ad24cd0ab65395a2307394f48438306edcbb2ad2261f7535abea9833df32f75d92d392390bcfef75c9923a1745b53c", 0xb3, 0x8801, 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000080)={'bond_slave_0\x00', 0x4000}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) ioctl$RTC_EPOCH_SET(r2, 0x4008700e, 0xc2fe) openat$tun(0xffffffffffffff9c, &(0x7f0000000380)='/dev/net/tun\x00', 0x0, 0x0) syz_open_dev$dri(&(0x7f0000001080)='/dev/dri/card#\x00', 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000140)={0x800, 0x10000, 0x8200, 0x1, 0x6, 0x80000001, 0x3ff, 0x1, 0x0}, &(0x7f0000000200)=0x20) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000003c0)={r5, @in6={{0xa, 0x4e21, 0x100000001, @mcast2, 0x80}}, 0x7, 0x53, 0x2, 0x100, 0x44}, 0x98) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x4000, 0x0) quotactl(0x0, 0x0, 0x0, 0x0) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x2, 0x0) write$binfmt_misc(r3, &(0x7f0000000480)=ANY=[@ANYBLOB="73797a30631cee5d21a669cdea93b9d8d4d594fdd6da263438f85e4a45f6393a24ed971733b8bdc6f5099d97090a9f085d8754d4e8d4284848e44f7601b55c01ea188afabe6f9d3e57bbea10636c433bfbbd4e0f5a320725638b1a52d142253f96c003665ec62a8d514aa7b2e0254a9d6d1d700727b3ed17b5"], 0x79) socketpair$unix(0x1, 0x7, 0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x9) ioctl$RTC_AIE_ON(r6, 0x7001) 03:35:55 executing program 0: socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f3, &(0x7f0000000080)='tunl0\x00') pread64(r0, &(0x7f0000000680)=""/193, 0xc1, 0x48) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000540), &(0x7f0000000580)=0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = add_key$user(&(0x7f0000000c80)='user\x00', &(0x7f0000000cc0)={'syz', 0x1}, &(0x7f0000000d00)="162a4f3b4d507941e5f9822086525ca7e97d9d550abc12f4dbdc00463d899794d1ad23f837c005ba134bf35846f3eab5e1ad476df068db97f1cc598962e6d238607052475415d368b9f02feab156325a181fdc6c5dda840475886d749e0391eda135cf3cd9400e82901f6670fdbec90f07e67332c03afffc5e15ea0704e6a09a041aea657c86d385c11d679ae0ce1b8e0b8cb13d0e0231140f847904b1e5b84cdfb6dd92a61acd59ab310e39d888423d0947469c390dd6c58a5e919e8b1a9ea1f7a6e5ca2f", 0xc5, 0xfffffffffffffffe) keyctl$get_security(0x11, r2, &(0x7f0000000e00)=""/150, 0x96) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/qat_adf_ctl\x00', 0x80, 0x0) write$input_event(r3, &(0x7f0000000c40)={{0x0, 0x2710}, 0x2, 0x862b, 0xfffffffffffffffe}, 0x18) r4 = syz_open_dev$sndpcmc(&(0x7f0000000280)='/dev/snd/pcmC#D#c\x00', 0x20, 0x2) sendto(0xffffffffffffffff, &(0x7f0000000440), 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000240)='\x00') ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000380)={'team0\x00', &(0x7f0000000ec0)=ANY=[@ANYBLOB="370000001f0000000900000000000000000000003f00000005000000000000f46e114e7d39b1aa4d9e46d23ef3eb1cfc383e0ab73f22407b44b59504117722f8352e70f790965e82558dd1e1605257dd8d38a18304cb4182e561780736d23ad616584add9185e24b723ba2f9453c94b2233be8ede133fb8ff84fa12e32913c695065748f4fb6bf2fa3424addcab864f54734eedda74208c9ac75857f7f05482fb71a418d66e9c72e90cb49e85c93"]}) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) ioctl$KVM_DIRTY_TLB(r4, 0x4010aeaa, &(0x7f0000000440)={0x80000000, 0x80}) r5 = add_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x1}, &(0x7f0000000140)="bf288f885d8a1d787a5a1457f7575fcad426660d2b107109824ff6513a914e2d280cf5031342d180b770138fbfe64b63bd9a1d2ad08cb5b22f65349059ced0984d0ca07fed1b1bbcdcbf073ff2c37daad254b59ddf84664458f089688f2dc04a6f0f752cdf8aeec0252e5386cfef07282d0658c81e12f807e5e25d75748644975fc5bbc0a6bb6b5bec67aff151acdd54c9169f6272b67508ff47545082b0978d21", 0xa1, 0xffffffffffffffff) add_key(&(0x7f0000000040)='cifs.spnego\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000a00)="b1039752b31f27a4126a2ff3fe", 0xd, r5) syz_mount_image$msdos(&(0x7f0000000500)='msdos\x00', &(0x7f00000005c0)='./file0\x00', 0xfff, 0x1, &(0x7f0000000600)=[{&(0x7f0000000800), 0x0, 0x10000}], 0x0, 0x0) dup(0xffffffffffffffff) syz_open_dev$media(&(0x7f00000003c0)='/dev/media#\x00', 0x1, 0x83) 03:35:55 executing program 3: ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x8c) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x13}}}, 0x1c) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r2 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r2, 0x107, 0xa, &(0x7f0000788000)=0x2, 0x4) bind$packet(r2, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r2, 0x107, 0x5, &(0x7f0000001000), 0xc5) r3 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0xc9, 0x0, {0x2600}}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) 03:35:55 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r1 = open$dir(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) getdents(r1, &(0x7f0000000180)=""/106, 0x6a) getdents64(r1, &(0x7f0000000440)=""/186, 0x760) getdents64(r1, &(0x7f0000000100)=""/81, 0x51) 03:35:55 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x80008000000002, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000100)={0xb, 'syz1\x00', 'syz0\x00', 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf6\xff\xff\xff\x00', 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "80"}, 0x119) r2 = socket$inet_udp(0x2, 0x2, 0x0) dup3(r2, r1, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) 03:35:55 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getflags(r0, 0x1) r1 = syz_open_dev$sndctrl(&(0x7f0000000640)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r1, 0x80045530, &(0x7f0000002b80)=""/4096) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x2f0080, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x400003, 0x300) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r4, &(0x7f0000000100)={0x2, 0x2}, 0x10) ioctl$sock_FIOSETOWN(r4, 0x8901, &(0x7f0000000580)=0xffffffffffffffff) ioctl$int_in(r4, 0x5452, &(0x7f0000000040)=0x19b) sendto$inet(r4, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @local}, 0x10) sendto$inet(r4, &(0x7f0000000280)="a5fe9e7be7060871618b23a8d86d12156655aa50100792f46b647308d3e2a67328969288734cc698158a84b40408261762639ee5e5881d4fb471fcb9639d30513ab42a04f920d8c1fa0c6ed49b0028fda44d1e69121bd2ff68125d42c7beccab2998e3392614583dd729cd341292ded369a34c4c75e12e8e0f519531fc8f11e74b74f2e5ad24cd0ab65395a2307394f48438306edcbb2ad2261f7535abea9833df32f75d92d392390bcfef75c9923a1745b53c", 0xb3, 0x8801, 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000080)={'bond_slave_0\x00', 0x4000}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) ioctl$RTC_EPOCH_SET(r2, 0x4008700e, 0xc2fe) openat$tun(0xffffffffffffff9c, &(0x7f0000000380)='/dev/net/tun\x00', 0x0, 0x0) syz_open_dev$dri(&(0x7f0000001080)='/dev/dri/card#\x00', 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000140)={0x800, 0x10000, 0x8200, 0x1, 0x6, 0x80000001, 0x3ff, 0x1, 0x0}, &(0x7f0000000200)=0x20) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000003c0)={r5, @in6={{0xa, 0x4e21, 0x100000001, @mcast2, 0x80}}, 0x7, 0x53, 0x2, 0x100, 0x44}, 0x98) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x4000, 0x0) quotactl(0x0, 0x0, 0x0, 0x0) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x2, 0x0) write$binfmt_misc(r3, &(0x7f0000000480)=ANY=[@ANYBLOB="73797a30631cee5d21a669cdea93b9d8d4d594fdd6da263438f85e4a45f6393a24ed971733b8bdc6f5099d97090a9f085d8754d4e8d4284848e44f7601b55c01ea188afabe6f9d3e57bbea10636c433bfbbd4e0f5a320725638b1a52d142253f96c003665ec62a8d514aa7b2e0254a9d6d1d700727b3ed17b5"], 0x79) socketpair$unix(0x1, 0x7, 0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x9) ioctl$RTC_AIE_ON(r6, 0x7001) 03:35:55 executing program 4: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = socket(0x11, 0x2, 0x5) r5 = gettid() perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r5, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$tipc(r4, 0x0, &(0x7f0000000080)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000008c0)={{{@in6=@remote, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000006c0)='./file0/file0\x00', &(0x7f00000007c0)) r7 = getpgid(0x0) connect$bt_l2cap(r0, &(0x7f0000000340)={0x1f, 0x1, {0xccce, 0x7, 0x80000001, 0x8, 0x7, 0x5}, 0xe0, 0x6}, 0xe) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000840)={{0x0, r2, r3, r6, r3, 0x4c1078b5631b409f, 0xb}, 0xb8fb, 0xffc, 0x3, 0x8000, r7, r7, 0x81}) r8 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000000) sendmsg(r0, &(0x7f0000001b40)={&(0x7f00000003c0)=@sco={0x1f, {0x7, 0x8000, 0x0, 0x0, 0x7ff, 0x8}}, 0x80, &(0x7f0000001a00)=[{&(0x7f0000000600)='t\x00\x00', 0x3}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000040)="2d41d358b8361e7d73e3e48513a08593", 0xffffffbd) ioctl$BLKTRACESETUP(r8, 0xc0481273, &(0x7f0000000080)={[], 0x2, 0x400, 0x200, 0x0, 0x1}) setsockopt$inet6_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f0000000100)='lp@', 0xffffffffffffffcd) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2000, 0x8000000000e, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x8000000000000000, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x7, 0xfffffffffffffffe, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r1, 0x0) r9 = add_key(&(0x7f00000002c0)='.request_key_auth\x00', &(0x7f0000000480)={'syz', 0x2}, &(0x7f0000000540)="f8fd8d8cc6a7f60cbf12c4712b9a67849bcf030bd87ba1706b188aec1ff87cc5b3202395528f4dbb504bdd2a93e2f896c7bd1041a75cccb8b7f688f7bc1ccf910aacbccf14cddb359390c9e7a64a", 0x4e, 0xfffffffffffffffc) r10 = add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, r9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440), 0x0, r10) io_setup(0x2, &(0x7f00000001c0)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000440)='IPVS\x00') memfd_create(&(0x7f0000000f40)='3\x00\x1e\x18J\xb6\t\xca\xd3\x00O9\x143\xd3ty\xf9 \n\x13S+\xefB\xff\x00D\xb8\xeb\fo\xf8\xbdv\xaf\xf6\x18\x1eE\x1eYQc\x94\xd2\xc8#\x9e HID v0.00 Device [syz1] on syz0 [ 1182.576325] hid-generic 0000:0000:0000.0006: hidraw0: HID v0.00 Device [syz1] on syz0 03:35:55 executing program 5: r0 = socket(0x2000000000000021, 0x2, 0x2) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[{0x2}], 0x10}}], 0x1, 0x0) 03:35:55 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) r1 = dup(r0) ioctl$sock_bt_cmtp_CMTPCONNDEL(r1, 0x800443d2, &(0x7f0000000000)) 03:35:55 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc0c0583b, &(0x7f0000000000)) 03:35:55 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getflags(r0, 0x1) r1 = syz_open_dev$sndctrl(&(0x7f0000000640)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r1, 0x80045530, &(0x7f0000002b80)=""/4096) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x2f0080, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x400003, 0x300) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r4, &(0x7f0000000100)={0x2, 0x2}, 0x10) ioctl$sock_FIOSETOWN(r4, 0x8901, &(0x7f0000000580)=0xffffffffffffffff) ioctl$int_in(r4, 0x5452, &(0x7f0000000040)=0x19b) sendto$inet(r4, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @local}, 0x10) sendto$inet(r4, &(0x7f0000000280)="a5fe9e7be7060871618b23a8d86d12156655aa50100792f46b647308d3e2a67328969288734cc698158a84b40408261762639ee5e5881d4fb471fcb9639d30513ab42a04f920d8c1fa0c6ed49b0028fda44d1e69121bd2ff68125d42c7beccab2998e3392614583dd729cd341292ded369a34c4c75e12e8e0f519531fc8f11e74b74f2e5ad24cd0ab65395a2307394f48438306edcbb2ad2261f7535abea9833df32f75d92d392390bcfef75c9923a1745b53c", 0xb3, 0x8801, 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000080)={'bond_slave_0\x00', 0x4000}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) ioctl$RTC_EPOCH_SET(r2, 0x4008700e, 0xc2fe) openat$tun(0xffffffffffffff9c, &(0x7f0000000380)='/dev/net/tun\x00', 0x0, 0x0) syz_open_dev$dri(&(0x7f0000001080)='/dev/dri/card#\x00', 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000140)={0x800, 0x10000, 0x8200, 0x1, 0x6, 0x80000001, 0x3ff, 0x1, 0x0}, &(0x7f0000000200)=0x20) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000003c0)={r5, @in6={{0xa, 0x4e21, 0x100000001, @mcast2, 0x80}}, 0x7, 0x53, 0x2, 0x100, 0x44}, 0x98) openat$zero(0xffffffffffffff9c, &(0x7f0000000240)='/dev/zero\x00', 0x4000, 0x0) quotactl(0x0, 0x0, 0x0, 0x0) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x2, 0x0) write$binfmt_misc(r3, &(0x7f0000000480)=ANY=[@ANYBLOB="73797a30631cee5d21a669cdea93b9d8d4d594fdd6da263438f85e4a45f6393a24ed971733b8bdc6f5099d97090a9f085d8754d4e8d4284848e44f7601b55c01ea188afabe6f9d3e57bbea10636c433bfbbd4e0f5a320725638b1a52d142253f96c003665ec62a8d514aa7b2e0254a9d6d1d700727b3ed17b5"], 0x79) socketpair$unix(0x1, 0x7, 0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x9) ioctl$RTC_AIE_ON(r6, 0x7001) 03:35:55 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x76) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet6_int(r0, 0x29, 0x43, &(0x7f0000000080)=0x1f, 0x4) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r2 = accept(r0, 0x0, 0x0) writev(r2, &(0x7f00000000c0)=[{&(0x7f0000000000)='2', 0x1}], 0x1) 03:35:55 executing program 3: ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x8c) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x13}}}, 0x1c) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r2 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r2, 0x107, 0xa, &(0x7f0000788000)=0x2, 0x4) bind$packet(r2, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r2, 0x107, 0x5, &(0x7f0000001000), 0xc5) r3 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2={0xc9, 0x0, {0x2600}}, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) 03:35:55 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000100)={0x51, 0x4, "4d7b8d0924cfd0a11fedb66d7039308011326bbccfb4d06153b36d03b0a2b4786a1f15e34983f64145bd743dc4d657999e504850fff5e372d16fef026934a01eb88c26306389ac563c"}, 0x2000) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000040)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKPG(r1, 0x90000915, 0x0) syz_open_dev$adsp(&(0x7f0000000640)='/dev/adsp#\x00', 0x7, 0x200000000100) socket$inet6_udp(0xa, 0x2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$l2tp(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x4e22, @broadcast}}}, 0xffffffffffffffc2) write$binfmt_elf64(r2, &(0x7f0000000680)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x9, 0x0, 0x0, 0x1ff, 0x3, 0x6, 0x6, 0x200, 0x40, 0x2bb, 0x6, 0x6, 0x38, 0x2, 0xccb, 0x6}, [{0x3, 0xffffffff, 0x0, 0x4, 0xffffffffffffff81, 0x0, 0x753}], "11b63defef4f39901a58ced1a39b478e86fb0256cf779e47ef2b44b0f4cb75faafd40fc44e37ea847224200381f6b9cf6699294129e400bcd0cb19aff81b4e2d05ff1b46648b02b209f80f604c5788d1528e5a4fb49b0cdb5f5a4ad73efb329e86372a14bae9e8607de6f25f", [[], [], [], [], []]}, 0x5e4) ioctl$DRM_IOCTL_ADD_MAP(0xffffffffffffffff, 0xc0286415, &(0x7f0000000280)={&(0x7f0000ffc000/0x3000)=nil, 0x7fffffff, 0x5, 0x40, &(0x7f0000ffa000/0x4000)=nil, 0xe15}) unlink(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) userfaultfd(0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r4 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r3, &(0x7f0000000400)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r3, r4, 0x0, 0x10000) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917}, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) open$dir(&(0x7f0000000240)='./file0\x00', 0x690800, 0x0) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000080)={0xc1, 0x8, 0x4, &(0x7f0000000000)="c7a0d64b"}) 03:35:55 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000025c0)=0x204, 0x4) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x200000000004e23}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000002c0)='illinois\x00', 0x9) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, 0x0, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 03:35:55 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x80, 0x0) add_key$keyring(0x0, &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$alg(0x26, 0x5, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDSETKEYCODE(0xffffffffffffffff, 0x4b4d, &(0x7f00000000c0)={0xffff}) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f0000000080)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x0, 0xfffffffe, 0x1107, 0x2000000, 0x0, 0x1000000000000, 0x0, 0x6]}}) read(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffe}) r2 = syz_open_dev$usbmon(&(0x7f0000000700)='/dev/usbmon#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$UFFDIO_COPY(r3, 0xc028aa03, &(0x7f0000000480)={&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$VIDIOC_ENCODER_CMD(0xffffffffffffffff, 0xc028564d, &(0x7f0000000680)={0x1, 0x1, [0x0, 0x101, 0x3ff, 0x40, 0x0, 0xfffffffffffffffb, 0x8]}) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r3, 0x80045400, &(0x7f00000004c0)) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x20a000, 0x0) ioctl$KDSKBSENT(r2, 0x4b49, &(0x7f0000000800)) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000500)='/dev/sequencer2\x00', 0x14003d, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r4, 0x84, 0x8, &(0x7f0000000180), 0x4) iopl(0x10000) syz_genetlink_get_family_id$fou(&(0x7f0000000580)='fou\x00') openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x501000, 0x0) sendmsg$FOU_CMD_DEL(r5, &(0x7f0000000640)={&(0x7f0000000540), 0xc, &(0x7f0000000600)={&(0x7f0000000000)=ANY=[@ANYBLOB="0000000000eefff5e36e02000000"], 0x1}, 0x1, 0x0, 0x0, 0x20044000}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25d1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000080)) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1183.086457] audit: type=1800 audit(2000000155.940:833): pid=18743 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=17338 res=0 03:35:56 executing program 4: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = socket(0x11, 0x2, 0x5) r5 = gettid() perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r5, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$tipc(r4, 0x0, &(0x7f0000000080)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000008c0)={{{@in6=@remote, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000006c0)='./file0/file0\x00', &(0x7f00000007c0)) r7 = getpgid(0x0) connect$bt_l2cap(r0, &(0x7f0000000340)={0x1f, 0x1, {0xccce, 0x7, 0x80000001, 0x8, 0x7, 0x5}, 0xe0, 0x6}, 0xe) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000840)={{0x0, r2, r3, r6, r3, 0x4c1078b5631b409f, 0xb}, 0xb8fb, 0xffc, 0x3, 0x8000, r7, r7, 0x81}) r8 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000000) sendmsg(r0, &(0x7f0000001b40)={&(0x7f00000003c0)=@sco={0x1f, {0x7, 0x8000, 0x0, 0x0, 0x7ff, 0x8}}, 0x80, &(0x7f0000001a00)=[{&(0x7f0000000600)='t\x00\x00', 0x3}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000040)="2d41d358b8361e7d73e3e48513a08593", 0xffffffbd) ioctl$BLKTRACESETUP(r8, 0xc0481273, &(0x7f0000000080)={[], 0x2, 0x400, 0x200, 0x0, 0x1}) setsockopt$inet6_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f0000000100)='lp@', 0xffffffffffffffcd) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2000, 0x8000000000e, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x8000000000000000, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x7, 0xfffffffffffffffe, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r1, 0x0) r9 = add_key(&(0x7f00000002c0)='.request_key_auth\x00', &(0x7f0000000480)={'syz', 0x2}, &(0x7f0000000540)="f8fd8d8cc6a7f60cbf12c4712b9a67849bcf030bd87ba1706b188aec1ff87cc5b3202395528f4dbb504bdd2a93e2f896c7bd1041a75cccb8b7f688f7bc1ccf910aacbccf14cddb359390c9e7a64a", 0x4e, 0xfffffffffffffffc) r10 = add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, r9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440), 0x0, r10) io_setup(0x2, &(0x7f00000001c0)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000440)='IPVS\x00') memfd_create(&(0x7f0000000f40)='3\x00\x1e\x18J\xb6\t\xca\xd3\x00O9\x143\xd3ty\xf9 \n\x13S+\xefB\xff\x00D\xb8\xeb\fo\xf8\xbdv\xaf\xf6\x18\x1eE\x1eYQc\x94\xd2\xc8#\x9e0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) unshare(0x20020000) mount$fuse(0x0, &(0x7f0000000040)='.\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) mount(&(0x7f0000000040), &(0x7f0000000140)='./file0\x00', 0x0, 0x201000, 0x0) chdir(&(0x7f0000000300)='./file0\x00') pivot_root(&(0x7f00000004c0)='.\x00', &(0x7f0000000200)='./file0\x00') poll(0x0, 0x0, 0x400007f) rmdir(&(0x7f00000001c0)='./file0\x00') 03:35:56 executing program 3: r0 = memfd_create(&(0x7f00000000c0)='\x06\x00\x00\x00\x00\x00\x00\xae\xe5\x9dr\xdd8\x89R\xd5^\xac\v\x12c\xa7\xb8/\x12\xd4\x18\x91\xc4$\b\xf7\xbe\x18\xb6\xdc\xbd\xaa\xa2$^\x81\xaad{\x94y3\xe2\x80 j\xaftTcu\xf9\xfd8\x16\x88{?\xb4c\xc6\xd0\x828wK\xed\x96\x10\xe2w\xdb\x1f\'\xe3Z\xe21\xa4EQ/\xea\xb1\xb2\xa6B\x92\x12\x84<\x04\bB\xadPa\xdfFo6\x94\x868\xa1\x8dB\xed_o{\xdeGW\xc3\xba\xac0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) readv(r0, &(0x7f0000000380)=[{&(0x7f0000000080)=""/195, 0x23}], 0x1) 03:35:56 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) futex(&(0x7f000000cffc)=0x200000004, 0x80, 0x4, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x85, 0x0, 0x0, &(0x7f0000000080), 0x5000000) 03:35:56 executing program 4: r0 = syz_open_dev$usbmon(0x0, 0x1, 0x48000) recvfrom$inet(r0, 0x0, 0x202, 0x0, 0x0, 0x10000007c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000240)='./file0/file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = socket(0x11, 0x2, 0x5) r5 = gettid() perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r5, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockname$tipc(r4, 0x0, &(0x7f0000000080)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000008c0)={{{@in6=@remote, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f00000006c0)='./file0/file0\x00', &(0x7f00000007c0)) r7 = getpgid(0x0) connect$bt_l2cap(r0, &(0x7f0000000340)={0x1f, 0x1, {0xccce, 0x7, 0x80000001, 0x8, 0x7, 0x5}, 0xe0, 0x6}, 0xe) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000840)={{0x0, r2, r3, r6, r3, 0x4c1078b5631b409f, 0xb}, 0xb8fb, 0xffc, 0x3, 0x8000, r7, r7, 0x81}) r8 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000000) sendmsg(r0, &(0x7f0000001b40)={&(0x7f00000003c0)=@sco={0x1f, {0x7, 0x8000, 0x0, 0x0, 0x7ff, 0x8}}, 0x80, &(0x7f0000001a00)=[{&(0x7f0000000600)='t\x00\x00', 0x3}], 0x1}, 0x40000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000040)="2d41d358b8361e7d73e3e48513a08593", 0xffffffbd) ioctl$BLKTRACESETUP(r8, 0xc0481273, &(0x7f0000000080)={[], 0x2, 0x400, 0x200, 0x0, 0x1}) setsockopt$inet6_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f0000000100)='lp@', 0xffffffffffffffcd) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2000, 0x8000000000e, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x8000000000000000, 0x0, 0x0, 0x0, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x7, 0xfffffffffffffffe, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r1, 0x0) r9 = add_key(&(0x7f00000002c0)='.request_key_auth\x00', &(0x7f0000000480)={'syz', 0x2}, &(0x7f0000000540)="f8fd8d8cc6a7f60cbf12c4712b9a67849bcf030bd87ba1706b188aec1ff87cc5b3202395528f4dbb504bdd2a93e2f896c7bd1041a75cccb8b7f688f7bc1ccf910aacbccf14cddb359390c9e7a64a", 0x4e, 0xfffffffffffffffc) r10 = add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, r9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440), 0x0, r10) io_setup(0x2, &(0x7f00000001c0)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000440)='IPVS\x00') memfd_create(&(0x7f0000000f40)='3\x00\x1e\x18J\xb6\t\xca\xd3\x00O9\x143\xd3ty\xf9 \n\x13S+\xefB\xff\x00D\xb8\xeb\fo\xf8\xbdv\xaf\xf6\x18\x1eE\x1eYQc\x94\xd2\xc8#\x9e0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, 0x0) 03:35:57 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000100)={0x51, 0x4, "4d7b8d0924cfd0a11fedb66d7039308011326bbccfb4d06153b36d03b0a2b4786a1f15e34983f64145bd743dc4d657999e504850fff5e372d16fef026934a01eb88c26306389ac563c"}, 0x2000) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000040)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKPG(r1, 0x90000915, 0x0) syz_open_dev$adsp(&(0x7f0000000640)='/dev/adsp#\x00', 0x7, 0x200000000100) socket$inet6_udp(0xa, 0x2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$l2tp(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x4e22, @broadcast}}}, 0xffffffffffffffc2) write$binfmt_elf64(r2, &(0x7f0000000680)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x9, 0x0, 0x0, 0x1ff, 0x3, 0x6, 0x6, 0x200, 0x40, 0x2bb, 0x6, 0x6, 0x38, 0x2, 0xccb, 0x6}, [{0x3, 0xffffffff, 0x0, 0x4, 0xffffffffffffff81, 0x0, 0x753}], "11b63defef4f39901a58ced1a39b478e86fb0256cf779e47ef2b44b0f4cb75faafd40fc44e37ea847224200381f6b9cf6699294129e400bcd0cb19aff81b4e2d05ff1b46648b02b209f80f604c5788d1528e5a4fb49b0cdb5f5a4ad73efb329e86372a14bae9e8607de6f25f", [[], [], [], [], []]}, 0x5e4) ioctl$DRM_IOCTL_ADD_MAP(0xffffffffffffffff, 0xc0286415, &(0x7f0000000280)={&(0x7f0000ffc000/0x3000)=nil, 0x7fffffff, 0x5, 0x40, &(0x7f0000ffa000/0x4000)=nil, 0xe15}) unlink(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) userfaultfd(0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r4 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r3, &(0x7f0000000400)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r3, r4, 0x0, 0x10000) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917}, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) open$dir(&(0x7f0000000240)='./file0\x00', 0x690800, 0x0) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000080)={0xc1, 0x8, 0x4, &(0x7f0000000000)="c7a0d64b"}) 03:35:57 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000300)='/dev/sg#\x00', 0x0, 0x2) write$binfmt_script(r0, &(0x7f0000000580)=ANY=[@ANYRES16=r0, @ANYRESOCT, @ANYRES32=r0, @ANYRES64=0x0], 0x25) socketpair$unix(0x1, 0x8000000000003, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) readv(r0, &(0x7f0000000380)=[{&(0x7f0000000080)=""/195, 0x23}], 0x1) 03:35:57 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000100)={0x51, 0x4, "4d7b8d0924cfd0a11fedb66d7039308011326bbccfb4d06153b36d03b0a2b4786a1f15e34983f64145bd743dc4d657999e504850fff5e372d16fef026934a01eb88c26306389ac563c"}, 0x2000) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000040)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKPG(r1, 0x90000915, 0x0) syz_open_dev$adsp(&(0x7f0000000640)='/dev/adsp#\x00', 0x7, 0x200000000100) socket$inet6_udp(0xa, 0x2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$l2tp(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x4e22, @broadcast}}}, 0xffffffffffffffc2) write$binfmt_elf64(r2, &(0x7f0000000680)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x9, 0x0, 0x0, 0x1ff, 0x3, 0x6, 0x6, 0x200, 0x40, 0x2bb, 0x6, 0x6, 0x38, 0x2, 0xccb, 0x6}, [{0x3, 0xffffffff, 0x0, 0x4, 0xffffffffffffff81, 0x0, 0x753}], "11b63defef4f39901a58ced1a39b478e86fb0256cf779e47ef2b44b0f4cb75faafd40fc44e37ea847224200381f6b9cf6699294129e400bcd0cb19aff81b4e2d05ff1b46648b02b209f80f604c5788d1528e5a4fb49b0cdb5f5a4ad73efb329e86372a14bae9e8607de6f25f", [[], [], [], [], []]}, 0x5e4) ioctl$DRM_IOCTL_ADD_MAP(0xffffffffffffffff, 0xc0286415, &(0x7f0000000280)={&(0x7f0000ffc000/0x3000)=nil, 0x7fffffff, 0x5, 0x40, &(0x7f0000ffa000/0x4000)=nil, 0xe15}) unlink(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) userfaultfd(0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r4 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r3, &(0x7f0000000400)="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", 0x200) sendfile(r3, r4, 0x0, 0x10000) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917}, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) open$dir(&(0x7f0000000240)='./file0\x00', 0x690800, 0x0) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000080)={0xc1, 0x8, 0x4, &(0x7f0000000000)="c7a0d64b"}) 03:35:57 executing program 2: connect$can_bcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x4000000) r0 = syz_open_dev$media(0x0, 0x2, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000000c0)=0x40400, 0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r1, 0x401c5504, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f00000001c0)={0x7, "0c0e0a12d7afa4f805aa9bb061b967c50f49b7a3120bf4f08b3f30ed4cca6e67", 0x2, 0x241, 0x6, 0x0, 0x5, 0x1, 0x4, 0x7fffffff}) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e21, @empty}}, 0x398fde67, 0x8}, &(0x7f0000000600)=0x90) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) ioctl$BLKALIGNOFF(r0, 0x127a, &(0x7f0000000040)) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x101, 0x0) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, 0x0, 0x0) r2 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e20, @loopback}, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') inotify_add_watch(r0, 0x0, 0x20000450) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={&(0x7f00000000c0)=ANY=[]}, 0x1, 0x0, 0x0, 0x40000}, 0x0) sendmsg(r2, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) recvfrom$inet(r2, &(0x7f0000000740)=""/171, 0xab, 0x10021, &(0x7f0000000800)={0x2, 0x4e23, @rand_addr=0x1000}, 0x10) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, 0x0) [ 1184.815752] audit: type=1800 audit(2000000157.670:836): pid=19261 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=17343 res=0 [ 1184.918875] audit: type=1804 audit(2000000157.710:837): pid=19261 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/file0/file0/file0/file0/root/syzkaller-testdir580031397/syzkaller.IeBvJH/550/file0" dev="sda1" ino=17343 res=1 03:35:57 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000025c0)=0x204, 0x4) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x200000000004e23}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000002c0)='illinois\x00', 0x9) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, 0x0, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 03:35:57 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000025c0)=0x204, 0x4) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x200000000004e23}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000002c0)='illinois\x00', 0x9) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, 0x0, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) [ 1185.108868] audit: type=1800 audit(2000000157.770:838): pid=19295 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=17313 res=0 [ 1185.131972] audit: type=1804 audit(2000000157.860:839): pid=19295 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir860627136/syzkaller.w4A5nC/403/file0" dev="sda1" ino=17313 res=1 03:35:58 executing program 2: mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000002c0)='cgroup.procs\x00', 0x2, 0x0) ioctl$FICLONE(r1, 0x40049409, r0) 03:35:58 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000300)='/dev/sg#\x00', 0x0, 0x2) write$binfmt_script(r0, &(0x7f0000000580)=ANY=[@ANYRES16=r0, @ANYRESOCT, @ANYRES32=r0, @ANYRES64=0x0], 0x25) socketpair$unix(0x1, 0x8000000000003, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) readv(r0, &(0x7f0000000380)=[{&(0x7f0000000080)=""/195, 0x23}], 0x1) 03:35:59 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000025c0)=0x204, 0x4) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x200000000004e23}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000002c0)='illinois\x00', 0x9) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, 0x0, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 03:35:59 executing program 2: r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, 0xffffffffffffffff) 03:35:59 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000025c0)=0x204, 0x4) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x200000000004e23}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000002c0)='illinois\x00', 0x9) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, 0x0, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, 0x0, 0x0) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 03:35:59 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000100)={0x51, 0x4, "4d7b8d0924cfd0a11fedb66d7039308011326bbccfb4d06153b36d03b0a2b4786a1f15e34983f64145bd743dc4d657999e504850fff5e372d16fef026934a01eb88c26306389ac563c"}, 0x2000) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000040)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKPG(r1, 0x90000915, 0x0) syz_open_dev$adsp(&(0x7f0000000640)='/dev/adsp#\x00', 0x7, 0x200000000100) socket$inet6_udp(0xa, 0x2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$l2tp(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x4e22, @broadcast}}}, 0xffffffffffffffc2) write$binfmt_elf64(r2, &(0x7f0000000680)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x9, 0x0, 0x0, 0x1ff, 0x3, 0x6, 0x6, 0x200, 0x40, 0x2bb, 0x6, 0x6, 0x38, 0x2, 0xccb, 0x6}, [{0x3, 0xffffffff, 0x0, 0x4, 0xffffffffffffff81, 0x0, 0x753}], "11b63defef4f39901a58ced1a39b478e86fb0256cf779e47ef2b44b0f4cb75faafd40fc44e37ea847224200381f6b9cf6699294129e400bcd0cb19aff81b4e2d05ff1b46648b02b209f80f604c5788d1528e5a4fb49b0cdb5f5a4ad73efb329e86372a14bae9e8607de6f25f", [[], [], [], [], []]}, 0x5e4) ioctl$DRM_IOCTL_ADD_MAP(0xffffffffffffffff, 0xc0286415, &(0x7f0000000280)={&(0x7f0000ffc000/0x3000)=nil, 0x7fffffff, 0x5, 0x40, &(0x7f0000ffa000/0x4000)=nil, 0xe15}) unlink(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) userfaultfd(0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r4 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r3, &(0x7f0000000400)="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", 0x200) sendfile(r3, r4, 0x0, 0x10000) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917}, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) open$dir(&(0x7f0000000240)='./file0\x00', 0x690800, 0x0) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000080)={0xc1, 0x8, 0x4, &(0x7f0000000000)="c7a0d64b"}) 03:35:59 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000100)={0x51, 0x4, "4d7b8d0924cfd0a11fedb66d7039308011326bbccfb4d06153b36d03b0a2b4786a1f15e34983f64145bd743dc4d657999e504850fff5e372d16fef026934a01eb88c26306389ac563c"}, 0x2000) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000040)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKPG(r1, 0x90000915, 0x0) syz_open_dev$adsp(&(0x7f0000000640)='/dev/adsp#\x00', 0x7, 0x200000000100) socket$inet6_udp(0xa, 0x2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$l2tp(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x4e22, @broadcast}}}, 0xffffffffffffffc2) write$binfmt_elf64(r2, &(0x7f0000000680)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x9, 0x0, 0x0, 0x1ff, 0x3, 0x6, 0x6, 0x200, 0x40, 0x2bb, 0x6, 0x6, 0x38, 0x2, 0xccb, 0x6}, [{0x3, 0xffffffff, 0x0, 0x4, 0xffffffffffffff81, 0x0, 0x753}], "11b63defef4f39901a58ced1a39b478e86fb0256cf779e47ef2b44b0f4cb75faafd40fc44e37ea847224200381f6b9cf6699294129e400bcd0cb19aff81b4e2d05ff1b46648b02b209f80f604c5788d1528e5a4fb49b0cdb5f5a4ad73efb329e86372a14bae9e8607de6f25f", [[], [], [], [], []]}, 0x5e4) ioctl$DRM_IOCTL_ADD_MAP(0xffffffffffffffff, 0xc0286415, &(0x7f0000000280)={&(0x7f0000ffc000/0x3000)=nil, 0x7fffffff, 0x5, 0x40, &(0x7f0000ffa000/0x4000)=nil, 0xe15}) unlink(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) userfaultfd(0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r4 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r3, &(0x7f0000000400)="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", 0x200) sendfile(r3, r4, 0x0, 0x10000) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917}, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) open$dir(&(0x7f0000000240)='./file0\x00', 0x690800, 0x0) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000080)={0xc1, 0x8, 0x4, &(0x7f0000000000)="c7a0d64b"}) 03:35:59 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000100)={0x51, 0x4, "4d7b8d0924cfd0a11fedb66d7039308011326bbccfb4d06153b36d03b0a2b4786a1f15e34983f64145bd743dc4d657999e504850fff5e372d16fef026934a01eb88c26306389ac563c"}, 0x2000) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000040)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKPG(r1, 0x90000915, 0x0) syz_open_dev$adsp(&(0x7f0000000640)='/dev/adsp#\x00', 0x7, 0x200000000100) socket$inet6_udp(0xa, 0x2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$l2tp(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x4e22, @broadcast}}}, 0xffffffffffffffc2) write$binfmt_elf64(r2, &(0x7f0000000680)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x9, 0x0, 0x0, 0x1ff, 0x3, 0x6, 0x6, 0x200, 0x40, 0x2bb, 0x6, 0x6, 0x38, 0x2, 0xccb, 0x6}, [{0x3, 0xffffffff, 0x0, 0x4, 0xffffffffffffff81, 0x0, 0x753}], "11b63defef4f39901a58ced1a39b478e86fb0256cf779e47ef2b44b0f4cb75faafd40fc44e37ea847224200381f6b9cf6699294129e400bcd0cb19aff81b4e2d05ff1b46648b02b209f80f604c5788d1528e5a4fb49b0cdb5f5a4ad73efb329e86372a14bae9e8607de6f25f", [[], [], [], [], []]}, 0x5e4) ioctl$DRM_IOCTL_ADD_MAP(0xffffffffffffffff, 0xc0286415, &(0x7f0000000280)={&(0x7f0000ffc000/0x3000)=nil, 0x7fffffff, 0x5, 0x40, &(0x7f0000ffa000/0x4000)=nil, 0xe15}) unlink(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) userfaultfd(0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r4 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r3, &(0x7f0000000400)="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", 0x200) sendfile(r3, r4, 0x0, 0x10000) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917}, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) open$dir(&(0x7f0000000240)='./file0\x00', 0x690800, 0x0) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000080)={0xc1, 0x8, 0x4, &(0x7f0000000000)="c7a0d64b"}) [ 1186.842033] audit: type=1800 audit(2000000159.690:840): pid=19628 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=17346 res=0 03:35:59 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000300)='/dev/sg#\x00', 0x0, 0x2) write$binfmt_script(r0, &(0x7f0000000580)=ANY=[@ANYRES16=r0, @ANYRESOCT, @ANYRES32=r0, @ANYRES64=0x0], 0x25) socketpair$unix(0x1, 0x8000000000003, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) readv(r0, &(0x7f0000000380)=[{&(0x7f0000000080)=""/195, 0x23}], 0x1) [ 1186.925744] audit: type=1804 audit(2000000159.750:841): pid=19628 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/file0/file0/file0/file0/root/syzkaller-testdir580031397/syzkaller.IeBvJH/551/file0" dev="sda1" ino=17346 res=1 [ 1187.157328] audit: type=1800 audit(2000000159.900:842): pid=19631 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=17328 res=0 03:36:00 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, 0x0, 0x0) getpgrp(0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={0x0, r1, 0x0, 0x7, &(0x7f0000000300)='$\'self\x00', 0xffffffffffffffff}, 0x30) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f00000004c0)=0x0) r4 = syz_open_procfs(r3, &(0x7f0000000740)='net/dev\x00') fcntl$setstatus(r4, 0x4, 0x14400) mprotect(&(0x7f0000107000/0x2000)=nil, 0x2000, 0xfffffffffffffff9) poll(&(0x7f0000000400)=[{0xffffffffffffffff, 0x120c}, {}], 0x2, 0x8) pread64(r4, &(0x7f0000003c00)=""/4096, 0xffffff72, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], &(0x7f0000000340)=""/144, 0x90) ioctl$KVM_IRQ_LINE(r4, 0x4008ae61, &(0x7f0000000000)={0x0, 0x9}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00', r2}, 0x10) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000640)=[{0x0, 0x0, 0x0}], 0x1, 0x4010) r5 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000180)={0x0, 0x40000001, 0x1000000006, 0x2}, &(0x7f0000000900)=0x33) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_CREATE_PIT2(r5, 0x4040ae77, 0x0) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) dup2(r0, r5) syz_emit_ethernet(0x30, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @local, [], {@llc_tr={0x11, {@snap={0x0, 0x1, "ed", "80da46", 0x89ff, "5873867110c22f81a95a544d15c962a6faf92bb1cc24dae03057"}}}}}, 0x0) ioctl$VIDIOC_ENUMAUDOUT(r4, 0xc0345642, &(0x7f00000000c0)={0x7, "5955cfc07bb325514a645aa1542ff1fc33dc7170fe80af668aadb01ec2059c66", 0x0, 0x1}) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) 03:36:00 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2000001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r1 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x400448c9, 0x0) 03:36:00 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x8020000) semget$private(0x0, 0x403, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x0, 0x1800}], 0x1) unshare(0x8020400) 03:36:00 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace(0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000040)={'syz_tun\x00'}) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000240)={'syz_tun\x00', {0x2, 0x0, @broadcast}}) 03:36:01 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, 0x0, 0x0) getpgrp(0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={0x0, r1, 0x0, 0x7, &(0x7f0000000300)='$\'self\x00', 0xffffffffffffffff}, 0x30) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f00000004c0)=0x0) r4 = syz_open_procfs(r3, &(0x7f0000000740)='net/dev\x00') fcntl$setstatus(r4, 0x4, 0x14400) mprotect(&(0x7f0000107000/0x2000)=nil, 0x2000, 0xfffffffffffffff9) poll(&(0x7f0000000400)=[{0xffffffffffffffff, 0x120c}, {}], 0x2, 0x8) pread64(r4, &(0x7f0000003c00)=""/4096, 0xffffff72, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], &(0x7f0000000340)=""/144, 0x90) ioctl$KVM_IRQ_LINE(r4, 0x4008ae61, &(0x7f0000000000)={0x0, 0x9}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00', r2}, 0x10) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000640)=[{0x0, 0x0, 0x0}], 0x1, 0x4010) r5 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000180)={0x0, 0x40000001, 0x1000000006, 0x2}, &(0x7f0000000900)=0x33) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_CREATE_PIT2(r5, 0x4040ae77, 0x0) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) dup2(r0, r5) syz_emit_ethernet(0x30, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @local, [], {@llc_tr={0x11, {@snap={0x0, 0x1, "ed", "80da46", 0x89ff, "5873867110c22f81a95a544d15c962a6faf92bb1cc24dae03057"}}}}}, 0x0) ioctl$VIDIOC_ENUMAUDOUT(r4, 0xc0345642, &(0x7f00000000c0)={0x7, "5955cfc07bb325514a645aa1542ff1fc33dc7170fe80af668aadb01ec2059c66", 0x0, 0x1}) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) 03:36:01 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x8020000) semget$private(0x0, 0x403, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x0, 0x1800}], 0x1) unshare(0x8020400) [ 1188.990188] bridge0: port 3(syz_tun) entered disabled state [ 1188.999005] device syz_tun left promiscuous mode [ 1189.004604] bridge0: port 3(syz_tun) entered disabled state [ 1190.855889] IPVS: ftp: loaded support on port[0] = 21 [ 1190.924198] chnl_net:caif_netlink_parms(): no params data found [ 1190.951534] bridge0: port 1(bridge_slave_0) entered blocking state [ 1190.958275] bridge0: port 1(bridge_slave_0) entered disabled state [ 1190.965310] device bridge_slave_0 entered promiscuous mode [ 1190.972598] bridge0: port 2(bridge_slave_1) entered blocking state [ 1190.979158] bridge0: port 2(bridge_slave_1) entered disabled state [ 1190.986214] device bridge_slave_1 entered promiscuous mode [ 1191.002407] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1191.011355] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1191.026630] team0: Port device team_slave_0 added [ 1191.032954] team0: Port device team_slave_1 added [ 1191.092493] device hsr_slave_0 entered promiscuous mode [ 1191.150990] device hsr_slave_1 entered promiscuous mode [ 1191.196425] bridge0: port 2(bridge_slave_1) entered blocking state [ 1191.202860] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1191.209519] bridge0: port 1(bridge_slave_0) entered blocking state [ 1191.215849] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1191.249619] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1191.264278] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1191.271817] bridge0: port 1(bridge_slave_0) entered disabled state [ 1191.289417] bridge0: port 2(bridge_slave_1) entered disabled state [ 1191.296917] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1191.307868] 8021q: adding VLAN 0 to HW filter on device team0 [ 1191.318437] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1191.325962] bridge0: port 1(bridge_slave_0) entered blocking state [ 1191.332364] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1191.339311] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1191.346847] bridge0: port 2(bridge_slave_1) entered blocking state [ 1191.353232] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1191.369851] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1191.377979] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1191.385812] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1191.398839] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1191.409565] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1191.421568] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1191.429959] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1191.445425] 8021q: adding VLAN 0 to HW filter on device batadv0 03:36:04 executing program 2: r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, 0xffffffffffffffff) 03:36:04 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000100)={0x51, 0x4, "4d7b8d0924cfd0a11fedb66d7039308011326bbccfb4d06153b36d03b0a2b4786a1f15e34983f64145bd743dc4d657999e504850fff5e372d16fef026934a01eb88c26306389ac563c"}, 0x2000) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000040)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKPG(r1, 0x90000915, 0x0) syz_open_dev$adsp(&(0x7f0000000640)='/dev/adsp#\x00', 0x7, 0x200000000100) socket$inet6_udp(0xa, 0x2, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$l2tp(0xffffffffffffffff, &(0x7f00000002c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x4e22, @broadcast}}}, 0xffffffffffffffc2) write$binfmt_elf64(r2, &(0x7f0000000680)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x9, 0x0, 0x0, 0x1ff, 0x3, 0x6, 0x6, 0x200, 0x40, 0x2bb, 0x6, 0x6, 0x38, 0x2, 0xccb, 0x6}, [{0x3, 0xffffffff, 0x0, 0x4, 0xffffffffffffff81, 0x0, 0x753}], "11b63defef4f39901a58ced1a39b478e86fb0256cf779e47ef2b44b0f4cb75faafd40fc44e37ea847224200381f6b9cf6699294129e400bcd0cb19aff81b4e2d05ff1b46648b02b209f80f604c5788d1528e5a4fb49b0cdb5f5a4ad73efb329e86372a14bae9e8607de6f25f", [[], [], [], [], []]}, 0x5e4) ioctl$DRM_IOCTL_ADD_MAP(0xffffffffffffffff, 0xc0286415, &(0x7f0000000280)={&(0x7f0000ffc000/0x3000)=nil, 0x7fffffff, 0x5, 0x40, &(0x7f0000ffa000/0x4000)=nil, 0xe15}) unlink(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) userfaultfd(0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r4 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r3, &(0x7f0000000400)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r3, r4, 0x0, 0x10000) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917}, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) open$dir(&(0x7f0000000240)='./file0\x00', 0x690800, 0x0) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000080)={0xc1, 0x8, 0x4, &(0x7f0000000000)="c7a0d64b"}) 03:36:04 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, 0x0, 0x0) getpgrp(0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={0x0, r1, 0x0, 0x7, &(0x7f0000000300)='$\'self\x00', 0xffffffffffffffff}, 0x30) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f00000004c0)=0x0) r4 = syz_open_procfs(r3, &(0x7f0000000740)='net/dev\x00') fcntl$setstatus(r4, 0x4, 0x14400) mprotect(&(0x7f0000107000/0x2000)=nil, 0x2000, 0xfffffffffffffff9) poll(&(0x7f0000000400)=[{0xffffffffffffffff, 0x120c}, {}], 0x2, 0x8) pread64(r4, &(0x7f0000003c00)=""/4096, 0xffffff72, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], &(0x7f0000000340)=""/144, 0x90) ioctl$KVM_IRQ_LINE(r4, 0x4008ae61, &(0x7f0000000000)={0x0, 0x9}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00', r2}, 0x10) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000640)=[{0x0, 0x0, 0x0}], 0x1, 0x4010) r5 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000180)={0x0, 0x40000001, 0x1000000006, 0x2}, &(0x7f0000000900)=0x33) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_CREATE_PIT2(r5, 0x4040ae77, 0x0) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) dup2(r0, r5) syz_emit_ethernet(0x30, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @local, [], {@llc_tr={0x11, {@snap={0x0, 0x1, "ed", "80da46", 0x89ff, "5873867110c22f81a95a544d15c962a6faf92bb1cc24dae03057"}}}}}, 0x0) ioctl$VIDIOC_ENUMAUDOUT(r4, 0xc0345642, &(0x7f00000000c0)={0x7, "5955cfc07bb325514a645aa1542ff1fc33dc7170fe80af668aadb01ec2059c66", 0x0, 0x1}) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) 03:36:04 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x8020000) semget$private(0x0, 0x403, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x0, 0x1800}], 0x1) unshare(0x8020400) 03:36:04 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x8020000) semget$private(0x0, 0x403, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x0, 0x1800}], 0x1) unshare(0x8020400) 03:36:04 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x8020000) semget$private(0x0, 0x403, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x0, 0x1800}], 0x1) unshare(0x8020400) [ 1191.623097] kauditd_printk_skb: 1 callbacks suppressed [ 1191.623110] audit: type=1800 audit(2000000164.480:844): pid=19686 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=17382 res=0 [ 1191.698471] audit: type=1804 audit(2000000164.530:845): pid=19686 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/file0/file0/file0/file0/root/syzkaller-testdir580031397/syzkaller.IeBvJH/552/file0" dev="sda1" ino=17382 res=1 03:36:04 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x8020000) semget$private(0x0, 0x403, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x0, 0x1800}], 0x1) unshare(0x8020400) 03:36:04 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x8020000) semget$private(0x0, 0x403, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x0, 0x1800}], 0x1) unshare(0x8020400) 03:36:04 executing program 2: r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, 0xffffffffffffffff) 03:36:04 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x8020000) semget$private(0x0, 0x403, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x0, 0x1800}], 0x1) unshare(0x8020400) 03:36:04 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, 0x0, 0x0) getpgrp(0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={0x0, r1, 0x0, 0x7, &(0x7f0000000300)='$\'self\x00', 0xffffffffffffffff}, 0x30) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f00000004c0)=0x0) r4 = syz_open_procfs(r3, &(0x7f0000000740)='net/dev\x00') fcntl$setstatus(r4, 0x4, 0x14400) mprotect(&(0x7f0000107000/0x2000)=nil, 0x2000, 0xfffffffffffffff9) poll(&(0x7f0000000400)=[{0xffffffffffffffff, 0x120c}, {}], 0x2, 0x8) pread64(r4, &(0x7f0000003c00)=""/4096, 0xffffff72, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], &(0x7f0000000340)=""/144, 0x90) ioctl$KVM_IRQ_LINE(r4, 0x4008ae61, &(0x7f0000000000)={0x0, 0x9}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00', r2}, 0x10) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000640)=[{0x0, 0x0, 0x0}], 0x1, 0x4010) r5 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000180)={0x0, 0x40000001, 0x1000000006, 0x2}, &(0x7f0000000900)=0x33) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_CREATE_PIT2(r5, 0x4040ae77, 0x0) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) dup2(r0, r5) syz_emit_ethernet(0x30, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @local, [], {@llc_tr={0x11, {@snap={0x0, 0x1, "ed", "80da46", 0x89ff, "5873867110c22f81a95a544d15c962a6faf92bb1cc24dae03057"}}}}}, 0x0) ioctl$VIDIOC_ENUMAUDOUT(r4, 0xc0345642, &(0x7f00000000c0)={0x7, "5955cfc07bb325514a645aa1542ff1fc33dc7170fe80af668aadb01ec2059c66", 0x0, 0x1}) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) 03:36:05 executing program 2: r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, 0xffffffffffffffff) 03:36:05 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, 0x0, 0x0) getpgrp(0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={0x0, r1, 0x0, 0x7, &(0x7f0000000300)='$\'self\x00', 0xffffffffffffffff}, 0x30) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f00000004c0)=0x0) r4 = syz_open_procfs(r3, &(0x7f0000000740)='net/dev\x00') fcntl$setstatus(r4, 0x4, 0x14400) mprotect(&(0x7f0000107000/0x2000)=nil, 0x2000, 0xfffffffffffffff9) poll(&(0x7f0000000400)=[{0xffffffffffffffff, 0x120c}, {}], 0x2, 0x8) pread64(r4, &(0x7f0000003c00)=""/4096, 0xffffff72, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], &(0x7f0000000340)=""/144, 0x90) ioctl$KVM_IRQ_LINE(r4, 0x4008ae61, &(0x7f0000000000)={0x0, 0x9}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00', r2}, 0x10) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000640)=[{0x0, 0x0, 0x0}], 0x1, 0x4010) r5 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000180)={0x0, 0x40000001, 0x1000000006, 0x2}, &(0x7f0000000900)=0x33) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_CREATE_PIT2(r5, 0x4040ae77, 0x0) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) dup2(r0, r5) syz_emit_ethernet(0x30, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @local, [], {@llc_tr={0x11, {@snap={0x0, 0x1, "ed", "80da46", 0x89ff, "5873867110c22f81a95a544d15c962a6faf92bb1cc24dae03057"}}}}}, 0x0) ioctl$VIDIOC_ENUMAUDOUT(r4, 0xc0345642, &(0x7f00000000c0)={0x7, "5955cfc07bb325514a645aa1542ff1fc33dc7170fe80af668aadb01ec2059c66", 0x0, 0x1}) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) 03:36:05 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x8020000) semget$private(0x0, 0x403, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x0, 0x1800}], 0x1) unshare(0x8020400) 03:36:05 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x8020000) semget$private(0x0, 0x403, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x0, 0x1800}], 0x1) unshare(0x8020400) 03:36:05 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000000c0)={'sit0\x00', 0x0}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000140)=0x110, 0x4) setsockopt$sock_int(r1, 0x1, 0x23, &(0x7f0000000000)=0x3, 0x4) bind$packet(r1, &(0x7f0000000040)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @remote}, 0x14) sendmmsg(r1, &(0x7f0000000d00), 0x400004e, 0x0) recvfrom$packet(r1, 0x0, 0x0, 0x2040, 0x0, 0x0) 03:36:05 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, 0x0, 0x0) getpgrp(0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={0x0, r1, 0x0, 0x7, &(0x7f0000000300)='$\'self\x00', 0xffffffffffffffff}, 0x30) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f00000004c0)=0x0) r4 = syz_open_procfs(r3, &(0x7f0000000740)='net/dev\x00') fcntl$setstatus(r4, 0x4, 0x14400) mprotect(&(0x7f0000107000/0x2000)=nil, 0x2000, 0xfffffffffffffff9) poll(&(0x7f0000000400)=[{0xffffffffffffffff, 0x120c}, {}], 0x2, 0x8) pread64(r4, &(0x7f0000003c00)=""/4096, 0xffffff72, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], &(0x7f0000000340)=""/144, 0x90) ioctl$KVM_IRQ_LINE(r4, 0x4008ae61, &(0x7f0000000000)={0x0, 0x9}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00', r2}, 0x10) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000640)=[{0x0, 0x0, 0x0}], 0x1, 0x4010) r5 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000180)={0x0, 0x40000001, 0x1000000006, 0x2}, &(0x7f0000000900)=0x33) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_CREATE_PIT2(r5, 0x4040ae77, 0x0) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) dup2(r0, r5) syz_emit_ethernet(0x30, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @local, [], {@llc_tr={0x11, {@snap={0x0, 0x1, "ed", "80da46", 0x89ff, "5873867110c22f81a95a544d15c962a6faf92bb1cc24dae03057"}}}}}, 0x0) ioctl$VIDIOC_ENUMAUDOUT(r4, 0xc0345642, &(0x7f00000000c0)={0x7, "5955cfc07bb325514a645aa1542ff1fc33dc7170fe80af668aadb01ec2059c66", 0x0, 0x1}) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) 03:36:05 executing program 0: r0 = socket(0x10, 0x2, 0xc) write(r0, &(0x7f0000000000)="1f0000000104ff00fd01000000000020000501000800010003f2511a10df00", 0x1f) 03:36:05 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x15, 0x3, &(0x7f0000000000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x5, 0x34}}, &(0x7f0000001580)='GPL\x00', 0x1, 0x99, &(0x7f0000000180)=""/153}, 0x48) [ 1192.899000] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.0'. 03:36:05 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000180), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000140)) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r0, 0x114, 0xa, &(0x7f0000000000), 0x1) 03:36:05 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r0, &(0x7f0000000500)=""/175, 0x5d) getdents64(r0, &(0x7f0000000080)=""/124, 0x7c) 03:36:05 executing program 5: prctl$PR_SET_NAME(0xf, &(0x7f0000000340)='/\x00\x00\x00\x00\x00\x00\x00\x00\x8ew\'\v\xd3W\x1a1\x85m:\xd2\xfa;<`\xe8\xaaA\xc94W\xaf\xca\x9ci\xdf}\x84eq\xe0\x82^\x9c\xd7\'\x9cS\x8d\x06\xce\x11\x12D\x8d\xc9C\x10G\xcb\x17\xa6\xff\xff\xff\x7f\xff\xff\xff\xff\x00\xb1\xa0\xd0\x9c2\x1d\x96\xc5\xd5;=ES\x18\r\x8c\xa5\x7f>\x9f\xbe\xfd\x9aQ\x12&\xceN(\x11\xbc\x9a\x11\x86@\xa0[\xc3O\x10U\x05\x8d\xf7m\x81\xd3\xec>\xac$\x86\x993\x89DQ\xd2\xfd\x89B\xa94\xf1#\xf8\x83\xd2\x94\xd0\xeca\x10\x17l\xa2|\x91\xc8\x1fph\xb5\xdb\xf4M\x11\x84\xb2i{w\xcc\x8e\xf24\x11\x0e\\\x1f\xb8A\x9d\xb2\xa4\xac\x91\x9a2\xea\x1cgk\xef\x9a\x1f6\x00`\x00p\xcf[@\x01\x1f\xf5\xa3\xf7K\x18k\r\xbfPjH3\xc2\xd2\xd7,\xb2\xc1\x90I\xbf\x9c\xb8l\xab\x83,\xc9\xc7\xc7\xa1[c\xe9+\x90^\xdd8\xac\x13\x11s-\xee\xb5\xbdR\x14}b4\"\xac\xb8\xa4\xb5\xfeu\xb3\a\xa02\xeb\x87\xdc\xdc\x96\xea\xaa\xee\xdc#\xb1\xd4\xf3\xf3\x8b\xa4c\xf2\x9f\x05\x134\xd1\xeaev_\xc0)L\'}^1\xa4\x04\x00\x00\x00\xa8\x92q\xef\x8b\xb1\t>\xb0AB\v\xb0=\n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') openat$dsp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp\x00', 0x0, 0x0) 03:36:06 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x0, 0x0}, 0x10) r1 = socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x100b}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r2, &(0x7f0000000180)={0x8, 0x120, 0xfa00, {0x0, {0x4, 0x8, "f1040bd0c89d00438179e3d1e5812547ae37ed970b0961973a68882ffbc1092eabeaafe4668075aaa3305757127e19e279e42a32e3ab2880aeb046e91dff90f7b06bde7af05cee582229dd6bdd0581351b0a5fd03334ba0e4ce59035b27fdbb1d55c1345c3593aeec21b187377269c929a8fcf4b15a50c1f8adfc60506fbe4e9d1bb52119157c51b4814baf0dfe857087e0af62489d1924a9f4ecbc3bad0293bdfb6de147e1a8dea4cd0453592f718b4d1ce5d8bf6848984a86409e5a2d7b35791b9562445844a0e5a4127e7ef7870b585612e5972e970587fa187c8ad7e5192733650e2b7b06705808e39c768c06eaf85fd2de03f073d881d058522a31a6e40", 0x6e, 0x6, 0x0, 0x200, 0x20, 0x3, 0xb509, 0x1}, r3}}, 0x128) connect$pppoe(r1, &(0x7f0000000140)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'batadv0\x00'}}, 0x1e) getsockopt$TIPC_DEST_DROPPABLE(0xffffffffffffffff, 0x10f, 0x81, &(0x7f00000000c0), 0x0) sendmmsg(r1, &(0x7f0000005b40), 0x40000000000014d, 0x0) 03:36:06 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0xc) write(r2, &(0x7f00000001c0)="1f0000000104ff00fd4354c007110000f3e9000008000100010423dcffdf00", 0x1f) write(r0, &(0x7f0000000080)="1f0000000104ff00fd4354c007110000f305030008000100010423dcffdf00", 0x1f) close(r0) 03:36:06 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r0, &(0x7f0000000500)=""/175, 0x5d) getdents64(r0, &(0x7f0000000080)=""/124, 0x7c) 03:36:06 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, 0x0, 0x0) getpgrp(0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={0x0, r1, 0x0, 0x7, &(0x7f0000000300)='$\'self\x00', 0xffffffffffffffff}, 0x30) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f00000004c0)=0x0) r4 = syz_open_procfs(r3, &(0x7f0000000740)='net/dev\x00') fcntl$setstatus(r4, 0x4, 0x14400) mprotect(&(0x7f0000107000/0x2000)=nil, 0x2000, 0xfffffffffffffff9) poll(&(0x7f0000000400)=[{0xffffffffffffffff, 0x120c}, {}], 0x2, 0x8) pread64(r4, &(0x7f0000003c00)=""/4096, 0xffffff72, 0x0) fgetxattr(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], &(0x7f0000000340)=""/144, 0x90) ioctl$KVM_IRQ_LINE(r4, 0x4008ae61, &(0x7f0000000000)={0x0, 0x9}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00', r2}, 0x10) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000640)=[{0x0, 0x0, 0x0}], 0x1, 0x4010) r5 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000180)={0x0, 0x40000001, 0x1000000006, 0x2}, &(0x7f0000000900)=0x33) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$KVM_CREATE_PIT2(r5, 0x4040ae77, 0x0) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) dup2(r0, r5) syz_emit_ethernet(0x30, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @local, [], {@llc_tr={0x11, {@snap={0x0, 0x1, "ed", "80da46", 0x89ff, "5873867110c22f81a95a544d15c962a6faf92bb1cc24dae03057"}}}}}, 0x0) ioctl$VIDIOC_ENUMAUDOUT(r4, 0xc0345642, &(0x7f00000000c0)={0x7, "5955cfc07bb325514a645aa1542ff1fc33dc7170fe80af668aadb01ec2059c66", 0x0, 0x1}) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) 03:36:06 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000180)={0xa, 0x6e22}, 0x1c) listen(r1, 0x0) listen(r0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r2, &(0x7f00000001c0)=[{&(0x7f0000000200)="580000001400add427323b470c45b4560a067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003fffffffffffff000cfb193e7ee00000000000000000000000000", 0x58}], 0x1) [ 1193.363866] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1193.423029] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1193.434995] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1193.455536] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.0'. 03:36:06 executing program 2: syz_open_dev$vcsa(0x0, 0x0, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lremovexattr(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000180)=ANY=[@ANYBLOB='os>.s']) socket$pppoe(0x18, 0x1, 0x0) move_pages(0x0, 0x1, &(0x7f00000001c0)=[&(0x7f0000001000/0x1000)=nil], 0x0, &(0x7f0000000240)=[0x0, 0x0], 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f00000001c0)={'syz1\x00', {}, 0x0, [], [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4202]}, 0x45c) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f0000000080)) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0x5101, 0x0) 03:36:06 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xd1, 0x0, 0x4) 03:36:06 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0xc) write(r2, &(0x7f00000001c0)="1f0000000104ff00fd4354c007110000f3e9000008000100010423dcffdf00", 0x1f) write(r0, &(0x7f0000000080)="1f0000000104ff00fd4354c007110000f305030008000100010423dcffdf00", 0x1f) close(r0) 03:36:06 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r0, &(0x7f0000000500)=""/175, 0x5d) getdents64(r0, &(0x7f0000000080)=""/124, 0x7c) 03:36:06 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xf, 0x4, &(0x7f0000000000)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x4}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) [ 1193.605513] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.0'. 03:36:06 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') getdents64(r0, &(0x7f0000000500)=""/175, 0x5d) getdents64(r0, &(0x7f0000000080)=""/124, 0x7c) [ 1193.689031] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1193.707300] net_ratelimit: 4 callbacks suppressed [ 1193.707307] protocol 88fb is buggy, dev hsr_slave_0 [ 1193.717281] protocol 88fb is buggy, dev hsr_slave_1 03:36:06 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0xc) write(r2, &(0x7f00000001c0)="1f0000000104ff00fd4354c007110000f3e9000008000100010423dcffdf00", 0x1f) write(r0, &(0x7f0000000080)="1f0000000104ff00fd4354c007110000f305030008000100010423dcffdf00", 0x1f) close(r0) [ 1193.867582] protocol 88fb is buggy, dev hsr_slave_0 03:36:06 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x0, 0x0}, 0x10) r1 = socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x100b}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r2, &(0x7f0000000180)={0x8, 0x120, 0xfa00, {0x0, {0x4, 0x8, "f1040bd0c89d00438179e3d1e5812547ae37ed970b0961973a68882ffbc1092eabeaafe4668075aaa3305757127e19e279e42a32e3ab2880aeb046e91dff90f7b06bde7af05cee582229dd6bdd0581351b0a5fd03334ba0e4ce59035b27fdbb1d55c1345c3593aeec21b187377269c929a8fcf4b15a50c1f8adfc60506fbe4e9d1bb52119157c51b4814baf0dfe857087e0af62489d1924a9f4ecbc3bad0293bdfb6de147e1a8dea4cd0453592f718b4d1ce5d8bf6848984a86409e5a2d7b35791b9562445844a0e5a4127e7ef7870b585612e5972e970587fa187c8ad7e5192733650e2b7b06705808e39c768c06eaf85fd2de03f073d881d058522a31a6e40", 0x6e, 0x6, 0x0, 0x200, 0x20, 0x3, 0xb509, 0x1}, r3}}, 0x128) connect$pppoe(r1, &(0x7f0000000140)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'batadv0\x00'}}, 0x1e) getsockopt$TIPC_DEST_DROPPABLE(0xffffffffffffffff, 0x10f, 0x81, &(0x7f00000000c0), 0x0) sendmmsg(r1, &(0x7f0000005b40), 0x40000000000014d, 0x0) 03:36:06 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f123c123f3188b070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000580)={0x26, 'aead\x00', 0x0, 0x0, 'aegis256-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000000440)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=[@assoc={0x18, 0x117, 0x4, 0x759a}], 0x18}], 0x1, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r2, &(0x7f0000008a00)=[{{0x0, 0x8000a0, &(0x7f0000000400)=[{&(0x7f0000000000)=""/48, 0x7ffff000}, {&(0x7f00000000c0)=""/120, 0x78}, {&(0x7f0000000300)=""/230, 0xe6}], 0x3, 0x0, 0xffffff16}}], 0x26000, 0x0, &(0x7f0000008bc0)) 03:36:06 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x1, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') preadv(r2, &(0x7f0000000100), 0x2df, 0x80000000000) 03:36:06 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r0, 0x10e, 0xb, &(0x7f0000000100)=""/4, &(0x7f0000000000)=0x4) [ 1193.922613] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1193.933471] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.0'. 03:36:06 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0x40000000c) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="24000000010407031dfffd946fa283000a200a0009000100041d85680c1baba20400ff7e28000000110affffba010000000009b356da5a80d18be34c8546c8243929db2406b20cd37ed01cc0", 0x4c}], 0x1}, 0x0) [ 1194.107292] protocol 88fb is buggy, dev hsr_slave_0 [ 1194.112391] protocol 88fb is buggy, dev hsr_slave_1 [ 1194.217516] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. 03:36:07 executing program 2: syz_open_dev$vcsa(0x0, 0x0, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lremovexattr(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000180)=ANY=[@ANYBLOB='os>.s']) socket$pppoe(0x18, 0x1, 0x0) move_pages(0x0, 0x1, &(0x7f00000001c0)=[&(0x7f0000001000/0x1000)=nil], 0x0, &(0x7f0000000240)=[0x0, 0x0], 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f00000001c0)={'syz1\x00', {}, 0x0, [], [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4202]}, 0x45c) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f0000000080)) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0x5101, 0x0) 03:36:07 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0xc) write(r2, &(0x7f00000001c0)="1f0000000104ff00fd4354c007110000f3e9000008000100010423dcffdf00", 0x1f) write(r0, &(0x7f0000000080)="1f0000000104ff00fd4354c007110000f305030008000100010423dcffdf00", 0x1f) close(r0) 03:36:07 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x0, 0x0) r1 = open(0x0, 0x20000, 0x4) ioctl$SG_GET_SCSI_ID(r1, 0x2276, &(0x7f0000000280)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/attr/current\x00', 0x2, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, &(0x7f0000000780), 0xffffffffffffffff) getresuid(&(0x7f0000000240)=0x0, 0x0, &(0x7f00000002c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000900)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @empty}}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xffffffffffffffc3) ioctl$DRM_IOCTL_SET_MASTER(r0, 0x641e) openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x101000, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000540)={@remote, 0x4c, r4}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xe, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [0x7, 0x0, 0x0, 0x0, 0x320]}, 0x2c) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000c00)="6de626cc15e41233bc46d922db632a46d3f2720276bf5713c5de506672c9087b611121809980e747b18757d384aff849957cac6ca81fbb954a3b19be540378e5732518bb14fb1b79050ef00fd6ab4cd654744ac5de0c6709afd8509f09833374082c3cab378e44c40d2fc2e93911a67438e74f7c5008c8dc8726ec22046b834249bb23c200503e3ff8e702ace6a707c57565834bd25eb3cc7f58fdc30377264d5060a0bbfbdc25d072333ccc19420ee613f977de43fc6d31dc8402c442f293e880fe1e5bf971f21c159585a16ed1961531102c194e5d4bfc43882a9ac7744969b1288559b475acc10323efac3fac5ab8b47bf2a83cf16b3c70f27b704dba07905148e43ea900b5bd2995b3910f828b83b5abf351c503793dcc62aedcd34bfbddc118beefcfad3c7c7c81565390d2920e9b9ed7a3c98cfb2c7831f0c1f71cb47e052c40543c12670e5cc12e85e27005266a96e5e4c4a02a13da1c8bdbbc1fbaae620060325c90da460f7995e68ff4c129df1f9fbc73cddf91ca58dd8dbe5c5f9ff1e811998cf3318d6095efb7daf39a5d665a20534fade687066edbc1293d326850de73ced98bbed2d53b7f1d81a8350abf9933094dbb0988b081bfc9820d08670f11579f0537ac3904013760c84253f7a3e5e406ab757471daa444e5c53a0fc7cf7e69e27e490decd2f62cc10cd6ffeaaee2bc8ba3a2e5c731c47be61885371433971c6d043e695672baead9e64a0b365687111d7c184a2402c1191b2b72fbd63c9fa3e1589e84e42e57fa07425b6c3345ac8e4703ef46102b81fd30d23f29ae91c3ae862c93784e3ab272b37034f7f3868f8ff042fc1c30c6fc2211af6e7c730c9062fbc8d6d3e65ab33e673fe6658ea0d502d7f1b4a49f255fe008af986f223a00a0393d5a149018212b613cb6a6f51b9e55b9b947897cc97a5344bb52d80e837e16344f6a26ec96f77eb16c761486dc9ba452db41946eab25db89a0b51d3e37fb446b97918017b8736bf9db2981414f5f8da7a7ce133460f0243bcc4b859cb2c6a8e456e9b46d59dc512a8ccd00852c53c93b4131158d44d0ba2f383223504a4f9eb767c97258fb6d919429266c4b0eab765f6a727046da757f2dcc7a338c3475e30a8e6e3460ba876288edc2882de768b9f23ea39ac76d59f1c17c8cc51d5ccb0643bcb0b149331a2e3ddc2df7dd2a836cea7797cfe940b622bf6e78c5483b6ace39f0f7b946c6798d32933af2321e00e128fe4213a049089011b23bc326a65ec4d1842d3021217bb270da42a70bc111a469c539868dc209e3237ef135ab225bf292cb2055e63ef8ff36b4c17942a46963dad5797e000821d33ad0262477873dce01e3b587a3e7400c6b7e61defc5dd7b8b83876234a6f950029563bc8732a60f91a9bd95b73c94fa8fe2e66a9ebf6d21af7923d71bbdb349e7a68bf355164a021a2c6ff04ebc9c4ed3bd86e3de3e97e58eb73715223dabb3714a2318e7b5c654a7c9617ab754812d547701f71d672197b8f8003e00e04ff6c28c2fc8a57ab504a373b4c8f6dbd9a1afd987c7674ff1856a9e6a278e20eaf0146c214412b7546f07129e1ee42a32b9009097aaf1bd04c884b513a1cbb07df95b9a48f112ed1c2e13ac6832742f74310d36d1e6e09d235a6c8c1cb3e5ba21eab85af04f138cf7097d0fd3e87c13f34bd535776e4bb3bb14c348ee8511ce26109afa5303485d207642cb0a960d8b44689132036b4c54c8915c0b58754ad03c849bc03ee8418fdfd10f6124d073c6c9bf73de0fc31e3118019b261245625ed1d93635107742c6a0d076962b82907b359e60af17d4612ec08f3fde35b6eaf11a44d8df0f5ad74df2eeaef7df3890a9646b4133d2373dddbea0df24aaa4b0c666c4ea193f5bc249d1afdd17834703aeb5529f9f5c381b7aa748b8c6851d9d33d78c9532fbccdc1c39dcfbe7359fa7350a0442a6c2f5f4fd6eba65be39a27c9b722585c833c07e390b45717ba869bd6436a67827c2dbcf8978ab420dd614a949ce8058d5f333ccad5d878627873147176d05b88b2a7e21bbb3b5b0e68cd27c77762f42bcc1cbf1f2609eb3c2c472e179570939dea97625286b42f636ec449a9e145583b4ee45c5b24105b9aeee6a87529b53824feaaf9462aa167d62f99dac9454fbe762e16a8533f0412e5d2b70a941ded544724ca491995cde7dce3e0b931298693b73016f4cd50bb0ad7b26bff55f01d0fccefcff20a4b98e62366a13ef8a0976f0a4e05979d3dd404a8cca61e155b0e6b7d083ce1b3f7b7118f0feaf04b6f89d092b82a14e558cc17528b6c3da2972bb3a2c26d9fb73f1b894230c57cd42e88b4e65cfaabbbb520683d728f0f70db8d6ac87bf41379fd0b43d71a9a95a0d5af922a7f06846748e2c2f06d6dcf082eb6e69e09d6a73ce32c825f04f156232177161e9cf3d25862acac85ef560fcbf3086bfea57b38906cae553d77480336f62b2a382cfbc5341468eef6e6950641edf218c65abded2f90cad91d652c424b94d53be728efe2c8b6c1726414b65b1afe03a316ed13d2e3048b38a0cd23d3edf6279cf97859501c20fafa978543b96d77b299b4ede5db4156657bc05f0719021d39da12ba73e8ef085b8ef9706eddab9498d450067fe9a81d578666cd22cb0b32ef72bc847d684bc0fe21734838f1a3a55594c10ffe3d01ee4bc9fbaefa1c4e46e5b8a4976fe17ee52a0b0736b9d0131ae29bf20acfd886a6c213b2e7bd9b75dc2a2ffdbe3719b093fbddbc0c8bd581f6ffa987ed01bd2fdbd46e2b4146410c80f80a155ad7976adab2eaf5b8ff64a6c365a2824dfb43a84408088f1f171fc7ee4b64ee3bac5fc844c3c60fc3121f46a05eada665e8f35cbfc988cc58302aa22af37f78f99787c208092d51907a9eb81bf05ded8e0b0b9e0411d0db313b7ed27cf22e7033ac33f8edf0c765e8fc3a695d89c48690dbabd6d14f5d685bcfed9ab3d0eee89849410052b2ff69a6087c42b8565dd8bdb4b912917032bd934b3723fb530e0367afd228ac2f3c591ed7b7e9f986379787ce96fe19a7db045401691a2a390dc5d703cb8dbcf9227c66ad4f0c6c56b1a8738a7a2d17cc4d72a874b270aa8aedeaf7a16d155aab6adf5905d2f68448a738399fea1067a58aeca6fcd7440bc69161b201e715fcf326fa977ee9d938349acc82f98ed78664f51bbb34d4922f784cff7df8b7f8c9ac467a1e2f87fb545814e0e34e265cd4879ae0aa59b2f5f632882cadea503b3f81b9f639273958591091894ea0d36bef8a683242e69dbf30320ef9e161646d4bb097c031410671dbe7f0d4eb6b3c9fa7422d3eadeb32319487c2f182560fc03ec04643fe6211db8ccb9648a58679d1cb2bcf6495e9531117f33d86c89f7d6fd403d44674ee6536269f69fb163993d7b3e5d00a7df2c4ad109680aff0d7ebb6f8143f61480d6fe1ccc4edfbabb34422f237b9818380af6d4646696c1b5b798289a5c5bee0861f46087fdbf36ae04a8a6de1123702241105e6f7052bb5a2ebaa0e8918d32497a07c9a9f88a060ef03d561c5eed4f4b4cd30bef1d8323b64787301926b2bd48b48ef75ca6a56cf557f5ebadd5f2d38b9a564258455d218fcffb957b244a66c7fdaa8f49fb9762d6a192c0fadacfb3c7a34ba516326eb60e50bad1ed9802031a78d6125d3b55cf4250aa876533fb6d85108f4bd3fd62c814a3481626d52f051cd32d28f422e27da75b3ce8ac78c9e7428053bce0b448fe02d4981dbf87d5fde33a26e0174e1cc92d43e8181a5de0682f2c1e229540f9da8493280c87b4bb806b85b2237d51c108a9caebc06557c9a3035a722b1baad8645ecb496d4f2a06089ffc268c4a41f2620d46e0af2bb63580918a91b9a178242a33d09f7baaa3a300fb90e0b8c1d8e8cfa4ca00452e98d6dd58eb2cbb5a76460a42c7dbfcf8441558144c1398670994cbcb5918f3f4f0414a087fbf27a62b562f73c6bd9", 0xb00, 0xfffffffffffffff9) request_key(&(0x7f00000006c0)='id_legacy\x00', &(0x7f0000000700)={'syz', 0x0}, &(0x7f0000000740)='\x00', 0xfffffffffffffffd) ioctl$RTC_WIE_OFF(r1, 0x7010) clock_gettime(0x0, &(0x7f0000000bc0)) syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="59cc9ee6e8e1164f1c92100a68689bf6df260008110000f40000000000000000000000030000000000010000000000089078"], 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000580)={{{@in=@empty, @in=@remote, 0x4e21, 0x100000000, 0x4e20, 0x0, 0x2, 0x0, 0x20, 0x67, r4, r3}, {0x4, 0x2, 0x1, 0x0, 0x0, 0x7fffffff, 0xcfa9, 0x55d5}, {0x0, 0x40, 0x80000001, 0xfff}, 0xc9, 0x6e6bbc, 0x1, 0x0, 0x0, 0x2}, {{@in6=@empty, 0x4d2}, 0xa, @in=@multicast1, 0x3501, 0x3, 0x3, 0x2000000000000000, 0x10000, 0x0, 0x8}}, 0xe8) r5 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000007c0)='/proc/capi/capi20ncci\x00', 0x40c400, 0x0) ioctl$VIDIOC_G_INPUT(r5, 0x80045626, &(0x7f00000001c0)) r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x8000, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000380)={'ip6gre0\x00', @remote}) ioctl$DRM_IOCTL_SET_VERSION(r0, 0xc0106407, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r6, 0xc028660f, &(0x7f0000000100)={0x0, r6, 0x0, 0x7, 0x6, 0x4}) 03:36:07 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x1, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') preadv(r2, &(0x7f0000000100), 0x2df, 0x80000000000) 03:36:07 executing program 4: syz_open_dev$vcsa(0x0, 0x0, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lremovexattr(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000180)=ANY=[@ANYBLOB='os>.s']) socket$pppoe(0x18, 0x1, 0x0) move_pages(0x0, 0x1, &(0x7f00000001c0)=[&(0x7f0000001000/0x1000)=nil], 0x0, &(0x7f0000000240)=[0x0, 0x0], 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f00000001c0)={'syz1\x00', {}, 0x0, [], [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4202]}, 0x45c) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f0000000080)) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0x5101, 0x0) 03:36:07 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/ipc\x00') r3 = dup3(r2, r0, 0x0) ioctl$VT_RELDISP(r3, 0xb701) 03:36:07 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x0, 0x0}, 0x10) r1 = socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x100b}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r2, &(0x7f0000000180)={0x8, 0x120, 0xfa00, {0x0, {0x4, 0x8, "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", 0x6e, 0x6, 0x0, 0x200, 0x20, 0x3, 0xb509, 0x1}, r3}}, 0x128) connect$pppoe(r1, &(0x7f0000000140)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'batadv0\x00'}}, 0x1e) getsockopt$TIPC_DEST_DROPPABLE(0xffffffffffffffff, 0x10f, 0x81, &(0x7f00000000c0), 0x0) sendmmsg(r1, &(0x7f0000005b40), 0x40000000000014d, 0x0) 03:36:07 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_END_FF_UPLOAD(r0, 0x406855c9, &(0x7f0000000180)={0x10, 0x0, {0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}, {0x0, 0x0, 0x0, {}, {}, @ramp}}) [ 1194.667581] protocol 88fb is buggy, dev hsr_slave_0 [ 1194.673207] protocol 88fb is buggy, dev hsr_slave_1 [ 1194.679459] protocol 88fb is buggy, dev hsr_slave_0 [ 1194.685181] protocol 88fb is buggy, dev hsr_slave_1 [ 1194.691307] protocol 88fb is buggy, dev hsr_slave_0 03:36:07 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r0, &(0x7f0000000040)="0600", 0x2) write(r0, &(0x7f00000000c0)='@', 0x1) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) r1 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r1, 0x0, 0xca, &(0x7f0000000000), 0x10) 03:36:07 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x1, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') preadv(r2, &(0x7f0000000100), 0x2df, 0x80000000000) 03:36:07 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x20) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x12f}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) 03:36:07 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x1, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') preadv(r2, &(0x7f0000000100), 0x2df, 0x80000000000) 03:36:08 executing program 0: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@nat={'%at\x00', 0x19, 0x1, 0x90, [0x20000580, 0x0, 0x0, 0x200008c0, 0x200008f0], 0x0, 0x0, &(0x7f0000000580)=[{}, {0x3, '\x00', 0x1}, {0x0, '\x00', 0x1}]}, 0x108) 03:36:08 executing program 2: syz_open_dev$vcsa(0x0, 0x0, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lremovexattr(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000180)=ANY=[@ANYBLOB='os>.s']) socket$pppoe(0x18, 0x1, 0x0) move_pages(0x0, 0x1, &(0x7f00000001c0)=[&(0x7f0000001000/0x1000)=nil], 0x0, &(0x7f0000000240)=[0x0, 0x0], 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f00000001c0)={'syz1\x00', {}, 0x0, [], [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4202]}, 0x45c) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f0000000080)) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0x5101, 0x0) 03:36:08 executing program 5: r0 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x0, 0x0) ioctl$SG_EMULATED_HOST(r0, 0xc0347c03, &(0x7f0000000680)) 03:36:08 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x0, 0x0}, 0x10) r1 = socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0x100b}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r2, &(0x7f0000000180)={0x8, 0x120, 0xfa00, {0x0, {0x4, 0x8, "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", 0x6e, 0x6, 0x0, 0x200, 0x20, 0x3, 0xb509, 0x1}, r3}}, 0x128) connect$pppoe(r1, &(0x7f0000000140)={0x18, 0x0, {0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 'batadv0\x00'}}, 0x1e) getsockopt$TIPC_DEST_DROPPABLE(0xffffffffffffffff, 0x10f, 0x81, &(0x7f00000000c0), 0x0) sendmmsg(r1, &(0x7f0000005b40), 0x40000000000014d, 0x0) [ 1195.223975] kernel msg: ebtables bug: please report to author: entries_size too small [ 1195.279372] kernel msg: ebtables bug: please report to author: entries_size too small 03:36:08 executing program 4: syz_open_dev$vcsa(0x0, 0x0, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lremovexattr(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000180)=ANY=[@ANYBLOB='os>.s']) socket$pppoe(0x18, 0x1, 0x0) move_pages(0x0, 0x1, &(0x7f00000001c0)=[&(0x7f0000001000/0x1000)=nil], 0x0, &(0x7f0000000240)=[0x0, 0x0], 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f00000001c0)={'syz1\x00', {}, 0x0, [], [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4202]}, 0x45c) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f0000000080)) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0x5101, 0x0) 03:36:08 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$rds(0x15, 0x5, 0x0) bind$rds(r2, &(0x7f0000000040)={0x2, 0x4e21, @remote}, 0x10) sendmsg$rds(r2, &(0x7f00000001c0)={&(0x7f0000000000)={0x2, 0x0, @dev}, 0x10, 0x0}, 0x0) dup3(r1, r2, 0x0) 03:36:08 executing program 5: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f00000000c0)={0x1, @raw_data="2e755946eb3245bb01a6f621caad73a69e5f2e266857f187379e15a8fecaedfed4fcab9f11e2eb9a8a3a0392525e60dc72b6dca7c70a8417f897aae95eed659beaae05d4bb6d616813adac4a5aac0901267b2da8b1ae8d05fe9120085ee82400aca41fc47f0e12cc15c6072d92ec6b8cafddbfd676a25ff109888ba6ad6df6d7189f691df852a36de0a894240a520842264381e40097d67ee33b9db1593168cc215b85588f4848ac28c8c21ae83d5ddad8deec4d65cf7d32ca9a9b1119d0a2b05ace3a7eb53a6fdc"}) 03:36:08 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_NESTED_STATE(r2, 0x4080aebf, &(0x7f00000002c0)={0x0, 0x0, 0x2080, {0x0, 0x5000}, [], "84e59dea9b0eb6d11bcefb9123cea1c9c44adb1ee28fe71ffd33c43be64d454b137c80844a3eaad0511baad524fcc5ab35671756c174d1053239ae631aa8bf0cfd613fe01ab288bedeaa4ada13b795f8553e03c09288b7f40f72aacaa3d3469a9dc788c1018739abb61ad07d7dfd4ac4d09923c0d43c7916a98b9c00fbc1166a8ec4f15a06dceeffc062088c8506b888398b1ab451495e525ddb2daed27310fa9738b2facff5c82bc631da2ddeb57b324892a9b913214ed3362626602d588c3bb2cf2e732881d59162ff6c583137464d813ba1a16d8cb32f017d2943487e4c821fff20b2b718084a15335dffc13afe361ad8daa40029bc1e1a3ceaf6badda661e0a9962e387ddc193d16e1823f229ec6438dbbc64ab642530c35b8ba6ee7cf467105dfe311f22187ef44bf6d2eb939b6b24b33513e616e53eacda605d9e6ab36e1f252ee1fdae5f85f477c084fc3ef251af3570a349e2b291b33e51d00def50e3a87956eb6d75efb676f6553509dea9a702c0fe9e2d6f3873b77c99195752188a8ec5f31f98f0d6c84c95c9e14cc81761d4248133e5bb68a88e708ce3f1e80894771b5bc061dd567ef14c7b7e08b606a9b74b49eeaec3c6510a181df63cd7f740b1bf9ae09d2fd01418628151f24a805207b68043eb1ed4c51f44a1639b6fd2b50abb79063cafa9af286a1b8bd63fb45083a220dba985ba067551a0c64ececdb7d19e217d9b9e061d75c951313efc584502497283c250e49fc5071bb6c3649ce70ada8455235dcb624f4a206c57e2513478c71915509e08aeea117008a588115a62484761932b16dd2085c0359edee51a6b8adcdefca023fab1f2a22c703d6730ab8ddf219eb7047f716c408eba2a8ba5815a678fd9df65b2f2caa4ca195e8fe16f1b159288da745a3e64dee8e5a2156efbf4321a5ca943fa5332d7747d3d87fd75c2262c6c61a9535d3c21b85d417d5c74a314844bd12e5da99de6a8b2626fd322436b5262398f280e01ffedcae914f0e2edbceea82e9a68ddd8724d7368e37ca12d56fe12db1adaf5980d01cf23e36b66b5f08d9c11d58752035732cce5d937dba35f20383c322d14283f8c1e01e356d26d2f639288d1687fdbdc36ba02a77537e97bfa912b6714969a8a3f3b384cb0a114e15d10664de344d38ea8411014412673f28a95d53f5bd4ca0d83b898e9bee81c9849fd550cca9bcfe16e0ff4ecffa3ce6e54bcbe440568da2694465ca1a00c67f28a95b3e7c7cb0d132efbbe819c038f9b76a1e24e5a0ee99d905db4b9a494a42efbb96e0911249eb26d43990024941ae62fc8bc3f386223b7c3a36f9f3722f675601f2f035c81bf0c3fa7be3515d5cb8e71fa3b979543fed2e0875c0972a410d188c1aaad36a4a72b473fe36393c6d5fd45df7ef6d70e97b9bf059adab7a132614cb98b73995b828c0ee9d7b85a76c276525af290c6c3dd715ff8c38f90732591fdf3fe8d3c45221e6c641542a5067d5dcc93629ce9db013dde814a64bf3bc83d671965f0866937fe259f0ded576c1a2b2e0cba05665d506f64e8057097e3575f9c005fdbb4bd75805c428640cb5d199a23e803627283fd01206a6849ef39264230a5a15e091c8490fa08e343bc7a90bd25d861262711eb696b114ce2fa631c94ec14aa91387b7ef243286f0f2bfcec05b226c04b2996e4d4413c38a37bbf60f9d2dfeca6f13b045028011aa04ab502180417239e84b8d23db65a2363b6704d5b68516ffe8a6ff8b8fc4f174d788db9a35a6345f4db9b738000f955526f97f8e059ff13694a19d60c26fc9d885089d76ecdbe52dec0d57d3ae94067242d0d9b46c23389403a64aa7623c268a6a1d3de88042773269b3e351fe95579163582c35bf5eb2ddb6ab24d4ea13764c705dc82b640323440f61e6639bd497279540d6ca7b74fe2416769a4933c4ac13d5c4b327787c8427cffdced01ae5e35dd23388c7d2cbcb96be25e6033cb2301dd71c8b520e36c1cb5e49396b3dc2245a3e4c16bfdcd8c16546b0a9093aa8b359e197e55a72ac1540665f278f2badc122df74885360317239ad6f98852e4462938573a2dc5a69113f20fdb51a8a684a2babca2a78cbdc80efb5981cbf13974dbbf67361bb3fd4a9fb9fd73fd8916a108cbd21cbcb56cc86c57197a4de0d39a0979f67a8e18a9063e5bdb7dc199bf968bc4ab46ff377decb1bf607fd1bcd2a7758d09f88c1d40fddb1e9439379b0d8fdbdb4ac2b56749aed4b9cb32598c5fdcc91cdd0b80193b64d204d9f26c0c543c121c68383ddf7fdbb5cdac789a652384f1dce01683cef2b9d0a90534eb049c0fda51b071ed307b86557eb221fb5965c3a0dae3a08649108f49a346f38c3eb50587b1094a062c4a496c931f2c81cc42ea1f9d100efc8a0a87918ca1cb7a057bbffbcd8160dde1b77aad08c3eb82d545312ced7b00d2b91e0689a61ed40aa8bd4c8008617d8c6e7b47ef2d0e846c5ba199c86f354d6fcd551eee360d44eb37128657d62273daf7d8a7dbd8256c6630b175b024b8ce227edc2d0395fe0e5e9f2d0c4d7539676450e895ad2f86dfcdf99ada36d679ad6f035ea17b366832bd9806f60b3bfd4743e46ea0fc557e8cf223da14cd4458f4761fca8fa3b0554ec25a75a52f28b4c5fbda184ede2c1eb00e92f8e1b462963f96fb9dc2aa869319b383b59ab92eda8b6d45f27c0a1b0dbfbb1ec6f4a68c359ef9e167feace0bcf731d4beeed9d66db70c8c343e5ab45584423d6619cc9d8d9c00565e7e9a62b185664f05c55373aa7ca6b3d9ecc8f8f6565ea6503ced4808c3e855b9f9f79ce5b0fd31338b1e4015f78dff65d7727bf47f17c5cbcf2a01d1269e6fda980dc3b0a538487df73dbd30914b3d597b634930add895b248246154782af5c92cbe41caae6f210cc3a3a76d4df425860fb7ea9f766132d5463494bf672d1ae20c97bcfad888647e4d94e389213a1ccb6d9cd4c83433f70cd2b56272090b413f0e6ae9d97c1608c4e2d0af6115b9d2d836e6bd3aa32f95f47f2f25a332eea4e0469aa999e059ce2984a66fa9957714d84f820b0674d6862b3b17b3276698ae43cd9a9e44455ab89e92dfe14eeaf643803ca86823167381b1780ba6e1edd037f1164334b6c1809669783634d5bb7b7022044c36db5bfa99d407a2438a2e4ba96dba95de2dd16afaa62a9e9db9e5f463ec0f78b9bed10a62f4e45601f0ac409e8ebf7ab96f80bdcccb5370335bd742d8b9472b1cf042618b229d945dbc2d2b45c4eaf81504baa35445ae15a5d22259d2606625723d5d83b45229a12eb84ff7122c1fa5d6ce9a1f2e7f655ea6023bc5a862c1299641672439fe36acda30e8fe8f2ba9939a29a37b468d54b8d7e64d00d3f91ad690564fbcc78e8507897d8384860febdcd4cb89324c9231e4588d1783d74a9d76118967e9f4a8605b200d0898d5b65385ea3db40cdd8c2677150a7b5af75f3023192b466924cd6be738e5c4fac0d323fd0da6e570e936e0a0b07cedc7e876cf3261e4b55489882deacc647cb70942cc9aef508edfb0248d367ccee7743e2577c5a39dd8f021ff4ca6c42cb3d75c5288f025a0f0b5c941cecab3c8fd2874dcd963d04db1be13e697f10ddf5c3da15743a9dca25691775086013eda52d105228dd3fe6b6350f39132f62e69ba8803dc58031b233a8ec73f7079b726463f6cf99e8baa55d65feaed99773fdca09b90306094ea3b89afa2213bf3dd7b7c16480a9ef2d437f2492d9ea1c60d400142d9f0a76ca14ec560b98b323c74c761a91a85c7c66c5b3ccc1792d6c6a3cfba2275d3d24a60fa11cc58423d53e4513725543343385e2e61bb09b04198e91e05bc8a05ba29fc95314f3e07ae1b484e9f97c2f7b9e127a0d67b6568560643e35b82a83f1178dc524e838e0e3e8d8461db919f58c4d791542714faeb4c405de35795b80bc00619e8e8818ec4cf2df5af22f767990af1133c148277314d75ac919925198b201e1a91ce48279c1cccd6c94adc5fb5938a85289cf0658ef2c99b6d160c4ebfc86bf1dfc65df72e2fc0a0146e1e64134501c1fc3d9d73ab95727a6366d4ce1c7457fb2b03a32b4e6dccc3171f8954e76b8d953cad04d24fb589a00a96c1db2302a3f78eeb569edbb447982fa9e3a3302629a9fec289b2e32c50e4c4ce83d52a3bae85066a5b3b8ce17cd8df855295470d688bd82e4bca9eff0784cd4fc6410dd6ed5201a9b8386e69297f362ee9a5a4dc4a804c41f8ddc31f3788cbc315a7bed49ebcb0e3231d975cbe835b7722cd35a53302343c332bee695e9a9cfab147f2eebf055560f4a11152514ac93e5ee4f83ee92150520d5efaabf803ba99f3ca8b8608a7f8bd0db957d20de28a6981abe8cd8202dfe657d04576e9314370542f1c4072eb13f84d24e2b57f8882d15421b6756bf9dacff85d43d4e3fd53ebca70ed037ab2b2b1f6ef4266494b679bebb197804495ace92789c33f6bac2f44b0d0a881382ffbce24655850f46402dbabf46906f11f5aefeee7c1c1d2b142b7bdb00b43414cd47d99b9336ce3772af42b8d73b5d6046b665538d4f41149897b2592f5ebf7a40587d06d0682cc7300e397d0eff0ab25544ac756da2476798078f8ea5d118d8945ad0b740fff940efa74ddab6f7530e9e97d0ab5e46df07e3d8dfd06af80163d2400947569425dbfd1b25ee49b2b3ced77007ab4e2aa4b6f5085c864af123b7e52af9014fd05f446a3526cfb847cbdb97e7412760f5e25e13e1d01b0bd6199d4415374660ed30b5b1cd51face3f3d1d70228e33861230352e028895fe1bc9f44d26c4ecd1c71ca93205b43637bee16b6d74529382cb812ead48ca566e1b5aad663f500c3a6900634e6fb947664230660ccec23a36811ec517a0f1a5bbcd508c0e5b8e71d179271e72f611bc0f51d053d8a71f1354eb5d756ee0fc247f1cba101180e9193a6a1b7386902c00cfe837124511a5a10229032c719c2cebad383f83a00aad9a30b21bca613642c391076bb7c5bcf6ffea060d458cd8e5a07d70e0a475434b887a76146c00390133404181bfe5b6fdb236470c72b0fa8036ccb787d3e873f48d92e0c29819e3a3b6d40f99277b05b8d5334349eb019c8fa1bc023297eaca181b9c2bde1816850da4765f073de10748f62df6d7d9845ce2d029ba309273806ca049ab27ddc914f0d819ecaedffa6efbb49691485852d1425dee984861f63e4fe711a2a9aad4456389e2463b87accbbc5564a9fc159b53b1ab0b6e70e2a691a011668d7aa7f22ce30c0d118ced380de062ae1fb8fd5d2e9d208c47fcfc7ef815133ab97f14ee2c9b159d836515dea3f8854d3024dd67d29e3789e36b36cf2758fa26126f435a2b5b737b1c4a34319ff92ab74dde30f5dc124378c51c39fe9e588936b93e80f5cf90bcdbdbd0265ada97d9d8bc8bad04b292319200bbc21762bdcd1b630e3c80e9778e35d76add1895e8612fd9475a9fa9714887ece72e814cbcf9d42d8338934e7645990f11d12ebb7576627b32c2f0f555779d77c2d97eea4f9e8a52d1d5f5aa4b2c82dd8807037a2bbbcaed621ce5259a3bca3ca4940af3704b84f5d5b28d79a0faa5ba73e0483765b0ddf301bc8ba5606f60fce47f9de4111c43945eade3ec4e80ea498be10435c4262496c3a8a97bc2e228d606da13fdf9b22acac9ea031164d5de6eb26a71d08b97debce82c5db9830931f730cc552fb033ef4d94734d20190479b949770592628e7c45d786e44bd11640cba95890bf10caa3de6c5027069821944919f4e01db2ad74932eac60", "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"}) 03:36:08 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$rds(0x15, 0x5, 0x0) bind$rds(r2, &(0x7f0000000040)={0x2, 0x4e21, @remote}, 0x10) sendmsg$rds(r2, &(0x7f00000001c0)={&(0x7f0000000000)={0x2, 0x0, @dev}, 0x10, 0x0}, 0x0) dup3(r1, r2, 0x0) 03:36:08 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x40000fffffb, 0x802) ioctl$FS_IOC_FSGETXATTR(r1, 0x40085511, 0x0) 03:36:08 executing program 5: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x44000) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0xa6ba0) io_setup(0x40000100000003, &(0x7f0000000340)=0x0) io_submit(r1, 0x653, &(0x7f0000000540)=[&(0x7f00000000c0)={0x8040000a70c0300, 0x0, 0x8, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7, 0xc00}]) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x3, 0x5c831, 0xffffffffffffffff, 0x0) 03:36:08 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$rds(0x15, 0x5, 0x0) bind$rds(r2, &(0x7f0000000040)={0x2, 0x4e21, @remote}, 0x10) sendmsg$rds(r2, &(0x7f00000001c0)={&(0x7f0000000000)={0x2, 0x0, @dev}, 0x10, 0x0}, 0x0) dup3(r1, r2, 0x0) 03:36:08 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000080)={{0x20080}, 'port0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xda_\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000ec6fb0)={{}, {0x80}}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40505330, &(0x7f0000000140)={{0x0, 0x100000001}, {0x80}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfdffff]}) 03:36:08 executing program 2: syz_open_dev$vcsa(0x0, 0x0, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lremovexattr(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000180)=ANY=[@ANYBLOB='os>.s']) socket$pppoe(0x18, 0x1, 0x0) move_pages(0x0, 0x1, &(0x7f00000001c0)=[&(0x7f0000001000/0x1000)=nil], 0x0, &(0x7f0000000240)=[0x0, 0x0], 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f00000001c0)={'syz1\x00', {}, 0x0, [], [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4202]}, 0x45c) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f0000000080)) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0x5101, 0x0) 03:36:08 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$rds(0x15, 0x5, 0x0) bind$rds(r2, &(0x7f0000000040)={0x2, 0x4e21, @remote}, 0x10) sendmsg$rds(r2, &(0x7f00000001c0)={&(0x7f0000000000)={0x2, 0x0, @dev}, 0x10, 0x0}, 0x0) dup3(r1, r2, 0x0) 03:36:08 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="24000000110007041dfffd946f610500090800000900000000000000421ba3a20400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 03:36:09 executing program 4: syz_open_dev$vcsa(0x0, 0x0, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lremovexattr(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000180)=ANY=[@ANYBLOB='os>.s']) socket$pppoe(0x18, 0x1, 0x0) move_pages(0x0, 0x1, &(0x7f00000001c0)=[&(0x7f0000001000/0x1000)=nil], 0x0, &(0x7f0000000240)=[0x0, 0x0], 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f00000001c0)={'syz1\x00', {}, 0x0, [], [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4202]}, 0x45c) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f0000000080)) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0x5101, 0x0) 03:36:09 executing program 3: syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x1400}], 0x0, 0x0) 03:36:09 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000), 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x103, 0x0) syz_open_dev$sndtimer(&(0x7f0000000100)='/dev/snd/timer\x00', 0x0, 0x38) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000480)={0x0, 0x80000000}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000002080)={{{@in6, @in, 0x0, 0x0, 0x4e21, 0x81, 0x0, 0x80, 0x0, 0x0, 0x0, r2}, {0x7, 0xfffffffffffffff7, 0x429, 0x3, 0x7, 0x955c, 0x0, 0x7}, {0x7, 0xfffffffffffffff8, 0x0, 0x6}, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1}, {{@in6=@local, 0x4d4, 0x7f}, 0xa, @in6=@mcast2, 0x3507, 0x4, 0x3, 0x400, 0x8, 0x3, 0x3f5}}, 0xe8) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0xe368adb30c792f1f, &(0x7f0000000340)={@local, @local}, 0xc) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000100)) getpeername$unix(r1, &(0x7f00000003c0)=@abs, &(0x7f0000000600)=0x6e) openat$cgroup_procs(r1, &(0x7f0000000240)='\x1f\x00\x000\xfc(e?\xe4\xa9\x9d\x04w\x1d\xe2\x9e\xee\xbfn\x96.\x10\x00s\x00', 0x2, 0x0) unshare(0x40000000) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000040)={'tunl0\x00', @ifru_names='bridge0\x00'}) r3 = syz_open_dev$admmidi(&(0x7f0000000140)='/dev/admmidi#\x00', 0x100000000, 0x2000) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)="025cc807") ioctl$VIDIOC_QUERYSTD(r3, 0x8008563f, &(0x7f0000000180)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f00000001c0)={0x8, 0x0, 0xc71a, {}, 0x100000001, 0x8}) 03:36:09 executing program 5: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x44000) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0xa6ba0) io_setup(0x40000100000003, &(0x7f0000000340)=0x0) io_submit(r1, 0x653, &(0x7f0000000540)=[&(0x7f00000000c0)={0x8040000a70c0300, 0x0, 0x8, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7, 0xc00}]) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x3, 0x5c831, 0xffffffffffffffff, 0x0) [ 1196.391741] F2FS-fs (loop3): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1196.444066] F2FS-fs (loop3): Can't find valid F2FS filesystem in 1th superblock [ 1196.464936] IPVS: ftp: loaded support on port[0] = 21 [ 1196.497386] F2FS-fs (loop3): Invalid Fs Meta Ino: node(1) meta(0) root(3) [ 1196.540821] F2FS-fs (loop3): Can't find valid F2FS filesystem in 2th superblock [ 1196.577995] F2FS-fs (loop3): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1196.597777] F2FS-fs (loop3): Can't find valid F2FS filesystem in 1th superblock [ 1196.616540] F2FS-fs (loop3): Invalid Fs Meta Ino: node(1) meta(0) root(3) [ 1196.648803] F2FS-fs (loop3): Can't find valid F2FS filesystem in 2th superblock 03:36:09 executing program 1: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x200, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0xffffffffffffff4c, 0x109000) ioctl$TIOCGPTPEER(r1, 0x5441, 0x7fffffff) syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x1, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000500)='/dev/input/event#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000380)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x8, 0x85a1035adf4fb4ed) r3 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r3, 0x29, 0xcc, &(0x7f0000000040)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x9, @ipv4={[], [], @multicast1}}, {0xa, 0x0, 0x0, @remote, 0x5}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x5c) utime(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)) setsockopt$inet6_MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f00000000c0)={0x1, 0x1, 0x80000000, 0x10000, 0x3}, 0xc) r4 = epoll_create(0xdaf) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000200)) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x600bff, 0x0) r5 = dup(r2) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r5, 0x10e, 0x8, &(0x7f0000000080)=0x9, 0x4) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r5, &(0x7f0000000140)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000540)={0xaa, 0xe}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000007c0)={@empty, 0x41}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}}) mlockall(0x3) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r6, 0x1000008912, &(0x7f0000001180)="0adc1f123c123f3188b070") r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) r8 = openat$cgroup_ro(r7, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) read$alg(r8, 0x0, 0x0) [ 1196.924007] F2FS-fs (loop3): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1196.942992] F2FS-fs (loop3): Can't find valid F2FS filesystem in 1th superblock 03:36:09 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000000907031dfffd946fa2830020200a0009000100001d85680c1baba20400ff7e28000000110affffba010000000009b356da5a80d18be34c8546c8243929db2406b20cd37ed01cc0", 0x4c}], 0x1}, 0x0) [ 1196.998337] F2FS-fs (loop3): Invalid Fs Meta Ino: node(1) meta(0) root(3) [ 1197.007687] F2FS-fs (loop3): Can't find valid F2FS filesystem in 2th superblock 03:36:09 executing program 5: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x44000) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0xa6ba0) io_setup(0x40000100000003, &(0x7f0000000340)=0x0) io_submit(r1, 0x653, &(0x7f0000000540)=[&(0x7f00000000c0)={0x8040000a70c0300, 0x0, 0x8, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7, 0xc00}]) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x3, 0x5c831, 0xffffffffffffffff, 0x0) [ 1197.041344] F2FS-fs (loop3): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1197.090074] F2FS-fs (loop3): Can't find valid F2FS filesystem in 1th superblock [ 1197.160904] F2FS-fs (loop3): Invalid Fs Meta Ino: node(1) meta(0) root(3) [ 1197.215186] IPVS: ftp: loaded support on port[0] = 21 [ 1197.219847] F2FS-fs (loop3): Can't find valid F2FS filesystem in 2th superblock 03:36:10 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x43, 0xffffffd5}}, &(0x7f0000000080)='GPL\x04\x9c5\x14\xbfw-\xa0z\xe8.vY\n6\xf6I>\xc1\xab\x91\xb3\x97\xe4*\xbf\x1e\xa6\xcd\x8c\xd7t\'\xfc\x9a\x9e+qe\xf5+A\a\xbf\bP\xd8\x99\xdcR\xd0\x13\x17]\xdb\x1b/F <*\x05\xb7\"\xe3>Uo\xb2\xe3\xf3\x9a<\xde\x1f\xcaSd\x037\xec\x95aF\xbd\xbf\xcb\x11Pp\x19V1\xde]!\xa5\xea\x9ec\x8c+\xdbx\xa5\x01\xcaKn\xa3\x13\xd8%h\xf98,,?o\xab\xa6\xb4\xeeTy;N\xd2m\xae>R\"P)\xbb*\xc0\x00\x7fwuL?#\xce\xda\x98\t\xb9\xa9hJ\x94\n\xbc\xaa\x8c\xfc\xc7\x13>\xc4\"\xe9\xc88\x881\x8dA\xe9\xa4\x93\xf0\x19_\xe2Y\x96Q\xb8\x95\x04\xf5\xdb\xa1F%\xce#f\xf3=\x95\xdb\xa9/\x86ry\xca\xbfJ\xce\xdd\xc8Z\x8a\xf7\xa0\xfah\xd7g\xceQ6\xb9\xd0\xd1\x96lI\x9c\xb6\xbf4\xc2\x98\x86f\x97\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'}, 0x48) 03:36:10 executing program 4: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x1ce, &(0x7f0000000700)={&(0x7f0000000000)=@bridge_getneigh={0x28, 0x1e, 0x601, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, 0x9}]}, 0x28}}, 0x0) 03:36:10 executing program 3: syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x1400}], 0x0, 0x0) 03:36:10 executing program 4: r0 = epoll_create(0x3) r1 = epoll_create(0xd3) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f000000e000)) [ 1197.696928] F2FS-fs (loop3): Magic Mismatch, valid(0xf2f52010) - read(0x0) 03:36:10 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup\x00\x06\xe8\x00a\x9e\xdfl0\x00', 0x200002, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0x8000008407) [ 1197.847391] F2FS-fs (loop3): Can't find valid F2FS filesystem in 1th superblock 03:36:10 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000), 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x103, 0x0) syz_open_dev$sndtimer(&(0x7f0000000100)='/dev/snd/timer\x00', 0x0, 0x38) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000480)={0x0, 0x80000000}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000002080)={{{@in6, @in, 0x0, 0x0, 0x4e21, 0x81, 0x0, 0x80, 0x0, 0x0, 0x0, r2}, {0x7, 0xfffffffffffffff7, 0x429, 0x3, 0x7, 0x955c, 0x0, 0x7}, {0x7, 0xfffffffffffffff8, 0x0, 0x6}, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1}, {{@in6=@local, 0x4d4, 0x7f}, 0xa, @in6=@mcast2, 0x3507, 0x4, 0x3, 0x400, 0x8, 0x3, 0x3f5}}, 0xe8) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0xe368adb30c792f1f, &(0x7f0000000340)={@local, @local}, 0xc) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000100)) getpeername$unix(r1, &(0x7f00000003c0)=@abs, &(0x7f0000000600)=0x6e) openat$cgroup_procs(r1, &(0x7f0000000240)='\x1f\x00\x000\xfc(e?\xe4\xa9\x9d\x04w\x1d\xe2\x9e\xee\xbfn\x96.\x10\x00s\x00', 0x2, 0x0) unshare(0x40000000) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000040)={'tunl0\x00', @ifru_names='bridge0\x00'}) r3 = syz_open_dev$admmidi(&(0x7f0000000140)='/dev/admmidi#\x00', 0x100000000, 0x2000) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)="025cc807") ioctl$VIDIOC_QUERYSTD(r3, 0x8008563f, &(0x7f0000000180)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f00000001c0)={0x8, 0x0, 0xc71a, {}, 0x100000001, 0x8}) 03:36:10 executing program 4: unshare(0x2000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000000)={@remote, @rand_addr, @multicast2}, &(0x7f0000000040)=0xc) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x17, 0x0, &(0x7f0000000680)) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x400) r3 = open$dir(&(0x7f0000001640)='./file0\x00', 0x6c402, 0x3) sendfile(r2, r3, 0x0, 0x10000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(r7, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x41, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r8, 0x402c5342, &(0x7f0000000440)={0x0, 0x0, 0x8, {}, 0x3, 0x100}) ioctl$INOTIFY_IOC_SETNEXTWD(r5, 0x40044900, 0x9) r9 = socket(0xa, 0x3, 0x8) setsockopt$SO_ATTACH_FILTER(r9, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x3, 0x80000, 0x5, 0xfffffffffffffffd}, {0x7fefadfb, 0x8, 0x7, 0x9}, {0x9, 0x20, 0x100000001, 0x80}, {0xffffffffffffff01, 0x984c, 0xfffffffffffffffd, 0xc96}, {0xffffffff, 0x3, 0x0, 0x5a}, {0x3f, 0x112000, 0xfffffffffffffff8, 0xc0}, {0xe60, 0x5, 0x100, 0x1}, {0xa7a, 0x2, 0xffffffffffffff81, 0x4}, {0x3, 0x7, 0x4, 0x7}]}, 0x10) getsockopt$IPT_SO_GET_INFO(r9, 0x0, 0x40, &(0x7f0000000600)={'mangle\x00\x00\x04\x00\x00\xe8\xff\x00\x00\x10\x00'}, &(0x7f0000000140)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r9, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r9, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) syz_genetlink_get_family_id$nbd(&(0x7f0000000400)='nbd\x00') ptrace$getsig(0x4202, r6, 0xffff, &(0x7f0000000500)) getpgid(r6) syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f00000003c0)='./file0\x00', 0x6bb78628, 0x1, &(0x7f0000007280)=[{&(0x7f0000004d00)="bd595fdd3b16353102437bfc5cc4ec1581e5094c3d299408d482f34118b617cfd59c1d82fb92ff7da91679cb3f29a3249f74095033583cd7570f6bad6742e07a7e55f8bbcd673cfb93be0054cbd874b30cc262", 0x53, 0x400}], 0x1a00000, 0x0) sendmsg$NBD_CMD_CONNECT(r9, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f0000001080)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x8000}, 0x4001) ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, &(0x7f0000000200)={{0xffffffffffffffff, 0x3, 0x8000, 0x10003, 0x80000000}}) mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x2001, 0x1) r10 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000580)='/dev/hwrng\x00', 0xff, 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(r10, 0x117, 0x5, 0x0, 0x20) [ 1197.945886] F2FS-fs (loop3): Invalid Fs Meta Ino: node(1) meta(0) root(3) [ 1198.049911] F2FS-fs (loop3): Can't find valid F2FS filesystem in 2th superblock [ 1198.083651] bridge0: port 3(syz_tun) entered disabled state [ 1198.091011] bridge0: port 2(bridge_slave_1) entered disabled state [ 1198.098871] bridge0: port 1(bridge_slave_0) entered disabled state [ 1198.271154] IPVS: ftp: loaded support on port[0] = 21 03:36:15 executing program 5: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x44000) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0xa6ba0) io_setup(0x40000100000003, &(0x7f0000000340)=0x0) io_submit(r1, 0x653, &(0x7f0000000540)=[&(0x7f00000000c0)={0x8040000a70c0300, 0x0, 0x8, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7, 0xc00}]) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x3, 0x5c831, 0xffffffffffffffff, 0x0) [ 1202.292970] F2FS-fs (loop3): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1202.300143] F2FS-fs (loop3): Can't find valid F2FS filesystem in 1th superblock [ 1202.308492] F2FS-fs (loop3): Invalid Fs Meta Ino: node(1) meta(0) root(3) [ 1202.334242] device syz_tun left promiscuous mode [ 1202.341224] bridge0: port 3(syz_tun) entered disabled state [ 1202.378140] F2FS-fs (loop3): Can't find valid F2FS filesystem in 2th superblock 03:36:15 executing program 3: syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x1400}], 0x0, 0x0) [ 1202.694334] F2FS-fs (loop3): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1202.752607] F2FS-fs (loop3): Can't find valid F2FS filesystem in 1th superblock [ 1202.787685] F2FS-fs (loop3): Invalid Fs Meta Ino: node(1) meta(0) root(3) [ 1202.830780] F2FS-fs (loop3): Can't find valid F2FS filesystem in 2th superblock [ 1202.863785] F2FS-fs (loop3): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1202.900124] F2FS-fs (loop3): Can't find valid F2FS filesystem in 1th superblock [ 1202.934010] F2FS-fs (loop3): Invalid Fs Meta Ino: node(1) meta(0) root(3) [ 1202.971396] F2FS-fs (loop3): Can't find valid F2FS filesystem in 2th superblock [ 1203.176856] device bridge_slave_1 left promiscuous mode [ 1203.183671] bridge0: port 2(bridge_slave_1) entered disabled state [ 1203.240216] device bridge_slave_0 left promiscuous mode [ 1203.246998] bridge0: port 1(bridge_slave_0) entered disabled state 03:36:16 executing program 1: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x200, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0xffffffffffffff4c, 0x109000) ioctl$TIOCGPTPEER(r1, 0x5441, 0x7fffffff) syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x1, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000500)='/dev/input/event#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000380)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x8, 0x85a1035adf4fb4ed) r3 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r3, 0x29, 0xcc, &(0x7f0000000040)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x9, @ipv4={[], [], @multicast1}}, {0xa, 0x0, 0x0, @remote, 0x5}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x5c) utime(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)) setsockopt$inet6_MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f00000000c0)={0x1, 0x1, 0x80000000, 0x10000, 0x3}, 0xc) r4 = epoll_create(0xdaf) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000200)) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x600bff, 0x0) r5 = dup(r2) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r5, 0x10e, 0x8, &(0x7f0000000080)=0x9, 0x4) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r5, &(0x7f0000000140)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000540)={0xaa, 0xe}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000007c0)={@empty, 0x41}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}}) mlockall(0x3) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r6, 0x1000008912, &(0x7f0000001180)="0adc1f123c123f3188b070") r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) r8 = openat$cgroup_ro(r7, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) read$alg(r8, 0x0, 0x0) 03:36:16 executing program 3: syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000300)=[{&(0x7f0000000040)="1020f5f20100070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000016000000020000000200000002000000020000000e000000000400000004000000080000000c000000100000001400000300000001", 0x65, 0x1400}], 0x0, 0x0) 03:36:16 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000001640)="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", 0x651}], 0x1}], 0x1, 0x0) recvmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000500)=""/84, 0xf}, {&(0x7f0000000580)=""/4096, 0x1000}], 0x2, &(0x7f00000000c0)=""/50, 0x32}, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) 03:36:16 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000), 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x103, 0x0) syz_open_dev$sndtimer(&(0x7f0000000100)='/dev/snd/timer\x00', 0x0, 0x38) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000480)={0x0, 0x80000000}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000002080)={{{@in6, @in, 0x0, 0x0, 0x4e21, 0x81, 0x0, 0x80, 0x0, 0x0, 0x0, r2}, {0x7, 0xfffffffffffffff7, 0x429, 0x3, 0x7, 0x955c, 0x0, 0x7}, {0x7, 0xfffffffffffffff8, 0x0, 0x6}, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1}, {{@in6=@local, 0x4d4, 0x7f}, 0xa, @in6=@mcast2, 0x3507, 0x4, 0x3, 0x400, 0x8, 0x3, 0x3f5}}, 0xe8) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0xe368adb30c792f1f, &(0x7f0000000340)={@local, @local}, 0xc) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000100)) getpeername$unix(r1, &(0x7f00000003c0)=@abs, &(0x7f0000000600)=0x6e) openat$cgroup_procs(r1, &(0x7f0000000240)='\x1f\x00\x000\xfc(e?\xe4\xa9\x9d\x04w\x1d\xe2\x9e\xee\xbfn\x96.\x10\x00s\x00', 0x2, 0x0) unshare(0x40000000) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000040)={'tunl0\x00', @ifru_names='bridge0\x00'}) r3 = syz_open_dev$admmidi(&(0x7f0000000140)='/dev/admmidi#\x00', 0x100000000, 0x2000) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)="025cc807") ioctl$VIDIOC_QUERYSTD(r3, 0x8008563f, &(0x7f0000000180)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f00000001c0)={0x8, 0x0, 0xc71a, {}, 0x100000001, 0x8}) 03:36:16 executing program 2: r0 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000500)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r0, 0x0, &(0x7f00000006c0)='md5sum\x00') 03:36:16 executing program 4: unshare(0x2000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000000)={@remote, @rand_addr, @multicast2}, &(0x7f0000000040)=0xc) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x17, 0x0, &(0x7f0000000680)) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x400) r3 = open$dir(&(0x7f0000001640)='./file0\x00', 0x6c402, 0x3) sendfile(r2, r3, 0x0, 0x10000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(r7, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x41, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r8, 0x402c5342, &(0x7f0000000440)={0x0, 0x0, 0x8, {}, 0x3, 0x100}) ioctl$INOTIFY_IOC_SETNEXTWD(r5, 0x40044900, 0x9) r9 = socket(0xa, 0x3, 0x8) setsockopt$SO_ATTACH_FILTER(r9, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x3, 0x80000, 0x5, 0xfffffffffffffffd}, {0x7fefadfb, 0x8, 0x7, 0x9}, {0x9, 0x20, 0x100000001, 0x80}, {0xffffffffffffff01, 0x984c, 0xfffffffffffffffd, 0xc96}, {0xffffffff, 0x3, 0x0, 0x5a}, {0x3f, 0x112000, 0xfffffffffffffff8, 0xc0}, {0xe60, 0x5, 0x100, 0x1}, {0xa7a, 0x2, 0xffffffffffffff81, 0x4}, {0x3, 0x7, 0x4, 0x7}]}, 0x10) getsockopt$IPT_SO_GET_INFO(r9, 0x0, 0x40, &(0x7f0000000600)={'mangle\x00\x00\x04\x00\x00\xe8\xff\x00\x00\x10\x00'}, &(0x7f0000000140)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r9, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r9, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) syz_genetlink_get_family_id$nbd(&(0x7f0000000400)='nbd\x00') ptrace$getsig(0x4202, r6, 0xffff, &(0x7f0000000500)) getpgid(r6) syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f00000003c0)='./file0\x00', 0x6bb78628, 0x1, &(0x7f0000007280)=[{&(0x7f0000004d00)="bd595fdd3b16353102437bfc5cc4ec1581e5094c3d299408d482f34118b617cfd59c1d82fb92ff7da91679cb3f29a3249f74095033583cd7570f6bad6742e07a7e55f8bbcd673cfb93be0054cbd874b30cc262", 0x53, 0x400}], 0x1a00000, 0x0) sendmsg$NBD_CMD_CONNECT(r9, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f0000001080)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x8000}, 0x4001) ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, &(0x7f0000000200)={{0xffffffffffffffff, 0x3, 0x8000, 0x10003, 0x80000000}}) mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x2001, 0x1) r10 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000580)='/dev/hwrng\x00', 0xff, 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(r10, 0x117, 0x5, 0x0, 0x20) [ 1203.910518] F2FS-fs (loop3): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1203.953036] F2FS-fs (loop3): Can't find valid F2FS filesystem in 1th superblock [ 1204.010743] IPVS: ftp: loaded support on port[0] = 21 [ 1204.017621] F2FS-fs (loop3): Invalid Fs Meta Ino: node(1) meta(0) root(3) 03:36:16 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000001640)="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", 0x651}], 0x1}], 0x1, 0x0) recvmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000500)=""/84, 0xf}, {&(0x7f0000000580)=""/4096, 0x1000}], 0x2, &(0x7f00000000c0)=""/50, 0x32}, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) [ 1204.052803] F2FS-fs (loop3): Can't find valid F2FS filesystem in 2th superblock 03:36:16 executing program 2: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x200, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0xffffffffffffff4c, 0x109000) ioctl$TIOCGPTPEER(r1, 0x5441, 0x7fffffff) syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x1, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000500)='/dev/input/event#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000380)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x8, 0x85a1035adf4fb4ed) r3 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r3, 0x29, 0xcc, &(0x7f0000000040)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x9, @ipv4={[], [], @multicast1}}, {0xa, 0x0, 0x0, @remote, 0x5}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x5c) utime(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)) setsockopt$inet6_MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f00000000c0)={0x1, 0x1, 0x80000000, 0x10000, 0x3}, 0xc) r4 = epoll_create(0xdaf) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000200)) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x600bff, 0x0) r5 = dup(r2) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r5, 0x10e, 0x8, &(0x7f0000000080)=0x9, 0x4) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r5, &(0x7f0000000140)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000540)={0xaa, 0xe}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000007c0)={@empty, 0x41}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}}) mlockall(0x3) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r6, 0x1000008912, &(0x7f0000001180)="0adc1f123c123f3188b070") r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) r8 = openat$cgroup_ro(r7, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) read$alg(r8, 0x0, 0x0) [ 1204.115447] F2FS-fs (loop3): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1204.256331] F2FS-fs (loop3): Can't find valid F2FS filesystem in 1th superblock [ 1204.317577] F2FS-fs (loop3): Invalid Fs Meta Ino: node(1) meta(0) root(3) [ 1204.349708] F2FS-fs (loop3): Can't find valid F2FS filesystem in 2th superblock 03:36:17 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000001640)="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", 0x651}], 0x1}], 0x1, 0x0) recvmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000500)=""/84, 0xf}, {&(0x7f0000000580)=""/4096, 0x1000}], 0x2, &(0x7f00000000c0)=""/50, 0x32}, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) 03:36:17 executing program 4: unshare(0x2000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000000)={@remote, @rand_addr, @multicast2}, &(0x7f0000000040)=0xc) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x17, 0x0, &(0x7f0000000680)) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x400) r3 = open$dir(&(0x7f0000001640)='./file0\x00', 0x6c402, 0x3) sendfile(r2, r3, 0x0, 0x10000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(r7, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x41, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r8, 0x402c5342, &(0x7f0000000440)={0x0, 0x0, 0x8, {}, 0x3, 0x100}) ioctl$INOTIFY_IOC_SETNEXTWD(r5, 0x40044900, 0x9) r9 = socket(0xa, 0x3, 0x8) setsockopt$SO_ATTACH_FILTER(r9, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x3, 0x80000, 0x5, 0xfffffffffffffffd}, {0x7fefadfb, 0x8, 0x7, 0x9}, {0x9, 0x20, 0x100000001, 0x80}, {0xffffffffffffff01, 0x984c, 0xfffffffffffffffd, 0xc96}, {0xffffffff, 0x3, 0x0, 0x5a}, {0x3f, 0x112000, 0xfffffffffffffff8, 0xc0}, {0xe60, 0x5, 0x100, 0x1}, {0xa7a, 0x2, 0xffffffffffffff81, 0x4}, {0x3, 0x7, 0x4, 0x7}]}, 0x10) getsockopt$IPT_SO_GET_INFO(r9, 0x0, 0x40, &(0x7f0000000600)={'mangle\x00\x00\x04\x00\x00\xe8\xff\x00\x00\x10\x00'}, &(0x7f0000000140)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r9, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r9, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) syz_genetlink_get_family_id$nbd(&(0x7f0000000400)='nbd\x00') ptrace$getsig(0x4202, r6, 0xffff, &(0x7f0000000500)) getpgid(r6) syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f00000003c0)='./file0\x00', 0x6bb78628, 0x1, &(0x7f0000007280)=[{&(0x7f0000004d00)="bd595fdd3b16353102437bfc5cc4ec1581e5094c3d299408d482f34118b617cfd59c1d82fb92ff7da91679cb3f29a3249f74095033583cd7570f6bad6742e07a7e55f8bbcd673cfb93be0054cbd874b30cc262", 0x53, 0x400}], 0x1a00000, 0x0) sendmsg$NBD_CMD_CONNECT(r9, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f0000001080)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x8000}, 0x4001) ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, &(0x7f0000000200)={{0xffffffffffffffff, 0x3, 0x8000, 0x10003, 0x80000000}}) mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x2001, 0x1) r10 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000580)='/dev/hwrng\x00', 0xff, 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(r10, 0x117, 0x5, 0x0, 0x20) 03:36:17 executing program 3: unshare(0x2000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000000)={@remote, @rand_addr, @multicast2}, &(0x7f0000000040)=0xc) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x17, 0x0, &(0x7f0000000680)) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x400) r3 = open$dir(&(0x7f0000001640)='./file0\x00', 0x6c402, 0x3) sendfile(r2, r3, 0x0, 0x10000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(r7, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x41, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r8, 0x402c5342, &(0x7f0000000440)={0x0, 0x0, 0x8, {}, 0x3, 0x100}) ioctl$INOTIFY_IOC_SETNEXTWD(r5, 0x40044900, 0x9) r9 = socket(0xa, 0x3, 0x8) setsockopt$SO_ATTACH_FILTER(r9, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x3, 0x80000, 0x5, 0xfffffffffffffffd}, {0x7fefadfb, 0x8, 0x7, 0x9}, {0x9, 0x20, 0x100000001, 0x80}, {0xffffffffffffff01, 0x984c, 0xfffffffffffffffd, 0xc96}, {0xffffffff, 0x3, 0x0, 0x5a}, {0x3f, 0x112000, 0xfffffffffffffff8, 0xc0}, {0xe60, 0x5, 0x100, 0x1}, {0xa7a, 0x2, 0xffffffffffffff81, 0x4}, {0x3, 0x7, 0x4, 0x7}]}, 0x10) getsockopt$IPT_SO_GET_INFO(r9, 0x0, 0x40, &(0x7f0000000600)={'mangle\x00\x00\x04\x00\x00\xe8\xff\x00\x00\x10\x00'}, &(0x7f0000000140)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r9, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r9, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) syz_genetlink_get_family_id$nbd(&(0x7f0000000400)='nbd\x00') ptrace$getsig(0x4202, r6, 0xffff, &(0x7f0000000500)) getpgid(r6) syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f00000003c0)='./file0\x00', 0x6bb78628, 0x1, &(0x7f0000007280)=[{&(0x7f0000004d00)="bd595fdd3b16353102437bfc5cc4ec1581e5094c3d299408d482f34118b617cfd59c1d82fb92ff7da91679cb3f29a3249f74095033583cd7570f6bad6742e07a7e55f8bbcd673cfb93be0054cbd874b30cc262", 0x53, 0x400}], 0x1a00000, 0x0) sendmsg$NBD_CMD_CONNECT(r9, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f0000001080)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x8000}, 0x4001) ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, &(0x7f0000000200)={{0xffffffffffffffff, 0x3, 0x8000, 0x10003, 0x80000000}}) mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x2001, 0x1) r10 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000580)='/dev/hwrng\x00', 0xff, 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(r10, 0x117, 0x5, 0x0, 0x20) 03:36:17 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000001640)="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", 0x651}], 0x1}], 0x1, 0x0) recvmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000500)=""/84, 0xf}, {&(0x7f0000000580)=""/4096, 0x1000}], 0x2, &(0x7f00000000c0)=""/50, 0x32}, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) [ 1204.839733] bridge0: port 2(bridge_slave_1) entered disabled state [ 1204.849568] bridge0: port 1(bridge_slave_0) entered disabled state [ 1207.101740] device bridge_slave_1 left promiscuous mode [ 1207.145900] bridge0: port 2(bridge_slave_1) entered disabled state [ 1207.171444] ISOFS: Unable to identify CD-ROM format. [ 1207.810282] device bridge_slave_0 left promiscuous mode [ 1207.815811] bridge0: port 1(bridge_slave_0) entered disabled state 03:36:20 executing program 1: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x200, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0xffffffffffffff4c, 0x109000) ioctl$TIOCGPTPEER(r1, 0x5441, 0x7fffffff) syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x1, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000500)='/dev/input/event#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000380)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x8, 0x85a1035adf4fb4ed) r3 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r3, 0x29, 0xcc, &(0x7f0000000040)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x9, @ipv4={[], [], @multicast1}}, {0xa, 0x0, 0x0, @remote, 0x5}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x5c) utime(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)) setsockopt$inet6_MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f00000000c0)={0x1, 0x1, 0x80000000, 0x10000, 0x3}, 0xc) r4 = epoll_create(0xdaf) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000200)) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x600bff, 0x0) r5 = dup(r2) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r5, 0x10e, 0x8, &(0x7f0000000080)=0x9, 0x4) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r5, &(0x7f0000000140)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000540)={0xaa, 0xe}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000007c0)={@empty, 0x41}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}}) mlockall(0x3) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r6, 0x1000008912, &(0x7f0000001180)="0adc1f123c123f3188b070") r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) r8 = openat$cgroup_ro(r7, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) read$alg(r8, 0x0, 0x0) 03:36:20 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000), 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x103, 0x0) syz_open_dev$sndtimer(&(0x7f0000000100)='/dev/snd/timer\x00', 0x0, 0x38) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000480)={0x0, 0x80000000}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000002080)={{{@in6, @in, 0x0, 0x0, 0x4e21, 0x81, 0x0, 0x80, 0x0, 0x0, 0x0, r2}, {0x7, 0xfffffffffffffff7, 0x429, 0x3, 0x7, 0x955c, 0x0, 0x7}, {0x7, 0xfffffffffffffff8, 0x0, 0x6}, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1}, {{@in6=@local, 0x4d4, 0x7f}, 0xa, @in6=@mcast2, 0x3507, 0x4, 0x3, 0x400, 0x8, 0x3, 0x3f5}}, 0xe8) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0xe368adb30c792f1f, &(0x7f0000000340)={@local, @local}, 0xc) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000100)) getpeername$unix(r1, &(0x7f00000003c0)=@abs, &(0x7f0000000600)=0x6e) openat$cgroup_procs(r1, &(0x7f0000000240)='\x1f\x00\x000\xfc(e?\xe4\xa9\x9d\x04w\x1d\xe2\x9e\xee\xbfn\x96.\x10\x00s\x00', 0x2, 0x0) unshare(0x40000000) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000040)={'tunl0\x00', @ifru_names='bridge0\x00'}) r3 = syz_open_dev$admmidi(&(0x7f0000000140)='/dev/admmidi#\x00', 0x100000000, 0x2000) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)="025cc807") ioctl$VIDIOC_QUERYSTD(r3, 0x8008563f, &(0x7f0000000180)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f00000001c0)={0x8, 0x0, 0xc71a, {}, 0x100000001, 0x8}) 03:36:20 executing program 4: unshare(0x2000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000000)={@remote, @rand_addr, @multicast2}, &(0x7f0000000040)=0xc) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x17, 0x0, &(0x7f0000000680)) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x400) r3 = open$dir(&(0x7f0000001640)='./file0\x00', 0x6c402, 0x3) sendfile(r2, r3, 0x0, 0x10000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(r7, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x41, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r8, 0x402c5342, &(0x7f0000000440)={0x0, 0x0, 0x8, {}, 0x3, 0x100}) ioctl$INOTIFY_IOC_SETNEXTWD(r5, 0x40044900, 0x9) r9 = socket(0xa, 0x3, 0x8) setsockopt$SO_ATTACH_FILTER(r9, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x3, 0x80000, 0x5, 0xfffffffffffffffd}, {0x7fefadfb, 0x8, 0x7, 0x9}, {0x9, 0x20, 0x100000001, 0x80}, {0xffffffffffffff01, 0x984c, 0xfffffffffffffffd, 0xc96}, {0xffffffff, 0x3, 0x0, 0x5a}, {0x3f, 0x112000, 0xfffffffffffffff8, 0xc0}, {0xe60, 0x5, 0x100, 0x1}, {0xa7a, 0x2, 0xffffffffffffff81, 0x4}, {0x3, 0x7, 0x4, 0x7}]}, 0x10) getsockopt$IPT_SO_GET_INFO(r9, 0x0, 0x40, &(0x7f0000000600)={'mangle\x00\x00\x04\x00\x00\xe8\xff\x00\x00\x10\x00'}, &(0x7f0000000140)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r9, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r9, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) syz_genetlink_get_family_id$nbd(&(0x7f0000000400)='nbd\x00') ptrace$getsig(0x4202, r6, 0xffff, &(0x7f0000000500)) getpgid(r6) syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f00000003c0)='./file0\x00', 0x6bb78628, 0x1, &(0x7f0000007280)=[{&(0x7f0000004d00)="bd595fdd3b16353102437bfc5cc4ec1581e5094c3d299408d482f34118b617cfd59c1d82fb92ff7da91679cb3f29a3249f74095033583cd7570f6bad6742e07a7e55f8bbcd673cfb93be0054cbd874b30cc262", 0x53, 0x400}], 0x1a00000, 0x0) sendmsg$NBD_CMD_CONNECT(r9, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f0000001080)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x8000}, 0x4001) ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, &(0x7f0000000200)={{0xffffffffffffffff, 0x3, 0x8000, 0x10003, 0x80000000}}) mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x2001, 0x1) r10 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000580)='/dev/hwrng\x00', 0xff, 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(r10, 0x117, 0x5, 0x0, 0x20) 03:36:20 executing program 5: clock_gettime(0xfffffffffffffff1, &(0x7f0000000000)) 03:36:20 executing program 2: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x200, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0xffffffffffffff4c, 0x109000) ioctl$TIOCGPTPEER(r1, 0x5441, 0x7fffffff) syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x1, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000500)='/dev/input/event#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000380)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x8, 0x85a1035adf4fb4ed) r3 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r3, 0x29, 0xcc, &(0x7f0000000040)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x9, @ipv4={[], [], @multicast1}}, {0xa, 0x0, 0x0, @remote, 0x5}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x5c) utime(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)) setsockopt$inet6_MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f00000000c0)={0x1, 0x1, 0x80000000, 0x10000, 0x3}, 0xc) r4 = epoll_create(0xdaf) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000200)) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x600bff, 0x0) r5 = dup(r2) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r5, 0x10e, 0x8, &(0x7f0000000080)=0x9, 0x4) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r5, &(0x7f0000000140)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000540)={0xaa, 0xe}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000007c0)={@empty, 0x41}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}}) mlockall(0x3) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r6, 0x1000008912, &(0x7f0000001180)="0adc1f123c123f3188b070") r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) r8 = openat$cgroup_ro(r7, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) read$alg(r8, 0x0, 0x0) 03:36:20 executing program 3: unshare(0x2000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000000)={@remote, @rand_addr, @multicast2}, &(0x7f0000000040)=0xc) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x17, 0x0, &(0x7f0000000680)) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x400) r3 = open$dir(&(0x7f0000001640)='./file0\x00', 0x6c402, 0x3) sendfile(r2, r3, 0x0, 0x10000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(r7, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x41, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r8, 0x402c5342, &(0x7f0000000440)={0x0, 0x0, 0x8, {}, 0x3, 0x100}) ioctl$INOTIFY_IOC_SETNEXTWD(r5, 0x40044900, 0x9) r9 = socket(0xa, 0x3, 0x8) setsockopt$SO_ATTACH_FILTER(r9, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x3, 0x80000, 0x5, 0xfffffffffffffffd}, {0x7fefadfb, 0x8, 0x7, 0x9}, {0x9, 0x20, 0x100000001, 0x80}, {0xffffffffffffff01, 0x984c, 0xfffffffffffffffd, 0xc96}, {0xffffffff, 0x3, 0x0, 0x5a}, {0x3f, 0x112000, 0xfffffffffffffff8, 0xc0}, {0xe60, 0x5, 0x100, 0x1}, {0xa7a, 0x2, 0xffffffffffffff81, 0x4}, {0x3, 0x7, 0x4, 0x7}]}, 0x10) getsockopt$IPT_SO_GET_INFO(r9, 0x0, 0x40, &(0x7f0000000600)={'mangle\x00\x00\x04\x00\x00\xe8\xff\x00\x00\x10\x00'}, &(0x7f0000000140)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r9, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r9, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) syz_genetlink_get_family_id$nbd(&(0x7f0000000400)='nbd\x00') ptrace$getsig(0x4202, r6, 0xffff, &(0x7f0000000500)) getpgid(r6) syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f00000003c0)='./file0\x00', 0x6bb78628, 0x1, &(0x7f0000007280)=[{&(0x7f0000004d00)="bd595fdd3b16353102437bfc5cc4ec1581e5094c3d299408d482f34118b617cfd59c1d82fb92ff7da91679cb3f29a3249f74095033583cd7570f6bad6742e07a7e55f8bbcd673cfb93be0054cbd874b30cc262", 0x53, 0x400}], 0x1a00000, 0x0) sendmsg$NBD_CMD_CONNECT(r9, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f0000001080)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x8000}, 0x4001) ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, &(0x7f0000000200)={{0xffffffffffffffff, 0x3, 0x8000, 0x10003, 0x80000000}}) mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x2001, 0x1) r10 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000580)='/dev/hwrng\x00', 0xff, 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(r10, 0x117, 0x5, 0x0, 0x20) [ 1208.200686] IPVS: ftp: loaded support on port[0] = 21 03:36:21 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) connect$ax25(r0, &(0x7f0000000080)={{0x3, @default}, [@netrom, @bcast, @netrom, @bcast, @remote, @null, @remote, @rose]}, 0x48) 03:36:21 executing program 5: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x2, 0xfa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1208.622985] ISOFS: Unable to identify CD-ROM format. 03:36:21 executing program 4: creat(&(0x7f0000000700)='./bus\x00', 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002011, r0, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000001b40)=[{0x0}], 0x1, 0x0) 03:36:21 executing program 5: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x2, 0xfa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 03:36:21 executing program 3: unshare(0x2000000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000000)={@remote, @rand_addr, @multicast2}, &(0x7f0000000040)=0xc) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_buf(r1, 0x0, 0x17, 0x0, &(0x7f0000000680)) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x400) r3 = open$dir(&(0x7f0000001640)='./file0\x00', 0x6c402, 0x3) sendfile(r2, r3, 0x0, 0x10000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(r7, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = openat$null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0x41, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r8, 0x402c5342, &(0x7f0000000440)={0x0, 0x0, 0x8, {}, 0x3, 0x100}) ioctl$INOTIFY_IOC_SETNEXTWD(r5, 0x40044900, 0x9) r9 = socket(0xa, 0x3, 0x8) setsockopt$SO_ATTACH_FILTER(r9, 0x1, 0x1a, &(0x7f00000000c0)={0x9, &(0x7f0000000040)=[{0x3, 0x80000, 0x5, 0xfffffffffffffffd}, {0x7fefadfb, 0x8, 0x7, 0x9}, {0x9, 0x20, 0x100000001, 0x80}, {0xffffffffffffff01, 0x984c, 0xfffffffffffffffd, 0xc96}, {0xffffffff, 0x3, 0x0, 0x5a}, {0x3f, 0x112000, 0xfffffffffffffff8, 0xc0}, {0xe60, 0x5, 0x100, 0x1}, {0xa7a, 0x2, 0xffffffffffffff81, 0x4}, {0x3, 0x7, 0x4, 0x7}]}, 0x10) getsockopt$IPT_SO_GET_INFO(r9, 0x0, 0x40, &(0x7f0000000600)={'mangle\x00\x00\x04\x00\x00\xe8\xff\x00\x00\x10\x00'}, &(0x7f0000000140)=0x54) ioctl$sock_inet_SIOCSIFFLAGS(r9, 0x8914, &(0x7f0000000000)={'bridge0\x004\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r9, 0x89a1, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) syz_genetlink_get_family_id$nbd(&(0x7f0000000400)='nbd\x00') ptrace$getsig(0x4202, r6, 0xffff, &(0x7f0000000500)) getpgid(r6) syz_mount_image$iso9660(&(0x7f00000002c0)='iso9660\x00', &(0x7f00000003c0)='./file0\x00', 0x6bb78628, 0x1, &(0x7f0000007280)=[{&(0x7f0000004d00)="bd595fdd3b16353102437bfc5cc4ec1581e5094c3d299408d482f34118b617cfd59c1d82fb92ff7da91679cb3f29a3249f74095033583cd7570f6bad6742e07a7e55f8bbcd673cfb93be0054cbd874b30cc262", 0x53, 0x400}], 0x1a00000, 0x0) sendmsg$NBD_CMD_CONNECT(r9, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f0000001080)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x8000}, 0x4001) ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, &(0x7f0000000200)={{0xffffffffffffffff, 0x3, 0x8000, 0x10003, 0x80000000}}) mknod$loop(&(0x7f00000001c0)='./file0\x00', 0x2001, 0x1) r10 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000580)='/dev/hwrng\x00', 0xff, 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(r10, 0x117, 0x5, 0x0, 0x20) 03:36:21 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x8, &(0x7f0000000280)="0adc1f023c123f3188a070") r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000040)={0x9, 0x4, 0xfffffffffffffff9, 0x0, 0x7d0974d3}) ioctl$int_in(r1, 0x800000c0045006, &(0x7f00000004c0)=0x100000035) socketpair(0x1, 0x5, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000004c0)=0x0) sched_setaffinity(r2, 0xfffffffffffffff8, &(0x7f0000000140)=0x40000000000009) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000b60000/0x4000)=nil) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r4 = shmat(0x0, &(0x7f0000ffb000/0x4000)=nil, 0x7000) shmdt(r4) clone(0x4000, &(0x7f0000000380)="675b650fadce7e985eab97c09770a8c72f8bf9da0bd325b21ebae1a0940bfb1bb9aa0658b5a4d8f9d1774c68fcffb56bcc0e373aa846adef2c9c30be36b32aa4b4e93ffde1fab67785a5e16f6b0d8a79236d76d493fb6669ec54368189", 0x0, 0x0, 0x0) ioctl$FS_IOC_GETFSLABEL(r3, 0x81009431, &(0x7f0000000280)) inotify_add_watch(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x20) fsetxattr$security_evm(r1, &(0x7f0000000200)='security.evm\x00', &(0x7f0000000480)=@sha1={0x1, "ff04d18c25564647592d485f6e3abd563af9bbc9"}, 0x8, 0x0) r5 = fcntl$dupfd(r3, 0x406, r3) connect$rds(r5, &(0x7f00000000c0)={0x2, 0x4e24, @multicast2}, 0x10) ioctl$sock_inet_SIOCSIFNETMASK(r5, 0x891c, &(0x7f0000000000)={'team_slave_0\x00', {0x2, 0x4e20, @multicast1}}) sendmmsg(r5, &(0x7f0000002240)=[{{&(0x7f0000000400)=@isdn={0x22, 0x84af, 0x8, 0x81, 0xb0a}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000680)="140f043e682e1763913e56a6b921a6e03431768f7c8545197bfb80e35026d1adde741a74407ade8f1df28e9297eb96a91bdd9257ae97894bd029ab40cbeba92ef27238a346a79385e0785c3dfb06cd140de4cb9dc8897ccf7318642ec5146ab58aa3e70228265c4ef0c7e292b460fde91a19c5ed6595776cb2a35a329dc41224beb5bfad79b4165558046ba9778f627bafed673267cadb33d47afdef88287a500e809aa35b51ebbf4d39", 0xaa}], 0x1}, 0x7fff}, {{0x0, 0x0, 0x0}}], 0x2, 0x8084) ioctl$ASHMEM_PURGE_ALL_CACHES(r5, 0x770a, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) fcntl$getownex(r3, 0x10, &(0x7f0000000240)) perf_event_open(&(0x7f000000a000)={0x4, 0x393, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xa000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x80a102001ff8, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) ioctl$EVIOCGABS20(r5, 0x80184560, &(0x7f0000000500)=""/171) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) read$FUSE(r1, &(0x7f0000000500), 0x1000) [ 1209.206957] ISOFS: Unable to identify CD-ROM format. 03:36:22 executing program 1: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x200, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0xffffffffffffff4c, 0x109000) ioctl$TIOCGPTPEER(r1, 0x5441, 0x7fffffff) syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x1, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000500)='/dev/input/event#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000380)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x8, 0x85a1035adf4fb4ed) r3 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r3, 0x29, 0xcc, &(0x7f0000000040)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x9, @ipv4={[], [], @multicast1}}, {0xa, 0x0, 0x0, @remote, 0x5}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x5c) utime(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)) setsockopt$inet6_MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f00000000c0)={0x1, 0x1, 0x80000000, 0x10000, 0x3}, 0xc) r4 = epoll_create(0xdaf) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000200)) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x600bff, 0x0) r5 = dup(r2) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r5, 0x10e, 0x8, &(0x7f0000000080)=0x9, 0x4) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r5, &(0x7f0000000140)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000540)={0xaa, 0xe}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000007c0)={@empty, 0x41}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}}) mlockall(0x3) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r6, 0x1000008912, &(0x7f0000001180)="0adc1f123c123f3188b070") r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) r8 = openat$cgroup_ro(r7, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) read$alg(r8, 0x0, 0x0) 03:36:22 executing program 5: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x2, 0xfa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 03:36:22 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x200600) 03:36:22 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSBRKP(r0, 0x5425, 0x8) 03:36:23 executing program 2: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x200, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0xffffffffffffff4c, 0x109000) ioctl$TIOCGPTPEER(r1, 0x5441, 0x7fffffff) syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x1, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000500)='/dev/input/event#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000380)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x8, 0x85a1035adf4fb4ed) r3 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r3, 0x29, 0xcc, &(0x7f0000000040)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @mcast1}}, 0x5c) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xc9, &(0x7f0000000180)={{0xa, 0x0, 0x9, @ipv4={[], [], @multicast1}}, {0xa, 0x0, 0x0, @remote, 0x5}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x5c) utime(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)) setsockopt$inet6_MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f00000000c0)={0x1, 0x1, 0x80000000, 0x10000, 0x3}, 0xc) r4 = epoll_create(0xdaf) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000200)) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x600bff, 0x0) r5 = dup(r2) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r5, 0x10e, 0x8, &(0x7f0000000080)=0x9, 0x4) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r5, &(0x7f0000000140)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000540)={0xaa, 0xe}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000007c0)={@empty, 0x41}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}}) mlockall(0x3) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r6, 0x1000008912, &(0x7f0000001180)="0adc1f123c123f3188b070") r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) r8 = openat$cgroup_ro(r7, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) read$alg(r8, 0x0, 0x0) 03:36:23 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/cuse\x00', 0x2, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000280)='ns/pid\x00') semget(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f00000004c0)='security.ima\x00', &(0x7f0000000500)=@sha1={0x1, "1549c6a79f24f4d62dfc8d54ff2f57971d4014c3"}, 0x15, 0x2) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000680)='security.ima\x00', 0x0, 0x0, 0x98391aa8d00f7f6a) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vcs\x00', 0x400100, 0x0) getsockname$tipc(r1, &(0x7f00000001c0)=@name, &(0x7f0000000240)=0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') r2 = gettid() fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) lsetxattr$security_smack_transmute(0x0, &(0x7f0000000600)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000640)='TRUE', 0x4, 0x1) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, 0x0, 0x0) r3 = msgget$private(0x0, 0x8) r4 = getuid() lstat(&(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r6 = geteuid() fstat(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) msgctl$IPC_SET(r3, 0x1, &(0x7f00000003c0)={{0x1, r4, r5, r6, r7, 0x2}, 0x1, 0xfff, 0x1ff, 0x0, 0x80000000, 0x76, r2, r2}) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f0000000180), &(0x7f0000000440)=0x4) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb)={'\x06\x00'}, &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) r8 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ppoll(&(0x7f0000000100)=[{r8, 0x1}], 0x1, 0x0, &(0x7f0000000200), 0x8) 03:36:23 executing program 5: clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x2, 0xfa}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 03:36:23 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x7, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0xb0}]}, &(0x7f0000000000)='GPL\x00', 0x1, 0x3f9, &(0x7f00001a7f05)=""/251}, 0x48) 03:36:23 executing program 4: openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000280)='/proc/capi/capi20\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd/3\x00') sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000002840)={0x0, 0x0, 0x0}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a4, 0x182) 03:36:23 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$TIOCGLCKTRMIOS(0xffffffffffffffff, 0x5456, &(0x7f00000000c0)={0x0, 0x9f}) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x60, &(0x7f0000000080)={'filter\x00', 0x1d0}, 0x1b) 03:36:23 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/cuse\x00', 0x2, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000280)='ns/pid\x00') semget(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f00000004c0)='security.ima\x00', &(0x7f0000000500)=@sha1={0x1, "1549c6a79f24f4d62dfc8d54ff2f57971d4014c3"}, 0x15, 0x2) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000680)='security.ima\x00', 0x0, 0x0, 0x98391aa8d00f7f6a) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vcs\x00', 0x400100, 0x0) getsockname$tipc(r1, &(0x7f00000001c0)=@name, &(0x7f0000000240)=0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') r2 = gettid() fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) lsetxattr$security_smack_transmute(0x0, &(0x7f0000000600)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000640)='TRUE', 0x4, 0x1) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, 0x0, 0x0) r3 = msgget$private(0x0, 0x8) r4 = getuid() lstat(&(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r6 = geteuid() fstat(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) msgctl$IPC_SET(r3, 0x1, &(0x7f00000003c0)={{0x1, r4, r5, r6, r7, 0x2}, 0x1, 0xfff, 0x1ff, 0x0, 0x80000000, 0x76, r2, r2}) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f0000000180), &(0x7f0000000440)=0x4) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb)={'\x06\x00'}, &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) r8 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ppoll(&(0x7f0000000100)=[{r8, 0x1}], 0x1, 0x0, &(0x7f0000000200), 0x8) 03:36:23 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x4004000000000003, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000005f0007021dfffd946fa2830020200a000500000000030000000000000000ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) [ 1210.955582] __nla_parse: 4 callbacks suppressed [ 1210.955590] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 03:36:24 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$TIOCGLCKTRMIOS(0xffffffffffffffff, 0x5456, &(0x7f00000000c0)={0x0, 0x9f}) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x60, &(0x7f0000000080)={'filter\x00', 0x1d0}, 0x1b) 03:36:24 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000080)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0x40046205, &(0x7f00000002c0)={0x1, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="cc"], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000300)={0x4, 0x0, &(0x7f0000000180)=[@enter_looper], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000000c0)="e1"}) clone(0x0, &(0x7f0000000240), 0x0, 0x0, 0x0) 03:36:24 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/cuse\x00', 0x2, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000280)='ns/pid\x00') semget(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f00000004c0)='security.ima\x00', &(0x7f0000000500)=@sha1={0x1, "1549c6a79f24f4d62dfc8d54ff2f57971d4014c3"}, 0x15, 0x2) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000680)='security.ima\x00', 0x0, 0x0, 0x98391aa8d00f7f6a) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vcs\x00', 0x400100, 0x0) getsockname$tipc(r1, &(0x7f00000001c0)=@name, &(0x7f0000000240)=0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') r2 = gettid() fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) lsetxattr$security_smack_transmute(0x0, &(0x7f0000000600)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000640)='TRUE', 0x4, 0x1) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, 0x0, 0x0) r3 = msgget$private(0x0, 0x8) r4 = getuid() lstat(&(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r6 = geteuid() fstat(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) msgctl$IPC_SET(r3, 0x1, &(0x7f00000003c0)={{0x1, r4, r5, r6, r7, 0x2}, 0x1, 0xfff, 0x1ff, 0x0, 0x80000000, 0x76, r2, r2}) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f0000000180), &(0x7f0000000440)=0x4) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb)={'\x06\x00'}, &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) r8 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ppoll(&(0x7f0000000100)=[{r8, 0x1}], 0x1, 0x0, &(0x7f0000000200), 0x8) 03:36:24 executing program 0: syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semget(0xffffffffffffffff, 0x0, 0x0) r0 = socket$isdn_base(0x22, 0x3, 0x0) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000000), 0x4) socketpair$nbd(0x2, 0x1, 0x0, 0x0) 03:36:24 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/135, 0x74f) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x843, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34dc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x105082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r1 = socket$inet6(0xa, 0x803, 0x3) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000580)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r3, &(0x7f0000001740)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x10004080}, 0xc, &(0x7f00000006c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="000326bd7000fbdbdf25100000000c000200080007000000000034000200080008006a0000001400010000000000000000000000ffff0000000014000100ac1414190000000000db6bacb8000000080006000300000008000600ffffffff080005000000100008000600020000007f3e7080e861b1ef3f144067f5d50a4eb2466b1dcdf5d044409f2178fc19d5c0bf6c12fe91a0df783c646cc3ea8d5dd42c09b24f828d46b5ee88bf5020dfb07558627cdbfb488dacfcdd94"], 0x1}, 0x1, 0x0, 0x0, 0x8000}, 0x4000005) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x78, 0x4) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66726f8cfafd6c8fe2c98de7ba44947a79015f0fe57917cb62a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef2818a179"}, 0xd8) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @dev}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x4e23}, 0x10) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000003c0)='lp\x00', 0x3) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000100), 0x4) pipe(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000700)='IPVS\x00') prctl$PR_GET_SECCOMP(0x15) sendmsg$IPVS_CMD_DEL_DAEMON(r0, 0x0, 0x0) dup3(r2, r1, 0x0) recvmsg(r1, &(0x7f0000000240)={0x0, 0x10000000000000, &(0x7f0000000080)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x4f}, 0x100) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) write$binfmt_elf64(r2, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 03:36:24 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) ioctl$TIOCGLCKTRMIOS(r0, 0x405c5503, &(0x7f0000000000)={0x0, 0x0, 0x2}) ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 03:36:24 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$TIOCGLCKTRMIOS(0xffffffffffffffff, 0x5456, &(0x7f00000000c0)={0x0, 0x9f}) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x60, &(0x7f0000000080)={'filter\x00', 0x1d0}, 0x1b) 03:36:24 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/cuse\x00', 0x2, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000280)='ns/pid\x00') semget(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(0x0, &(0x7f00000004c0)='security.ima\x00', &(0x7f0000000500)=@sha1={0x1, "1549c6a79f24f4d62dfc8d54ff2f57971d4014c3"}, 0x15, 0x2) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000680)='security.ima\x00', 0x0, 0x0, 0x98391aa8d00f7f6a) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vcs\x00', 0x400100, 0x0) getsockname$tipc(r1, &(0x7f00000001c0)=@name, &(0x7f0000000240)=0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') r2 = gettid() fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) lsetxattr$security_smack_transmute(0x0, &(0x7f0000000600)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000640)='TRUE', 0x4, 0x1) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, 0x0, 0x0) r3 = msgget$private(0x0, 0x8) r4 = getuid() lstat(&(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r6 = geteuid() fstat(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) msgctl$IPC_SET(r3, 0x1, &(0x7f00000003c0)={{0x1, r4, r5, r6, r7, 0x2}, 0x1, 0xfff, 0x1ff, 0x0, 0x80000000, 0x76, r2, r2}) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f0000000180), &(0x7f0000000440)=0x4) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb)={'\x06\x00'}, &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) r8 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ppoll(&(0x7f0000000100)=[{r8, 0x1}], 0x1, 0x0, &(0x7f0000000200), 0x8) 03:36:24 executing program 0: syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semget(0xffffffffffffffff, 0x0, 0x0) r0 = socket$isdn_base(0x22, 0x3, 0x0) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000000), 0x4) socketpair$nbd(0x2, 0x1, 0x0, 0x0) 03:36:24 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x10000000000002, 0x0) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0x30, 0x0, &(0x7f0000000100)) [ 1211.961619] input:  as /devices/virtual/input/input55 03:36:24 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$TIOCGLCKTRMIOS(0xffffffffffffffff, 0x5456, &(0x7f00000000c0)={0x0, 0x9f}) r1 = dup2(r0, r0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x60, &(0x7f0000000080)={'filter\x00', 0x1d0}, 0x1b) 03:36:25 executing program 0: syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semget(0xffffffffffffffff, 0x0, 0x0) r0 = socket$isdn_base(0x22, 0x3, 0x0) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000000), 0x4) socketpair$nbd(0x2, 0x1, 0x0, 0x0) [ 1212.140935] input:  as /devices/virtual/input/input56 03:36:25 executing program 2: r0 = syz_open_dev$video4linux(&(0x7f0000000280)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_S_TUNER(r0, 0xc038563c, &(0x7f0000000440)={0x0, "9d30158b020b693ccee576912bb86e4f98b612a027ceaf1d48fffa2b8b675c8f"}) 03:36:25 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendto$inet(r0, &(0x7f0000000080), 0xffffffffffffff04, 0x420ffe0, 0x0, 0x37) 03:36:25 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_PPC_ALLOCATE_HTAB(r1, 0xc004aea7, &(0x7f0000000140)=0x1540000) r2 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, 0x0) add_key(0x0, &(0x7f0000001a40)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) getegid() ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000200)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) prctl$PR_CAPBSET_READ(0x17, 0x18) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000000)=ANY=[@ANYBLOB="f13d16c348fca10d447278f15ba5c7612954888917980df208ac34492164a37d96d4e146721a2fb75f7eb106b4cf32676ee8be052588b910a1037f7f"], 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) keyctl$unlink(0x9, r2, 0xfffffffffffffffd) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000080)=0x8000) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x7e) pipe(&(0x7f0000000880)) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200), 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x441, 0x10) 03:36:25 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x10000, 0x0, 0x3, 0x4, 0x4, 0x80000001}, 0x0) syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) connect$inet6(r0, &(0x7f0000000100)={0xa, 0xfffffffffffffffd, 0x0, @mcast1, 0x5}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f00000092c0), 0x170, 0x0) 03:36:25 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/135, 0x74f) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x843, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34dc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x105082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r1 = socket$inet6(0xa, 0x803, 0x3) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000580)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r3, &(0x7f0000001740)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x10004080}, 0xc, &(0x7f00000006c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="000326bd7000fbdbdf25100000000c000200080007000000000034000200080008006a0000001400010000000000000000000000ffff0000000014000100ac1414190000000000db6bacb8000000080006000300000008000600ffffffff080005000000100008000600020000007f3e7080e861b1ef3f144067f5d50a4eb2466b1dcdf5d044409f2178fc19d5c0bf6c12fe91a0df783c646cc3ea8d5dd42c09b24f828d46b5ee88bf5020dfb07558627cdbfb488dacfcdd94"], 0x1}, 0x1, 0x0, 0x0, 0x8000}, 0x4000005) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x78, 0x4) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66726f8cfafd6c8fe2c98de7ba44947a79015f0fe57917cb62a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef2818a179"}, 0xd8) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @dev}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x4e23}, 0x10) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000003c0)='lp\x00', 0x3) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000100), 0x4) pipe(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000700)='IPVS\x00') prctl$PR_GET_SECCOMP(0x15) sendmsg$IPVS_CMD_DEL_DAEMON(r0, 0x0, 0x0) dup3(r2, r1, 0x0) recvmsg(r1, &(0x7f0000000240)={0x0, 0x10000000000000, &(0x7f0000000080)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x4f}, 0x100) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) write$binfmt_elf64(r2, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 03:36:25 executing program 3: r0 = memfd_create(&(0x7f0000000000)='S\x00', 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0x102}) ioctl$TUNSETPERSIST(r1, 0x400454cb, 0x2) dup2(r0, r1) 03:36:25 executing program 0: syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semget(0xffffffffffffffff, 0x0, 0x0) r0 = socket$isdn_base(0x22, 0x3, 0x0) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000000), 0x4) socketpair$nbd(0x2, 0x1, 0x0, 0x0) 03:36:25 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r1, 0x0) writev(r1, &(0x7f0000000140)=[{&(0x7f0000000040)='<', 0x1}], 0x1) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x300}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r2) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 03:36:25 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000180)={0x20000000}) write$P9_RUNLINKAT(0xffffffffffffffff, 0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000040)) 03:36:25 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_PPC_ALLOCATE_HTAB(r1, 0xc004aea7, &(0x7f0000000140)=0x1540000) r2 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, 0x0) add_key(0x0, &(0x7f0000001a40)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) getegid() ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000200)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) prctl$PR_CAPBSET_READ(0x17, 0x18) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000000)=ANY=[@ANYBLOB="f13d16c348fca10d447278f15ba5c7612954888917980df208ac34492164a37d96d4e146721a2fb75f7eb106b4cf32676ee8be052588b910a1037f7f"], 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) keyctl$unlink(0x9, r2, 0xfffffffffffffffd) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000080)=0x8000) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x7e) pipe(&(0x7f0000000880)) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200), 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x441, 0x10) 03:36:25 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_PPC_ALLOCATE_HTAB(r1, 0xc004aea7, &(0x7f0000000140)=0x1540000) r2 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, 0x0) add_key(0x0, &(0x7f0000001a40)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) getegid() ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000200)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) prctl$PR_CAPBSET_READ(0x17, 0x18) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000000)=ANY=[@ANYBLOB="f13d16c348fca10d447278f15ba5c7612954888917980df208ac34492164a37d96d4e146721a2fb75f7eb106b4cf32676ee8be052588b910a1037f7f"], 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) keyctl$unlink(0x9, r2, 0xfffffffffffffffd) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000080)=0x8000) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x7e) pipe(&(0x7f0000000880)) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200), 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x441, 0x10) 03:36:25 executing program 3: r0 = memfd_create(&(0x7f0000000000)='S\x00', 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0x102}) ioctl$TUNSETPERSIST(r1, 0x400454cb, 0x2) dup2(r0, r1) 03:36:26 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_CLOCK(r1, 0x4030ae7b, 0x0) 03:36:26 executing program 3: r0 = memfd_create(&(0x7f0000000000)='S\x00', 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0x102}) ioctl$TUNSETPERSIST(r1, 0x400454cb, 0x2) dup2(r0, r1) 03:36:26 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_PPC_ALLOCATE_HTAB(r1, 0xc004aea7, &(0x7f0000000140)=0x1540000) r2 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, 0x0) add_key(0x0, &(0x7f0000001a40)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) getegid() ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000200)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) prctl$PR_CAPBSET_READ(0x17, 0x18) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000000)=ANY=[@ANYBLOB="f13d16c348fca10d447278f15ba5c7612954888917980df208ac34492164a37d96d4e146721a2fb75f7eb106b4cf32676ee8be052588b910a1037f7f"], 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) keyctl$unlink(0x9, r2, 0xfffffffffffffffd) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000080)=0x8000) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x7e) pipe(&(0x7f0000000880)) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200), 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x441, 0x10) 03:36:26 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') mount$9p_tcp(0x0, 0x0, 0x0, 0x800, &(0x7f0000000c40)=ANY=[@ANYBLOB]) setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2d, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x802}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff2f, 0x0, @remote, @local, {[], @udp={0x0, 0x883e, 0x8}}}}}}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r1, &(0x7f0000000000), 0x12) [ 1213.723781] device nr0 entered promiscuous mode 03:36:26 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/135, 0x74f) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x843, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34dc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x105082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r1 = socket$inet6(0xa, 0x803, 0x3) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000580)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r3, &(0x7f0000001740)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x10004080}, 0xc, &(0x7f00000006c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="000326bd7000fbdbdf25100000000c000200080007000000000034000200080008006a0000001400010000000000000000000000ffff0000000014000100ac1414190000000000db6bacb8000000080006000300000008000600ffffffff080005000000100008000600020000007f3e7080e861b1ef3f144067f5d50a4eb2466b1dcdf5d044409f2178fc19d5c0bf6c12fe91a0df783c646cc3ea8d5dd42c09b24f828d46b5ee88bf5020dfb07558627cdbfb488dacfcdd94"], 0x1}, 0x1, 0x0, 0x0, 0x8000}, 0x4000005) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x78, 0x4) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66726f8cfafd6c8fe2c98de7ba44947a79015f0fe57917cb62a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef2818a179"}, 0xd8) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @dev}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x4e23}, 0x10) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000003c0)='lp\x00', 0x3) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000100), 0x4) pipe(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000700)='IPVS\x00') prctl$PR_GET_SECCOMP(0x15) sendmsg$IPVS_CMD_DEL_DAEMON(r0, 0x0, 0x0) dup3(r2, r1, 0x0) recvmsg(r1, &(0x7f0000000240)={0x0, 0x10000000000000, &(0x7f0000000080)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x4f}, 0x100) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) write$binfmt_elf64(r2, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 03:36:26 executing program 3: r0 = memfd_create(&(0x7f0000000000)='S\x00', 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'\x00\xacs\x00\x00\x00\x00\x00\xec\x97?\x82\x0f|@\x00', 0x102}) ioctl$TUNSETPERSIST(r1, 0x400454cb, 0x2) dup2(r0, r1) 03:36:26 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_PPC_ALLOCATE_HTAB(r1, 0xc004aea7, &(0x7f0000000140)=0x1540000) r2 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, 0x0) add_key(0x0, &(0x7f0000001a40)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) getegid() ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000200)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) prctl$PR_CAPBSET_READ(0x17, 0x18) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000000)=ANY=[@ANYBLOB="f13d16c348fca10d447278f15ba5c7612954888917980df208ac34492164a37d96d4e146721a2fb75f7eb106b4cf32676ee8be052588b910a1037f7f"], 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) keyctl$unlink(0x9, r2, 0xfffffffffffffffd) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000080)=0x8000) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x7e) pipe(&(0x7f0000000880)) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200), 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x441, 0x10) 03:36:26 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_CLOCK(r1, 0x4030ae7b, 0x0) 03:36:26 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_PPC_ALLOCATE_HTAB(r1, 0xc004aea7, &(0x7f0000000140)=0x1540000) r2 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, 0x0) add_key(0x0, &(0x7f0000001a40)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) getegid() ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000200)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) prctl$PR_CAPBSET_READ(0x17, 0x18) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000000)=ANY=[@ANYBLOB="f13d16c348fca10d447278f15ba5c7612954888917980df208ac34492164a37d96d4e146721a2fb75f7eb106b4cf32676ee8be052588b910a1037f7f"], 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) keyctl$unlink(0x9, r2, 0xfffffffffffffffd) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000080)=0x8000) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x7e) pipe(&(0x7f0000000880)) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200), 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x441, 0x10) 03:36:27 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_CLOCK(r1, 0x4030ae7b, 0x0) 03:36:27 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_PPC_ALLOCATE_HTAB(r1, 0xc004aea7, &(0x7f0000000140)=0x1540000) r2 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, 0x0) add_key(0x0, &(0x7f0000001a40)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) getegid() ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000200)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) prctl$PR_CAPBSET_READ(0x17, 0x18) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000000)=ANY=[@ANYBLOB="f13d16c348fca10d447278f15ba5c7612954888917980df208ac34492164a37d96d4e146721a2fb75f7eb106b4cf32676ee8be052588b910a1037f7f"], 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) keyctl$unlink(0x9, r2, 0xfffffffffffffffd) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000080)=0x8000) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x7e) pipe(&(0x7f0000000880)) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200), 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x441, 0x10) 03:36:27 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_CLOCK(r1, 0x4030ae7b, 0x0) 03:36:27 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) fchmod(r0, 0xd) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f00000000c0)) getresuid(&(0x7f0000000140), 0x0, &(0x7f00000001c0)=0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, 0x0, 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) write$P9_RSTATu(0xffffffffffffffff, &(0x7f00000002c0)={0x7d, 0x7d, 0x2, {{0x0, 0x5f, 0x0, 0x2, {0x0, 0x3}, 0x2000000, 0x0, 0x286, 0x7, 0x10, 'bdev&trustedppp0', 0x6, 'vmnet1', 0x9, '/dev/kvm\x00', 0xd, '-.(ppp0md5sum'}, 0x9, '/dev/kvm\x00', r1}}, 0x7d) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x400042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x97ffffff, 0x0, 0x0, 0x100032, &(0x7f0000001d80)={[{@data_err_abort='data_err=abort'}], [], 0x6800}) 03:36:27 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x22, 0x1, 0x0, 0x0, {0x4, 0x0, 0x9}, [@nested={0x10, 0x11, [@generic="e2abb4ec7645192056d52f"]}]}, 0x24}}, 0x0) 03:36:27 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) close(r1) 03:36:27 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') mount$9p_tcp(0x0, 0x0, 0x0, 0x800, &(0x7f0000000c40)=ANY=[@ANYBLOB]) setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2d, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x802}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff2f, 0x0, @remote, @local, {[], @udp={0x0, 0x883e, 0x8}}}}}}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r1, &(0x7f0000000000), 0x12) 03:36:27 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xf, 0x4, 0x4, 0x7cb}, 0x2c) r2 = socket$inet_udplite(0x2, 0x2, 0x88) dup3(r2, r1, 0x0) 03:36:27 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/135, 0x74f) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x843, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34dc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x105082) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r1 = socket$inet6(0xa, 0x803, 0x3) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000580)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r3, &(0x7f0000001740)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x10004080}, 0xc, &(0x7f00000006c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="000326bd7000fbdbdf25100000000c000200080007000000000034000200080008006a0000001400010000000000000000000000ffff0000000014000100ac1414190000000000db6bacb8000000080006000300000008000600ffffffff080005000000100008000600020000007f3e7080e861b1ef3f144067f5d50a4eb2466b1dcdf5d044409f2178fc19d5c0bf6c12fe91a0df783c646cc3ea8d5dd42c09b24f828d46b5ee88bf5020dfb07558627cdbfb488dacfcdd94"], 0x1}, 0x1, 0x0, 0x0, 0x8000}, 0x4000005) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x78, 0x4) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, 0x0) ioctl$DRM_IOCTL_SG_ALLOC(0xffffffffffffffff, 0xc0106438, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x2, 0x0, "a77760f5a7645bc43c241d69912dda0c63c2a66726f8cfafd6c8fe2c98de7ba44947a79015f0fe57917cb62a93987a938fdedfce7bbba4fec2d8a09c41fb233245f2604b9e07b8ab79ec15ef2818a179"}, 0xd8) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @dev}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x4e23}, 0x10) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f00000003c0)='lp\x00', 0x3) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000100), 0x4) pipe(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000700)='IPVS\x00') prctl$PR_GET_SECCOMP(0x15) sendmsg$IPVS_CMD_DEL_DAEMON(r0, 0x0, 0x0) dup3(r2, r1, 0x0) recvmsg(r1, &(0x7f0000000240)={0x0, 0x10000000000000, &(0x7f0000000080)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x4f}, 0x100) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) write$binfmt_elf64(r2, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 03:36:27 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QBUF(r0, 0xc058560f, &(0x7f0000000140)={0x0, 0x7, 0x4, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "8c3e19f6"}, 0x0, 0x0, @planes=0x0, 0x4}) 03:36:27 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) fchmod(r0, 0xd) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, &(0x7f00000000c0)) getresuid(&(0x7f0000000140), 0x0, &(0x7f00000001c0)=0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, 0x0, 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) write$P9_RSTATu(0xffffffffffffffff, &(0x7f00000002c0)={0x7d, 0x7d, 0x2, {{0x0, 0x5f, 0x0, 0x2, {0x0, 0x3}, 0x2000000, 0x0, 0x286, 0x7, 0x10, 'bdev&trustedppp0', 0x6, 'vmnet1', 0x9, '/dev/kvm\x00', 0xd, '-.(ppp0md5sum'}, 0x9, '/dev/kvm\x00', r1}}, 0x7d) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x400042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x97ffffff, 0x0, 0x0, 0x100032, &(0x7f0000001d80)={[{@data_err_abort='data_err=abort'}], [], 0x6800}) 03:36:28 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) close(r1) 03:36:28 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, 0x0, 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) write$P9_RSTATu(0xffffffffffffffff, &(0x7f00000002c0)={0x7d, 0x7d, 0x2, {{0x0, 0x5f, 0x0, 0x2, {0x0, 0x3}, 0x2000000, 0x0, 0x286, 0x7, 0x10, 'bdev&trustedppp0', 0x6, 'vmnet1', 0x9, '/dev/kvm\x00', 0xd, '-.(ppp0md5sum'}, 0x9, '/dev/kvm\x00', r1}}, 0x7d) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x400042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x97ffffff, 0x0, 0x0, 0x100032, &(0x7f0000001d80)={[{@data_err_abort='data_err=abort'}], [], 0x6800}) 03:36:28 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, 0x0, 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) write$P9_RSTATu(0xffffffffffffffff, &(0x7f00000002c0)={0x7d, 0x7d, 0x2, {{0x0, 0x5f, 0x0, 0x2, {0x0, 0x3}, 0x2000000, 0x0, 0x286, 0x7, 0x10, 'bdev&trustedppp0', 0x6, 'vmnet1', 0x9, '/dev/kvm\x00', 0xd, '-.(ppp0md5sum'}, 0x9, '/dev/kvm\x00', r1}}, 0x7d) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x400042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', 0x0, 0x2001001, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x97ffffff, 0x0, 0x0, 0x100032, &(0x7f0000001d80)={[{@data_err_abort='data_err=abort'}], [], 0x6800}) 03:36:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") unshare(0x4000400) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) getsockopt$ax25_int(r1, 0x101, 0x8, &(0x7f0000000100), &(0x7f0000000080)=0xfdd7) 03:36:29 executing program 5: r0 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@mcast2={0xff, 0x2, [0xfc000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4ffffff]}, 0x0, 0x0, 0x3, 0x1}, 0x21) 03:36:29 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) close(r1) 03:36:29 executing program 5: r0 = syz_open_dev$sndpcmc(&(0x7f0000001fee)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x5421, &(0x7f0000000000)) 03:36:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") unshare(0x4000400) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) getsockopt$ax25_int(r1, 0x101, 0x8, &(0x7f0000000100), &(0x7f0000000080)=0xfdd7) 03:36:29 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000680)={&(0x7f00000006c0)={0x14, 0x1e, 0x400000000000109, 0x0, 0x0, {0x7}}, 0x14}}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 03:36:29 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") r1 = socket$kcm(0x29, 0x2, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = memfd_create(&(0x7f0000000240)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r2, &(0x7f0000000040)=[{&(0x7f00001f2000)="aa", 0x1}], 0x1, 0x800000) sendfile(r1, r2, 0x0, 0x1ffe00) 03:36:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") unshare(0x4000400) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) getsockopt$ax25_int(r1, 0x101, 0x8, &(0x7f0000000100), &(0x7f0000000080)=0xfdd7) 03:36:29 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@rand_addr="92071d7261cbd35c09d45f287b8d2698", 0x0, r2}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) [ 1216.657471] device nr0 entered promiscuous mode [ 1216.827309] net_ratelimit: 1 callbacks suppressed [ 1216.827317] protocol 88fb is buggy, dev hsr_slave_0 [ 1216.837298] protocol 88fb is buggy, dev hsr_slave_1 [ 1216.842398] protocol 88fb is buggy, dev hsr_slave_0 [ 1216.847477] protocol 88fb is buggy, dev hsr_slave_1 [ 1216.852569] protocol 88fb is buggy, dev hsr_slave_0 [ 1216.857658] protocol 88fb is buggy, dev hsr_slave_1 [ 1216.862741] protocol 88fb is buggy, dev hsr_slave_0 [ 1216.867805] protocol 88fb is buggy, dev hsr_slave_1 03:36:30 executing program 0: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000380)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;<\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xc6\x0f\xd7\x14\x0f\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4N') mount$9p_tcp(0x0, 0x0, 0x0, 0x800, &(0x7f0000000c40)=ANY=[@ANYBLOB]) setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2d, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x802, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x802}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff2f, 0x0, @remote, @local, {[], @udp={0x0, 0x883e, 0x8}}}}}}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_int(r1, &(0x7f0000000000), 0x12) 03:36:30 executing program 4: r0 = socket$inet(0x2, 0x3, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000240)=0x28, 0x4) sendmsg(r0, &(0x7f00000014c0)={&(0x7f0000716000)=@in, 0x80, &(0x7f0000685000)=[{&(0x7f0000001480)="b5887200000000000000000057a2d32741000000", 0x14}], 0x1}, 0x0) 03:36:30 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x100000010, 0x4, 0x4, 0x5}, 0x2c) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, &(0x7f0000000680)=ANY=[@ANYBLOB="3e0f58e15d42066f1376347e35a36663d1c2188e49cec056e5bfcb3311e066f5a5d26a352028b26642a051bd18bc3e33a0ac79ba7d2294da3195d5c2cb3fd4f52fd3b434140ea79ae3a7705f8bb9dd328c81ce17539c171e4553a135dfd768c10eea90300387249706b515fb1a1c13ceb7e1fef65de7a666fd2101f441ae57dcc0594c11f3d3f04d0415b4305ba5e8f572b4e3673f622aed0b2bee2721bda71bd0840f42345a"]) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f00000000c0), 0x0}, 0x18) 03:36:30 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") unshare(0x4000400) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) getsockopt$ax25_int(r1, 0x101, 0x8, &(0x7f0000000100), &(0x7f0000000080)=0xfdd7) 03:36:30 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002b80)=[{&(0x7f0000001880)=""/190, 0xbe}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/sockstat\x00') preadv(r0, &(0x7f00000017c0), 0x10000000000001f7, 0x0) [ 1217.233024] bridge0: port 1(bridge_slave_0) entered disabled state [ 1217.243131] bridge0: port 1(bridge_slave_0) entered blocking state [ 1217.249589] bridge0: port 1(bridge_slave_0) entered forwarding state 03:36:30 executing program 1: ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4008700c, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x2, 0x0, 0x2, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f00000002c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000200)}}, 0x18) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) ioctl$VIDIOC_QUERY_DV_TIMINGS(0xffffffffffffffff, 0x80845663, &(0x7f0000000300)) dup2(r0, r1) syz_open_procfs(0x0, &(0x7f0000000400)='net\xf0C\x16\x16\xfe\xaf\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 03:36:30 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x800000000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800815fe45ae087185082cf0300b0eba06ec40000230000000008000f0000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 1217.467305] protocol 88fb is buggy, dev hsr_slave_0 [ 1217.472476] protocol 88fb is buggy, dev hsr_slave_1 03:36:30 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002b80)=[{&(0x7f0000001880)=""/190, 0xbe}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/sockstat\x00') preadv(r0, &(0x7f00000017c0), 0x10000000000001f7, 0x0) 03:36:30 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002b80)=[{&(0x7f0000001880)=""/190, 0xbe}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/sockstat\x00') preadv(r0, &(0x7f00000017c0), 0x10000000000001f7, 0x0) [ 1218.061779] bridge0: port 1(bridge_slave_0) entered disabled state [ 1218.083358] bridge0: port 1(bridge_slave_0) entered blocking state [ 1218.089814] bridge0: port 1(bridge_slave_0) entered forwarding state 03:36:31 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x8, 0x40) ioctl$KVM_SET_DEBUGREGS(r0, 0x4080aea2, &(0x7f00000001c0)={[0x0, 0x0, 0xf000], 0x4}) r1 = openat(0xffffffffffffffff, 0x0, 0xa4000, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000080)) r2 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) r3 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) r4 = openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r5 = openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(r4, 0x801c581f, &(0x7f0000000340)={0x0, 0x8001, 0x34ad}) setsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, 0x0, 0x0) ioctl$VIDIOC_G_EDID(r5, 0xc0285628, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r6, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) accept4(r3, &(0x7f00000000c0)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @loopback}}, &(0x7f0000000140)=0x80, 0x800) listen(r6, 0x5) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) r8 = accept4(r6, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r7, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r8, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x54}, 0x98) ioctl$DRM_IOCTL_SET_MASTER(r1, 0x641e) r9 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x3) listen(r9, 0x0) unshare(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r2, 0x0, 0x0) clone(0x802102081ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_dev$sndmidi(&(0x7f0000000000)='/dev/snd/midiC#D#\x00', 0x1, 0x200) [ 1218.181312] device nr0 entered promiscuous mode 03:36:31 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@rand_addr="92071d7261cbd35c09d45f287b8d2698", 0x0, r2}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:36:31 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(0xffffffffffffffff, 0x84, 0x74, &(0x7f0000001000)=""/4096, &(0x7f00000002c0)=0x1000) io_submit(0x0, 0x0, &(0x7f0000000fc0)) getpeername$inet6(0xffffffffffffffff, &(0x7f00000008c0)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000980)=0x1c) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$can_raw(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x1000000000000, 0x3f00000000000000, 0x13000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x2000000}) ioctl$KVM_DIRTY_TLB(0xffffffffffffffff, 0x4010aeaa, &(0x7f0000000200)) shutdown(0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f0000000040)=@ethernet={0x0, @broadcast}, 0x0) r1 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x40046109, &(0x7f0000000300)) close(r1) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@remote, @empty, @dev={0xfe, 0x80, [], 0x21}, 0x3, 0x0, 0x0, 0x0, 0x0, 0x4000000}) r2 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/attr/sockcreate\x00', 0x2, 0x0) ioctl(r2, 0x0, &(0x7f0000000080)="0adc1f023c123f3188a070") umount2(&(0x7f0000000140)='./file0\x00', 0x1) semget(0xffffffffffffffff, 0x40000, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) [ 1218.831573] bridge0: port 1(bridge_slave_0) entered disabled state [ 1218.846600] bridge0: port 1(bridge_slave_0) entered blocking state [ 1218.853084] bridge0: port 1(bridge_slave_0) entered forwarding state 03:36:31 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002b80)=[{&(0x7f0000001880)=""/190, 0xbe}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/sockstat\x00') preadv(r0, &(0x7f00000017c0), 0x10000000000001f7, 0x0) 03:36:31 executing program 1: ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4008700c, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x2, 0x0, 0x2, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f00000002c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000200)}}, 0x18) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) ioctl$VIDIOC_QUERY_DV_TIMINGS(0xffffffffffffffff, 0x80845663, &(0x7f0000000300)) dup2(r0, r1) syz_open_procfs(0x0, &(0x7f0000000400)='net\xf0C\x16\x16\xfe\xaf\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 03:36:31 executing program 4: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0x1, 0x0, 0x0, 0x0, 0x0) 03:36:31 executing program 2: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000040)) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) setxattr$system_posix_acl(0x0, 0x0, 0x0, 0x0, 0x0) write$P9_RRENAME(0xffffffffffffffff, &(0x7f0000000400)={0x7, 0x15, 0x2}, 0x7) chdir(&(0x7f0000000280)='./file0\x00') bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 03:36:31 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@rand_addr="92071d7261cbd35c09d45f287b8d2698", 0x0, r2}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:36:31 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x8d5af}], 0x10000000000000db, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80800) r2 = gettid() ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r2, 0x1000000000016) 03:36:31 executing program 1: ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4008700c, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x2, 0x0, 0x2, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f00000002c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000200)}}, 0x18) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) ioctl$VIDIOC_QUERY_DV_TIMINGS(0xffffffffffffffff, 0x80845663, &(0x7f0000000300)) dup2(r0, r1) syz_open_procfs(0x0, &(0x7f0000000400)='net\xf0C\x16\x16\xfe\xaf\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 03:36:32 executing program 3: r0 = socket$inet6(0xa, 0x1000000000005, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000040)=0x7, 0x4) getsockopt$inet_buf(r0, 0x84, 0x20, &(0x7f0000dcffe8)=""/24, &(0x7f0000000080)=0x18) 03:36:32 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x8d5af}], 0x10000000000000db, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80800) r2 = gettid() ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r2, 0x1000000000016) [ 1219.762884] overlayfs: './file0' not a directory 03:36:32 executing program 2: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000040)) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) setxattr$system_posix_acl(0x0, 0x0, 0x0, 0x0, 0x0) write$P9_RRENAME(0xffffffffffffffff, &(0x7f0000000400)={0x7, 0x15, 0x2}, 0x7) chdir(&(0x7f0000000280)='./file0\x00') bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 03:36:32 executing program 3: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000040)) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) setxattr$system_posix_acl(0x0, 0x0, 0x0, 0x0, 0x0) write$P9_RRENAME(0xffffffffffffffff, &(0x7f0000000400)={0x7, 0x15, 0x2}, 0x7) chdir(&(0x7f0000000280)='./file0\x00') bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') [ 1219.812118] bridge0: port 1(bridge_slave_0) entered disabled state [ 1219.835624] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1219.870332] bridge0: port 1(bridge_slave_0) entered blocking state [ 1219.876750] bridge0: port 1(bridge_slave_0) entered forwarding state 03:36:32 executing program 1: ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4008700c, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x2, 0x0, 0x2, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f00000002c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000200)}}, 0x18) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x1b, &(0x7f0000000100)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) ioctl$VIDIOC_QUERY_DV_TIMINGS(0xffffffffffffffff, 0x80845663, &(0x7f0000000300)) dup2(r0, r1) syz_open_procfs(0x0, &(0x7f0000000400)='net\xf0C\x16\x16\xfe\xaf\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 03:36:32 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'bridge_slave_0\x00\x04'}) r1 = socket$inet6(0xa, 0x803, 0x3) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@rand_addr="92071d7261cbd35c09d45f287b8d2698", 0x0, r2}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'bridge_slave_0\x00?', 0x22000000c0ffffff}) 03:36:32 executing program 4: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000040)) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) setxattr$system_posix_acl(0x0, 0x0, 0x0, 0x0, 0x0) write$P9_RRENAME(0xffffffffffffffff, &(0x7f0000000400)={0x7, 0x15, 0x2}, 0x7) chdir(&(0x7f0000000280)='./file0\x00') bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 03:36:32 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x8d5af}], 0x10000000000000db, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80800) r2 = gettid() ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r2, 0x1000000000016) [ 1220.183812] overlayfs: failed to resolve './file1': -2 03:36:33 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x0, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x8d5af}], 0x10000000000000db, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x80800) r2 = gettid() ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r2, 0x1000000000016) 03:36:33 executing program 3: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000040)) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) setxattr$system_posix_acl(0x0, 0x0, 0x0, 0x0, 0x0) write$P9_RRENAME(0xffffffffffffffff, &(0x7f0000000400)={0x7, 0x15, 0x2}, 0x7) chdir(&(0x7f0000000280)='./file0\x00') bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 03:36:33 executing program 0: r0 = semget$private(0x0, 0x207, 0x0) semop(r0, &(0x7f0000000000)=[{0x0, 0x0, 0x1800}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000080)) 03:36:33 executing program 2: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000040)) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) setxattr$system_posix_acl(0x0, 0x0, 0x0, 0x0, 0x0) write$P9_RRENAME(0xffffffffffffffff, &(0x7f0000000400)={0x7, 0x15, 0x2}, 0x7) chdir(&(0x7f0000000280)='./file0\x00') bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 03:36:33 executing program 0: r0 = semget$private(0x0, 0x207, 0x0) semop(r0, &(0x7f0000000000)=[{0x0, 0x0, 0x1800}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000080)) 03:36:33 executing program 0: r0 = semget$private(0x0, 0x207, 0x0) semop(r0, &(0x7f0000000000)=[{0x0, 0x0, 0x1800}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000080)) 03:36:33 executing program 4: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000040)) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) setxattr$system_posix_acl(0x0, 0x0, 0x0, 0x0, 0x0) write$P9_RRENAME(0xffffffffffffffff, &(0x7f0000000400)={0x7, 0x15, 0x2}, 0x7) chdir(&(0x7f0000000280)='./file0\x00') bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') [ 1220.711033] bridge0: port 1(bridge_slave_0) entered disabled state [ 1220.817008] bridge0: port 1(bridge_slave_0) entered blocking state [ 1220.823479] bridge0: port 1(bridge_slave_0) entered forwarding state 03:36:33 executing program 1: r0 = socket$caif_seqpacket(0x25, 0x5, 0x3) socketpair$unix(0x1, 0x100000000005, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$CAIFSO_REQ_PARAM(r0, 0x116, 0x80, &(0x7f0000000180)="83", 0x1) 03:36:33 executing program 0: r0 = semget$private(0x0, 0x207, 0x0) semop(r0, &(0x7f0000000000)=[{0x0, 0x0, 0x1800}], 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000080)) 03:36:33 executing program 3: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000040)) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) setxattr$system_posix_acl(0x0, 0x0, 0x0, 0x0, 0x0) write$P9_RRENAME(0xffffffffffffffff, &(0x7f0000000400)={0x7, 0x15, 0x2}, 0x7) chdir(&(0x7f0000000280)='./file0\x00') bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 03:36:33 executing program 1: r0 = socket$inet6_sctp(0xa, 0x80000000005, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000001000)={0x0, @in6={{0xa, 0x0, 0x0, @loopback}}}, 0x98) getsockopt$inet6_buf(r0, 0x29, 0x30, &(0x7f0000001000)=""/144, &(0x7f0000001ffc)=0x90) 03:36:33 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) getsockopt$netrom_NETROM_T1(r0, 0x103, 0x7, 0x0, &(0x7f00000000c0)=0xfffffffffffffeb9) [ 1221.053235] overlayfs: failed to resolve './file1': -2 03:36:33 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) socket$inet_smc(0x2b, 0x1, 0x0) syz_mount_image$reiserfs(&(0x7f0000000b00)='reiserfs\x00', &(0x7f0000000b40)='./file0\x00', 0x0, 0x0, 0x0, 0x440, &(0x7f0000001180)={[{@balloc_noborder='block-allocator=noborder'}, {@nouser_xattr='nouser_xattr'}, {@tails_on='tails=on'}], [{@fsname={'fsname'}}]}) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000880)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x4000000004}, 0xc, &(0x7f0000000840)={&(0x7f0000000700)=ANY=[]}}, 0x0) getsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000200)=0x4) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) dup(r1) write$uinput_user_dev(r1, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0xc0, &(0x7f0000000000)={0x2, 0x0, @empty}, 0x10) ustat(0x80000000, &(0x7f0000000180)) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000003c0)) lremovexattr(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000600)={{0x8, 0x0, 0x0, 0x20, 'syz1\x00', 0x9}, 0x0, [0x9, 0x0, 0x0, 0x0, 0x0, 0xf5, 0x0, 0x6fc1, 0xfffffffffffffffe, 0x9, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x6ef5, 0x0, 0x0, 0xd3a, 0x4, 0x0, 0x0, 0x6, 0x0, 0x5, 0x3f, 0x8, 0x2, 0x6, 0x0, 0x0, 0x401, 0x0, 0x5, 0x0, 0x0, 0x1, 0x4, 0x7, 0xffffffff, 0x7fff, 0x7, 0x9, 0x2, 0x400, 0x0, 0x9, 0xacd, 0x7, 0x1, 0xdb2, 0x6, 0x81, 0x81, 0x7, 0xfd65800000000000, 0xff, 0x3f, 0x200, 0x0, 0xfffffffffffffffd, 0x514, 0xf0c, 0xfffffffffffffffb, 0x0, 0x8, 0x8, 0x8, 0xe2c, 0x78, 0x0, 0x0, 0x8, 0x0, 0x200, 0x0, 0x800, 0xc31d, 0x0, 0x7, 0x800, 0x0, 0x7, 0x6, 0x4, 0x91a, 0x1, 0x2, 0x1, 0x8, 0x7, 0x0, 0x1f, 0x9, 0x5, 0x2a5c, 0x35d, 0x12, 0x0, 0x0, 0x0, 0x1, 0x7, 0x0, 0xfffffffffffffffb, 0x2, 0x80000000, 0x0, 0x0, 0x8, 0x0, 0x0, 0x3, 0x6, 0xa8, 0x1ff, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x1, 0x6, 0x10000, 0x8, 0x40, 0x0, 0x3], {0x0, 0x989680}}) 03:36:34 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000002c0)="0a5c2d023c126285718070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000040)={0x14, 0x26, 0x3fffffffffffff, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) 03:36:34 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCETHTOOL(r1, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=@ethtool_cmd={0x7, 0x0, 0x70a000, 0x0, 0x0, 0x0, 0x2}}) 03:36:34 executing program 2: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000040)) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) setxattr$system_posix_acl(0x0, 0x0, 0x0, 0x0, 0x0) write$P9_RRENAME(0xffffffffffffffff, &(0x7f0000000400)={0x7, 0x15, 0x2}, 0x7) chdir(&(0x7f0000000280)='./file0\x00') bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 03:36:34 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='sysfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x100000, 0x0) clone(0x70024100, 0x0, 0x0, 0x0, 0x0) 03:36:34 executing program 0: r0 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000001c0)={0x4, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00c@@'], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000140)={0x4, 0x0, &(0x7f0000000080)=[@enter_looper], 0x48, 0x0, &(0x7f0000000480)="f27aec438116cefc2a394072b6ad8809e53ac6553db7f225a4e47722a00ba8846454ad779316094e4bee8cab76761555d3676404fb3c728f045f7d9ecc9b2662539500d7df7d1802"}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000340)={0x4c, 0x0, &(0x7f0000000280)=[@reply_sg={0x40486312, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}}], 0x0, 0x0, 0x0}) [ 1221.399219] IPVS: ftp: loaded support on port[0] = 21 [ 1221.422606] binder: 21480:21482 got reply transaction with bad transaction stack, transaction 112 has target 21480:21482 [ 1221.449960] binder: 21480:21482 transaction failed 29201/-71, size 0-0 line 2816 03:36:34 executing program 4: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000040)) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) setxattr$system_posix_acl(0x0, 0x0, 0x0, 0x0, 0x0) write$P9_RRENAME(0xffffffffffffffff, &(0x7f0000000400)={0x7, 0x15, 0x2}, 0x7) chdir(&(0x7f0000000280)='./file0\x00') bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 03:36:34 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r0, 0x0) read(r2, &(0x7f0000002b40)=""/1, 0x10000014d) close(r0) [ 1221.479121] binder_alloc: binder_alloc_mmap_handler: 21480 20005000-20009000 already mapped failed -16 03:36:34 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='sysfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x100000, 0x0) clone(0x70024100, 0x0, 0x0, 0x0, 0x0) [ 1221.524642] binder: BINDER_SET_CONTEXT_MGR already set [ 1221.530997] binder: 21480:21482 ioctl 40046207 0 returned -16 [ 1221.542604] binder_alloc: 21480: binder_alloc_buf, no vma [ 1221.562933] binder: 21480:21489 transaction failed 29189/-3, size 0-0 line 3035 [ 1221.572313] binder: 21480:21484 got reply transaction with no transaction stack [ 1221.589427] binder: 21480:21484 transaction failed 29201/-71, size 0-0 line 2801 [ 1221.604045] binder: release 21480:21482 transaction 112 out, still active [ 1221.621518] IPVS: ftp: loaded support on port[0] = 21 [ 1221.625249] binder: undelivered TRANSACTION_COMPLETE [ 1221.652867] binder: undelivered TRANSACTION_ERROR: 29201 [ 1221.686404] binder: undelivered TRANSACTION_ERROR: 29201 [ 1221.710876] binder: undelivered TRANSACTION_ERROR: 29189 [ 1221.733476] binder: release 21480:21482 transaction 112 in, still active [ 1221.754611] binder: send failed reply for transaction 112, target dead 03:36:34 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='sysfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x100000, 0x0) clone(0x70024100, 0x0, 0x0, 0x0, 0x0) 03:36:34 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r0, 0x0) read(r2, &(0x7f0000002b40)=""/1, 0x10000014d) close(r0) 03:36:34 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket(0x11, 0x4000000000080002, 0x0) sendmmsg(r0, 0x0, 0xfffffffffffffca7, 0x840) capset(&(0x7f00000003c0), &(0x7f0000000400)={0xe609, 0xfffffffffffff026, 0x0, 0x4, 0x4}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x4000, 0x0) recvmmsg(r1, &(0x7f0000007440), 0x0, 0x0, &(0x7f0000007640)={0x77359400}) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000100)=0x1) r3 = epoll_create1(0x80000) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f0000000140)={0x2000}) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x74, 0x0, &(0x7f00000001c0)) sendmsg(0xffffffffffffffff, 0x0, 0x4000) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) close(r2) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x3, 0x100, 0x0, 0x0, 0x3, 0x40, 0x2, 0x80000001, 0xb2, 0x2, 0x662, 0x0, 0x7, 0x783, 0x3, 0x7, 0xaa1, 0x401, 0xaea, 0x4, 0x20, 0x9, 0x4, 0xf802, 0x37b800, 0x0, 0x80, 0x7, 0x1, 0x0, 0x6, 0x100000000, 0x2, 0x5, 0xfffffffffffffffa, 0x0, 0x6, 0x4, @perf_config_ext={0x0, 0x3}, 0x1000, 0x0, 0x4, 0x0, 0x401, 0x23837179, 0x4a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r4 = pkey_alloc(0x0, 0x1) pkey_free(r4) socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(0xffffffffffffffff, &(0x7f0000000040), 0x10) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={'rose0\x00', {0x2, 0x4e20, @multicast2}}) write$FUSE_NOTIFY_INVAL_INODE(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x2, 0x0, {0x3, 0x8}}, 0x28) syz_genetlink_get_family_id$ipvs(0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'ip_vti0\x00', 0x4000}) getsockopt$sock_int(r1, 0x1, 0x2a, &(0x7f0000000000), 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000440)=""/243, 0xf3, 0x0, &(0x7f0000000180)={0xa, 0x0, 0xbffd, @empty, 0x24a}, 0x1c) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) poll(&(0x7f0000000200)=[{}, {r3, 0x1018}], 0x2, 0x9) 03:36:34 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='sysfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x100000, 0x0) clone(0x70024100, 0x0, 0x0, 0x0, 0x0) 03:36:34 executing program 4: r0 = memfd_create(&(0x7f0000000140)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x400) pwritev(r0, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) lseek(r0, 0x0, 0x3) [ 1222.017052] IPVS: ftp: loaded support on port[0] = 21 [ 1222.058147] IPVS: ftp: loaded support on port[0] = 21 03:36:34 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000f01c000000000004800000850000000000000095"], 0x0}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xc, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x17}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r1, 0x0, 0xe, 0x0, &(0x7f00000003c0)="d7dbb23bab31f7d84ff4dfb4c7fc", 0x0}, 0x28) 03:36:35 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt(r0, 0x65, 0x10000000004, &(0x7f0000000000)="c8d63f23", 0x4) 03:36:35 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r0, 0x0) read(r2, &(0x7f0000002b40)=""/1, 0x10000014d) close(r0) 03:36:35 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000f01c000000000004800000850000000000000095"], 0x0}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xc, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x17}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r1, 0x0, 0xe, 0x0, &(0x7f00000003c0)="d7dbb23bab31f7d84ff4dfb4c7fc", 0x0}, 0x28) 03:36:35 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='sysfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x100000, 0x0) clone(0x70024100, 0x0, 0x0, 0x0, 0x0) 03:36:35 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$f2fs(&(0x7f0000000240)='f2fs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f00000000c0)="1020f5f20100070009000000030000000c0000000900000001000000020000000000000000300000000000000e00000016", 0x31, 0x1400}], 0x0, 0x0) 03:36:35 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='sysfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x100000, 0x0) clone(0x70024100, 0x0, 0x0, 0x0, 0x0) 03:36:35 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000f01c000000000004800000850000000000000095"], 0x0}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xc, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x17}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r1, 0x0, 0xe, 0x0, &(0x7f00000003c0)="d7dbb23bab31f7d84ff4dfb4c7fc", 0x0}, 0x28) [ 1222.419461] IPVS: ftp: loaded support on port[0] = 21 03:36:35 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r0, 0x0) read(r2, &(0x7f0000002b40)=""/1, 0x10000014d) close(r0) [ 1222.631118] IPVS: ftp: loaded support on port[0] = 21 03:36:35 executing program 2: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000001c0)={0xaa, 0x2}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000340)={{&(0x7f00004b3000/0x5000)=nil, 0x5000}, 0x1}) clone(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, 0x0) 03:36:35 executing program 4: r0 = socket(0x800000000010, 0x2, 0x0) write(r0, &(0x7f0000000200)="bc0000001a000700ab092500090007000aab80ff010052020000369309000100fd8ed69ad84e3d951e6a599f141591bcd000e000ba6da9edf27595057d00bfacf22956e233f96a948b676476c05778cbca032f2e517c35ebc2052140000004c300897f00000100000000004548ad414f5423e2a9d165df4700000000000000d796d556272f5baa000005de0d020000006e7fbf6ab82088f8e0039fe2800e3c5cafdc2c098b56f902454f0151c8bf83be82f605f30c9ddaf2fe0820f4", 0xbc) 03:36:35 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000f01c000000000004800000850000000000000095"], 0x0}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xc, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x17}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r1, 0x0, 0xe, 0x0, &(0x7f00000003c0)="d7dbb23bab31f7d84ff4dfb4c7fc", 0x0}, 0x28) 03:36:35 executing program 1: connect$can_bcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x4000000) r0 = syz_open_dev$media(0x0, 0x2, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r1, 0x401c5504, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f00000001c0)={0x7, "0c0e0a12d7afa4f805aa9bb061b967c50f49b7a3120bf4f08b3f30ed4cca6e67", 0x2, 0x241, 0x6, 0x0, 0x5, 0x1, 0x4, 0x7fffffff}) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e21, @empty}}, 0x398fde67, 0x8}, &(0x7f0000000600)=0x90) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) exit_group(0x0) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, 0x0, 0x0) r2 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e20, @loopback}, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') inotify_add_watch(r0, 0x0, 0x20000450) sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000ac0)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x10010}, 0xc, &(0x7f0000000a80)={&(0x7f00000000c0)=ANY=[]}, 0x1, 0x0, 0x0, 0x40000}, 0x4040000) sendmsg(r2, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) setsockopt$inet_sctp_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) recvfrom$inet(r2, &(0x7f0000000740)=""/171, 0xab, 0x10021, &(0x7f0000000800)={0x2, 0x4e23, @rand_addr=0x1000}, 0x10) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, 0x0) 03:36:35 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='sysfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x100000, 0x0) clone(0x70024100, 0x0, 0x0, 0x0, 0x0) [ 1222.859986] netlink: 148 bytes leftover after parsing attributes in process `syz-executor.4'. 03:36:35 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000300)='/dev/sg#\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="fc00000048000700ab0925ee090007000a060000000000000001369321000100ff0100000005d00000000000000398996c92770411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bb6b07e4f40000000000005a32e280fc83ab82f605f70c9ddef245c1bc79ebbaa08a", 0x88) ioctl$SG_SET_FORCE_PACK_ID(r0, 0x227b, &(0x7f0000000000)=0x1) readv(r0, &(0x7f0000000380)=[{&(0x7f0000000080)=""/195, 0x200000d7}], 0x1) 03:36:35 executing program 1: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8927, &(0x7f0000000080)={'bridge0\x00', 0x0}) ioctl$TUNSETIFINDEX(r1, 0x400454da, &(0x7f0000000040)=r2) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'bpq0\x00', 0x1211}) [ 1222.975555] IPVS: ftp: loaded support on port[0] = 21 03:36:36 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x3, 0x81) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000000c0), 0x0) syz_open_dev$mouse(0x0, 0x8, 0x0) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0xe00) syz_open_dev$dmmidi(&(0x7f00000003c0)='/dev/dmmidi#\x00', 0x1, 0x640000) 03:36:36 executing program 3: socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) 03:36:36 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x44000) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0xa6ba0) io_setup(0x40000100000003, &(0x7f0000000200)=0x0) io_submit(r1, 0x653, &(0x7f0000000540)=[&(0x7f00000000c0)={0x804000008040000, 0x3f00000000000759, 0x8, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7, 0xc00}]) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x3, 0x5c831, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000003bc0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000003b80)={&(0x7f0000003d00)={0x58, 0x0, 0x4, 0x70bd2b, 0x0, {}, [@TIPC_NLA_MEDIA={0x20, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10001}]}]}, @TIPC_NLA_LINK={0x24, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x800}, 0x1) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) ioctl$sock_x25_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, 0x0, 0x0) 03:36:36 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000ffe000/0x1000)=nil) 03:36:36 executing program 3: clock_nanosleep(0xfffffffffffffffc, 0x0, &(0x7f0000000000)={0x0, 0x1c9c380}, 0x0) 03:36:36 executing program 2: r0 = socket$inet6(0xa, 0x4000000080002, 0x88) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4, 0x6}, 0x1c) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x0, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40001ab, 0x0) 03:36:36 executing program 3: getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0xffffffffffffff6c) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000000)={0x400000000000003, 0x600000000000000, [0x49, 0x1, 0x40000021], [0xc2]}) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) 03:36:36 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x44000) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0xa6ba0) io_setup(0x40000100000003, &(0x7f0000000200)=0x0) io_submit(r1, 0x653, &(0x7f0000000540)=[&(0x7f00000000c0)={0x804000008040000, 0x3f00000000000759, 0x8, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7, 0xc00}]) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x3, 0x5c831, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000003bc0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000003b80)={&(0x7f0000003d00)={0x58, 0x0, 0x4, 0x70bd2b, 0x0, {}, [@TIPC_NLA_MEDIA={0x20, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10001}]}]}, @TIPC_NLA_LINK={0x24, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x800}, 0x1) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) ioctl$sock_x25_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, 0x0, 0x0) 03:36:36 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x3, 0x81) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000000c0), 0x0) syz_open_dev$mouse(0x0, 0x8, 0x0) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0xe00) syz_open_dev$dmmidi(&(0x7f00000003c0)='/dev/dmmidi#\x00', 0x1, 0x640000) 03:36:36 executing program 0: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000100)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_GET_SERIAL(r0, 0xc0104320, &(0x7f0000000140)=0x5) [ 1223.859953] unchecked MSR access error: WRMSR to 0x49 (tried to write 0x0000000000000001) at rIP: 0xffffffff81303034 (native_write_msr+0x4/0x30) [ 1223.891493] Call Trace: [ 1223.894318] ? vmx_set_msr+0x13b2/0x21f0 [ 1223.903133] ? pt_update_intercept_for_msr+0x690/0x690 [ 1223.914970] kvm_set_msr+0x190/0x380 [ 1223.924150] do_set_msr+0xa6/0xf0 03:36:36 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000300)='/dev/sg#\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="fc00000048000700ab0925ee090007000a060000000000000001369321000100ff0100000005d00000000000000398996c92770411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bb6b07e4f40000000000005a32e280fc83ab82f605f70c9ddef245c1bc79ebbaa08a", 0x88) ioctl$SG_SET_FORCE_PACK_ID(r0, 0x227b, &(0x7f0000000000)=0x1) readv(r0, &(0x7f0000000380)=[{&(0x7f0000000080)=""/195, 0x200000d7}], 0x1) 03:36:36 executing program 0: sendmmsg(0xffffffffffffffff, &(0x7f0000007e00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="1400000000000000290000003b000000d85c4a09"], 0x14}}], 0x1, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r0, &(0x7f0000007d80), 0x6, 0x0) 03:36:36 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x3, 0x81) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000000c0), 0x0) syz_open_dev$mouse(0x0, 0x8, 0x0) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0xe00) syz_open_dev$dmmidi(&(0x7f00000003c0)='/dev/dmmidi#\x00', 0x1, 0x640000) 03:36:36 executing program 2: r0 = socket$inet6(0xa, 0x20000000000005, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0xe, 0x0, &(0x7f00000001c0)) [ 1223.964030] ? do_get_msr+0x150/0x150 [ 1224.008935] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1224.025454] msr_io+0x1b0/0x2e0 [ 1224.032513] ? do_get_msr+0x150/0x150 [ 1224.036816] ? emulator_set_hflags+0xa0/0xa0 [ 1224.043014] ? lock_acquire+0x16f/0x3f0 [ 1224.048585] ? kvm_arch_vcpu_ioctl+0x1219/0x2fa0 [ 1224.056116] kvm_arch_vcpu_ioctl+0x1268/0x2fa0 [ 1224.061697] ? kvm_arch_vcpu_ioctl+0x1219/0x2fa0 [ 1224.067121] ? kvm_arch_vcpu_put+0x430/0x430 [ 1224.072164] ? pci_mmcfg_check_reserved+0x170/0x170 [ 1224.078003] ? kvm_vcpu_ioctl+0x181/0xfa0 [ 1224.082580] ? lock_acquire+0x16f/0x3f0 [ 1224.087195] ? kvm_vcpu_ioctl+0x181/0xfa0 [ 1224.091931] ? __mutex_lock+0x3cd/0x1310 [ 1224.096817] ? drop_futex_key_refs.isra.0+0x6f/0xf0 [ 1224.102422] ? kvm_vcpu_ioctl+0x181/0xfa0 03:36:36 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x44000) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0xa6ba0) io_setup(0x40000100000003, &(0x7f0000000200)=0x0) io_submit(r1, 0x653, &(0x7f0000000540)=[&(0x7f00000000c0)={0x804000008040000, 0x3f00000000000759, 0x8, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7, 0xc00}]) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x3, 0x5c831, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000003bc0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000003b80)={&(0x7f0000003d00)={0x58, 0x0, 0x4, 0x70bd2b, 0x0, {}, [@TIPC_NLA_MEDIA={0x20, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10001}]}]}, @TIPC_NLA_LINK={0x24, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x800}, 0x1) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) ioctl$sock_x25_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, 0x0, 0x0) 03:36:36 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000000)={0x7b, 0x600000000000000, [0x258, 0x0, 0x1b], [0xc2]}) 03:36:37 executing program 0: mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x4, 0x31, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) getsockopt$X25_QBITINCL(r0, 0x106, 0x1, 0x0, &(0x7f0000001400)) [ 1224.107998] ? futex_wait+0x482/0x5e0 [ 1224.112446] ? mutex_trylock+0x1e0/0x1e0 [ 1224.117130] ? futex_wait_setup+0x390/0x390 [ 1224.122681] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 1224.129977] ? drop_futex_key_refs.isra.0+0x6f/0xf0 [ 1224.146891] ? __lock_acquire+0x53b/0x4700 [ 1224.152391] kvm_vcpu_ioctl+0x8f6/0xfa0 [ 1224.185360] ? kvm_vcpu_block+0xcd0/0xcd0 [ 1224.206619] ? mark_held_locks+0x100/0x100 [ 1224.237574] ? __might_fault+0x12b/0x1e0 [ 1224.257245] ? __fget+0x340/0x540 [ 1224.261556] kvm [21951]: vcpu0, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc2 data 0x0 [ 1224.286110] ? find_held_lock+0x35/0x130 [ 1224.298765] ? __fget+0x340/0x540 [ 1224.309274] ? kvm_vcpu_block+0xcd0/0xcd0 [ 1224.316056] do_vfs_ioctl+0xd6e/0x1390 [ 1224.326033] ? ioctl_preallocate+0x210/0x210 [ 1224.333536] ? smack_file_ioctl+0x196/0x300 [ 1224.362934] ? smack_file_lock+0x240/0x240 03:36:37 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@ipv6_newaddr={0x40, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_CACHEINFO={0x14, 0x6, {0x0, 0xfffffffffffff1bb}}, @IFA_ADDRESS={0x14, 0x1, @local}]}, 0x40}}, 0x0) [ 1224.385836] ? __fget+0x367/0x540 [ 1224.415831] ? iterate_fd+0x360/0x360 [ 1224.427872] ? nsecs_to_jiffies+0x30/0x30 [ 1224.438525] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1224.464800] ? security_file_ioctl+0x93/0xc0 [ 1224.494378] ksys_ioctl+0xab/0xd0 [ 1224.513317] __x64_sys_ioctl+0x73/0xb0 [ 1224.525466] do_syscall_64+0x103/0x610 [ 1224.531071] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1224.545414] RIP: 0033:0x457e29 [ 1224.554275] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1224.589738] RSP: 002b:00007f7cb7543c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1224.622868] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457e29 [ 1224.642549] RDX: 0000000020000000 RSI: 000000004008ae89 RDI: 0000000000000007 [ 1224.661241] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1224.681358] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7cb75446d4 [ 1224.692140] R13: 00000000004c09b0 R14: 00000000004d27c8 R15: 00000000ffffffff [ 1224.702590] kvm [21718]: vcpu0, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc2 data 0x0 [ 1224.720612] kvm [21718]: vcpu0, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc2 data 0x0 03:36:37 executing program 3: mknod(&(0x7f0000000080)='./file0\x00', 0x1040, 0x0) r0 = gettid() open(&(0x7f00000001c0)='./file0\x00', 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f000000d000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000000200)=0x3f) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r3 = getpgid(0x0) fcntl$setsig(r1, 0xa, 0x12) r4 = dup2(r1, r2) fcntl$setown(r4, 0x8, r3) tkill(r0, 0x16) open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) 03:36:37 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x44000) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0xa6ba0) io_setup(0x40000100000003, &(0x7f0000000200)=0x0) io_submit(r1, 0x653, &(0x7f0000000540)=[&(0x7f00000000c0)={0x804000008040000, 0x3f00000000000759, 0x8, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7, 0xc00}]) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x3, 0x5c831, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000003bc0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000003b80)={&(0x7f0000003d00)={0x58, 0x0, 0x4, 0x70bd2b, 0x0, {}, [@TIPC_NLA_MEDIA={0x20, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10001}]}]}, @TIPC_NLA_LINK={0x24, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x800}, 0x1) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) ioctl$sock_x25_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, 0x0, 0x0) 03:36:37 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000f59ffc)=0x4, 0x4) bind$inet6(r0, &(0x7f0000000480)={0xa, 0x4e20, 0x0, @mcast1, 0x2}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000040)=0x1, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000000)=0x6, 0xa) bind$inet6(r1, &(0x7f0000f67fe4)={0xa, 0x4e20}, 0x1c) 03:36:37 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000040)=ANY=[@ANYBLOB="05000000000000000d000040050000a90000000000fa00000000004000030000010000000000000025000000ff"]) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [{0x48e}]}) 03:36:37 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000300)='/dev/sg#\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="fc00000048000700ab0925ee090007000a060000000000000001369321000100ff0100000005d00000000000000398996c92770411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bb6b07e4f40000000000005a32e280fc83ab82f605f70c9ddef245c1bc79ebbaa08a", 0x88) ioctl$SG_SET_FORCE_PACK_ID(r0, 0x227b, &(0x7f0000000000)=0x1) readv(r0, &(0x7f0000000380)=[{&(0x7f0000000080)=""/195, 0x200000d7}], 0x1) 03:36:37 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x3, 0x81) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'sit0\x00', 0x0}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @broadcast}, 0x14) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000000c0), 0x0) syz_open_dev$mouse(0x0, 0x8, 0x0) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0xe00) syz_open_dev$dmmidi(&(0x7f00000003c0)='/dev/dmmidi#\x00', 0x1, 0x640000) 03:36:37 executing program 0: syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x1000, 0x101080) bind$netlink(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x6, 0x0, @perf_bp={0x0}, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$unix(0x1, 0x3, 0x0) socket$unix(0x1, 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) timer_create(0x0, 0x0, 0x0) timer_create(0x0, 0x0, &(0x7f0000000640)) timer_create(0x0, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(0xffffffffffffffff, 0xc0585604, &(0x7f0000001b40)={0x1, 0x0, {0xeb38, 0x0, 0x301f, 0x0, 0xc, 0x6, 0x0, 0x6}}) timer_create(0x4, 0x0, 0x0) timer_create(0x6, 0x0, &(0x7f0000001ac0)) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000180)={'gretap0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}) getpgid(0x0) symlinkat(&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000001c00)={0x3, 0xd9}) setsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) setpgid(0x0, 0x0) 03:36:37 executing program 2: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000040)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c653100d5"]) setxattr$system_posix_acl(&(0x7f0000000080)='./file1/file0\x00', &(0x7f0000000380)='system.posix_acl_access\x00', &(0x7f0000000cc0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x4}}, 0x34, 0x0) ioctl$VIDIOC_S_AUDIO(r0, 0x40345622, &(0x7f0000000000)={0x9, "96b238ba57e459f02537578ce1bef26fce537f928d63c0cc9fefdb2792a928b9", 0x1, 0x1}) ioctl$KVM_HAS_DEVICE_ATTR(r0, 0x4018aee3, &(0x7f0000000100)={0x0, 0x5, 0x5, &(0x7f00000000c0)=0x1f}) chdir(&(0x7f0000000280)='./file0\x00') sync() openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x100ffd, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000200)='nodev(wlan0\x00', 0xffffffffffffffff}, 0x30) 03:36:37 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$int_in(r0, 0x5452, &(0x7f0000000040)=0x1f) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @loopback}, 0x10) shutdown(r0, 0x1) 03:36:38 executing program 1: socketpair$unix(0x1, 0x4000000000005, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f000000d379)={&(0x7f0000000200)={0x18, 0x14, 0x301, 0x0, 0x0, {0x1e}, [@generic="c1"]}, 0x18}}, 0x0) 03:36:38 executing program 0: syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x1000, 0x101080) bind$netlink(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x6, 0x0, @perf_bp={0x0}, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$unix(0x1, 0x3, 0x0) socket$unix(0x1, 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) timer_create(0x0, 0x0, 0x0) timer_create(0x0, 0x0, &(0x7f0000000640)) timer_create(0x0, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(0xffffffffffffffff, 0xc0585604, &(0x7f0000001b40)={0x1, 0x0, {0xeb38, 0x0, 0x301f, 0x0, 0xc, 0x6, 0x0, 0x6}}) timer_create(0x4, 0x0, 0x0) timer_create(0x6, 0x0, &(0x7f0000001ac0)) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000180)={'gretap0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}) getpgid(0x0) symlinkat(&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000001c00)={0x3, 0xd9}) setsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) setpgid(0x0, 0x0) 03:36:38 executing program 1: socket$tipc(0x1e, 0x2, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000008) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, &(0x7f00000019c0)=""/4096, 0x1000}, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) writev(r2, &(0x7f0000000700), 0x100000000000000d) 03:36:40 executing program 3: mknod(&(0x7f0000000080)='./file0\x00', 0x1040, 0x0) r0 = gettid() open(&(0x7f00000001c0)='./file0\x00', 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f000000d000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000000200)=0x3f) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r3 = getpgid(0x0) fcntl$setsig(r1, 0xa, 0x12) r4 = dup2(r1, r2) fcntl$setown(r4, 0x8, r3) tkill(r0, 0x16) open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) 03:36:40 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000100)={0x0, 0x100000}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000040)=ANY=[@ANYBLOB="0fb1"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000028000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 03:36:40 executing program 0: syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x1000, 0x101080) bind$netlink(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x6, 0x0, @perf_bp={0x0}, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$unix(0x1, 0x3, 0x0) socket$unix(0x1, 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) timer_create(0x0, 0x0, 0x0) timer_create(0x0, 0x0, &(0x7f0000000640)) timer_create(0x0, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(0xffffffffffffffff, 0xc0585604, &(0x7f0000001b40)={0x1, 0x0, {0xeb38, 0x0, 0x301f, 0x0, 0xc, 0x6, 0x0, 0x6}}) timer_create(0x4, 0x0, 0x0) timer_create(0x6, 0x0, &(0x7f0000001ac0)) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000180)={'gretap0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}) getpgid(0x0) symlinkat(&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000001c00)={0x3, 0xd9}) setsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) setpgid(0x0, 0x0) 03:36:40 executing program 2: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000040)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c653100d5"]) setxattr$system_posix_acl(&(0x7f0000000080)='./file1/file0\x00', &(0x7f0000000380)='system.posix_acl_access\x00', &(0x7f0000000cc0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x4}}, 0x34, 0x0) ioctl$VIDIOC_S_AUDIO(r0, 0x40345622, &(0x7f0000000000)={0x9, "96b238ba57e459f02537578ce1bef26fce537f928d63c0cc9fefdb2792a928b9", 0x1, 0x1}) ioctl$KVM_HAS_DEVICE_ATTR(r0, 0x4018aee3, &(0x7f0000000100)={0x0, 0x5, 0x5, &(0x7f00000000c0)=0x1f}) chdir(&(0x7f0000000280)='./file0\x00') sync() openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x100ffd, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000200)='nodev(wlan0\x00', 0xffffffffffffffff}, 0x30) 03:36:40 executing program 1: socket$tipc(0x1e, 0x2, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000008) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, &(0x7f00000019c0)=""/4096, 0x1000}, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) writev(r2, &(0x7f0000000700), 0x100000000000000d) 03:36:40 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000300)='/dev/sg#\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="fc00000048000700ab0925ee090007000a060000000000000001369321000100ff0100000005d00000000000000398996c92770411419da79bb94b46fe000000bc00020000036c6c256f1a272f2e117c22ebc205214000000000008934d07302ad031720d7d5bb6b07e4f40000000000005a32e280fc83ab82f605f70c9ddef245c1bc79ebbaa08a", 0x88) ioctl$SG_SET_FORCE_PACK_ID(r0, 0x227b, &(0x7f0000000000)=0x1) readv(r0, &(0x7f0000000380)=[{&(0x7f0000000080)=""/195, 0x200000d7}], 0x1) 03:36:40 executing program 5: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000040)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c653100d5"]) setxattr$system_posix_acl(&(0x7f0000000080)='./file1/file0\x00', &(0x7f0000000380)='system.posix_acl_access\x00', &(0x7f0000000cc0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x4}}, 0x34, 0x0) ioctl$VIDIOC_S_AUDIO(r0, 0x40345622, &(0x7f0000000000)={0x9, "96b238ba57e459f02537578ce1bef26fce537f928d63c0cc9fefdb2792a928b9", 0x1, 0x1}) ioctl$KVM_HAS_DEVICE_ATTR(r0, 0x4018aee3, &(0x7f0000000100)={0x0, 0x5, 0x5, &(0x7f00000000c0)=0x1f}) chdir(&(0x7f0000000280)='./file0\x00') sync() openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x100ffd, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000200)='nodev(wlan0\x00', 0xffffffffffffffff}, 0x30) 03:36:40 executing program 0: syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x1000, 0x101080) bind$netlink(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x6, 0x0, @perf_bp={0x0}, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$unix(0x1, 0x3, 0x0) socket$unix(0x1, 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) timer_create(0x0, 0x0, 0x0) timer_create(0x0, 0x0, &(0x7f0000000640)) timer_create(0x0, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(0xffffffffffffffff, 0xc0585604, &(0x7f0000001b40)={0x1, 0x0, {0xeb38, 0x0, 0x301f, 0x0, 0xc, 0x6, 0x0, 0x6}}) timer_create(0x4, 0x0, 0x0) timer_create(0x6, 0x0, &(0x7f0000001ac0)) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000180)={'gretap0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}) getpgid(0x0) symlinkat(&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000001c00)={0x3, 0xd9}) setsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) setpgid(0x0, 0x0) 03:36:41 executing program 3: mknod(&(0x7f0000000080)='./file0\x00', 0x1040, 0x0) r0 = gettid() open(&(0x7f00000001c0)='./file0\x00', 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f000000d000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000000200)=0x3f) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r3 = getpgid(0x0) fcntl$setsig(r1, 0xa, 0x12) r4 = dup2(r1, r2) fcntl$setown(r4, 0x8, r3) tkill(r0, 0x16) open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) 03:36:41 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(r2, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) sendmmsg(r2, &(0x7f000000a080)=[{{0x0, 0x0, &(0x7f0000005640)=[{&(0x7f00000097c0)="bf", 0x1}], 0x1, 0x0, 0x0, 0x1}}], 0x1, 0x0) 03:36:41 executing program 1: socket$tipc(0x1e, 0x2, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000008) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, &(0x7f00000019c0)=""/4096, 0x1000}, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) writev(r2, &(0x7f0000000700), 0x100000000000000d) 03:36:41 executing program 3: mknod(&(0x7f0000000080)='./file0\x00', 0x1040, 0x0) r0 = gettid() open(&(0x7f00000001c0)='./file0\x00', 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f000000d000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000000200)=0x3f) recvfrom$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r3 = getpgid(0x0) fcntl$setsig(r1, 0xa, 0x12) r4 = dup2(r1, r2) fcntl$setown(r4, 0x8, r3) tkill(r0, 0x16) open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) 03:36:41 executing program 0: ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) mprotect(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x2f) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty, 0x77f980000}, 0x1c) r1 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x8, 0x400100) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'hwsim0\x00', 0x100}) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x7}, 0x1c) sendmmsg(r0, &(0x7f0000000c40)=[{{0x0, 0x5c00000000000000, &(0x7f00000009c0), 0x2c, &(0x7f00000000c0)}}], 0x40000000000026a, 0x0) geteuid() fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000580)) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) 03:36:41 executing program 2: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000040)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c653100d5"]) setxattr$system_posix_acl(&(0x7f0000000080)='./file1/file0\x00', &(0x7f0000000380)='system.posix_acl_access\x00', &(0x7f0000000cc0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x4}}, 0x34, 0x0) ioctl$VIDIOC_S_AUDIO(r0, 0x40345622, &(0x7f0000000000)={0x9, "96b238ba57e459f02537578ce1bef26fce537f928d63c0cc9fefdb2792a928b9", 0x1, 0x1}) ioctl$KVM_HAS_DEVICE_ATTR(r0, 0x4018aee3, &(0x7f0000000100)={0x0, 0x5, 0x5, &(0x7f00000000c0)=0x1f}) chdir(&(0x7f0000000280)='./file0\x00') sync() openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x100ffd, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000200)='nodev(wlan0\x00', 0xffffffffffffffff}, 0x30) [ 1228.609662] net_ratelimit: 10 callbacks suppressed [ 1228.609741] Dead loop on virtual device ip6_vti0, fix it urgently! [ 1228.626797] Dead loop on virtual device ip6_vti0, fix it urgently! [ 1228.640351] Dead loop on virtual device ip6_vti0, fix it urgently! [ 1228.671169] Dead loop on virtual device ip6_vti0, fix it urgently! 03:36:41 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) io_setup(0x807, &(0x7f00000000c0)=0x0) socket$unix(0x1, 0x1, 0x0) io_submit(r2, 0x0, 0x0) io_submit(r2, 0xf61, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r1, &(0x7f0000000140), 0x26a3535c9becb8da}]) [ 1228.716830] Dead loop on virtual device ip6_vti0, fix it urgently! 03:36:41 executing program 3: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = memfd_create(&(0x7f00000000c0)='\x00', 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x8000000}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) wait4(0x0, 0x0, 0x0, 0x0) [ 1228.774994] Dead loop on virtual device ip6_vti0, fix it urgently! 03:36:41 executing program 5: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000040)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c653100d5"]) setxattr$system_posix_acl(&(0x7f0000000080)='./file1/file0\x00', &(0x7f0000000380)='system.posix_acl_access\x00', &(0x7f0000000cc0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x4}}, 0x34, 0x0) ioctl$VIDIOC_S_AUDIO(r0, 0x40345622, &(0x7f0000000000)={0x9, "96b238ba57e459f02537578ce1bef26fce537f928d63c0cc9fefdb2792a928b9", 0x1, 0x1}) ioctl$KVM_HAS_DEVICE_ATTR(r0, 0x4018aee3, &(0x7f0000000100)={0x0, 0x5, 0x5, &(0x7f00000000c0)=0x1f}) chdir(&(0x7f0000000280)='./file0\x00') sync() openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x100ffd, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000200)='nodev(wlan0\x00', 0xffffffffffffffff}, 0x30) 03:36:41 executing program 3: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = memfd_create(&(0x7f00000000c0)='\x00', 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x8000000}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) wait4(0x0, 0x0, 0x0, 0x0) 03:36:41 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/kcm\x00\b\x00') mmap$perf(&(0x7f0000ff9000/0x7000)=nil, 0x7000, 0x0, 0x20013, r0, 0x0) 03:36:41 executing program 1: socket$tipc(0x1e, 0x2, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000008) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, &(0x7f00000019c0)=""/4096, 0x1000}, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) writev(r2, &(0x7f0000000700), 0x100000000000000d) 03:36:42 executing program 4: socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x880, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x2) openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(r1, &(0x7f0000000140)={0x1f, 0x0, {}, 0x0, 0x1}, 0xe) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f00000004c0)=ANY=[@ANYBLOB="31dff57ad5e5905299f0f8261b3e5220bb8797c9347a1a9e6061989d169908a2c27a753a68220a1ad20853e4e4589f90315d7da42924cbe2f0d51dd4b1a91383bc1d36bafad8223be05887b04a2b423b1a017bad1f144975f529611024877dcdd7bf80000000000000000000000000"], 0x0) r3 = syz_init_net_socket$llc(0x1a, 0x80000000000002, 0x0) sendto$llc(r3, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x0) write(r3, &(0x7f0000000200), 0x0) recvmmsg(r3, &(0x7f000000cd80)=[{{&(0x7f000000be80)=@ll, 0x80, &(0x7f000000c2c0)=[{&(0x7f000000bf00)=""/139, 0x8b}, {&(0x7f000000bfc0)=""/220, 0xdc}, {&(0x7f000000c0c0)=""/93, 0x5d}, {&(0x7f000000c140)=""/193, 0xc1}, {&(0x7f000000c240)=""/115, 0x73}], 0x5, &(0x7f000000c340)=""/106, 0x6a, 0xffffffff}, 0x6}, {{0x0, 0x0, &(0x7f000000c600)=[{&(0x7f000000c3c0)=""/56, 0x38}, {&(0x7f000000c400)=""/74, 0x4a}, {&(0x7f000000c480)=""/114, 0x72}, {&(0x7f00000000c0)=""/132, 0x84}, {&(0x7f000000c5c0)=""/15, 0xf}], 0x10000000000000f7, 0x0, 0x0, 0x7d48bddc}, 0x100000001}], 0x2, 0x2000, &(0x7f000000cec0)={0x0, 0x1c9c380}) recvmmsg(r3, &(0x7f0000002740)=[{{&(0x7f0000000600)=@nl=@proc, 0x80, &(0x7f0000001780)=[{&(0x7f0000000680)=""/4096, 0x1000}, {&(0x7f0000000080)=""/38, 0x26}, {&(0x7f0000001680)=""/198, 0xc6}], 0x3, 0x0, 0x0, 0xffffffffffffc1fb}, 0x5}, {{&(0x7f00000017c0)=@hci, 0x80, &(0x7f0000001940)=[{&(0x7f0000001840)=""/194, 0xc2}], 0x1, &(0x7f0000001980)=""/232, 0xe8, 0x5}, 0x7}, {{&(0x7f0000001a80)=@rc, 0x80, &(0x7f0000001c80)=[{&(0x7f0000001b00)=""/157, 0x1926403c1d9e3bb7}, {&(0x7f0000001bc0)=""/12, 0xc}, {&(0x7f0000001c00)=""/101, 0x65}], 0x3, &(0x7f0000001cc0)=""/130, 0x82, 0x7}, 0x8}, {{&(0x7f0000001d80)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000001f00)=[{&(0x7f0000001e00)=""/206, 0xce}], 0x1, &(0x7f0000001f40)=""/34, 0x22, 0xffffffff}, 0x3}, {{&(0x7f0000001f80)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000002180)=[{&(0x7f0000002000)=""/240, 0xf0}, {&(0x7f0000002100)=""/79, 0x4f}], 0x2, 0x0, 0x0, 0x10001}, 0xff}, {{&(0x7f00000021c0)=@nl=@proc, 0xfffffffffffffde8, &(0x7f0000002580)=[{&(0x7f0000002240)=""/131, 0x83}, {&(0x7f0000002300)=""/55, 0x37}, {&(0x7f0000002440)=""/129, 0x81}, {&(0x7f0000002500)=""/98, 0x62}], 0x4, &(0x7f0000002600)=""/70, 0x46, 0x7f}, 0xdcf}, {{0x0, 0x0, &(0x7f00000026c0)=[{&(0x7f0000002680)=""/50, 0x32}], 0x1, &(0x7f0000002700)=""/31, 0x1f, 0xabf}, 0x81}], 0x7, 0x2000, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r2, 0x8919, &(0x7f0000000440)={'veth0_to_bridge\x00', {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x1b}}}) r5 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000400)={r5, &(0x7f00000004c0), 0x0}, 0x18) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000200)={0x0, 0x200}, &(0x7f0000000240)=0x8) ioctl$LOOP_CTL_GET_FREE(r5, 0x4c82) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)={0x9, 0x52, 0x3, 0x400000bff, 0x0, 0xffffffffffffffff, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r7, &(0x7f0000000040), 0x0}, 0x20) getpeername(r3, &(0x7f0000002900)=@in={0x2, 0x0, @local}, &(0x7f0000002340)=0x80) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r5, 0x84, 0x19, &(0x7f0000000280)={r6, 0x81}, 0x8) shmctl$SHM_UNLOCK(0x0, 0xc) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r4, 0x84, 0x77, &(0x7f0000000340)={r6, 0x3, 0x2, [0x0, 0x5]}, &(0x7f0000000540)=0xc) syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x401, 0x8000) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r4, 0x84, 0x5, &(0x7f0000002980)={r8, @in={{0x2, 0x4e21, @broadcast}}}, 0x84) connect$bt_l2cap(r1, &(0x7f0000000040)={0x1f, 0x0, {}, 0x0, 0x2}, 0xa4) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x4c100, 0x0) 03:36:42 executing program 5: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000040)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c653100d5"]) setxattr$system_posix_acl(&(0x7f0000000080)='./file1/file0\x00', &(0x7f0000000380)='system.posix_acl_access\x00', &(0x7f0000000cc0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x4}}, 0x34, 0x0) ioctl$VIDIOC_S_AUDIO(r0, 0x40345622, &(0x7f0000000000)={0x9, "96b238ba57e459f02537578ce1bef26fce537f928d63c0cc9fefdb2792a928b9", 0x1, 0x1}) ioctl$KVM_HAS_DEVICE_ATTR(r0, 0x4018aee3, &(0x7f0000000100)={0x0, 0x5, 0x5, &(0x7f00000000c0)=0x1f}) chdir(&(0x7f0000000280)='./file0\x00') sync() openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x100ffd, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000200)='nodev(wlan0\x00', 0xffffffffffffffff}, 0x30) 03:36:42 executing program 0: ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) mprotect(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x2f) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty, 0x77f980000}, 0x1c) r1 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x8, 0x400100) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'hwsim0\x00', 0x100}) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x7}, 0x1c) sendmmsg(r0, &(0x7f0000000c40)=[{{0x0, 0x5c00000000000000, &(0x7f00000009c0), 0x2c, &(0x7f00000000c0)}}], 0x40000000000026a, 0x0) geteuid() fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000580)) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) 03:36:42 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") syz_emit_ethernet(0x300b00, &(0x7f0000000000)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300008, 0x3a, 0x0, @ipv4={[0x0, 0x3], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x7, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 03:36:42 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") syz_emit_ethernet(0x300b00, &(0x7f0000000000)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300008, 0x3a, 0x0, @ipv4={[0x0, 0x3], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x7, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 1229.635567] Dead loop on virtual device ip6_vti0, fix it urgently! 03:36:42 executing program 2: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000040)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c653100d5"]) setxattr$system_posix_acl(&(0x7f0000000080)='./file1/file0\x00', &(0x7f0000000380)='system.posix_acl_access\x00', &(0x7f0000000cc0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x4}}, 0x34, 0x0) ioctl$VIDIOC_S_AUDIO(r0, 0x40345622, &(0x7f0000000000)={0x9, "96b238ba57e459f02537578ce1bef26fce537f928d63c0cc9fefdb2792a928b9", 0x1, 0x1}) ioctl$KVM_HAS_DEVICE_ATTR(r0, 0x4018aee3, &(0x7f0000000100)={0x0, 0x5, 0x5, &(0x7f00000000c0)=0x1f}) chdir(&(0x7f0000000280)='./file0\x00') sync() openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x100ffd, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000200)='nodev(wlan0\x00', 0xffffffffffffffff}, 0x30) 03:36:42 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") syz_emit_ethernet(0x300b00, &(0x7f0000000000)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300008, 0x3a, 0x0, @ipv4={[0x0, 0x3], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x7, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 03:36:42 executing program 1: r0 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x77fe, 0x40000) fsetxattr$security_ima(r0, &(0x7f0000000180)='security.ima\x00', &(0x7f00000001c0)=ANY=[@ANYBLOB="040054528d5f30ac843f"], 0x1, 0x3) socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$IP_VS_SO_GET_DAEMON(r1, 0x0, 0x487, &(0x7f0000000080), &(0x7f00000000c0)=0x30) r2 = syz_open_dev$vcsn(&(0x7f0000000340)='/dev/vcs#\x00', 0x8001, 0xbbaee3c0434f2b9a) write$tun(r2, &(0x7f0000000400)={@val={0x0, 0x88b6}, @val={0x0, 0x80, 0x8, 0x6, 0x0, 0xffffffc000000000}, @ipv4={{0xb, 0x4, 0x401, 0x126b9681, 0x89, 0x68, 0x7, 0xffff, 0xff, 0x0, @loopback, @multicast2, {[@cipso={0x86, 0x16, 0x800, [{0x0, 0x10, "661f553a57952ede1794cd7279a6"}]}]}}, @dccp={{0x4e24, 0x4e22, 0x4, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0xa, 0x0, "95ef1c", 0x80, "9898aa"}, "fdf139d390696ad407aa9445ea3efc7b8cb6239aefa57e1ada8e73cec4afbb40348b926b0f605ffb7befd2c24d252cf6dec1b39141c1ed94390dbac48815c17a8987d03de53a799220dec7d171"}}}, 0x97) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f00000002c0)='yeah\x00', 0x5) bind$inet(r3, &(0x7f00000003c0)={0x2, 0x200000000004e23, @rand_addr=0x2}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x66, &(0x7f0000000280)=0x80000000, 0x4) bind$netlink(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_HYPERV_EVENTFD(0xffffffffffffffff, 0x4018aebd, 0x0) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000100)=0x3e0, 0x4) fstatfs(r4, 0x0) recvmsg(r3, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r3, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) connect$pppoe(0xffffffffffffffff, 0x0, 0x0) connect$llc(0xffffffffffffffff, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, 0x10) 03:36:42 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") syz_emit_ethernet(0x300b00, &(0x7f0000000000)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300008, 0x3a, 0x0, @ipv4={[0x0, 0x3], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x7, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 03:36:43 executing program 3: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = memfd_create(&(0x7f00000000c0)='\x00', 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x8000000}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) wait4(0x0, 0x0, 0x0, 0x0) 03:36:43 executing program 5: unshare(0x24020400) r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) r1 = fanotify_init(0x0, 0x0) fanotify_mark(r1, 0x11, 0x20, r0, 0x0) 03:36:43 executing program 0: ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) mprotect(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x2f) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty, 0x77f980000}, 0x1c) r1 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x8, 0x400100) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'hwsim0\x00', 0x100}) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x7}, 0x1c) sendmmsg(r0, &(0x7f0000000c40)=[{{0x0, 0x5c00000000000000, &(0x7f00000009c0), 0x2c, &(0x7f00000000c0)}}], 0x40000000000026a, 0x0) geteuid() fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000580)) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) 03:36:43 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0xc, 0x20000000004, 0x4, 0xb, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r1, &(0x7f0000000040), 0x0}, 0x20) 03:36:43 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000001e00)={0x2, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x75}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x5, 0x110f, &(0x7f0000014000)=""/4096}, 0x48) 03:36:43 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f000000d000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote, 0xb}, 0x7a) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) syz_emit_ethernet(0x140, &(0x7f00000001c0)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote, @local, {[], @udp={0x0, 0x4e20, 0x8}}}}}}, 0x0) 03:36:43 executing program 5: getrandom(&(0x7f0000000080)=""/44, 0x1c3c8d6e4daaf67e, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0xffffffffffffff25, &(0x7f0000000000)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x2}]]}}}]}, 0xeb}}, 0x0) 03:36:43 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000982ff9)='mqueue\x00', 0x0, 0x0) r0 = creat(&(0x7f0000c5eff4)='./file0/bus\x00', 0x0) mq_getsetattr(r0, 0x0, &(0x7f0000000100)) [ 1230.611772] Dead loop on virtual device ip6_vti0, fix it urgently! 03:36:43 executing program 2: r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f0000000000)={0x2, 'c'}, 0x9, 0x0) msgrcv(r0, &(0x7f0000000040), 0x8, 0x2, 0x1800) 03:36:43 executing program 1: r0 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x77fe, 0x40000) fsetxattr$security_ima(r0, &(0x7f0000000180)='security.ima\x00', &(0x7f00000001c0)=ANY=[@ANYBLOB="040054528d5f30ac843f"], 0x1, 0x3) socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$IP_VS_SO_GET_DAEMON(r1, 0x0, 0x487, &(0x7f0000000080), &(0x7f00000000c0)=0x30) r2 = syz_open_dev$vcsn(&(0x7f0000000340)='/dev/vcs#\x00', 0x8001, 0xbbaee3c0434f2b9a) write$tun(r2, &(0x7f0000000400)={@val={0x0, 0x88b6}, @val={0x0, 0x80, 0x8, 0x6, 0x0, 0xffffffc000000000}, @ipv4={{0xb, 0x4, 0x401, 0x126b9681, 0x89, 0x68, 0x7, 0xffff, 0xff, 0x0, @loopback, @multicast2, {[@cipso={0x86, 0x16, 0x800, [{0x0, 0x10, "661f553a57952ede1794cd7279a6"}]}]}}, @dccp={{0x4e24, 0x4e22, 0x4, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0xa, 0x0, "95ef1c", 0x80, "9898aa"}, "fdf139d390696ad407aa9445ea3efc7b8cb6239aefa57e1ada8e73cec4afbb40348b926b0f605ffb7befd2c24d252cf6dec1b39141c1ed94390dbac48815c17a8987d03de53a799220dec7d171"}}}, 0x97) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f00000002c0)='yeah\x00', 0x5) bind$inet(r3, &(0x7f00000003c0)={0x2, 0x200000000004e23, @rand_addr=0x2}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x66, &(0x7f0000000280)=0x80000000, 0x4) bind$netlink(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_HYPERV_EVENTFD(0xffffffffffffffff, 0x4018aebd, 0x0) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000100)=0x3e0, 0x4) fstatfs(r4, 0x0) recvmsg(r3, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r3, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) connect$pppoe(0xffffffffffffffff, 0x0, 0x0) connect$llc(0xffffffffffffffff, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, 0x10) 03:36:43 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$radio(0x0, 0xffffffffffffffff, 0x2) syz_open_dev$admmidi(0x0, 0x0, 0x0) pipe2(&(0x7f0000000200), 0x80000) mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket(0xa, 0x3, 0x200000000008) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00`\x00', 0xfffffffffffffffd}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") 03:36:43 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000982ff9)='mqueue\x00', 0x0, 0x0) r0 = creat(&(0x7f0000c5eff4)='./file0/bus\x00', 0x0) mq_getsetattr(r0, 0x0, &(0x7f0000000100)) [ 1231.110091] bridge0: port 2(bridge_slave_1) entered disabled state [ 1231.116773] bridge0: port 1(bridge_slave_0) entered disabled state 03:36:44 executing program 3: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = memfd_create(&(0x7f00000000c0)='\x00', 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x8000000}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) wait4(0x0, 0x0, 0x0, 0x0) 03:36:44 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000982ff9)='mqueue\x00', 0x0, 0x0) r0 = creat(&(0x7f0000c5eff4)='./file0/bus\x00', 0x0) mq_getsetattr(r0, 0x0, &(0x7f0000000100)) 03:36:44 executing program 0: ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) mprotect(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x2f) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty, 0x77f980000}, 0x1c) r1 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x8, 0x400100) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'hwsim0\x00', 0x100}) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x7}, 0x1c) sendmmsg(r0, &(0x7f0000000c40)=[{{0x0, 0x5c00000000000000, &(0x7f00000009c0), 0x2c, &(0x7f00000000c0)}}], 0x40000000000026a, 0x0) geteuid() fsetxattr$security_capability(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000580)) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) [ 1231.599289] bridge0: port 2(bridge_slave_1) entered blocking state [ 1231.605738] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1231.612454] bridge0: port 1(bridge_slave_0) entered blocking state [ 1231.618859] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1231.672393] device bridge0 entered promiscuous mode [ 1231.696201] Dead loop on virtual device ip6_vti0, fix it urgently! 03:36:44 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000982ff9)='mqueue\x00', 0x0, 0x0) r0 = creat(&(0x7f0000c5eff4)='./file0/bus\x00', 0x0) mq_getsetattr(r0, 0x0, &(0x7f0000000100)) [ 1231.748970] bridge0: port 2(bridge_slave_1) entered disabled state [ 1231.755462] bridge0: port 1(bridge_slave_0) entered disabled state [ 1231.847461] device bridge0 left promiscuous mode 03:36:44 executing program 4: r0 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x77fe, 0x40000) fsetxattr$security_ima(r0, &(0x7f0000000180)='security.ima\x00', &(0x7f00000001c0)=ANY=[@ANYBLOB="040054528d5f30ac843f"], 0x1, 0x3) socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$IP_VS_SO_GET_DAEMON(r1, 0x0, 0x487, &(0x7f0000000080), &(0x7f00000000c0)=0x30) r2 = syz_open_dev$vcsn(&(0x7f0000000340)='/dev/vcs#\x00', 0x8001, 0xbbaee3c0434f2b9a) write$tun(r2, &(0x7f0000000400)={@val={0x0, 0x88b6}, @val={0x0, 0x80, 0x8, 0x6, 0x0, 0xffffffc000000000}, @ipv4={{0xb, 0x4, 0x401, 0x126b9681, 0x89, 0x68, 0x7, 0xffff, 0xff, 0x0, @loopback, @multicast2, {[@cipso={0x86, 0x16, 0x800, [{0x0, 0x10, "661f553a57952ede1794cd7279a6"}]}]}}, @dccp={{0x4e24, 0x4e22, 0x4, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0xa, 0x0, "95ef1c", 0x80, "9898aa"}, "fdf139d390696ad407aa9445ea3efc7b8cb6239aefa57e1ada8e73cec4afbb40348b926b0f605ffb7befd2c24d252cf6dec1b39141c1ed94390dbac48815c17a8987d03de53a799220dec7d171"}}}, 0x97) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f00000002c0)='yeah\x00', 0x5) bind$inet(r3, &(0x7f00000003c0)={0x2, 0x200000000004e23, @rand_addr=0x2}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x66, &(0x7f0000000280)=0x80000000, 0x4) bind$netlink(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_HYPERV_EVENTFD(0xffffffffffffffff, 0x4018aebd, 0x0) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000100)=0x3e0, 0x4) fstatfs(r4, 0x0) recvmsg(r3, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r3, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) connect$pppoe(0xffffffffffffffff, 0x0, 0x0) connect$llc(0xffffffffffffffff, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, 0x10) 03:36:44 executing program 5: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='configfs\x00', 0x0, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) lseek(r0, 0x1, 0x0) getdents(r0, 0x0, 0xfe54) 03:36:44 executing program 1: r0 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x77fe, 0x40000) fsetxattr$security_ima(r0, &(0x7f0000000180)='security.ima\x00', &(0x7f00000001c0)=ANY=[@ANYBLOB="040054528d5f30ac843f"], 0x1, 0x3) socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$IP_VS_SO_GET_DAEMON(r1, 0x0, 0x487, &(0x7f0000000080), &(0x7f00000000c0)=0x30) r2 = syz_open_dev$vcsn(&(0x7f0000000340)='/dev/vcs#\x00', 0x8001, 0xbbaee3c0434f2b9a) write$tun(r2, &(0x7f0000000400)={@val={0x0, 0x88b6}, @val={0x0, 0x80, 0x8, 0x6, 0x0, 0xffffffc000000000}, @ipv4={{0xb, 0x4, 0x401, 0x126b9681, 0x89, 0x68, 0x7, 0xffff, 0xff, 0x0, @loopback, @multicast2, {[@cipso={0x86, 0x16, 0x800, [{0x0, 0x10, "661f553a57952ede1794cd7279a6"}]}]}}, @dccp={{0x4e24, 0x4e22, 0x4, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0xa, 0x0, "95ef1c", 0x80, "9898aa"}, "fdf139d390696ad407aa9445ea3efc7b8cb6239aefa57e1ada8e73cec4afbb40348b926b0f605ffb7befd2c24d252cf6dec1b39141c1ed94390dbac48815c17a8987d03de53a799220dec7d171"}}}, 0x97) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f00000002c0)='yeah\x00', 0x5) bind$inet(r3, &(0x7f00000003c0)={0x2, 0x200000000004e23, @rand_addr=0x2}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x66, &(0x7f0000000280)=0x80000000, 0x4) bind$netlink(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_HYPERV_EVENTFD(0xffffffffffffffff, 0x4018aebd, 0x0) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000100)=0x3e0, 0x4) fstatfs(r4, 0x0) recvmsg(r3, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r3, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) connect$pppoe(0xffffffffffffffff, 0x0, 0x0) connect$llc(0xffffffffffffffff, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, 0x10) 03:36:45 executing program 5: r0 = syz_open_dev$dspn(&(0x7f0000001080)='/dev/dsp#\x00', 0x1, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) read$eventfd(r0, &(0x7f0000000040), 0x8) ioctl$int_in(r0, 0x800000c0045005, &(0x7f0000000080)=0x7) dup3(r1, r0, 0x0) 03:36:45 executing program 4: r0 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x77fe, 0x40000) fsetxattr$security_ima(r0, &(0x7f0000000180)='security.ima\x00', &(0x7f00000001c0)=ANY=[@ANYBLOB="040054528d5f30ac843f"], 0x1, 0x3) socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$IP_VS_SO_GET_DAEMON(r1, 0x0, 0x487, &(0x7f0000000080), &(0x7f00000000c0)=0x30) r2 = syz_open_dev$vcsn(&(0x7f0000000340)='/dev/vcs#\x00', 0x8001, 0xbbaee3c0434f2b9a) write$tun(r2, &(0x7f0000000400)={@val={0x0, 0x88b6}, @val={0x0, 0x80, 0x8, 0x6, 0x0, 0xffffffc000000000}, @ipv4={{0xb, 0x4, 0x401, 0x126b9681, 0x89, 0x68, 0x7, 0xffff, 0xff, 0x0, @loopback, @multicast2, {[@cipso={0x86, 0x16, 0x800, [{0x0, 0x10, "661f553a57952ede1794cd7279a6"}]}]}}, @dccp={{0x4e24, 0x4e22, 0x4, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0xa, 0x0, "95ef1c", 0x80, "9898aa"}, "fdf139d390696ad407aa9445ea3efc7b8cb6239aefa57e1ada8e73cec4afbb40348b926b0f605ffb7befd2c24d252cf6dec1b39141c1ed94390dbac48815c17a8987d03de53a799220dec7d171"}}}, 0x97) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f00000002c0)='yeah\x00', 0x5) bind$inet(r3, &(0x7f00000003c0)={0x2, 0x200000000004e23, @rand_addr=0x2}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x66, &(0x7f0000000280)=0x80000000, 0x4) bind$netlink(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_HYPERV_EVENTFD(0xffffffffffffffff, 0x4018aebd, 0x0) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000100)=0x3e0, 0x4) fstatfs(r4, 0x0) recvmsg(r3, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r3, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) connect$pppoe(0xffffffffffffffff, 0x0, 0x0) connect$llc(0xffffffffffffffff, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, 0x10) [ 1232.335798] bridge0: port 2(bridge_slave_1) entered blocking state [ 1232.342289] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1232.348966] bridge0: port 1(bridge_slave_0) entered blocking state [ 1232.355328] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1232.397807] device bridge0 entered promiscuous mode 03:36:45 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) set_mempolicy(0x0, 0x0, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$SIOCAX25GETINFO(r0, 0x89ed, &(0x7f0000000080)) prctl$PR_SET_THP_DISABLE(0x29, 0x4) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x1) mincore(&(0x7f0000ffe000/0x1000)=nil, 0x1000, &(0x7f0000000180)=""/229) syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') 03:36:45 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$radio(0x0, 0xffffffffffffffff, 0x2) syz_open_dev$admmidi(0x0, 0x0, 0x0) pipe2(&(0x7f0000000200), 0x80000) mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket(0xa, 0x3, 0x200000000008) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00`\x00', 0xfffffffffffffffd}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") 03:36:45 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={0x28, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x14, 0x1, [@TIPC_NLA_BEARER_NAME={0x4, 0x1, @udp='udp:syz2\x00'}]}]}, 0x28}}, 0x0) [ 1232.609842] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 03:36:45 executing program 3: r0 = memfd_create(&(0x7f00000000c0)='#em1#+\x00', 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r0, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x28, 0x6, 0x0, 0x0) 03:36:45 executing program 4: r0 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x77fe, 0x40000) fsetxattr$security_ima(r0, &(0x7f0000000180)='security.ima\x00', &(0x7f00000001c0)=ANY=[@ANYBLOB="040054528d5f30ac843f"], 0x1, 0x3) socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$IP_VS_SO_GET_DAEMON(r1, 0x0, 0x487, &(0x7f0000000080), &(0x7f00000000c0)=0x30) r2 = syz_open_dev$vcsn(&(0x7f0000000340)='/dev/vcs#\x00', 0x8001, 0xbbaee3c0434f2b9a) write$tun(r2, &(0x7f0000000400)={@val={0x0, 0x88b6}, @val={0x0, 0x80, 0x8, 0x6, 0x0, 0xffffffc000000000}, @ipv4={{0xb, 0x4, 0x401, 0x126b9681, 0x89, 0x68, 0x7, 0xffff, 0xff, 0x0, @loopback, @multicast2, {[@cipso={0x86, 0x16, 0x800, [{0x0, 0x10, "661f553a57952ede1794cd7279a6"}]}]}}, @dccp={{0x4e24, 0x4e22, 0x4, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0xa, 0x0, "95ef1c", 0x80, "9898aa"}, "fdf139d390696ad407aa9445ea3efc7b8cb6239aefa57e1ada8e73cec4afbb40348b926b0f605ffb7befd2c24d252cf6dec1b39141c1ed94390dbac48815c17a8987d03de53a799220dec7d171"}}}, 0x97) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f00000002c0)='yeah\x00', 0x5) bind$inet(r3, &(0x7f00000003c0)={0x2, 0x200000000004e23, @rand_addr=0x2}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x66, &(0x7f0000000280)=0x80000000, 0x4) bind$netlink(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_HYPERV_EVENTFD(0xffffffffffffffff, 0x4018aebd, 0x0) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000100)=0x3e0, 0x4) fstatfs(r4, 0x0) recvmsg(r3, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r3, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) connect$pppoe(0xffffffffffffffff, 0x0, 0x0) connect$llc(0xffffffffffffffff, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, 0x10) 03:36:45 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000440)=@newlink={0x28, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_CARRIER={0x8, 0x21, 0x5865}]}, 0x28}}, 0x0) [ 1232.884574] bridge0: port 2(bridge_slave_1) entered disabled state [ 1232.891145] bridge0: port 1(bridge_slave_0) entered disabled state [ 1232.901587] device bridge0 left promiscuous mode 03:36:45 executing program 1: r0 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x77fe, 0x40000) fsetxattr$security_ima(r0, &(0x7f0000000180)='security.ima\x00', &(0x7f00000001c0)=ANY=[@ANYBLOB="040054528d5f30ac843f"], 0x1, 0x3) socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$IP_VS_SO_GET_DAEMON(r1, 0x0, 0x487, &(0x7f0000000080), &(0x7f00000000c0)=0x30) r2 = syz_open_dev$vcsn(&(0x7f0000000340)='/dev/vcs#\x00', 0x8001, 0xbbaee3c0434f2b9a) write$tun(r2, &(0x7f0000000400)={@val={0x0, 0x88b6}, @val={0x0, 0x80, 0x8, 0x6, 0x0, 0xffffffc000000000}, @ipv4={{0xb, 0x4, 0x401, 0x126b9681, 0x89, 0x68, 0x7, 0xffff, 0xff, 0x0, @loopback, @multicast2, {[@cipso={0x86, 0x16, 0x800, [{0x0, 0x10, "661f553a57952ede1794cd7279a6"}]}]}}, @dccp={{0x4e24, 0x4e22, 0x4, 0x1, 0xfffffffffffffffb, 0x0, 0x0, 0xa, 0x0, "95ef1c", 0x80, "9898aa"}, "fdf139d390696ad407aa9445ea3efc7b8cb6239aefa57e1ada8e73cec4afbb40348b926b0f605ffb7befd2c24d252cf6dec1b39141c1ed94390dbac48815c17a8987d03de53a799220dec7d171"}}}, 0x97) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f00000002c0)='yeah\x00', 0x5) bind$inet(r3, &(0x7f00000003c0)={0x2, 0x200000000004e23, @rand_addr=0x2}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x66, &(0x7f0000000280)=0x80000000, 0x4) bind$netlink(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_HYPERV_EVENTFD(0xffffffffffffffff, 0x4018aebd, 0x0) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000100)=0x3e0, 0x4) fstatfs(r4, 0x0) recvmsg(r3, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r3, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) connect$pppoe(0xffffffffffffffff, 0x0, 0x0) connect$llc(0xffffffffffffffff, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, 0x10) 03:36:45 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f0000000100)={'filter\x00', 0x4, [{}, {}, {}, {}]}, 0x68) 03:36:46 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f0000000100)={'filter\x00', 0x4, [{}, {}, {}, {}]}, 0x68) 03:36:46 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000340)={0x8f, 0x0, [0x2]}) ioctl$KVM_SET_CPUID2(r2, 0x4008ae90, &(0x7f0000000080)={0x1, 0x0, [{0x1}]}) [ 1233.345913] bridge0: port 2(bridge_slave_1) entered blocking state [ 1233.352434] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1233.359162] bridge0: port 1(bridge_slave_0) entered blocking state [ 1233.365533] bridge0: port 1(bridge_slave_0) entered forwarding state 03:36:46 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f0000000100)={'filter\x00', 0x4, [{}, {}, {}, {}]}, 0x68) [ 1233.402773] device bridge0 entered promiscuous mode [ 1233.426074] netlink: 'syz-executor.5': attribute type 33 has an invalid length. 03:36:46 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x40000000001, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ppoll(&(0x7f00000001c0)=[{r0}, {r2, 0x1}], 0x2, 0x0, 0x0, 0x0) close(r0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="ea"], 0x1) [ 1235.386366] IPVS: ftp: loaded support on port[0] = 21 [ 1235.443765] chnl_net:caif_netlink_parms(): no params data found [ 1235.473939] bridge0: port 1(bridge_slave_0) entered blocking state [ 1235.480538] bridge0: port 1(bridge_slave_0) entered disabled state [ 1235.487796] device bridge_slave_0 entered promiscuous mode [ 1235.494911] bridge0: port 2(bridge_slave_1) entered blocking state [ 1235.501471] bridge0: port 2(bridge_slave_1) entered disabled state [ 1235.508532] device bridge_slave_1 entered promiscuous mode [ 1235.526477] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1235.535531] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1235.807598] team0: Port device team_slave_0 added [ 1235.813401] team0: Port device team_slave_1 added [ 1235.879780] device hsr_slave_0 entered promiscuous mode [ 1235.917710] device hsr_slave_1 entered promiscuous mode [ 1236.082390] bridge0: port 2(bridge_slave_1) entered blocking state [ 1236.088771] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1236.095453] bridge0: port 1(bridge_slave_0) entered blocking state [ 1236.101839] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1236.264186] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1236.276221] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1236.284266] bridge0: port 1(bridge_slave_0) entered disabled state [ 1236.291776] bridge0: port 2(bridge_slave_1) entered disabled state [ 1236.300073] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1236.435618] 8021q: adding VLAN 0 to HW filter on device team0 [ 1236.445170] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1236.452933] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1236.460784] bridge0: port 1(bridge_slave_0) entered blocking state [ 1236.467122] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1236.610424] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1236.618481] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1236.626021] bridge0: port 2(bridge_slave_1) entered blocking state [ 1236.632395] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1236.639460] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1236.647578] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1236.797974] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1236.805829] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1236.813730] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1236.821622] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1236.829618] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1236.837032] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1236.846795] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1236.858490] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1236.865499] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1236.866031] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1236.881069] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1237.032529] 8021q: adding VLAN 0 to HW filter on device batadv0 03:36:50 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) set_mempolicy(0x0, 0x0, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$SIOCAX25GETINFO(r0, 0x89ed, &(0x7f0000000080)) prctl$PR_SET_THP_DISABLE(0x29, 0x4) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x1) mincore(&(0x7f0000ffe000/0x1000)=nil, 0x1000, &(0x7f0000000180)=""/229) syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') 03:36:50 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$radio(0x0, 0xffffffffffffffff, 0x2) syz_open_dev$admmidi(0x0, 0x0, 0x0) pipe2(&(0x7f0000000200), 0x80000) mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket(0xa, 0x3, 0x200000000008) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00`\x00', 0xfffffffffffffffd}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") 03:36:50 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f0000000100)={'filter\x00', 0x4, [{}, {}, {}, {}]}, 0x68) 03:36:50 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000340)={0x8f, 0x0, [0x2]}) ioctl$KVM_SET_CPUID2(r2, 0x4008ae90, &(0x7f0000000080)={0x1, 0x0, [{0x1}]}) 03:36:50 executing program 5: ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000300)="240000002a0007011dff0e950101830020200a0020000000060000003173447b114824d4", 0x24}], 0x1}, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 03:36:50 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003680), 0x0, 0x0, &(0x7f0000003800)) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f\x00', 0x2761, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340), 0xffffffffffffff2, 0x0, 0xffffffffffffffce}, 0xffffffffffffffff) ioctl$EVIOCSREP(r0, 0x40084503, &(0x7f0000000080)=[0x0, 0x3]) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) 03:36:50 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) set_mempolicy(0x0, 0x0, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$SIOCAX25GETINFO(r0, 0x89ed, &(0x7f0000000080)) prctl$PR_SET_THP_DISABLE(0x29, 0x4) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x1) mincore(&(0x7f0000ffe000/0x1000)=nil, 0x1000, &(0x7f0000000180)=""/229) syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') 03:36:50 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000340)={0x8f, 0x0, [0x2]}) ioctl$KVM_SET_CPUID2(r2, 0x4008ae90, &(0x7f0000000080)={0x1, 0x0, [{0x1}]}) 03:36:50 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003680), 0x0, 0x0, &(0x7f0000003800)) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f\x00', 0x2761, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340), 0xffffffffffffff2, 0x0, 0xffffffffffffffce}, 0xffffffffffffffff) ioctl$EVIOCSREP(r0, 0x40084503, &(0x7f0000000080)=[0x0, 0x3]) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) 03:36:50 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000340)={0x8f, 0x0, [0x2]}) ioctl$KVM_SET_CPUID2(r2, 0x4008ae90, &(0x7f0000000080)={0x1, 0x0, [{0x1}]}) 03:36:50 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) set_mempolicy(0x0, 0x0, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$SIOCAX25GETINFO(r0, 0x89ed, &(0x7f0000000080)) prctl$PR_SET_THP_DISABLE(0x29, 0x4) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x1) mincore(&(0x7f0000ffe000/0x1000)=nil, 0x1000, &(0x7f0000000180)=""/229) syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') 03:36:50 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003680), 0x0, 0x0, &(0x7f0000003800)) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f\x00', 0x2761, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340), 0xffffffffffffff2, 0x0, 0xffffffffffffffce}, 0xffffffffffffffff) ioctl$EVIOCSREP(r0, 0x40084503, &(0x7f0000000080)=[0x0, 0x3]) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) 03:36:50 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000700)="0adc1f123c123f3188b070") r1 = openat$userio(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/userio\x00', 0x0, 0x0) close(r1) [ 1238.235075] bridge0: port 2(bridge_slave_1) entered disabled state [ 1238.241599] bridge0: port 1(bridge_slave_0) entered disabled state [ 1238.248614] device bridge0 left promiscuous mode [ 1238.459422] bridge0: port 2(bridge_slave_1) entered blocking state [ 1238.465806] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1238.472463] bridge0: port 1(bridge_slave_0) entered blocking state [ 1238.478857] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1238.499191] device bridge0 entered promiscuous mode 03:36:51 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$radio(0x0, 0xffffffffffffffff, 0x2) syz_open_dev$admmidi(0x0, 0x0, 0x0) pipe2(&(0x7f0000000200), 0x80000) mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket(0xa, 0x3, 0x200000000008) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'bridge0\x00`\x00', 0xfffffffffffffffd}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") 03:36:51 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) set_mempolicy(0x0, 0x0, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$SIOCAX25GETINFO(r0, 0x89ed, &(0x7f0000000080)) prctl$PR_SET_THP_DISABLE(0x29, 0x4) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x1) mincore(&(0x7f0000ffe000/0x1000)=nil, 0x1000, &(0x7f0000000180)=""/229) syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') 03:36:51 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003680), 0x0, 0x0, &(0x7f0000003800)) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f\x00', 0x2761, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340), 0xffffffffffffff2, 0x0, 0xffffffffffffffce}, 0xffffffffffffffff) ioctl$EVIOCSREP(r0, 0x40084503, &(0x7f0000000080)=[0x0, 0x3]) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) 03:36:51 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) set_mempolicy(0x0, 0x0, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$SIOCAX25GETINFO(r0, 0x89ed, &(0x7f0000000080)) prctl$PR_SET_THP_DISABLE(0x29, 0x4) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x1) mincore(&(0x7f0000ffe000/0x1000)=nil, 0x1000, &(0x7f0000000180)=""/229) syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') 03:36:51 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000700)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00R+\xff!\xf8\xa7\xd6\fz\xa4\x03\xd8\xe3\x12\xbcI\xb0l\x8fs_\xa0\x8e\xcdO6\x11\x7f>s\x80\xc2\xf7\x12\xb9\x1c\xfd\xf7\xfc9g\x90\xdb{J\xec0\xa5\x8a\x03\x102\xad\xf0\xca\x19\a\x04\r\xa3\xccS/_K\xc3\xef2\x91-wmx\xfd\xfd)>\x89t\x18M\xfb\x05\xfbO\a\xee\bs\xbf\x1en\f*\xae\xd6]N\xef\xc5~\xdb\xb4\x00\xd9#9P\xb8\ai1\xad\x8d\xea\x84h\xca`\xd0\x12\xcf\xa5\xf7{\xad\xca\x18\xb2\xdf\x89\x90\xea\t\xce\xbc\x06s\xbaG\xb2~\xd9\xff\xd3\x04\xca\"$\xcc8\xe3\x16k\x8b\x9b\x14\x84\x99C\b\xce}5\xb1\x7f\xbc;yM.H\x91)ejX=\x11\n\xb6\xbf@\x8a\xe3\x93y\xab\x8e3\xaa\xfag\x0e\xa1`_F\xe5\x02\x16\xf5\'\xa0{\x97C\xd4\xd6^\xcc|+1\xd4\xf9\xeb\xbc12\xe9+!\x13\xf3\xda\xfb\xc20\x9a\x13\x11\xbc>\xc5\x88\a\xd3\xb2\xb2\"\xaa\xc4\xf3,k\xed\x01i\xa4Kn\xd0\xff\x10\x1b\x067Qo\xac\xc2\xa1\x00\x00\x00\x00\x00\x00\x00\x00=\'\xa2\x02\xe98\xa74x5[\x99\xbd\xa0.N\x98w\x93\xe2)\x95\xab\"\xcdC\xa1\x04\x9f\xaeZ\x00nj\x82\xae\xackK(\xe1\xdbj]E\x8d\xfe\"\x8c\x11[W\x83B`\xa3\xe1\xe6\xa7\xb7!\xbcIV\x83\x7f\xb9\x86\xbaZ\r\xedy\v\xf2+\xeb\x13\xa1\xb33\xad\x033\xa3WK\xec\xef\xf1\x1d\xee\x17\x12\xc4/\xef\xe1\xa3i\xed\xb0\x19I7\xee\x85(\x881Tl\xea\xf6\xaf\\\xba\xee\x12U\xb9\x01ZN8o{\xfbO\x95\xeb\xb60\xf8\x81\xae\x82Ih\xb6\xf5\xc6\xa6\x19\xef\x88\xc8\x80A\x8b\xba\xb9\xabM\x85\xf7\xde\xb4\b\v\x10\xa3\xdb\x94\xd4v\xb1vh\x87\xd7{\xeb\xc8\xb4\xa6]s\x1du\xb2\x81j\x8an\xa5J\xa1\xcc\xc9n\xf8\xdd%\x93\xf5\x17\b\xb1\xf4H\r\xe4g\xd8\x11I\x15\xdc1-W {\xea\xb5\x96U\xae\xe9?\xf8\xf5\xdbC\xdb\x8d\x8f\x1c]wh\x9e\x7f\xb8\x8c\x88\x91\xb5\xa5\vC\xe4N5\r6\xb3}>\xc8\xedf\x836\xa0\xbc;\xf7', 0x2761, 0x0) write$cgroup_int(r1, &(0x7f0000000080), 0x297ef) 03:36:51 executing program 4: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000040), 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x2a6000, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x297ef) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_ASSIGN_DEV_IRQ(0xffffffffffffffff, 0x4040ae70, 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, 0x0, &(0x7f0000000480)) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, 0x0, 0x0) 03:36:51 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000700)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00R+\xff!\xf8\xa7\xd6\fz\xa4\x03\xd8\xe3\x12\xbcI\xb0l\x8fs_\xa0\x8e\xcdO6\x11\x7f>s\x80\xc2\xf7\x12\xb9\x1c\xfd\xf7\xfc9g\x90\xdb{J\xec0\xa5\x8a\x03\x102\xad\xf0\xca\x19\a\x04\r\xa3\xccS/_K\xc3\xef2\x91-wmx\xfd\xfd)>\x89t\x18M\xfb\x05\xfbO\a\xee\bs\xbf\x1en\f*\xae\xd6]N\xef\xc5~\xdb\xb4\x00\xd9#9P\xb8\ai1\xad\x8d\xea\x84h\xca`\xd0\x12\xcf\xa5\xf7{\xad\xca\x18\xb2\xdf\x89\x90\xea\t\xce\xbc\x06s\xbaG\xb2~\xd9\xff\xd3\x04\xca\"$\xcc8\xe3\x16k\x8b\x9b\x14\x84\x99C\b\xce}5\xb1\x7f\xbc;yM.H\x91)ejX=\x11\n\xb6\xbf@\x8a\xe3\x93y\xab\x8e3\xaa\xfag\x0e\xa1`_F\xe5\x02\x16\xf5\'\xa0{\x97C\xd4\xd6^\xcc|+1\xd4\xf9\xeb\xbc12\xe9+!\x13\xf3\xda\xfb\xc20\x9a\x13\x11\xbc>\xc5\x88\a\xd3\xb2\xb2\"\xaa\xc4\xf3,k\xed\x01i\xa4Kn\xd0\xff\x10\x1b\x067Qo\xac\xc2\xa1\x00\x00\x00\x00\x00\x00\x00\x00=\'\xa2\x02\xe98\xa74x5[\x99\xbd\xa0.N\x98w\x93\xe2)\x95\xab\"\xcdC\xa1\x04\x9f\xaeZ\x00nj\x82\xae\xackK(\xe1\xdbj]E\x8d\xfe\"\x8c\x11[W\x83B`\xa3\xe1\xe6\xa7\xb7!\xbcIV\x83\x7f\xb9\x86\xbaZ\r\xedy\v\xf2+\xeb\x13\xa1\xb33\xad\x033\xa3WK\xec\xef\xf1\x1d\xee\x17\x12\xc4/\xef\xe1\xa3i\xed\xb0\x19I7\xee\x85(\x881Tl\xea\xf6\xaf\\\xba\xee\x12U\xb9\x01ZN8o{\xfbO\x95\xeb\xb60\xf8\x81\xae\x82Ih\xb6\xf5\xc6\xa6\x19\xef\x88\xc8\x80A\x8b\xba\xb9\xabM\x85\xf7\xde\xb4\b\v\x10\xa3\xdb\x94\xd4v\xb1vh\x87\xd7{\xeb\xc8\xb4\xa6]s\x1du\xb2\x81j\x8an\xa5J\xa1\xcc\xc9n\xf8\xdd%\x93\xf5\x17\b\xb1\xf4H\r\xe4g\xd8\x11I\x15\xdc1-W {\xea\xb5\x96U\xae\xe9?\xf8\xf5\xdbC\xdb\x8d\x8f\x1c]wh\x9e\x7f\xb8\x8c\x88\x91\xb5\xa5\vC\xe4N5\r6\xb3}>\xc8\xedf\x836\xa0\xbc;\xf7', 0x2761, 0x0) write$cgroup_int(r1, &(0x7f0000000080), 0x297ef) 03:36:51 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x1805000000000000}, 0xc, &(0x7f0000000100)={&(0x7f00000006c0)={0x14, 0x1d, 0x2000000000001, 0x0, 0x0, {0x7e}}, 0x14}}, 0x0) mount$bpf(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000480)='bpf\x00', 0x0, &(0x7f0000000340)) 03:36:51 executing program 4: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000040), 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x2a6000, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x297ef) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_ASSIGN_DEV_IRQ(0xffffffffffffffff, 0x4040ae70, 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, 0x0, &(0x7f0000000480)) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, 0x0, 0x0) 03:36:51 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto(r0, &(0x7f0000000040)='\x00', 0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYRES32], 0x2e0) shutdown(r0, 0x1) 03:36:51 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000700)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00R+\xff!\xf8\xa7\xd6\fz\xa4\x03\xd8\xe3\x12\xbcI\xb0l\x8fs_\xa0\x8e\xcdO6\x11\x7f>s\x80\xc2\xf7\x12\xb9\x1c\xfd\xf7\xfc9g\x90\xdb{J\xec0\xa5\x8a\x03\x102\xad\xf0\xca\x19\a\x04\r\xa3\xccS/_K\xc3\xef2\x91-wmx\xfd\xfd)>\x89t\x18M\xfb\x05\xfbO\a\xee\bs\xbf\x1en\f*\xae\xd6]N\xef\xc5~\xdb\xb4\x00\xd9#9P\xb8\ai1\xad\x8d\xea\x84h\xca`\xd0\x12\xcf\xa5\xf7{\xad\xca\x18\xb2\xdf\x89\x90\xea\t\xce\xbc\x06s\xbaG\xb2~\xd9\xff\xd3\x04\xca\"$\xcc8\xe3\x16k\x8b\x9b\x14\x84\x99C\b\xce}5\xb1\x7f\xbc;yM.H\x91)ejX=\x11\n\xb6\xbf@\x8a\xe3\x93y\xab\x8e3\xaa\xfag\x0e\xa1`_F\xe5\x02\x16\xf5\'\xa0{\x97C\xd4\xd6^\xcc|+1\xd4\xf9\xeb\xbc12\xe9+!\x13\xf3\xda\xfb\xc20\x9a\x13\x11\xbc>\xc5\x88\a\xd3\xb2\xb2\"\xaa\xc4\xf3,k\xed\x01i\xa4Kn\xd0\xff\x10\x1b\x067Qo\xac\xc2\xa1\x00\x00\x00\x00\x00\x00\x00\x00=\'\xa2\x02\xe98\xa74x5[\x99\xbd\xa0.N\x98w\x93\xe2)\x95\xab\"\xcdC\xa1\x04\x9f\xaeZ\x00nj\x82\xae\xackK(\xe1\xdbj]E\x8d\xfe\"\x8c\x11[W\x83B`\xa3\xe1\xe6\xa7\xb7!\xbcIV\x83\x7f\xb9\x86\xbaZ\r\xedy\v\xf2+\xeb\x13\xa1\xb33\xad\x033\xa3WK\xec\xef\xf1\x1d\xee\x17\x12\xc4/\xef\xe1\xa3i\xed\xb0\x19I7\xee\x85(\x881Tl\xea\xf6\xaf\\\xba\xee\x12U\xb9\x01ZN8o{\xfbO\x95\xeb\xb60\xf8\x81\xae\x82Ih\xb6\xf5\xc6\xa6\x19\xef\x88\xc8\x80A\x8b\xba\xb9\xabM\x85\xf7\xde\xb4\b\v\x10\xa3\xdb\x94\xd4v\xb1vh\x87\xd7{\xeb\xc8\xb4\xa6]s\x1du\xb2\x81j\x8an\xa5J\xa1\xcc\xc9n\xf8\xdd%\x93\xf5\x17\b\xb1\xf4H\r\xe4g\xd8\x11I\x15\xdc1-W {\xea\xb5\x96U\xae\xe9?\xf8\xf5\xdbC\xdb\x8d\x8f\x1c]wh\x9e\x7f\xb8\x8c\x88\x91\xb5\xa5\vC\xe4N5\r6\xb3}>\xc8\xedf\x836\xa0\xbc;\xf7', 0x2761, 0x0) write$cgroup_int(r1, &(0x7f0000000080), 0x297ef) 03:36:51 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) set_mempolicy(0x0, 0x0, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$SIOCAX25GETINFO(r0, 0x89ed, &(0x7f0000000080)) prctl$PR_SET_THP_DISABLE(0x29, 0x4) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x1) mincore(&(0x7f0000ffe000/0x1000)=nil, 0x1000, &(0x7f0000000180)=""/229) syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') [ 1239.122875] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1239.203933] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1242.300350] device hsr_slave_1 left promiscuous mode [ 1242.351955] device hsr_slave_0 left promiscuous mode [ 1242.403722] team0 (unregistering): Port device team_slave_1 removed [ 1242.415322] team0 (unregistering): Port device team_slave_0 removed [ 1242.426515] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1242.465483] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1242.532456] bond0 (unregistering): Released all slaves [ 1242.550645] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1242.559908] bridge0: port 2(bridge_slave_1) entered disabled state [ 1242.566308] bridge0: port 1(bridge_slave_0) entered disabled state [ 1242.573536] device bridge0 left promiscuous mode 03:36:55 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'!! ', './file0'}, 0xfdef) r1 = socket$packet(0x11, 0x2, 0x300) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x8000, 0x0) ioctl$PIO_UNIMAPCLR(r2, 0x4b68, &(0x7f0000000080)={0x6, 0x81, 0x4}) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x3}, 0x4) 03:36:55 executing program 4: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000040), 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x2a6000, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x297ef) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_ASSIGN_DEV_IRQ(0xffffffffffffffff, 0x4040ae70, 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, 0x0, &(0x7f0000000480)) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, 0x0, 0x0) 03:36:55 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000700)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00R+\xff!\xf8\xa7\xd6\fz\xa4\x03\xd8\xe3\x12\xbcI\xb0l\x8fs_\xa0\x8e\xcdO6\x11\x7f>s\x80\xc2\xf7\x12\xb9\x1c\xfd\xf7\xfc9g\x90\xdb{J\xec0\xa5\x8a\x03\x102\xad\xf0\xca\x19\a\x04\r\xa3\xccS/_K\xc3\xef2\x91-wmx\xfd\xfd)>\x89t\x18M\xfb\x05\xfbO\a\xee\bs\xbf\x1en\f*\xae\xd6]N\xef\xc5~\xdb\xb4\x00\xd9#9P\xb8\ai1\xad\x8d\xea\x84h\xca`\xd0\x12\xcf\xa5\xf7{\xad\xca\x18\xb2\xdf\x89\x90\xea\t\xce\xbc\x06s\xbaG\xb2~\xd9\xff\xd3\x04\xca\"$\xcc8\xe3\x16k\x8b\x9b\x14\x84\x99C\b\xce}5\xb1\x7f\xbc;yM.H\x91)ejX=\x11\n\xb6\xbf@\x8a\xe3\x93y\xab\x8e3\xaa\xfag\x0e\xa1`_F\xe5\x02\x16\xf5\'\xa0{\x97C\xd4\xd6^\xcc|+1\xd4\xf9\xeb\xbc12\xe9+!\x13\xf3\xda\xfb\xc20\x9a\x13\x11\xbc>\xc5\x88\a\xd3\xb2\xb2\"\xaa\xc4\xf3,k\xed\x01i\xa4Kn\xd0\xff\x10\x1b\x067Qo\xac\xc2\xa1\x00\x00\x00\x00\x00\x00\x00\x00=\'\xa2\x02\xe98\xa74x5[\x99\xbd\xa0.N\x98w\x93\xe2)\x95\xab\"\xcdC\xa1\x04\x9f\xaeZ\x00nj\x82\xae\xackK(\xe1\xdbj]E\x8d\xfe\"\x8c\x11[W\x83B`\xa3\xe1\xe6\xa7\xb7!\xbcIV\x83\x7f\xb9\x86\xbaZ\r\xedy\v\xf2+\xeb\x13\xa1\xb33\xad\x033\xa3WK\xec\xef\xf1\x1d\xee\x17\x12\xc4/\xef\xe1\xa3i\xed\xb0\x19I7\xee\x85(\x881Tl\xea\xf6\xaf\\\xba\xee\x12U\xb9\x01ZN8o{\xfbO\x95\xeb\xb60\xf8\x81\xae\x82Ih\xb6\xf5\xc6\xa6\x19\xef\x88\xc8\x80A\x8b\xba\xb9\xabM\x85\xf7\xde\xb4\b\v\x10\xa3\xdb\x94\xd4v\xb1vh\x87\xd7{\xeb\xc8\xb4\xa6]s\x1du\xb2\x81j\x8an\xa5J\xa1\xcc\xc9n\xf8\xdd%\x93\xf5\x17\b\xb1\xf4H\r\xe4g\xd8\x11I\x15\xdc1-W {\xea\xb5\x96U\xae\xe9?\xf8\xf5\xdbC\xdb\x8d\x8f\x1c]wh\x9e\x7f\xb8\x8c\x88\x91\xb5\xa5\vC\xe4N5\r6\xb3}>\xc8\xedf\x836\xa0\xbc;\xf7', 0x2761, 0x0) write$cgroup_int(r1, &(0x7f0000000080), 0x297ef) 03:36:55 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x1805000000000000}, 0xc, &(0x7f0000000100)={&(0x7f00000006c0)={0x14, 0x1d, 0x2000000000001, 0x0, 0x0, {0x7e}}, 0x14}}, 0x0) mount$bpf(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000480)='bpf\x00', 0x0, &(0x7f0000000340)) 03:36:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0af51f023c123f3188a070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000001380)=""/239, 0xef}], 0x4, 0x0) 03:36:55 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0x1, 0x2) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000080)={0xdd}, 0x208) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 'y\x14\bK\x16^\x9e\xc5/\x15\x95\xab)\xeb\xf0\x15\xf3{T\x1aWP\xac\xb2\xac\x95\xe9\xad9b\xaf5.S#\xb7y\x82\x1f\xa5^\xe1K\xf9'}) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1242.741546] bridge0: port 2(bridge_slave_1) entered blocking state [ 1242.747969] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1242.754548] bridge0: port 1(bridge_slave_0) entered blocking state [ 1242.760961] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1242.767830] device bridge0 entered promiscuous mode [ 1242.910931] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:36:55 executing program 5: mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$amidi(&(0x7f0000000280)='/dev/amidi#\x00', 0x8, 0x202002) connect$inet6(r0, &(0x7f0000000300)={0xa, 0x4e20, 0x1, @loopback, 0x5}, 0x1c) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f0000000700)) futimesat(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000380)='./file0\x00', 0x0) syz_mount_image$btrfs(&(0x7f0000000240)='btrfs\x00', &(0x7f00000002c0)='./file1/file0\x00', 0x4, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000b40)=ANY=[@ANYBLOB=',\x00']) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c653100d5d9097e116bcf3181884a7e723a37fe"]) r2 = creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) ioctl$SG_SET_FORCE_PACK_ID(0xffffffffffffffff, 0x227b, &(0x7f0000000780)) chdir(0x0) ioctl$SG_GET_PACK_ID(r2, 0x227c, &(0x7f0000000180)) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) r3 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r3) open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', 0x0, 0x3b, 0x0, 0x0, 0x0, 0x0) 03:36:55 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x1805000000000000}, 0xc, &(0x7f0000000100)={&(0x7f00000006c0)={0x14, 0x1d, 0x2000000000001, 0x0, 0x0, {0x7e}}, 0x14}}, 0x0) mount$bpf(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000480)='bpf\x00', 0x0, &(0x7f0000000340)) 03:36:55 executing program 4: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000040), 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x2a6000, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x297ef) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_ASSIGN_DEV_IRQ(0xffffffffffffffff, 0x4040ae70, 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, 0x0, &(0x7f0000000480)) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, 0x0, 0x0) 03:36:56 executing program 0: perf_event_open(&(0x7f0000000d40)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x2f, &(0x7f00000001c0)=""/156, &(0x7f0000000280)=0x9c) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000200), 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f00000000c0)) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)={0x2c}) ptrace(0x10, r2) ptrace$cont(0xffffffffffffffff, r2, 0x0, 0x0) wait4(r2, 0x0, 0x2000000a, &(0x7f0000000a40)) semget$private(0x0, 0x0, 0x0) semctl$GETPID(0x0, 0x2, 0xb, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000600), &(0x7f0000000640)=0x4) ioctl$UI_DEV_DESTROY(r1, 0x5502) ioctl$VIDIOC_OVERLAY(0xffffffffffffffff, 0x4004560e, &(0x7f0000000140)) getpeername$packet(0xffffffffffffffff, &(0x7f0000000380), &(0x7f00000003c0)=0x14) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000c40)=ANY=[@ANYBLOB], 0x0) accept$alg(r0, 0x0, 0x0) [ 1243.207397] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1243.332510] overlayfs: failed to resolve './file1': -2 03:36:56 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x1805000000000000}, 0xc, &(0x7f0000000100)={&(0x7f00000006c0)={0x14, 0x1d, 0x2000000000001, 0x0, 0x0, {0x7e}}, 0x14}}, 0x0) mount$bpf(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000480)='bpf\x00', 0x0, &(0x7f0000000340)) 03:36:56 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x0, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r0, 0xc02c564a, &(0x7f0000000100)={0x0, 0x100a, 0x0, @stepwise}) [ 1243.468275] protocol 88fb is buggy, dev hsr_slave_0 [ 1243.473736] protocol 88fb is buggy, dev hsr_slave_1 [ 1243.580671] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1243.590145] overlayfs: failed to resolve './file1': -2 03:36:56 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'!! ', './file0'}, 0xfdef) r1 = socket$packet(0x11, 0x2, 0x300) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x8000, 0x0) ioctl$PIO_UNIMAPCLR(r2, 0x4b68, &(0x7f0000000080)={0x6, 0x81, 0x4}) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x3}, 0x4) 03:36:56 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x0, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r0, 0xc02c564a, &(0x7f0000000100)={0x0, 0x100a, 0x0, @stepwise}) 03:36:56 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000780)="480000001400190020ffff7fffffff5602113bc50e1de0974881000000000004004a35a49135e57b7d27923beaa394f4ceea64643e89720000de213ee23ffb2a10040041feff5aff", 0x48}], 0x1) 03:36:56 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0x1, 0x2) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000080)={0xdd}, 0x208) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 'y\x14\bK\x16^\x9e\xc5/\x15\x95\xab)\xeb\xf0\x15\xf3{T\x1aWP\xac\xb2\xac\x95\xe9\xad9b\xaf5.S#\xb7y\x82\x1f\xa5^\xe1K\xf9'}) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:36:56 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x0, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r0, 0xc02c564a, &(0x7f0000000100)={0x0, 0x100a, 0x0, @stepwise}) 03:36:56 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0x1, 0x2) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000080)={0xdd}, 0x208) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 'y\x14\bK\x16^\x9e\xc5/\x15\x95\xab)\xeb\xf0\x15\xf3{T\x1aWP\xac\xb2\xac\x95\xe9\xad9b\xaf5.S#\xb7y\x82\x1f\xa5^\xe1K\xf9'}) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:36:57 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuset.memory_pressure\x00', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r1, 0x0, 0x4, &(0x7f0000000180), 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x800, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, "97570445e47bead949a19fa9bf928fab59a6fac3a06a6efa8ea2b5b3147a8aafd11c7c1cc6ca2cfe3b81eca46395d4672640efe2cc8a7f5939b5cfa32ff5cdc2", "ade1b3517b66e61059d1053654a5beb13253f0a653eb210ef878b72c20a3269a", [0xfffffffffffffeff, 0x7]}) sendto$inet(r1, &(0x7f0000000000), 0x0, 0x4008000, 0x0, 0x0) ioctl$EVIOCSREP(r2, 0x40084503, &(0x7f0000000300)=[0x3, 0xb]) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x1, 0x1, {0x26, 0x15, 0x11, 0xe, 0xa, 0x80000000, 0x6, 0xea}}) getsockopt$sock_buf(r0, 0x1, 0x40, &(0x7f00000002c0)=""/60, &(0x7f0000000180)=0x3c) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r3 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000, 0x0, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r4, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r2, &(0x7f00000000c0)="12a4aeab0000699a269d06ab4090541daddf4e846d6cd534827cc3683d3465e4dc", 0x21, 0x20000800, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f00000008c0)={0xfffffffffffffffd, {0x2, 0x4e1d}, {0x2, 0x4e23}, {0x2, 0x4e1d, @multicast1}, 0x1c, 0x5, 0x7fff, 0x9976, 0x6, &(0x7f0000000800)='bridge_slave_1\x00', 0x4, 0x7, 0x800}) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000100)={0x5084f74d, {0x2, 0x4e22}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x2}}, {0x2, 0x4e24, @broadcast}, 0xfd, 0x6, 0x20, 0x40, 0xfffffffd}) r6 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r6, 0x8912, &(0x7f0000000580)="0047f82f07d82c99240970") madvise(&(0x7f0000ff9000/0x2000)=nil, 0x2000, 0x1) bind$rds(r2, &(0x7f0000000540)={0x2, 0x4e24, @remote}, 0x8) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1d) getsockopt$IP_VS_SO_GET_SERVICES(r4, 0x0, 0x482, &(0x7f0000000600)=""/193, &(0x7f0000000440)=0x28e) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0x7fff, 0x3cb, 0x89d1, 0x7, 0x0, 0x0, 0x20140, 0x4, 0x2, 0x6, 0x1f, 0xfffffffffffffff8, 0x8, 0x2, 0x40, 0x8000, 0x7c4, 0x8, 0x81, 0x9, 0x9, 0x7, 0x7, 0x101, 0x7, 0x1, 0x6, 0x3, 0x9b8d, 0xfffffffffffffff7, 0x80, 0xffffffff, 0x3, 0x1000, 0x8, 0x8, 0x0, 0x8001, 0x1, @perf_bp={&(0x7f0000000380), 0x9}, 0x1000, 0x4, 0x200, 0x2, 0x7ff, 0x2, 0x1ff}, r7, 0xe, r3, 0x2) fcntl$dupfd(r5, 0x406, r4) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000000)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x10) r8 = socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r8, 0x29, 0x20, &(0x7f0000000080)={@dev={0xfe, 0x80, [], 0x1b}, 0x4, 0x4000000001, 0xff, 0x2, 0x0, 0xd84}, 0x20) 03:36:57 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0x1, 0x2) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000080)={0xdd}, 0x208) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 'y\x14\bK\x16^\x9e\xc5/\x15\x95\xab)\xeb\xf0\x15\xf3{T\x1aWP\xac\xb2\xac\x95\xe9\xad9b\xaf5.S#\xb7y\x82\x1f\xa5^\xe1K\xf9'}) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:36:57 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x0, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r0, 0xc02c564a, &(0x7f0000000100)={0x0, 0x100a, 0x0, @stepwise}) 03:36:57 executing program 0: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000006c0)={0x0, 0x0, 0x0}, &(0x7f0000000700)=0xc) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)={[{@gid={'gid', 0x3d, r1}}]}) 03:36:57 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0x1, 0x2) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000080)={0xdd}, 0x208) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 'y\x14\bK\x16^\x9e\xc5/\x15\x95\xab)\xeb\xf0\x15\xf3{T\x1aWP\xac\xb2\xac\x95\xe9\xad9b\xaf5.S#\xb7y\x82\x1f\xa5^\xe1K\xf9'}) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1244.364459] IPVS: length: 654 != 8 [ 1244.433957] IPVS: length: 654 != 8 [ 1244.507312] protocol 88fb is buggy, dev hsr_slave_0 [ 1244.512479] protocol 88fb is buggy, dev hsr_slave_1 [ 1244.523610] hfs: gid requires an argument [ 1244.582157] hfs: unable to parse mount options 03:36:57 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuset.memory_pressure\x00', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r1, 0x0, 0x4, &(0x7f0000000180), 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x800, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, "97570445e47bead949a19fa9bf928fab59a6fac3a06a6efa8ea2b5b3147a8aafd11c7c1cc6ca2cfe3b81eca46395d4672640efe2cc8a7f5939b5cfa32ff5cdc2", "ade1b3517b66e61059d1053654a5beb13253f0a653eb210ef878b72c20a3269a", [0xfffffffffffffeff, 0x7]}) sendto$inet(r1, &(0x7f0000000000), 0x0, 0x4008000, 0x0, 0x0) ioctl$EVIOCSREP(r2, 0x40084503, &(0x7f0000000300)=[0x3, 0xb]) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x1, 0x1, {0x26, 0x15, 0x11, 0xe, 0xa, 0x80000000, 0x6, 0xea}}) getsockopt$sock_buf(r0, 0x1, 0x40, &(0x7f00000002c0)=""/60, &(0x7f0000000180)=0x3c) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r3 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000, 0x0, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r4, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r2, &(0x7f00000000c0)="12a4aeab0000699a269d06ab4090541daddf4e846d6cd534827cc3683d3465e4dc", 0x21, 0x20000800, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f00000008c0)={0xfffffffffffffffd, {0x2, 0x4e1d}, {0x2, 0x4e23}, {0x2, 0x4e1d, @multicast1}, 0x1c, 0x5, 0x7fff, 0x9976, 0x6, &(0x7f0000000800)='bridge_slave_1\x00', 0x4, 0x7, 0x800}) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000100)={0x5084f74d, {0x2, 0x4e22}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x2}}, {0x2, 0x4e24, @broadcast}, 0xfd, 0x6, 0x20, 0x40, 0xfffffffd}) r6 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r6, 0x8912, &(0x7f0000000580)="0047f82f07d82c99240970") madvise(&(0x7f0000ff9000/0x2000)=nil, 0x2000, 0x1) bind$rds(r2, &(0x7f0000000540)={0x2, 0x4e24, @remote}, 0x8) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1d) getsockopt$IP_VS_SO_GET_SERVICES(r4, 0x0, 0x482, &(0x7f0000000600)=""/193, &(0x7f0000000440)=0x28e) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0x7fff, 0x3cb, 0x89d1, 0x7, 0x0, 0x0, 0x20140, 0x4, 0x2, 0x6, 0x1f, 0xfffffffffffffff8, 0x8, 0x2, 0x40, 0x8000, 0x7c4, 0x8, 0x81, 0x9, 0x9, 0x7, 0x7, 0x101, 0x7, 0x1, 0x6, 0x3, 0x9b8d, 0xfffffffffffffff7, 0x80, 0xffffffff, 0x3, 0x1000, 0x8, 0x8, 0x0, 0x8001, 0x1, @perf_bp={&(0x7f0000000380), 0x9}, 0x1000, 0x4, 0x200, 0x2, 0x7ff, 0x2, 0x1ff}, r7, 0xe, r3, 0x2) fcntl$dupfd(r5, 0x406, r4) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000000)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x10) r8 = socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r8, 0x29, 0x20, &(0x7f0000000080)={@dev={0xfe, 0x80, [], 0x1b}, 0x4, 0x4000000001, 0xff, 0x2, 0x0, 0xd84}, 0x20) 03:36:57 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'!! ', './file0'}, 0xfdef) r1 = socket$packet(0x11, 0x2, 0x300) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x8000, 0x0) ioctl$PIO_UNIMAPCLR(r2, 0x4b68, &(0x7f0000000080)={0x6, 0x81, 0x4}) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x3}, 0x4) [ 1244.678711] hfs: gid requires an argument [ 1244.683169] hfs: unable to parse mount options 03:36:57 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuset.memory_pressure\x00', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r1, 0x0, 0x4, &(0x7f0000000180), 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x800, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, "97570445e47bead949a19fa9bf928fab59a6fac3a06a6efa8ea2b5b3147a8aafd11c7c1cc6ca2cfe3b81eca46395d4672640efe2cc8a7f5939b5cfa32ff5cdc2", "ade1b3517b66e61059d1053654a5beb13253f0a653eb210ef878b72c20a3269a", [0xfffffffffffffeff, 0x7]}) sendto$inet(r1, &(0x7f0000000000), 0x0, 0x4008000, 0x0, 0x0) ioctl$EVIOCSREP(r2, 0x40084503, &(0x7f0000000300)=[0x3, 0xb]) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x1, 0x1, {0x26, 0x15, 0x11, 0xe, 0xa, 0x80000000, 0x6, 0xea}}) getsockopt$sock_buf(r0, 0x1, 0x40, &(0x7f00000002c0)=""/60, &(0x7f0000000180)=0x3c) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r3 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000, 0x0, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r4, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r2, &(0x7f00000000c0)="12a4aeab0000699a269d06ab4090541daddf4e846d6cd534827cc3683d3465e4dc", 0x21, 0x20000800, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f00000008c0)={0xfffffffffffffffd, {0x2, 0x4e1d}, {0x2, 0x4e23}, {0x2, 0x4e1d, @multicast1}, 0x1c, 0x5, 0x7fff, 0x9976, 0x6, &(0x7f0000000800)='bridge_slave_1\x00', 0x4, 0x7, 0x800}) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000100)={0x5084f74d, {0x2, 0x4e22}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x2}}, {0x2, 0x4e24, @broadcast}, 0xfd, 0x6, 0x20, 0x40, 0xfffffffd}) r6 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r6, 0x8912, &(0x7f0000000580)="0047f82f07d82c99240970") madvise(&(0x7f0000ff9000/0x2000)=nil, 0x2000, 0x1) bind$rds(r2, &(0x7f0000000540)={0x2, 0x4e24, @remote}, 0x8) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1d) getsockopt$IP_VS_SO_GET_SERVICES(r4, 0x0, 0x482, &(0x7f0000000600)=""/193, &(0x7f0000000440)=0x28e) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0x7fff, 0x3cb, 0x89d1, 0x7, 0x0, 0x0, 0x20140, 0x4, 0x2, 0x6, 0x1f, 0xfffffffffffffff8, 0x8, 0x2, 0x40, 0x8000, 0x7c4, 0x8, 0x81, 0x9, 0x9, 0x7, 0x7, 0x101, 0x7, 0x1, 0x6, 0x3, 0x9b8d, 0xfffffffffffffff7, 0x80, 0xffffffff, 0x3, 0x1000, 0x8, 0x8, 0x0, 0x8001, 0x1, @perf_bp={&(0x7f0000000380), 0x9}, 0x1000, 0x4, 0x200, 0x2, 0x7ff, 0x2, 0x1ff}, r7, 0xe, r3, 0x2) fcntl$dupfd(r5, 0x406, r4) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000000)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x10) r8 = socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r8, 0x29, 0x20, &(0x7f0000000080)={@dev={0xfe, 0x80, [], 0x1b}, 0x4, 0x4000000001, 0xff, 0x2, 0x0, 0xd84}, 0x20) [ 1244.778887] IPVS: length: 654 != 8 03:36:57 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuset.memory_pressure\x00', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r1, 0x0, 0x4, &(0x7f0000000180), 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x800, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, "97570445e47bead949a19fa9bf928fab59a6fac3a06a6efa8ea2b5b3147a8aafd11c7c1cc6ca2cfe3b81eca46395d4672640efe2cc8a7f5939b5cfa32ff5cdc2", "ade1b3517b66e61059d1053654a5beb13253f0a653eb210ef878b72c20a3269a", [0xfffffffffffffeff, 0x7]}) sendto$inet(r1, &(0x7f0000000000), 0x0, 0x4008000, 0x0, 0x0) ioctl$EVIOCSREP(r2, 0x40084503, &(0x7f0000000300)=[0x3, 0xb]) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x1, 0x1, {0x26, 0x15, 0x11, 0xe, 0xa, 0x80000000, 0x6, 0xea}}) getsockopt$sock_buf(r0, 0x1, 0x40, &(0x7f00000002c0)=""/60, &(0x7f0000000180)=0x3c) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r3 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000, 0x0, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r4, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r2, &(0x7f00000000c0)="12a4aeab0000699a269d06ab4090541daddf4e846d6cd534827cc3683d3465e4dc", 0x21, 0x20000800, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f00000008c0)={0xfffffffffffffffd, {0x2, 0x4e1d}, {0x2, 0x4e23}, {0x2, 0x4e1d, @multicast1}, 0x1c, 0x5, 0x7fff, 0x9976, 0x6, &(0x7f0000000800)='bridge_slave_1\x00', 0x4, 0x7, 0x800}) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000100)={0x5084f74d, {0x2, 0x4e22}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x2}}, {0x2, 0x4e24, @broadcast}, 0xfd, 0x6, 0x20, 0x40, 0xfffffffd}) r6 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r6, 0x8912, &(0x7f0000000580)="0047f82f07d82c99240970") madvise(&(0x7f0000ff9000/0x2000)=nil, 0x2000, 0x1) bind$rds(r2, &(0x7f0000000540)={0x2, 0x4e24, @remote}, 0x8) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1d) getsockopt$IP_VS_SO_GET_SERVICES(r4, 0x0, 0x482, &(0x7f0000000600)=""/193, &(0x7f0000000440)=0x28e) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0x7fff, 0x3cb, 0x89d1, 0x7, 0x0, 0x0, 0x20140, 0x4, 0x2, 0x6, 0x1f, 0xfffffffffffffff8, 0x8, 0x2, 0x40, 0x8000, 0x7c4, 0x8, 0x81, 0x9, 0x9, 0x7, 0x7, 0x101, 0x7, 0x1, 0x6, 0x3, 0x9b8d, 0xfffffffffffffff7, 0x80, 0xffffffff, 0x3, 0x1000, 0x8, 0x8, 0x0, 0x8001, 0x1, @perf_bp={&(0x7f0000000380), 0x9}, 0x1000, 0x4, 0x200, 0x2, 0x7ff, 0x2, 0x1ff}, r7, 0xe, r3, 0x2) fcntl$dupfd(r5, 0x406, r4) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000000)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x10) r8 = socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r8, 0x29, 0x20, &(0x7f0000000080)={@dev={0xfe, 0x80, [], 0x1b}, 0x4, 0x4000000001, 0xff, 0x2, 0x0, 0xd84}, 0x20) 03:36:57 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0x1, 0x2) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000080)={0xdd}, 0x208) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 'y\x14\bK\x16^\x9e\xc5/\x15\x95\xab)\xeb\xf0\x15\xf3{T\x1aWP\xac\xb2\xac\x95\xe9\xad9b\xaf5.S#\xb7y\x82\x1f\xa5^\xe1K\xf9'}) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1245.075311] IPVS: length: 654 != 8 [ 1245.242433] IPVS: length: 654 != 8 03:36:58 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0x1, 0x2) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000080)={0xdd}, 0x208) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 'y\x14\bK\x16^\x9e\xc5/\x15\x95\xab)\xeb\xf0\x15\xf3{T\x1aWP\xac\xb2\xac\x95\xe9\xad9b\xaf5.S#\xb7y\x82\x1f\xa5^\xe1K\xf9'}) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:36:58 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuset.memory_pressure\x00', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r1, 0x0, 0x4, &(0x7f0000000180), 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x800, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, "97570445e47bead949a19fa9bf928fab59a6fac3a06a6efa8ea2b5b3147a8aafd11c7c1cc6ca2cfe3b81eca46395d4672640efe2cc8a7f5939b5cfa32ff5cdc2", "ade1b3517b66e61059d1053654a5beb13253f0a653eb210ef878b72c20a3269a", [0xfffffffffffffeff, 0x7]}) sendto$inet(r1, &(0x7f0000000000), 0x0, 0x4008000, 0x0, 0x0) ioctl$EVIOCSREP(r2, 0x40084503, &(0x7f0000000300)=[0x3, 0xb]) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x1, 0x1, {0x26, 0x15, 0x11, 0xe, 0xa, 0x80000000, 0x6, 0xea}}) getsockopt$sock_buf(r0, 0x1, 0x40, &(0x7f00000002c0)=""/60, &(0x7f0000000180)=0x3c) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r3 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000, 0x0, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r4, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r2, &(0x7f00000000c0)="12a4aeab0000699a269d06ab4090541daddf4e846d6cd534827cc3683d3465e4dc", 0x21, 0x20000800, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f00000008c0)={0xfffffffffffffffd, {0x2, 0x4e1d}, {0x2, 0x4e23}, {0x2, 0x4e1d, @multicast1}, 0x1c, 0x5, 0x7fff, 0x9976, 0x6, &(0x7f0000000800)='bridge_slave_1\x00', 0x4, 0x7, 0x800}) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000100)={0x5084f74d, {0x2, 0x4e22}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x2}}, {0x2, 0x4e24, @broadcast}, 0xfd, 0x6, 0x20, 0x40, 0xfffffffd}) r6 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r6, 0x8912, &(0x7f0000000580)="0047f82f07d82c99240970") madvise(&(0x7f0000ff9000/0x2000)=nil, 0x2000, 0x1) bind$rds(r2, &(0x7f0000000540)={0x2, 0x4e24, @remote}, 0x8) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1d) getsockopt$IP_VS_SO_GET_SERVICES(r4, 0x0, 0x482, &(0x7f0000000600)=""/193, &(0x7f0000000440)=0x28e) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0x7fff, 0x3cb, 0x89d1, 0x7, 0x0, 0x0, 0x20140, 0x4, 0x2, 0x6, 0x1f, 0xfffffffffffffff8, 0x8, 0x2, 0x40, 0x8000, 0x7c4, 0x8, 0x81, 0x9, 0x9, 0x7, 0x7, 0x101, 0x7, 0x1, 0x6, 0x3, 0x9b8d, 0xfffffffffffffff7, 0x80, 0xffffffff, 0x3, 0x1000, 0x8, 0x8, 0x0, 0x8001, 0x1, @perf_bp={&(0x7f0000000380), 0x9}, 0x1000, 0x4, 0x200, 0x2, 0x7ff, 0x2, 0x1ff}, r7, 0xe, r3, 0x2) fcntl$dupfd(r5, 0x406, r4) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000000)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x10) r8 = socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r8, 0x29, 0x20, &(0x7f0000000080)={@dev={0xfe, 0x80, [], 0x1b}, 0x4, 0x4000000001, 0xff, 0x2, 0x0, 0xd84}, 0x20) 03:36:58 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuset.memory_pressure\x00', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r1, 0x0, 0x4, &(0x7f0000000180), 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x800, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, "97570445e47bead949a19fa9bf928fab59a6fac3a06a6efa8ea2b5b3147a8aafd11c7c1cc6ca2cfe3b81eca46395d4672640efe2cc8a7f5939b5cfa32ff5cdc2", "ade1b3517b66e61059d1053654a5beb13253f0a653eb210ef878b72c20a3269a", [0xfffffffffffffeff, 0x7]}) sendto$inet(r1, &(0x7f0000000000), 0x0, 0x4008000, 0x0, 0x0) ioctl$EVIOCSREP(r2, 0x40084503, &(0x7f0000000300)=[0x3, 0xb]) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x1, 0x1, {0x26, 0x15, 0x11, 0xe, 0xa, 0x80000000, 0x6, 0xea}}) getsockopt$sock_buf(r0, 0x1, 0x40, &(0x7f00000002c0)=""/60, &(0x7f0000000180)=0x3c) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r3 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000, 0x0, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r4, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r2, &(0x7f00000000c0)="12a4aeab0000699a269d06ab4090541daddf4e846d6cd534827cc3683d3465e4dc", 0x21, 0x20000800, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f00000008c0)={0xfffffffffffffffd, {0x2, 0x4e1d}, {0x2, 0x4e23}, {0x2, 0x4e1d, @multicast1}, 0x1c, 0x5, 0x7fff, 0x9976, 0x6, &(0x7f0000000800)='bridge_slave_1\x00', 0x4, 0x7, 0x800}) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000100)={0x5084f74d, {0x2, 0x4e22}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x2}}, {0x2, 0x4e24, @broadcast}, 0xfd, 0x6, 0x20, 0x40, 0xfffffffd}) r6 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r6, 0x8912, &(0x7f0000000580)="0047f82f07d82c99240970") madvise(&(0x7f0000ff9000/0x2000)=nil, 0x2000, 0x1) bind$rds(r2, &(0x7f0000000540)={0x2, 0x4e24, @remote}, 0x8) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1d) getsockopt$IP_VS_SO_GET_SERVICES(r4, 0x0, 0x482, &(0x7f0000000600)=""/193, &(0x7f0000000440)=0x28e) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0x7fff, 0x3cb, 0x89d1, 0x7, 0x0, 0x0, 0x20140, 0x4, 0x2, 0x6, 0x1f, 0xfffffffffffffff8, 0x8, 0x2, 0x40, 0x8000, 0x7c4, 0x8, 0x81, 0x9, 0x9, 0x7, 0x7, 0x101, 0x7, 0x1, 0x6, 0x3, 0x9b8d, 0xfffffffffffffff7, 0x80, 0xffffffff, 0x3, 0x1000, 0x8, 0x8, 0x0, 0x8001, 0x1, @perf_bp={&(0x7f0000000380), 0x9}, 0x1000, 0x4, 0x200, 0x2, 0x7ff, 0x2, 0x1ff}, r7, 0xe, r3, 0x2) fcntl$dupfd(r5, 0x406, r4) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000000)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x10) r8 = socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r8, 0x29, 0x20, &(0x7f0000000080)={@dev={0xfe, 0x80, [], 0x1b}, 0x4, 0x4000000001, 0xff, 0x2, 0x0, 0xd84}, 0x20) [ 1245.481186] IPVS: length: 654 != 8 03:36:58 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'!! ', './file0'}, 0xfdef) r1 = socket$packet(0x11, 0x2, 0x300) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x8000, 0x0) ioctl$PIO_UNIMAPCLR(r2, 0x4b68, &(0x7f0000000080)={0x6, 0x81, 0x4}) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x3}, 0x4) 03:36:58 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuset.memory_pressure\x00', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r1, 0x0, 0x4, &(0x7f0000000180), 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x800, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, "97570445e47bead949a19fa9bf928fab59a6fac3a06a6efa8ea2b5b3147a8aafd11c7c1cc6ca2cfe3b81eca46395d4672640efe2cc8a7f5939b5cfa32ff5cdc2", "ade1b3517b66e61059d1053654a5beb13253f0a653eb210ef878b72c20a3269a", [0xfffffffffffffeff, 0x7]}) sendto$inet(r1, &(0x7f0000000000), 0x0, 0x4008000, 0x0, 0x0) ioctl$EVIOCSREP(r2, 0x40084503, &(0x7f0000000300)=[0x3, 0xb]) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x1, 0x1, {0x26, 0x15, 0x11, 0xe, 0xa, 0x80000000, 0x6, 0xea}}) getsockopt$sock_buf(r0, 0x1, 0x40, &(0x7f00000002c0)=""/60, &(0x7f0000000180)=0x3c) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r3 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000, 0x0, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r4, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r2, &(0x7f00000000c0)="12a4aeab0000699a269d06ab4090541daddf4e846d6cd534827cc3683d3465e4dc", 0x21, 0x20000800, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f00000008c0)={0xfffffffffffffffd, {0x2, 0x4e1d}, {0x2, 0x4e23}, {0x2, 0x4e1d, @multicast1}, 0x1c, 0x5, 0x7fff, 0x9976, 0x6, &(0x7f0000000800)='bridge_slave_1\x00', 0x4, 0x7, 0x800}) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f0000000100)={0x5084f74d, {0x2, 0x4e22}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x2}}, {0x2, 0x4e24, @broadcast}, 0xfd, 0x6, 0x20, 0x40, 0xfffffffd}) r6 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r6, 0x8912, &(0x7f0000000580)="0047f82f07d82c99240970") madvise(&(0x7f0000ff9000/0x2000)=nil, 0x2000, 0x1) bind$rds(r2, &(0x7f0000000540)={0x2, 0x4e24, @remote}, 0x8) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x1d) getsockopt$IP_VS_SO_GET_SERVICES(r4, 0x0, 0x482, &(0x7f0000000600)=""/193, &(0x7f0000000440)=0x28e) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000700)=0x0) perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0x7fff, 0x3cb, 0x89d1, 0x7, 0x0, 0x0, 0x20140, 0x4, 0x2, 0x6, 0x1f, 0xfffffffffffffff8, 0x8, 0x2, 0x40, 0x8000, 0x7c4, 0x8, 0x81, 0x9, 0x9, 0x7, 0x7, 0x101, 0x7, 0x1, 0x6, 0x3, 0x9b8d, 0xfffffffffffffff7, 0x80, 0xffffffff, 0x3, 0x1000, 0x8, 0x8, 0x0, 0x8001, 0x1, @perf_bp={&(0x7f0000000380), 0x9}, 0x1000, 0x4, 0x200, 0x2, 0x7ff, 0x2, 0x1ff}, r7, 0xe, r3, 0x2) fcntl$dupfd(r5, 0x406, r4) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000000)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x10) r8 = socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r8, 0x29, 0x20, &(0x7f0000000080)={@dev={0xfe, 0x80, [], 0x1b}, 0x4, 0x4000000001, 0xff, 0x2, 0x0, 0xd84}, 0x20) [ 1245.633265] IPVS: length: 654 != 8 03:36:58 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0x1, 0x2) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000080)={0xdd}, 0x208) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 'y\x14\bK\x16^\x9e\xc5/\x15\x95\xab)\xeb\xf0\x15\xf3{T\x1aWP\xac\xb2\xac\x95\xe9\xad9b\xaf5.S#\xb7y\x82\x1f\xa5^\xe1K\xf9'}) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1245.797980] IPVS: length: 654 != 8 03:36:58 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000000180)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) dup(r0) syz_genetlink_get_family_id$net_dm(0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x23, 0x0) [ 1245.868118] protocol 88fb is buggy, dev hsr_slave_0 [ 1245.873251] protocol 88fb is buggy, dev hsr_slave_1 [ 1245.948376] protocol 88fb is buggy, dev hsr_slave_0 [ 1245.953507] protocol 88fb is buggy, dev hsr_slave_1 [ 1245.958649] protocol 88fb is buggy, dev hsr_slave_0 [ 1245.963699] protocol 88fb is buggy, dev hsr_slave_1 03:36:58 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x3, &(0x7f0000000280)={r0, 0x0, 0x0}, 0x18) 03:36:59 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0x1, 0x2) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000080)={0xdd}, 0x208) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 'y\x14\bK\x16^\x9e\xc5/\x15\x95\xab)\xeb\xf0\x15\xf3{T\x1aWP\xac\xb2\xac\x95\xe9\xad9b\xaf5.S#\xb7y\x82\x1f\xa5^\xe1K\xf9'}) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:36:59 executing program 5: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000000200)={0x28, 0x0, 0x0, @hyper}, 0x10) listen(r0, 0x0) accept(r0, 0x0, 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{}, {0x0, 0x1c9c380}}, 0x0) tkill(r1, 0x1000000000013) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 03:36:59 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x7, 0x4, 0x8, 0x100}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000240)={r0, &(0x7f0000000740), &(0x7f0000000140)=""/26}, 0x18) 03:36:59 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb)={'\x00?\x0f', 0xffffffffffffffff, 0x4c00000000006800}, &(0x7f0000001fee)='R\trist\xe3cpsgrVid:De', 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f000016b000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-twofish-3way\x00'}, 0x58) keyctl$session_to_parent(0x12) r1 = dup(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r2 = request_key(&(0x7f0000000140)='id_legacy\x00', &(0x7f0000000180)={'syz', 0x2}, 0xffffffffffffffff, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="29e5af4dd2c0134867cdc0c7a9bad57a1c625d83e6e1de2d779b2576d421a0fd3a4cb21ab62122b34c26167f5ae730114c14cf1691bc7e1e80a9c3ebafb78c73a16a5fae35ef20e434", 0x49}], 0x1, r2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendto$x25(r1, &(0x7f00000001c0)="62c6ed21e4014c88f4c00dd5be79c478270e5f72948ddc36a53a185f92419ed31e8bcdfb592a9c1f5449c2fc4e41a93e6ebcf448fe9e6d62a64d6637e7505b7414e43981ce42b49d4a2b8984ab53fb4bd1e76f4ffbe7a3df2be01986b5695e35051a786527624f67bcaa0e4dd5d8495769fe90d4cf7df157315d419243bb64840fd1f9247fa9b4281b82a21c7af3130dae70e55c6b8fde02", 0x98, 0x24000051, 0x0, 0x0) 03:36:59 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_TUNER(0xffffffffffffffff, 0x4054561e, &(0x7f0000000300)={0x0, "89c4003a7df068a823bdba716d38ffc82be91787d095ec33432870cc35b5e65f"}) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast2, @in6=@mcast1}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0x1, 0x2) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000080)={0xdd}, 0x208) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 'y\x14\bK\x16^\x9e\xc5/\x15\x95\xab)\xeb\xf0\x15\xf3{T\x1aWP\xac\xb2\xac\x95\xe9\xad9b\xaf5.S#\xb7y\x82\x1f\xa5^\xe1K\xf9'}) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:36:59 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb)={'\x00?\x0f', 0xffffffffffffffff, 0x4c00000000006800}, &(0x7f0000001fee)='R\trist\xe3cpsgrVid:De', 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f000016b000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-twofish-3way\x00'}, 0x58) keyctl$session_to_parent(0x12) r1 = dup(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r2 = request_key(&(0x7f0000000140)='id_legacy\x00', &(0x7f0000000180)={'syz', 0x2}, 0xffffffffffffffff, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="29e5af4dd2c0134867cdc0c7a9bad57a1c625d83e6e1de2d779b2576d421a0fd3a4cb21ab62122b34c26167f5ae730114c14cf1691bc7e1e80a9c3ebafb78c73a16a5fae35ef20e434", 0x49}], 0x1, r2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendto$x25(r1, &(0x7f00000001c0)="62c6ed21e4014c88f4c00dd5be79c478270e5f72948ddc36a53a185f92419ed31e8bcdfb592a9c1f5449c2fc4e41a93e6ebcf448fe9e6d62a64d6637e7505b7414e43981ce42b49d4a2b8984ab53fb4bd1e76f4ffbe7a3df2be01986b5695e35051a786527624f67bcaa0e4dd5d8495769fe90d4cf7df157315d419243bb64840fd1f9247fa9b4281b82a21c7af3130dae70e55c6b8fde02", 0x98, 0x24000051, 0x0, 0x0) 03:36:59 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(r1, &(0x7f00000007c0)={&(0x7f0000000180)=@in={0x2, 0x0, @loopback}, 0x10, &(0x7f0000000640), 0x76, &(0x7f0000000240)=[@prinfo={0x18, 0x84, 0x5, {0x10}}], 0x18}, 0x0) 03:36:59 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xffffffffffffffc1, 0x0, 0x0, 0x1201000000003618) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) 03:36:59 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb)={'\x00?\x0f', 0xffffffffffffffff, 0x4c00000000006800}, &(0x7f0000001fee)='R\trist\xe3cpsgrVid:De', 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f000016b000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-twofish-3way\x00'}, 0x58) keyctl$session_to_parent(0x12) r1 = dup(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r2 = request_key(&(0x7f0000000140)='id_legacy\x00', &(0x7f0000000180)={'syz', 0x2}, 0xffffffffffffffff, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="29e5af4dd2c0134867cdc0c7a9bad57a1c625d83e6e1de2d779b2576d421a0fd3a4cb21ab62122b34c26167f5ae730114c14cf1691bc7e1e80a9c3ebafb78c73a16a5fae35ef20e434", 0x49}], 0x1, r2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendto$x25(r1, &(0x7f00000001c0)="62c6ed21e4014c88f4c00dd5be79c478270e5f72948ddc36a53a185f92419ed31e8bcdfb592a9c1f5449c2fc4e41a93e6ebcf448fe9e6d62a64d6637e7505b7414e43981ce42b49d4a2b8984ab53fb4bd1e76f4ffbe7a3df2be01986b5695e35051a786527624f67bcaa0e4dd5d8495769fe90d4cf7df157315d419243bb64840fd1f9247fa9b4281b82a21c7af3130dae70e55c6b8fde02", 0x98, 0x24000051, 0x0, 0x0) 03:36:59 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f000072eff0)=[{&(0x7f00000000c0)="480000001500257f09004b01fcfc8c860a881300f217e0060000e3303909b8f8896e33719fe3bb036e0bc90900000000000000000000ffff5bf10900001eed5e000000006203005b", 0x48}], 0x1) 03:36:59 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb)={'\x00?\x0f', 0xffffffffffffffff, 0x4c00000000006800}, &(0x7f0000001fee)='R\trist\xe3cpsgrVid:De', 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f000016b000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-twofish-3way\x00'}, 0x58) keyctl$session_to_parent(0x12) r1 = dup(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) r2 = request_key(&(0x7f0000000140)='id_legacy\x00', &(0x7f0000000180)={'syz', 0x2}, 0xffffffffffffffff, 0x0) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="29e5af4dd2c0134867cdc0c7a9bad57a1c625d83e6e1de2d779b2576d421a0fd3a4cb21ab62122b34c26167f5ae730114c14cf1691bc7e1e80a9c3ebafb78c73a16a5fae35ef20e434", 0x49}], 0x1, r2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendto$x25(r1, &(0x7f00000001c0)="62c6ed21e4014c88f4c00dd5be79c478270e5f72948ddc36a53a185f92419ed31e8bcdfb592a9c1f5449c2fc4e41a93e6ebcf448fe9e6d62a64d6637e7505b7414e43981ce42b49d4a2b8984ab53fb4bd1e76f4ffbe7a3df2be01986b5695e35051a786527624f67bcaa0e4dd5d8495769fe90d4cf7df157315d419243bb64840fd1f9247fa9b4281b82a21c7af3130dae70e55c6b8fde02", 0x98, 0x24000051, 0x0, 0x0) 03:36:59 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x6, 0x4, 0x200, 0x4, 0x0, 0x0}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r0, 0x0, &(0x7f0000000040)=""/28}, 0x18) 03:37:00 executing program 3: semget(0xffffffffffffffff, 0x0, 0x0) semctl$IPC_INFO(0x0, 0x3, 0x3, &(0x7f0000000080)=""/205) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600), 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000300)={0xa, 0x4000, 0x0, @mcast2, 0x2}, 0xfffffffffffffde5) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) open(&(0x7f0000000500)='./file0\x00', 0x410240, 0x166) r2 = perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000040)={0x6, @local, 0x0, 0x1000000, 'sh\x00', 0x20, 0xfffffffffffff0b5, 0x67}, 0x2c) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x11f7) r4 = syz_open_dev$vcsa(&(0x7f0000000340)='/dev/vcsa#\x00', 0xfffffffffffffffb, 0x2) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r4, 0x28, 0x2, &(0x7f0000000380)=0x10001, 0x8) r5 = fcntl$dupfd(r2, 0x406, r2) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'veth0_to_bridge\x00'}, 0x18) sendfile(r2, r2, &(0x7f00000000c0), 0x6) ioctl(r3, 0x800000000008982, &(0x7f0000000080)) signalfd4(r4, &(0x7f00000003c0)={0x4}, 0x8, 0x80800) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f0000000480)={0x5}, 0x1) openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x101800, 0x0) r7 = socket(0x0, 0x7, 0x0) ioctl(r7, 0x8912, &(0x7f0000000240)="c626262c8523bf012cf66f") openat$urandom(0xffffffffffffff9c, &(0x7f0000000440)='/dev/urandom\x00', 0x80000, 0x0) r8 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r8, 0xae41, 0x0) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu\x00\x87\xec\x80\xa4\xb5.\x17\'\x8c\x97\xcd]K\xd01@\xea\x82\xb4x\xe9\xceNC\xe4\xd6\xf1\x89\x8bIY\xbbE\xaf\xb9\x8a\x12e\x1c\xc7;\x00\xb2\xfc\xff\x03\xfb\x19\xb7\xf3\xf1\xf333\xed\x05#4\x98\xfc>_\x98\x7f\x86%\xf7\x8e\x8a\x13@\xd7\xd3#\x98\xec>\xae\x1e];\x10\xea\x93\xff\xb0\xfe\xd1\xcfU\xce\x17\xbb\xc7\x92h\x1cb\r}r\x03\f\xbe\x10Nzj\x15l\xe3\x17\xab\x8b\x8fnX\xb1DT\xa9\xf7\xfd\x17{R2P\xa55\x94R\x92;y\x8e\xe8', 0x200002, 0x0) fchdir(r9) mkdir(&(0x7f00000001c0)='./control\x00', 0x0) 03:37:00 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) close(r0) socket$pppoe(0x18, 0x1, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0xfffffffffffffe1a, 0x0, 0x0, 0x0) 03:37:00 executing program 2: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x0, 0x0, 0x0, 0x0, 0x0) 03:37:00 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x35c, 0x0, 0x196, 0x132}}, 0xffffffffffffffff, 0x35c, 0x91, 0x1}, 0x20) 03:37:00 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x11, 0x2, 0x300) r2 = socket$kcm(0x2, 0x5, 0x0) sendmsg$kcm(r2, &(0x7f0000000740)={&(0x7f0000000040)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000580)=[{&(0x7f0000000200)="ff", 0x1}], 0x1}, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) recvmsg(r1, &(0x7f000000c240)={&(0x7f000000b0c0)=@xdp={0x2c, 0x0, 0x0}, 0x196, 0x0}, 0x0) ioctl$TUNSETIFINDEX(r3, 0x400454da, &(0x7f00000003c0)=r4) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'irlan0\x00', 0x4001}) 03:37:00 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000280)='/dev/video#\x00', 0x9, 0x0) ioctl$VIDIOC_G_STD(r0, 0x80085617, &(0x7f0000000000)=0x0) ioctl$VIDIOC_S_STD(r0, 0x40085618, &(0x7f0000000080)=r1) 03:37:00 executing program 0: munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mremap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1000, 0x0, &(0x7f000053b000/0x1000)=nil) 03:37:00 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_MCE_KILL(0x2a, 0x0, 0x0) 03:37:00 executing program 5: perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f00000005c0)={'bond_slave_0\x00\x0e\x00', {0x2, 0x0, @loopback}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00\xfd\x00', {0x2, 0x0, @local}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) fcntl$getownex(r0, 0x10, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000002c0)) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) 03:37:00 executing program 0: syz_mount_image$vfat(0x0, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = fanotify_init(0x26, 0x0) fanotify_mark(r1, 0x11, 0x40000028, r0, 0x0) creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000080)=""/49, 0x101fa}], 0x1) 03:37:00 executing program 3: r0 = socket$inet6(0xa, 0x80002, 0x100000000000088) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23}, 0x1c) r1 = socket$inet6(0xa, 0x802, 0x88) setsockopt$inet6_udp_int(r1, 0x11, 0x100000000a, &(0x7f00000003c0)=0x800000001, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x8800, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @mcast2}, 0x1c) sendto$inet6(r1, &(0x7f00000000c0)="dd", 0x1, 0x0, 0x0, 0x0) poll(&(0x7f0000000400)=[{r0}], 0x1, 0x0) 03:37:00 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x5411, 0x20400200) 03:37:00 executing program 3: r0 = socket$inet6(0xa, 0x80002, 0x100000000000088) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23}, 0x1c) r1 = socket$inet6(0xa, 0x802, 0x88) setsockopt$inet6_udp_int(r1, 0x11, 0x100000000a, &(0x7f00000003c0)=0x800000001, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x8800, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @mcast2}, 0x1c) sendto$inet6(r1, &(0x7f00000000c0)="dd", 0x1, 0x0, 0x0, 0x0) poll(&(0x7f0000000400)=[{r0}], 0x1, 0x0) 03:37:01 executing program 3: r0 = socket$inet6(0xa, 0x80002, 0x100000000000088) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23}, 0x1c) r1 = socket$inet6(0xa, 0x802, 0x88) setsockopt$inet6_udp_int(r1, 0x11, 0x100000000a, &(0x7f00000003c0)=0x800000001, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x8800, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @mcast2}, 0x1c) sendto$inet6(r1, &(0x7f00000000c0)="dd", 0x1, 0x0, 0x0, 0x0) poll(&(0x7f0000000400)=[{r0}], 0x1, 0x0) [ 1248.667309] net_ratelimit: 17 callbacks suppressed [ 1248.667317] protocol 88fb is buggy, dev hsr_slave_0 [ 1248.677381] protocol 88fb is buggy, dev hsr_slave_1 03:37:01 executing program 2: capset(&(0x7f00001e8ff8)={0x19980330}, &(0x7f0000032fe8)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) 03:37:01 executing program 0: clone(0x4000003102041ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="0d2fc73ca93f3634a9cd2f990000000d0000432503b6b00040ef3d6ba7d455f9ff8e97b862c5458ee9cd4f56bed334d63fec8a385c63305fbf"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) ptrace$cont(0x7, r0, 0x0, 0x0) fsetxattr$security_smack_transmute(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 03:37:01 executing program 3: r0 = socket$inet6(0xa, 0x80002, 0x100000000000088) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e23}, 0x1c) r1 = socket$inet6(0xa, 0x802, 0x88) setsockopt$inet6_udp_int(r1, 0x11, 0x100000000a, &(0x7f00000003c0)=0x800000001, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x8800, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @mcast2}, 0x1c) sendto$inet6(r1, &(0x7f00000000c0)="dd", 0x1, 0x0, 0x0, 0x0) poll(&(0x7f0000000400)=[{r0}], 0x1, 0x0) 03:37:01 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x800) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 03:37:01 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(r0, 0x400000000000000, 0xffffffffffffffff) openat$fuse(0xffffffffffffff9c, &(0x7f0000000840)='/dev/fuse\x00', 0x2, 0x0) ioctl$UFFDIO_WAKE(r1, 0x8010aa02, &(0x7f0000000380)={&(0x7f0000be1000/0x2000)=nil, 0x2000}) shmget$private(0x0, 0x1000, 0x8, &(0x7f0000fff000/0x1000)=nil) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x5411, &(0x7f00000004c0)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000003c0)}}, 0x20) readv(0xffffffffffffffff, &(0x7f0000001900)=[{&(0x7f0000000680)=""/235, 0xeb}, {0x0}, {&(0x7f0000000500)=""/3, 0x3}, {&(0x7f0000000900)=""/4096, 0x1000}], 0x4) ioctl$UI_SET_FFBIT(r1, 0x4004556b, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x4}, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x40003) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000480)={0x0, 0x8000}, 0x0) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000600)={0x1f, 0x2f, &(0x7f0000000580)="3aa4b0e1b7bcbd4cdc7c2936523ca374d9e7a7f3d3db196a1202c53712c2a68b00c7066c6612b3cfc935696b9766d4"}) mmap$binder(&(0x7f00009ea000/0x2000)=nil, 0x2000, 0xfffffefffffffffd, 0x200000000000010, 0xffffffffffffffff, 0x0) r3 = gettid() ptrace$peek(0x3, r3, &(0x7f0000000080)) setsockopt$XDP_UMEM_FILL_RING(r2, 0x11b, 0x5, &(0x7f00000008c0)=0x4400, 0x4) fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB="6f7301002f0765762f69f0672564c70900000000466b3b662adba2193a9ba381820e182c34656c75a146f44ce64a5f869e599a0b19a9aafc472751e49f65ecb2e307a60500a353bd55a8e26c6635358b990000a574b5e672f307b148b5288030661d"]) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, &(0x7f0000001980)=r2) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0x16) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f00000000c0), &(0x7f0000000540)=0x8) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000100)={0x0, 0xffffffffffffffff}, &(0x7f0000000040)=0x8) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x1, 0x2000000000002) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x0, 0x7}}, 0x20) 03:37:01 executing program 0: clone(0x4000003102041ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="0d2fc73ca93f3634a9cd2f990000000d0000432503b6b00040ef3d6ba7d455f9ff8e97b862c5458ee9cd4f56bed334d63fec8a385c63305fbf"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) ptrace$cont(0x7, r0, 0x0, 0x0) fsetxattr$security_smack_transmute(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 03:37:01 executing program 5: perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f00000005c0)={'bond_slave_0\x00\x0e\x00', {0x2, 0x0, @loopback}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00\xfd\x00', {0x2, 0x0, @local}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) fcntl$getownex(r0, 0x10, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000002c0)) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) 03:37:01 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_XCRS(r3, 0xc080aebe, &(0x7f00000001c0)={0x0, 0xffff8000}) 03:37:01 executing program 4: ioctl$UI_SET_LEDBIT(0xffffffffffffffff, 0x40045569, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xffffffffffffffff}, 0x4) bind$inet(r2, &(0x7f00000002c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x2) 03:37:01 executing program 1: perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f00000005c0)={'bond_slave_0\x00\x0e\x00', {0x2, 0x0, @loopback}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00\xfd\x00', {0x2, 0x0, @local}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) fcntl$getownex(r0, 0x10, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000002c0)) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) [ 1249.707669] protocol 88fb is buggy, dev hsr_slave_0 [ 1249.713091] protocol 88fb is buggy, dev hsr_slave_1 [ 1250.027562] protocol 88fb is buggy, dev hsr_slave_0 [ 1250.033024] protocol 88fb is buggy, dev hsr_slave_1 03:37:02 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$adsp(&(0x7f0000000140)='/dev/adsp#\x00', 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000001540)={0x0, 0x0, 0x0}, &(0x7f0000001580)=0xc) setfsgid(r4) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000200)=0x400, 0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000e95fe0)={@remote}, 0x25c) r5 = syz_open_procfs(r3, &(0x7f00000003c0)='n\x00\x00\x00\x00\x00\x00\x00\x00\xe4\x9c2H\xe1\xda\x88TPJ\xcc\x9a\xed\x8eEw\xa0V\xc6\x1bQ\x14\x17\x18\xf2\b\xbc\xbeH\xcd\xd0\xed\"Z\x9b\xd1&I\xa2\xd0\xf5\x84UN\x97\x92J\xeb\xb7,N\xf1\x92B&Z1\x8bx\xa6+*\xb1L\xfcC\x93\x8ct\xe5+\x03\xe3\xb6\xc3\x9bY\x8d\x06\xc6N\xe7\xf0\xdd\xfa\x17\xdb\xbb\x02\nt\xc4\x12\xe7\x16\xad\x0fB.\x9c\x88O.!\xe2\xb7\x94\xad1|\xa4\x85\x89\xe4_\xa9\xfa\x12\xdd\xf1r\x9cm1\x89\")\xe3\xe6\x02\xd6\\\xfb\xe7h{2x\x84\x1a\x1e;Xbg\xc5,\xda\xbe\xdc`H\xe6\xa6P\x89K\xe9q\x19\x9d\x93\x8d\x81\x82;8\xee\x1d\x10e\x04cY\xff\xc7_\xd2m\xb0\xa3\x18C\xf2s\xfd\xfa\xaa1\xcf\x9b\x80\xfc%\n4m\xb8\xa0z>\x16\x8c\xbc\xc6}EF@\x98\xb4\xf5I\x02\x1c\xda.q8P\xe0\xc0\x15`SZJ\xe3W}\x16n\xdd+\xe4\xa3\v\x82s\xbcg') perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) symlink(&(0x7f0000001480)='./file0\x00', &(0x7f00000014c0)='./file0\x00') sendto$inet6(r5, &(0x7f0000000340)="312b2a3467b6466bf13efa14aae47d0d8567678be538f709d99b37fd35fa99e62010d4b7a8b4b354ae585a3445aa6760820c18bdc8ae1ec9926a2639aa2f4575d5400b65fb33708facb671567f98dc46e0e4d7a2f5699d1d9ea50779198ec2fad9ae3db7f111d41ea22d31d51bc31735987de34d986c03990a6a85", 0x7b, 0x4048044, 0x0, 0x0) getrandom(&(0x7f0000001240)=""/184, 0xfffffffffffffe1d, 0x2) r6 = openat$full(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/full\x00', 0x20000, 0x0) ioctl$sock_SIOCGSKNS(r6, 0x894c, &(0x7f0000000140)=0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_SIOCSIFBR(r7, 0x8941, &(0x7f0000000040)=@generic={0x3}) r8 = socket$inet(0x2, 0x2, 0x0) r9 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r9, 0x8912, &(0x7f0000000180)="025c3f0a00145f8f764070") ioctl$sock_inet_SIOCADDRT(r8, 0x890b, &(0x7f0000000080)={0x5, {0x2, 0x4e21, @local}, {0x2, 0x4e24, @local}, {0x2, 0x4e22, @remote}, 0x84, 0xdd53, 0x9, 0x8, 0x0, 0x0, 0x5, 0x1000000, 0x8}) ioctl$RTC_AIE_ON(r6, 0x7001) socket$vsock_stream(0x28, 0x1, 0x0) syz_emit_ethernet(0x423, &(0x7f0000000cc0)={@link_local, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x415, 0x0, 0x0, 0x0, 0x200000000000011, 0x0, @rand_addr, @multicast1}, @dccp={{0x0, 0x1, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d70502", 0x0, "f53475"}, "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"}}}}}, 0x0) r10 = openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x20000, 0x0) getpeername$packet(r0, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000880)=0x14) sendmsg$nl_route_sched(r10, &(0x7f0000000980)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000940)={&(0x7f0000000900)=ANY=[@ANYBLOB="e7ff11002000f3ffffffffff04000a00"], 0x1}, 0x1, 0x0, 0x0, 0x40080}, 0x4040000) syz_mount_image$hfs(&(0x7f0000000100)='hfs\x00', &(0x7f00000001c0)='./file0\x00', 0x8003, 0x1, &(0x7f0000000700)=[{&(0x7f0000000600)="29c2e9bde8bc67ab2db241366d9603590677b933dd6b12fc701ef419ec784f7cf5a5e5de0370d1cd86b11a8a73c6b088d0bd5407f5630697d3e1f342e5172e74463cae1960376fb63c44f18221f11d0b4ad8e9494dbfea1902cd047d629facbd93cd659a9d9952910cc94a", 0x6b, 0x298b51be}], 0x1, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r6, 0x0, 0x63, &(0x7f00000002c0)={'IDLETIMER\x00'}, &(0x7f0000000300)=0x1e) r11 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000240)='/dev/nullb0\x00', 0x101000, 0x0) ioctl$BLKREPORTZONE(r11, 0xc0101282, &(0x7f0000000140)={0x0, 0x1, 0x0, [{0x8001, 0x0, 0x0, 0xd0, 0x9, 0x5, 0xffff}]}) 03:37:03 executing program 4: ioctl$UI_SET_LEDBIT(0xffffffffffffffff, 0x40045569, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xffffffffffffffff}, 0x4) bind$inet(r2, &(0x7f00000002c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x2) [ 1250.107312] protocol 88fb is buggy, dev hsr_slave_0 [ 1250.112458] protocol 88fb is buggy, dev hsr_slave_1 [ 1250.117625] protocol 88fb is buggy, dev hsr_slave_0 [ 1250.122689] protocol 88fb is buggy, dev hsr_slave_1 03:37:03 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(r0, 0x400000000000000, 0xffffffffffffffff) openat$fuse(0xffffffffffffff9c, &(0x7f0000000840)='/dev/fuse\x00', 0x2, 0x0) ioctl$UFFDIO_WAKE(r1, 0x8010aa02, &(0x7f0000000380)={&(0x7f0000be1000/0x2000)=nil, 0x2000}) shmget$private(0x0, 0x1000, 0x8, &(0x7f0000fff000/0x1000)=nil) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x5411, &(0x7f00000004c0)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000003c0)}}, 0x20) readv(0xffffffffffffffff, &(0x7f0000001900)=[{&(0x7f0000000680)=""/235, 0xeb}, {0x0}, {&(0x7f0000000500)=""/3, 0x3}, {&(0x7f0000000900)=""/4096, 0x1000}], 0x4) ioctl$UI_SET_FFBIT(r1, 0x4004556b, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x4}, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x40003) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000480)={0x0, 0x8000}, 0x0) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000600)={0x1f, 0x2f, &(0x7f0000000580)="3aa4b0e1b7bcbd4cdc7c2936523ca374d9e7a7f3d3db196a1202c53712c2a68b00c7066c6612b3cfc935696b9766d4"}) mmap$binder(&(0x7f00009ea000/0x2000)=nil, 0x2000, 0xfffffefffffffffd, 0x200000000000010, 0xffffffffffffffff, 0x0) r3 = gettid() ptrace$peek(0x3, r3, &(0x7f0000000080)) setsockopt$XDP_UMEM_FILL_RING(r2, 0x11b, 0x5, &(0x7f00000008c0)=0x4400, 0x4) fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB="6f7301002f0765762f69f0672564c70900000000466b3b662adba2193a9ba381820e182c34656c75a146f44ce64a5f869e599a0b19a9aafc472751e49f65ecb2e307a60500a353bd55a8e26c6635358b990000a574b5e672f307b148b5288030661d"]) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, &(0x7f0000001980)=r2) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0x16) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f00000000c0), &(0x7f0000000540)=0x8) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000100)={0x0, 0xffffffffffffffff}, &(0x7f0000000040)=0x8) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x1, 0x2000000000002) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x0, 0x7}}, 0x20) 03:37:03 executing program 5: perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f00000005c0)={'bond_slave_0\x00\x0e\x00', {0x2, 0x0, @loopback}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00\xfd\x00', {0x2, 0x0, @local}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) fcntl$getownex(r0, 0x10, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000002c0)) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) 03:37:03 executing program 1: perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f00000005c0)={'bond_slave_0\x00\x0e\x00', {0x2, 0x0, @loopback}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00\xfd\x00', {0x2, 0x0, @local}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) fcntl$getownex(r0, 0x10, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000002c0)) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) 03:37:03 executing program 4: ioctl$UI_SET_LEDBIT(0xffffffffffffffff, 0x40045569, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xffffffffffffffff}, 0x4) bind$inet(r2, &(0x7f00000002c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x2) 03:37:04 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(r0, 0x400000000000000, 0xffffffffffffffff) openat$fuse(0xffffffffffffff9c, &(0x7f0000000840)='/dev/fuse\x00', 0x2, 0x0) ioctl$UFFDIO_WAKE(r1, 0x8010aa02, &(0x7f0000000380)={&(0x7f0000be1000/0x2000)=nil, 0x2000}) shmget$private(0x0, 0x1000, 0x8, &(0x7f0000fff000/0x1000)=nil) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x5411, &(0x7f00000004c0)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000003c0)}}, 0x20) readv(0xffffffffffffffff, &(0x7f0000001900)=[{&(0x7f0000000680)=""/235, 0xeb}, {0x0}, {&(0x7f0000000500)=""/3, 0x3}, {&(0x7f0000000900)=""/4096, 0x1000}], 0x4) ioctl$UI_SET_FFBIT(r1, 0x4004556b, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x4}, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x40003) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000480)={0x0, 0x8000}, 0x0) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000600)={0x1f, 0x2f, &(0x7f0000000580)="3aa4b0e1b7bcbd4cdc7c2936523ca374d9e7a7f3d3db196a1202c53712c2a68b00c7066c6612b3cfc935696b9766d4"}) mmap$binder(&(0x7f00009ea000/0x2000)=nil, 0x2000, 0xfffffefffffffffd, 0x200000000000010, 0xffffffffffffffff, 0x0) r3 = gettid() ptrace$peek(0x3, r3, &(0x7f0000000080)) setsockopt$XDP_UMEM_FILL_RING(r2, 0x11b, 0x5, &(0x7f00000008c0)=0x4400, 0x4) fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB="6f7301002f0765762f69f0672564c70900000000466b3b662adba2193a9ba381820e182c34656c75a146f44ce64a5f869e599a0b19a9aafc472751e49f65ecb2e307a60500a353bd55a8e26c6635358b990000a574b5e672f307b148b5288030661d"]) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, &(0x7f0000001980)=r2) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0x16) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f00000000c0), &(0x7f0000000540)=0x8) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000100)={0x0, 0xffffffffffffffff}, &(0x7f0000000040)=0x8) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x1, 0x2000000000002) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x0, 0x7}}, 0x20) 03:37:04 executing program 0: clone(0x4000003102041ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="0d2fc73ca93f3634a9cd2f990000000d0000432503b6b00040ef3d6ba7d455f9ff8e97b862c5458ee9cd4f56bed334d63fec8a385c63305fbf"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) ptrace$cont(0x7, r0, 0x0, 0x0) fsetxattr$security_smack_transmute(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 03:37:04 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$adsp(&(0x7f0000000140)='/dev/adsp#\x00', 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000001540)={0x0, 0x0, 0x0}, &(0x7f0000001580)=0xc) setfsgid(r4) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000200)=0x400, 0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000e95fe0)={@remote}, 0x25c) r5 = syz_open_procfs(r3, &(0x7f00000003c0)='n\x00\x00\x00\x00\x00\x00\x00\x00\xe4\x9c2H\xe1\xda\x88TPJ\xcc\x9a\xed\x8eEw\xa0V\xc6\x1bQ\x14\x17\x18\xf2\b\xbc\xbeH\xcd\xd0\xed\"Z\x9b\xd1&I\xa2\xd0\xf5\x84UN\x97\x92J\xeb\xb7,N\xf1\x92B&Z1\x8bx\xa6+*\xb1L\xfcC\x93\x8ct\xe5+\x03\xe3\xb6\xc3\x9bY\x8d\x06\xc6N\xe7\xf0\xdd\xfa\x17\xdb\xbb\x02\nt\xc4\x12\xe7\x16\xad\x0fB.\x9c\x88O.!\xe2\xb7\x94\xad1|\xa4\x85\x89\xe4_\xa9\xfa\x12\xdd\xf1r\x9cm1\x89\")\xe3\xe6\x02\xd6\\\xfb\xe7h{2x\x84\x1a\x1e;Xbg\xc5,\xda\xbe\xdc`H\xe6\xa6P\x89K\xe9q\x19\x9d\x93\x8d\x81\x82;8\xee\x1d\x10e\x04cY\xff\xc7_\xd2m\xb0\xa3\x18C\xf2s\xfd\xfa\xaa1\xcf\x9b\x80\xfc%\n4m\xb8\xa0z>\x16\x8c\xbc\xc6}EF@\x98\xb4\xf5I\x02\x1c\xda.q8P\xe0\xc0\x15`SZJ\xe3W}\x16n\xdd+\xe4\xa3\v\x82s\xbcg') perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) symlink(&(0x7f0000001480)='./file0\x00', &(0x7f00000014c0)='./file0\x00') sendto$inet6(r5, &(0x7f0000000340)="312b2a3467b6466bf13efa14aae47d0d8567678be538f709d99b37fd35fa99e62010d4b7a8b4b354ae585a3445aa6760820c18bdc8ae1ec9926a2639aa2f4575d5400b65fb33708facb671567f98dc46e0e4d7a2f5699d1d9ea50779198ec2fad9ae3db7f111d41ea22d31d51bc31735987de34d986c03990a6a85", 0x7b, 0x4048044, 0x0, 0x0) getrandom(&(0x7f0000001240)=""/184, 0xfffffffffffffe1d, 0x2) r6 = openat$full(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/full\x00', 0x20000, 0x0) ioctl$sock_SIOCGSKNS(r6, 0x894c, &(0x7f0000000140)=0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_SIOCSIFBR(r7, 0x8941, &(0x7f0000000040)=@generic={0x3}) r8 = socket$inet(0x2, 0x2, 0x0) r9 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r9, 0x8912, &(0x7f0000000180)="025c3f0a00145f8f764070") ioctl$sock_inet_SIOCADDRT(r8, 0x890b, &(0x7f0000000080)={0x5, {0x2, 0x4e21, @local}, {0x2, 0x4e24, @local}, {0x2, 0x4e22, @remote}, 0x84, 0xdd53, 0x9, 0x8, 0x0, 0x0, 0x5, 0x1000000, 0x8}) ioctl$RTC_AIE_ON(r6, 0x7001) socket$vsock_stream(0x28, 0x1, 0x0) syz_emit_ethernet(0x423, &(0x7f0000000cc0)={@link_local, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x415, 0x0, 0x0, 0x0, 0x200000000000011, 0x0, @rand_addr, @multicast1}, @dccp={{0x0, 0x1, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d70502", 0x0, "f53475"}, "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"}}}}}, 0x0) r10 = openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x20000, 0x0) getpeername$packet(r0, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000880)=0x14) sendmsg$nl_route_sched(r10, &(0x7f0000000980)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000940)={&(0x7f0000000900)=ANY=[@ANYBLOB="e7ff11002000f3ffffffffff04000a00"], 0x1}, 0x1, 0x0, 0x0, 0x40080}, 0x4040000) syz_mount_image$hfs(&(0x7f0000000100)='hfs\x00', &(0x7f00000001c0)='./file0\x00', 0x8003, 0x1, &(0x7f0000000700)=[{&(0x7f0000000600)="29c2e9bde8bc67ab2db241366d9603590677b933dd6b12fc701ef419ec784f7cf5a5e5de0370d1cd86b11a8a73c6b088d0bd5407f5630697d3e1f342e5172e74463cae1960376fb63c44f18221f11d0b4ad8e9494dbfea1902cd047d629facbd93cd659a9d9952910cc94a", 0x6b, 0x298b51be}], 0x1, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r6, 0x0, 0x63, &(0x7f00000002c0)={'IDLETIMER\x00'}, &(0x7f0000000300)=0x1e) r11 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000240)='/dev/nullb0\x00', 0x101000, 0x0) ioctl$BLKREPORTZONE(r11, 0xc0101282, &(0x7f0000000140)={0x0, 0x1, 0x0, [{0x8001, 0x0, 0x0, 0xd0, 0x9, 0x5, 0xffff}]}) 03:37:04 executing program 5: perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f00000005c0)={'bond_slave_0\x00\x0e\x00', {0x2, 0x0, @loopback}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00\xfd\x00', {0x2, 0x0, @local}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) fcntl$getownex(r0, 0x10, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000002c0)) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) 03:37:04 executing program 1: perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f00000005c0)={'bond_slave_0\x00\x0e\x00', {0x2, 0x0, @loopback}}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00\xfd\x00', {0x2, 0x0, @local}}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) fcntl$getownex(r0, 0x10, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000002c0)) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) 03:37:04 executing program 4: ioctl$UI_SET_LEDBIT(0xffffffffffffffff, 0x40045569, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xffffffffffffffff}, 0x4) bind$inet(r2, &(0x7f00000002c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x2) 03:37:05 executing program 0: clone(0x4000003102041ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="0d2fc73ca93f3634a9cd2f990000000d0000432503b6b00040ef3d6ba7d455f9ff8e97b862c5458ee9cd4f56bed334d63fec8a385c63305fbf"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) ptrace$cont(0x7, r0, 0x0, 0x0) fsetxattr$security_smack_transmute(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 03:37:05 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(r0, 0x400000000000000, 0xffffffffffffffff) openat$fuse(0xffffffffffffff9c, &(0x7f0000000840)='/dev/fuse\x00', 0x2, 0x0) ioctl$UFFDIO_WAKE(r1, 0x8010aa02, &(0x7f0000000380)={&(0x7f0000be1000/0x2000)=nil, 0x2000}) shmget$private(0x0, 0x1000, 0x8, &(0x7f0000fff000/0x1000)=nil) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x5411, &(0x7f00000004c0)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000003c0)}}, 0x20) readv(0xffffffffffffffff, &(0x7f0000001900)=[{&(0x7f0000000680)=""/235, 0xeb}, {0x0}, {&(0x7f0000000500)=""/3, 0x3}, {&(0x7f0000000900)=""/4096, 0x1000}], 0x4) ioctl$UI_SET_FFBIT(r1, 0x4004556b, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x4}, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x40003) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000480)={0x0, 0x8000}, 0x0) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000600)={0x1f, 0x2f, &(0x7f0000000580)="3aa4b0e1b7bcbd4cdc7c2936523ca374d9e7a7f3d3db196a1202c53712c2a68b00c7066c6612b3cfc935696b9766d4"}) mmap$binder(&(0x7f00009ea000/0x2000)=nil, 0x2000, 0xfffffefffffffffd, 0x200000000000010, 0xffffffffffffffff, 0x0) r3 = gettid() ptrace$peek(0x3, r3, &(0x7f0000000080)) setsockopt$XDP_UMEM_FILL_RING(r2, 0x11b, 0x5, &(0x7f00000008c0)=0x4400, 0x4) fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB="6f7301002f0765762f69f0672564c70900000000466b3b662adba2193a9ba381820e182c34656c75a146f44ce64a5f869e599a0b19a9aafc472751e49f65ecb2e307a60500a353bd55a8e26c6635358b990000a574b5e672f307b148b5288030661d"]) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, &(0x7f0000001980)=r2) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0x16) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f00000000c0), &(0x7f0000000540)=0x8) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000100)={0x0, 0xffffffffffffffff}, &(0x7f0000000040)=0x8) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x1, 0x2000000000002) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x0, 0x7}}, 0x20) 03:37:05 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(r0, 0x400000000000000, 0xffffffffffffffff) openat$fuse(0xffffffffffffff9c, &(0x7f0000000840)='/dev/fuse\x00', 0x2, 0x0) ioctl$UFFDIO_WAKE(r1, 0x8010aa02, &(0x7f0000000380)={&(0x7f0000be1000/0x2000)=nil, 0x2000}) shmget$private(0x0, 0x1000, 0x8, &(0x7f0000fff000/0x1000)=nil) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x5411, &(0x7f00000004c0)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000003c0)}}, 0x20) readv(0xffffffffffffffff, &(0x7f0000001900)=[{&(0x7f0000000680)=""/235, 0xeb}, {0x0}, {&(0x7f0000000500)=""/3, 0x3}, {&(0x7f0000000900)=""/4096, 0x1000}], 0x4) ioctl$UI_SET_FFBIT(r1, 0x4004556b, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x4}, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x40003) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000480)={0x0, 0x8000}, 0x0) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000600)={0x1f, 0x2f, &(0x7f0000000580)="3aa4b0e1b7bcbd4cdc7c2936523ca374d9e7a7f3d3db196a1202c53712c2a68b00c7066c6612b3cfc935696b9766d4"}) mmap$binder(&(0x7f00009ea000/0x2000)=nil, 0x2000, 0xfffffefffffffffd, 0x200000000000010, 0xffffffffffffffff, 0x0) r3 = gettid() ptrace$peek(0x3, r3, &(0x7f0000000080)) setsockopt$XDP_UMEM_FILL_RING(r2, 0x11b, 0x5, &(0x7f00000008c0)=0x4400, 0x4) fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB="6f7301002f0765762f69f0672564c70900000000466b3b662adba2193a9ba381820e182c34656c75a146f44ce64a5f869e599a0b19a9aafc472751e49f65ecb2e307a60500a353bd55a8e26c6635358b990000a574b5e672f307b148b5288030661d"]) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, &(0x7f0000001980)=r2) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0x16) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f00000000c0), &(0x7f0000000540)=0x8) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000100)={0x0, 0xffffffffffffffff}, &(0x7f0000000040)=0x8) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x1, 0x2000000000002) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x0, 0x7}}, 0x20) 03:37:05 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(r0, 0x400000000000000, 0xffffffffffffffff) openat$fuse(0xffffffffffffff9c, &(0x7f0000000840)='/dev/fuse\x00', 0x2, 0x0) ioctl$UFFDIO_WAKE(r1, 0x8010aa02, &(0x7f0000000380)={&(0x7f0000be1000/0x2000)=nil, 0x2000}) shmget$private(0x0, 0x1000, 0x8, &(0x7f0000fff000/0x1000)=nil) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x5411, &(0x7f00000004c0)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000003c0)}}, 0x20) readv(0xffffffffffffffff, &(0x7f0000001900)=[{&(0x7f0000000680)=""/235, 0xeb}, {0x0}, {&(0x7f0000000500)=""/3, 0x3}, {&(0x7f0000000900)=""/4096, 0x1000}], 0x4) ioctl$UI_SET_FFBIT(r1, 0x4004556b, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x4}, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x40003) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000480)={0x0, 0x8000}, 0x0) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000600)={0x1f, 0x2f, &(0x7f0000000580)="3aa4b0e1b7bcbd4cdc7c2936523ca374d9e7a7f3d3db196a1202c53712c2a68b00c7066c6612b3cfc935696b9766d4"}) mmap$binder(&(0x7f00009ea000/0x2000)=nil, 0x2000, 0xfffffefffffffffd, 0x200000000000010, 0xffffffffffffffff, 0x0) r3 = gettid() ptrace$peek(0x3, r3, &(0x7f0000000080)) setsockopt$XDP_UMEM_FILL_RING(r2, 0x11b, 0x5, &(0x7f00000008c0)=0x4400, 0x4) fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB="6f7301002f0765762f69f0672564c70900000000466b3b662adba2193a9ba381820e182c34656c75a146f44ce64a5f869e599a0b19a9aafc472751e49f65ecb2e307a60500a353bd55a8e26c6635358b990000a574b5e672f307b148b5288030661d"]) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, &(0x7f0000001980)=r2) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0x16) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f00000000c0), &(0x7f0000000540)=0x8) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000100)={0x0, 0xffffffffffffffff}, &(0x7f0000000040)=0x8) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x1, 0x2000000000002) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x0, 0x7}}, 0x20) 03:37:06 executing program 5: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'ip6gretap0\x00', &(0x7f0000000000)=@ethtool_stats}) 03:37:06 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(r0, 0x400000000000000, 0xffffffffffffffff) openat$fuse(0xffffffffffffff9c, &(0x7f0000000840)='/dev/fuse\x00', 0x2, 0x0) ioctl$UFFDIO_WAKE(r1, 0x8010aa02, &(0x7f0000000380)={&(0x7f0000be1000/0x2000)=nil, 0x2000}) shmget$private(0x0, 0x1000, 0x8, &(0x7f0000fff000/0x1000)=nil) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x5411, &(0x7f00000004c0)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000003c0)}}, 0x20) readv(0xffffffffffffffff, &(0x7f0000001900)=[{&(0x7f0000000680)=""/235, 0xeb}, {0x0}, {&(0x7f0000000500)=""/3, 0x3}, {&(0x7f0000000900)=""/4096, 0x1000}], 0x4) ioctl$UI_SET_FFBIT(r1, 0x4004556b, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x4}, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x40003) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000480)={0x0, 0x8000}, 0x0) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000600)={0x1f, 0x2f, &(0x7f0000000580)="3aa4b0e1b7bcbd4cdc7c2936523ca374d9e7a7f3d3db196a1202c53712c2a68b00c7066c6612b3cfc935696b9766d4"}) mmap$binder(&(0x7f00009ea000/0x2000)=nil, 0x2000, 0xfffffefffffffffd, 0x200000000000010, 0xffffffffffffffff, 0x0) r3 = gettid() ptrace$peek(0x3, r3, &(0x7f0000000080)) setsockopt$XDP_UMEM_FILL_RING(r2, 0x11b, 0x5, &(0x7f00000008c0)=0x4400, 0x4) fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB="6f7301002f0765762f69f0672564c70900000000466b3b662adba2193a9ba381820e182c34656c75a146f44ce64a5f869e599a0b19a9aafc472751e49f65ecb2e307a60500a353bd55a8e26c6635358b990000a574b5e672f307b148b5288030661d"]) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, &(0x7f0000001980)=r2) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0x16) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f00000000c0), &(0x7f0000000540)=0x8) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000100)={0x0, 0xffffffffffffffff}, &(0x7f0000000040)=0x8) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x1, 0x2000000000002) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x0, 0x7}}, 0x20) 03:37:06 executing program 1: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000180)="0f00db670f01df66b8000000000f23d80f21f86635400000f00f23f80f09b800008ee00f009a00000f212b0f01c30f21b00f1af9", 0x34}], 0x1, 0x10, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfbffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000540)={0xd0003}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:37:06 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$adsp(&(0x7f0000000140)='/dev/adsp#\x00', 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000001540)={0x0, 0x0, 0x0}, &(0x7f0000001580)=0xc) setfsgid(r4) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000200)=0x400, 0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000e95fe0)={@remote}, 0x25c) r5 = syz_open_procfs(r3, &(0x7f00000003c0)='n\x00\x00\x00\x00\x00\x00\x00\x00\xe4\x9c2H\xe1\xda\x88TPJ\xcc\x9a\xed\x8eEw\xa0V\xc6\x1bQ\x14\x17\x18\xf2\b\xbc\xbeH\xcd\xd0\xed\"Z\x9b\xd1&I\xa2\xd0\xf5\x84UN\x97\x92J\xeb\xb7,N\xf1\x92B&Z1\x8bx\xa6+*\xb1L\xfcC\x93\x8ct\xe5+\x03\xe3\xb6\xc3\x9bY\x8d\x06\xc6N\xe7\xf0\xdd\xfa\x17\xdb\xbb\x02\nt\xc4\x12\xe7\x16\xad\x0fB.\x9c\x88O.!\xe2\xb7\x94\xad1|\xa4\x85\x89\xe4_\xa9\xfa\x12\xdd\xf1r\x9cm1\x89\")\xe3\xe6\x02\xd6\\\xfb\xe7h{2x\x84\x1a\x1e;Xbg\xc5,\xda\xbe\xdc`H\xe6\xa6P\x89K\xe9q\x19\x9d\x93\x8d\x81\x82;8\xee\x1d\x10e\x04cY\xff\xc7_\xd2m\xb0\xa3\x18C\xf2s\xfd\xfa\xaa1\xcf\x9b\x80\xfc%\n4m\xb8\xa0z>\x16\x8c\xbc\xc6}EF@\x98\xb4\xf5I\x02\x1c\xda.q8P\xe0\xc0\x15`SZJ\xe3W}\x16n\xdd+\xe4\xa3\v\x82s\xbcg') perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) symlink(&(0x7f0000001480)='./file0\x00', &(0x7f00000014c0)='./file0\x00') sendto$inet6(r5, &(0x7f0000000340)="312b2a3467b6466bf13efa14aae47d0d8567678be538f709d99b37fd35fa99e62010d4b7a8b4b354ae585a3445aa6760820c18bdc8ae1ec9926a2639aa2f4575d5400b65fb33708facb671567f98dc46e0e4d7a2f5699d1d9ea50779198ec2fad9ae3db7f111d41ea22d31d51bc31735987de34d986c03990a6a85", 0x7b, 0x4048044, 0x0, 0x0) getrandom(&(0x7f0000001240)=""/184, 0xfffffffffffffe1d, 0x2) r6 = openat$full(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/full\x00', 0x20000, 0x0) ioctl$sock_SIOCGSKNS(r6, 0x894c, &(0x7f0000000140)=0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_SIOCSIFBR(r7, 0x8941, &(0x7f0000000040)=@generic={0x3}) r8 = socket$inet(0x2, 0x2, 0x0) r9 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r9, 0x8912, &(0x7f0000000180)="025c3f0a00145f8f764070") ioctl$sock_inet_SIOCADDRT(r8, 0x890b, &(0x7f0000000080)={0x5, {0x2, 0x4e21, @local}, {0x2, 0x4e24, @local}, {0x2, 0x4e22, @remote}, 0x84, 0xdd53, 0x9, 0x8, 0x0, 0x0, 0x5, 0x1000000, 0x8}) ioctl$RTC_AIE_ON(r6, 0x7001) socket$vsock_stream(0x28, 0x1, 0x0) syz_emit_ethernet(0x423, &(0x7f0000000cc0)={@link_local, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x415, 0x0, 0x0, 0x0, 0x200000000000011, 0x0, @rand_addr, @multicast1}, @dccp={{0x0, 0x1, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d70502", 0x0, "f53475"}, "b441d632cdbbcb211363807aec73d3883762a61dc02d349bfa3ac974b987aa7fb97eb324d594fbbb77bab759418aa8d451d921e8f5d2cf2b08292111701192e97cac366dd3eb2e0fb039e58314ef4709c5f3556db6a1ab6b4fb2bdd83cdc26e8395ec4984ec3faf71a611d1569545d654cded93be827a85188b803c19c1b56aab522862a718b81e512b49690994d3425e33bd93f0e744c66a083c1f9f1bd7bb8f9e123c08f3f041ed3fdc058136cf0071a47cc0e38720a12e11e842a7b5b26dff07f578fdb9a7b14662a625c1ee76c41ccb2b1fc6376aa718e1067b9e4af511ef5b360dbfad326108bb033db193dab27974eb8c462739eaee51d87f31c516e7e391073770da3202e02c41a7277c847df24bd5b0a7ab6e252f3c8ebf00688cc55311d887e8bfd95a7f4c6a126af3fe26714ddb869c66d18f870631bbd497e8a06881b754ecdcdd0dcffc51cd52a6b560f8d64b63a1674745edc5f53b18a8ffcc5c2fbc4d2bbcc2faf3c189d9b36c0655d1394f5c127ec86b8a764a87b546c2b6ac37d0a8ec3edd7cda6f930570763dbdc0640d219749bd57c7c89eaadfdae41d654a46b17be069a32a7d94d29b612fbe61b8bd11a2d10ba5d4ac7014fc0465c3f144598bd1f913343e7293711040eee0ae8df1e49f04ed1037d4b742aed0e932116060aaf6b985238d2e10fb5b11d19d7801befed4833287d96a85a7cdd9e211a672760335655576fc0fa0336621c2b2b1018ef71bb5077c67ee5fa8d479d6776013363e98b1f1213712be7e47549b6035459008c509f0f983130a451531381ee3c1ab9e1cbb8e558b56ca1a70939389addc5f9632b37ff3f634abb504bb0be0a51649683f6e29588c15cda40255e173328681884ffef6729e9058c5623e1401fdcc7b8cb5623a8fd725fbeea05fc417c44e46500619218dff7c70aa068994c58883cada505a2aa85b6620dfe9c45b707c9aa1222b86972eae564b28a05ddfa3545df231fde2707d4bf67dc6ba41daba91dee8081e5c7e2bcfbebebd42d5ab8a32d6e098fd57233e3b813dc0d772134775def451823b7fef2bc93da01722cd613b9a3db7e2d4c51fb7b56006ee9cea53b62343599a56167388d45247f9289fb1cab67a7cb0c3665ddf1e1411875b4de3428b32fc6603691a023d8e4cb93c667acb7b535fb5f77af9a49640cbe8ffe3a193cf4df1b556a67cb753c60bdf978b871aa513c07074c6602037ebc32199290e3c7ac6f103ad9358951ad4de0c8f1b34951b0e6a48295975cf08b2c3c95064855fc95317e386f1c18608d1d08699003c998b93332cd316f17a5139d350cbfa9dabc3f77c4197a0186e50913978e980a7a028e7ccdeee718af028200e94a6b3a0ec93ba14b0c64dfaf3967e230d8cf876f26287d436ebc9588b52b43f2380836bfe3"}}}}}, 0x0) r10 = openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x20000, 0x0) getpeername$packet(r0, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000880)=0x14) sendmsg$nl_route_sched(r10, &(0x7f0000000980)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000940)={&(0x7f0000000900)=ANY=[@ANYBLOB="e7ff11002000f3ffffffffff04000a00"], 0x1}, 0x1, 0x0, 0x0, 0x40080}, 0x4040000) syz_mount_image$hfs(&(0x7f0000000100)='hfs\x00', &(0x7f00000001c0)='./file0\x00', 0x8003, 0x1, &(0x7f0000000700)=[{&(0x7f0000000600)="29c2e9bde8bc67ab2db241366d9603590677b933dd6b12fc701ef419ec784f7cf5a5e5de0370d1cd86b11a8a73c6b088d0bd5407f5630697d3e1f342e5172e74463cae1960376fb63c44f18221f11d0b4ad8e9494dbfea1902cd047d629facbd93cd659a9d9952910cc94a", 0x6b, 0x298b51be}], 0x1, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r6, 0x0, 0x63, &(0x7f00000002c0)={'IDLETIMER\x00'}, &(0x7f0000000300)=0x1e) r11 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000240)='/dev/nullb0\x00', 0x101000, 0x0) ioctl$BLKREPORTZONE(r11, 0xc0101282, &(0x7f0000000140)={0x0, 0x1, 0x0, [{0x8001, 0x0, 0x0, 0xd0, 0x9, 0x5, 0xffff}]}) 03:37:07 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000080)=0x200000000) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/audio\x00', 0x0, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(r1, 0x0, 0x0) preadv(r0, &(0x7f00000003c0)=[{&(0x7f00000006c0)=""/4096, 0x1000}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) close(r1) socket$packet(0x11, 0x3, 0x300) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000180)={0x0, r1}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f0000000040), 0x0}, 0x20) 03:37:07 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(r0, 0x400000000000000, 0xffffffffffffffff) openat$fuse(0xffffffffffffff9c, &(0x7f0000000840)='/dev/fuse\x00', 0x2, 0x0) ioctl$UFFDIO_WAKE(r1, 0x8010aa02, &(0x7f0000000380)={&(0x7f0000be1000/0x2000)=nil, 0x2000}) shmget$private(0x0, 0x1000, 0x8, &(0x7f0000fff000/0x1000)=nil) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x5411, &(0x7f00000004c0)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000003c0)}}, 0x20) readv(0xffffffffffffffff, &(0x7f0000001900)=[{&(0x7f0000000680)=""/235, 0xeb}, {0x0}, {&(0x7f0000000500)=""/3, 0x3}, {&(0x7f0000000900)=""/4096, 0x1000}], 0x4) ioctl$UI_SET_FFBIT(r1, 0x4004556b, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x4}, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x40003) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000480)={0x0, 0x8000}, 0x0) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000600)={0x1f, 0x2f, &(0x7f0000000580)="3aa4b0e1b7bcbd4cdc7c2936523ca374d9e7a7f3d3db196a1202c53712c2a68b00c7066c6612b3cfc935696b9766d4"}) mmap$binder(&(0x7f00009ea000/0x2000)=nil, 0x2000, 0xfffffefffffffffd, 0x200000000000010, 0xffffffffffffffff, 0x0) r3 = gettid() ptrace$peek(0x3, r3, &(0x7f0000000080)) setsockopt$XDP_UMEM_FILL_RING(r2, 0x11b, 0x5, &(0x7f00000008c0)=0x4400, 0x4) fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB="6f7301002f0765762f69f0672564c70900000000466b3b662adba2193a9ba381820e182c34656c75a146f44ce64a5f869e599a0b19a9aafc472751e49f65ecb2e307a60500a353bd55a8e26c6635358b990000a574b5e672f307b148b5288030661d"]) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, &(0x7f0000001980)=r2) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0x16) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f00000000c0), &(0x7f0000000540)=0x8) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000100)={0x0, 0xffffffffffffffff}, &(0x7f0000000040)=0x8) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x1, 0x2000000000002) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x0, 0x7}}, 0x20) 03:37:07 executing program 5: getsockname$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000009340)=[{{0xffffffffffffffff, 0x0, &(0x7f0000003280)=[{&(0x7f0000002180)=""/113, 0x71}, {&(0x7f0000002200)=""/66, 0x42}, {&(0x7f0000002280)=""/4096, 0x1000}], 0x3, &(0x7f00000032c0)=""/224, 0xe0, 0x9}, 0xfffffffffffffffe}, {{&(0x7f00000034c0)=@sco, 0x80, 0x0, 0x0, &(0x7f0000003740)=""/165, 0xa5, 0x10001}}, {{&(0x7f0000003980)=@ipx, 0x80, &(0x7f0000005bc0)=[{&(0x7f0000003a00)=""/181, 0xb5}, {&(0x7f0000003ac0)=""/4, 0x4}, {0x0}, {&(0x7f0000005b00)=""/119, 0x77}, {&(0x7f0000005b80)=""/23, 0x17}], 0x5, &(0x7f0000005c40)=""/4096, 0x1000}, 0x8}, {{&(0x7f0000006c40)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000006ec0)=[{&(0x7f0000006cc0)=""/230, 0xe6}], 0x1, &(0x7f0000006f00)=""/245, 0xf5, 0x1000}, 0x5}, {{0x0, 0x0, &(0x7f0000007000), 0x0, 0x0, 0x0, 0x800}, 0x7}], 0x5, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f00000001c0)) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r1) r3 = socket$alg(0x26, 0x5, 0x0) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, 0x0) r4 = syz_open_dev$admmidi(0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(r4, 0x54a1) bind$alg(r3, &(0x7f0000000100)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000ff8000), 0x0) r5 = accept$alg(r3, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x3) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_SIZE(r2, 0xc040564a, 0x0) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000500)=0x0) capset(&(0x7f00000002c0)={0x200f1526, r6}, 0x0) recvmmsg(r5, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) openat$snapshot(0xffffffffffffff9c, 0x0, 0x200, 0x0) r7 = getegid() setregid(0x0, r7) open(&(0x7f0000000400)='./file0\x00', 0x8000, 0x40) syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r2, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000480)=ANY=[@ANYBLOB="00072cbd7000fedbdf25110000dcec86f181caf5a9c604c1ff69d1d3004cd13ab11ed3e437a23cc92cda6257e1a958e0531d420109f6d7972ac298e52e28a7dc1d28f22f2d956c63d490bcc20952d2c75126f252242e0398eacd"], 0x1}, 0x1, 0x0, 0x0, 0x4000040}, 0x4048810) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) 03:37:07 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000080)=0x200000000) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/audio\x00', 0x0, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(r1, 0x0, 0x0) preadv(r0, &(0x7f00000003c0)=[{&(0x7f00000006c0)=""/4096, 0x1000}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) close(r1) socket$packet(0x11, 0x3, 0x300) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000180)={0x0, r1}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f0000000040), 0x0}, 0x20) [ 1254.188133] net_ratelimit: 10 callbacks suppressed [ 1254.188141] protocol 88fb is buggy, dev hsr_slave_0 [ 1254.198251] protocol 88fb is buggy, dev hsr_slave_1 [ 1254.268695] protocol 88fb is buggy, dev hsr_slave_0 [ 1254.274164] protocol 88fb is buggy, dev hsr_slave_1 [ 1254.279572] protocol 88fb is buggy, dev hsr_slave_0 [ 1254.284941] protocol 88fb is buggy, dev hsr_slave_1 [ 1254.290514] protocol 88fb is buggy, dev hsr_slave_0 [ 1254.296074] protocol 88fb is buggy, dev hsr_slave_1 [ 1254.301891] protocol 88fb is buggy, dev hsr_slave_0 [ 1254.307402] protocol 88fb is buggy, dev hsr_slave_1 03:37:07 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000080)=0x200000000) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/audio\x00', 0x0, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(r1, 0x0, 0x0) preadv(r0, &(0x7f00000003c0)=[{&(0x7f00000006c0)=""/4096, 0x1000}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) close(r1) socket$packet(0x11, 0x3, 0x300) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000180)={0x0, r1}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f0000000040), 0x0}, 0x20) 03:37:07 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$adsp(&(0x7f0000000140)='/dev/adsp#\x00', 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000001540)={0x0, 0x0, 0x0}, &(0x7f0000001580)=0xc) setfsgid(r4) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000200)=0x400, 0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000e95fe0)={@remote}, 0x25c) r5 = syz_open_procfs(r3, &(0x7f00000003c0)='n\x00\x00\x00\x00\x00\x00\x00\x00\xe4\x9c2H\xe1\xda\x88TPJ\xcc\x9a\xed\x8eEw\xa0V\xc6\x1bQ\x14\x17\x18\xf2\b\xbc\xbeH\xcd\xd0\xed\"Z\x9b\xd1&I\xa2\xd0\xf5\x84UN\x97\x92J\xeb\xb7,N\xf1\x92B&Z1\x8bx\xa6+*\xb1L\xfcC\x93\x8ct\xe5+\x03\xe3\xb6\xc3\x9bY\x8d\x06\xc6N\xe7\xf0\xdd\xfa\x17\xdb\xbb\x02\nt\xc4\x12\xe7\x16\xad\x0fB.\x9c\x88O.!\xe2\xb7\x94\xad1|\xa4\x85\x89\xe4_\xa9\xfa\x12\xdd\xf1r\x9cm1\x89\")\xe3\xe6\x02\xd6\\\xfb\xe7h{2x\x84\x1a\x1e;Xbg\xc5,\xda\xbe\xdc`H\xe6\xa6P\x89K\xe9q\x19\x9d\x93\x8d\x81\x82;8\xee\x1d\x10e\x04cY\xff\xc7_\xd2m\xb0\xa3\x18C\xf2s\xfd\xfa\xaa1\xcf\x9b\x80\xfc%\n4m\xb8\xa0z>\x16\x8c\xbc\xc6}EF@\x98\xb4\xf5I\x02\x1c\xda.q8P\xe0\xc0\x15`SZJ\xe3W}\x16n\xdd+\xe4\xa3\v\x82s\xbcg') perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) symlink(&(0x7f0000001480)='./file0\x00', &(0x7f00000014c0)='./file0\x00') sendto$inet6(r5, &(0x7f0000000340)="312b2a3467b6466bf13efa14aae47d0d8567678be538f709d99b37fd35fa99e62010d4b7a8b4b354ae585a3445aa6760820c18bdc8ae1ec9926a2639aa2f4575d5400b65fb33708facb671567f98dc46e0e4d7a2f5699d1d9ea50779198ec2fad9ae3db7f111d41ea22d31d51bc31735987de34d986c03990a6a85", 0x7b, 0x4048044, 0x0, 0x0) getrandom(&(0x7f0000001240)=""/184, 0xfffffffffffffe1d, 0x2) r6 = openat$full(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/full\x00', 0x20000, 0x0) ioctl$sock_SIOCGSKNS(r6, 0x894c, &(0x7f0000000140)=0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_SIOCSIFBR(r7, 0x8941, &(0x7f0000000040)=@generic={0x3}) r8 = socket$inet(0x2, 0x2, 0x0) r9 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r9, 0x8912, &(0x7f0000000180)="025c3f0a00145f8f764070") ioctl$sock_inet_SIOCADDRT(r8, 0x890b, &(0x7f0000000080)={0x5, {0x2, 0x4e21, @local}, {0x2, 0x4e24, @local}, {0x2, 0x4e22, @remote}, 0x84, 0xdd53, 0x9, 0x8, 0x0, 0x0, 0x5, 0x1000000, 0x8}) ioctl$RTC_AIE_ON(r6, 0x7001) socket$vsock_stream(0x28, 0x1, 0x0) syz_emit_ethernet(0x423, &(0x7f0000000cc0)={@link_local, @empty=[0x0, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x415, 0x0, 0x0, 0x0, 0x200000000000011, 0x0, @rand_addr, @multicast1}, @dccp={{0x0, 0x1, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d70502", 0x0, "f53475"}, "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"}}}}}, 0x0) r10 = openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x20000, 0x0) getpeername$packet(r0, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000880)=0x14) sendmsg$nl_route_sched(r10, &(0x7f0000000980)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000940)={&(0x7f0000000900)=ANY=[@ANYBLOB="e7ff11002000f3ffffffffff04000a00"], 0x1}, 0x1, 0x0, 0x0, 0x40080}, 0x4040000) syz_mount_image$hfs(&(0x7f0000000100)='hfs\x00', &(0x7f00000001c0)='./file0\x00', 0x8003, 0x1, &(0x7f0000000700)=[{&(0x7f0000000600)="29c2e9bde8bc67ab2db241366d9603590677b933dd6b12fc701ef419ec784f7cf5a5e5de0370d1cd86b11a8a73c6b088d0bd5407f5630697d3e1f342e5172e74463cae1960376fb63c44f18221f11d0b4ad8e9494dbfea1902cd047d629facbd93cd659a9d9952910cc94a", 0x6b, 0x298b51be}], 0x1, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r6, 0x0, 0x63, &(0x7f00000002c0)={'IDLETIMER\x00'}, &(0x7f0000000300)=0x1e) r11 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000240)='/dev/nullb0\x00', 0x101000, 0x0) ioctl$BLKREPORTZONE(r11, 0xc0101282, &(0x7f0000000140)={0x0, 0x1, 0x0, [{0x8001, 0x0, 0x0, 0xd0, 0x9, 0x5, 0xffff}]}) 03:37:07 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000080)=0x200000000) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/audio\x00', 0x0, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(r1, 0x0, 0x0) preadv(r0, &(0x7f00000003c0)=[{&(0x7f00000006c0)=""/4096, 0x1000}], 0x1, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) close(r1) socket$packet(0x11, 0x3, 0x300) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000180)={0x0, r1}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f0000000040), 0x0}, 0x20) 03:37:08 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) setsockopt$inet_msfilter(r1, 0x0, 0xa, &(0x7f0000001180)={@multicast2=0x5000000, @multicast2}, 0x3) 03:37:08 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(r0, 0x400000000000000, 0xffffffffffffffff) openat$fuse(0xffffffffffffff9c, &(0x7f0000000840)='/dev/fuse\x00', 0x2, 0x0) ioctl$UFFDIO_WAKE(r1, 0x8010aa02, &(0x7f0000000380)={&(0x7f0000be1000/0x2000)=nil, 0x2000}) shmget$private(0x0, 0x1000, 0x8, &(0x7f0000fff000/0x1000)=nil) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x5411, &(0x7f00000004c0)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000003c0)}}, 0x20) readv(0xffffffffffffffff, &(0x7f0000001900)=[{&(0x7f0000000680)=""/235, 0xeb}, {0x0}, {&(0x7f0000000500)=""/3, 0x3}, {&(0x7f0000000900)=""/4096, 0x1000}], 0x4) ioctl$UI_SET_FFBIT(r1, 0x4004556b, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x4}, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x40003) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000480)={0x0, 0x8000}, 0x0) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000600)={0x1f, 0x2f, &(0x7f0000000580)="3aa4b0e1b7bcbd4cdc7c2936523ca374d9e7a7f3d3db196a1202c53712c2a68b00c7066c6612b3cfc935696b9766d4"}) mmap$binder(&(0x7f00009ea000/0x2000)=nil, 0x2000, 0xfffffefffffffffd, 0x200000000000010, 0xffffffffffffffff, 0x0) r3 = gettid() ptrace$peek(0x3, r3, &(0x7f0000000080)) setsockopt$XDP_UMEM_FILL_RING(r2, 0x11b, 0x5, &(0x7f00000008c0)=0x4400, 0x4) fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB="6f7301002f0765762f69f0672564c70900000000466b3b662adba2193a9ba381820e182c34656c75a146f44ce64a5f869e599a0b19a9aafc472751e49f65ecb2e307a60500a353bd55a8e26c6635358b990000a574b5e672f307b148b5288030661d"]) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, &(0x7f0000001980)=r2) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0x16) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f00000000c0), &(0x7f0000000540)=0x8) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000100)={0x0, 0xffffffffffffffff}, &(0x7f0000000040)=0x8) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x1, 0x2000000000002) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x0, 0x7}}, 0x20) 03:37:08 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(r0, 0x400000000000000, 0xffffffffffffffff) openat$fuse(0xffffffffffffff9c, &(0x7f0000000840)='/dev/fuse\x00', 0x2, 0x0) ioctl$UFFDIO_WAKE(r1, 0x8010aa02, &(0x7f0000000380)={&(0x7f0000be1000/0x2000)=nil, 0x2000}) shmget$private(0x0, 0x1000, 0x8, &(0x7f0000fff000/0x1000)=nil) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x5411, &(0x7f00000004c0)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000003c0)}}, 0x20) readv(0xffffffffffffffff, &(0x7f0000001900)=[{&(0x7f0000000680)=""/235, 0xeb}, {0x0}, {&(0x7f0000000500)=""/3, 0x3}, {&(0x7f0000000900)=""/4096, 0x1000}], 0x4) ioctl$UI_SET_FFBIT(r1, 0x4004556b, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x4}, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x40003) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000480)={0x0, 0x8000}, 0x0) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000600)={0x1f, 0x2f, &(0x7f0000000580)="3aa4b0e1b7bcbd4cdc7c2936523ca374d9e7a7f3d3db196a1202c53712c2a68b00c7066c6612b3cfc935696b9766d4"}) mmap$binder(&(0x7f00009ea000/0x2000)=nil, 0x2000, 0xfffffefffffffffd, 0x200000000000010, 0xffffffffffffffff, 0x0) r3 = gettid() ptrace$peek(0x3, r3, &(0x7f0000000080)) setsockopt$XDP_UMEM_FILL_RING(r2, 0x11b, 0x5, &(0x7f00000008c0)=0x4400, 0x4) fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB="6f7301002f0765762f69f0672564c70900000000466b3b662adba2193a9ba381820e182c34656c75a146f44ce64a5f869e599a0b19a9aafc472751e49f65ecb2e307a60500a353bd55a8e26c6635358b990000a574b5e672f307b148b5288030661d"]) ioctl$VHOST_SET_LOG_FD(r2, 0x4004af07, &(0x7f0000001980)=r2) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0x16) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f00000000c0), &(0x7f0000000540)=0x8) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000100)={0x0, 0xffffffffffffffff}, &(0x7f0000000040)=0x8) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x1, 0x2000000000002) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x0, 0x7}}, 0x20) 03:37:08 executing program 3: io_setup(0x1, &(0x7f0000000080)=0x0) io_getevents(r0, 0x2, 0x800000000000013, &(0x7f0000d83f60)=[{}, {}], 0x0) r1 = memfd_create(&(0x7f0000000440)='securit\x00', 0x0) io_submit(r0, 0x1, &(0x7f0000000180)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) io_destroy(r0) 03:37:08 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='map_files\x00') getdents(r0, &(0x7f0000000380)=""/4096, 0x1000) getdents(r0, 0x0, 0x317) 03:37:08 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f0000000140)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r2, &(0x7f0000000240)='/', 0x1, 0x1) fcntl$setlease(r2, 0x400, 0x0) setsockopt$XDP_UMEM_FILL_RING(r2, 0x11b, 0x5, 0x0, 0x0) lseek(r2, 0x0, 0x2) fcntl$F_SET_FILE_RW_HINT(r1, 0x40e, &(0x7f0000000100)=0x7) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000480)='/dev/rtc0\x00', 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r3, 0x4, &(0x7f0000000500)=""/34) sendfile(r2, r2, &(0x7f00000000c0), 0x7f8) fsetxattr(r1, &(0x7f00000001c0)=@known='security.evm\x00', &(0x7f0000000280)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x76, 0x1) ioctl$sock_inet_SIOCDELRT(r2, 0x890c, &(0x7f0000000540)={0xffffffffffffff80, {0x2, 0x4e22, @rand_addr=0xe491}, {0x2, 0x4e20}, {0x2, 0x4e24, @broadcast}, 0x4, 0x100000001, 0x2, 0x2, 0x3, 0x0, 0x0, 0x5d07e887, 0x5}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x4000, 0x0) ioctl$RTC_WKALM_RD(r2, 0x80287010, &(0x7f0000000440)) syz_open_pts(r0, 0x2000) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x101200, 0x0) rename(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)='./file0\x00') lstat(0x0, &(0x7f0000000a80)) syz_mount_image$btrfs(&(0x7f00000005c0)='btrfs\x00', 0x0, 0x80, 0x0, 0x0, 0x800000, &(0x7f0000000b00)={[{@device={'device', 0x3d, './file0'}}, {@nodatasum='nodatasum'}, {@nospace_cache='nospace_cache'}, {@metadata_ratio={'metadata_ratio', 0x3d, 0x4706}}, {@thread_pool={'thread_pool'}}], [{@hash='hash'}, {@smackfsroot={'smackfsroot'}}]}) write(0xffffffffffffffff, &(0x7f0000000340), 0x10000014c) clock_gettime(0x0, &(0x7f0000000240)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), 0x0, &(0x7f0000000200), 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) 03:37:08 executing program 2: r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x9, 0x0, &(0x7f0000000080)=0x9700) 03:37:08 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) connect$inet6(r0, &(0x7f0000000080), 0x1c) getsockopt$inet6_int(r0, 0x29, 0x1, 0x0, &(0x7f00000001c0)) 03:37:08 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000039c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000200)={0x0, 0x5005000000000000, &(0x7f00000001c0)={&(0x7f0000000040)={0x60, r2, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x4c, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0x2, 0x0, 0x0, @mcast1}}, {0x14, 0x2, @in={0x3, 0x0, @multicast1}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}]}]}, 0x60}}, 0x0) 03:37:08 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000440)}, 0x0) r0 = socket$inet(0x10, 0x3, 0x0) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xd1, &(0x7f0000000000)={{0xa, 0x0, 0x0, @ipv4}, {0xa, 0x0, 0x1}}, 0x5c) ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags}) [ 1256.257522] Enabling of bearer rejected, failed to enable media 03:37:09 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000700)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000280)=[@text16={0x10, &(0x7f00000003c0)="0f20d86635080000000f22d866b80500000066b9060d20500f01c1ba6100b01aeed9a6390b0f0174170f009a0050670f01caba610066b80010000066ef260f22276766c74424004edeac976766c74424022c0000006766c744240600000000670f011424", 0x64}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000180)={0x5}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1256.331237] Enabling of bearer rejected, failed to enable media 03:37:09 executing program 3: r0 = memfd_create(&(0x7f0000000580)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\b\x00\x00\x00\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe9\xaa\x9b\xc3\x14\xd2\xd1y\x1f\x9e\x856\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce(\xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(\xb8\xd9\xa3\xc4p\xf4\\>A\x11U\x99\x8d\xa3\x86\xb7\x1d\x87z\xd3\xc4\xdf\x13/\x97Yy\x8b{\x1df\x8d/\x90\xd3<\xf8\x18\xa4\x88\xcf\x048\xb4\xbe\xfa\xa5\xb7\xd6\xa5&);\x1br\xd2a\xf2\x8b\xa7\x15\xbe\x95\xeb\x1bB\xacoyP\xbb\x1c\xb9S-\xe0oK\xac\x00;S\x8a\x01\xd2\xca<\x04\xaf\x04\x9a\x9d\x84\xa5\x94J>F\xc5V\xc6\xfa\x8e\v\xe1\x82\x03`\xf8\xca\xf4\x89\r^Z44\x91\xeb\xf4$\xf3\x1d\xd5\xbd\xb6ZZ\xd8\xfdS\r\x98\x06/\x9a%m\xcf\xab u\xa6Fw\xde\xb4?\r\xbdK\xfb\xf2\x13\xb3\xfa\x00\xaaP\xc9t\x7f\'\xba\x12', 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) lseek(r0, 0x0, 0x4) sendfile(r0, r0, &(0x7f0000000200), 0xffffffff) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff, 0x10001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000240)={0x2, 0x0, @local}, 0x10) setxattr$security_evm(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000180)='security.evm\x00', &(0x7f00000001c0)=@md5={0x1, "214776881fba4414912acc4ced10572e"}, 0x11, 0x3) connect$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e) ioctl(r1, 0x0, &(0x7f0000000080)="0a5cc80700315f85715070") symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000040)='./file0\x00') rename(&(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='./file0/file0\x00') 03:37:09 executing program 2: getsockopt$bt_rfcomm_RFCOMM_CONNINFO(0xffffffffffffffff, 0x12, 0x2, &(0x7f0000000540)=""/4096, &(0x7f00000002c0)=0x1000) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020401042b000270f7f8", 0x16}], 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000500)={0x0, r0}, 0x10) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x20) sendto$inet(r2, &(0x7f0000000340)="af776b48fd5acea4377d9bc134910eaba548aafd1417bf4112ac30259cf10e6446eef6189d5a1a0afef5f7f307bc39e7fee294f53d11a5ef1201fad81164f903ef1f7c3afc43060434b2c10cb34f77", 0x4f, 0xc044, 0x0, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) openat$udambuf(0xffffffffffffff9c, 0x0, 0x2) umount2(&(0x7f0000000280)='./file0\x00', 0x3f00000000000000) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1) syz_genetlink_get_family_id$ipvs(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000001600)='IPVS\x00') sendto$inet(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000200)) get_thread_area(0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f00000001c0)={0x0, 0x100000001, 0x4}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r2, 0x84, 0x17, &(0x7f0000001540)={r3, 0x0, 0x86, "2eb42ea964dae56a513675047e8d780ee653f19e2fa4280e641a569542064d503d68c86978670b150c699afbb309dc19dbb258b760907fb4ad6581c515e206892a3a46556d2d1dbf4ef7be58acd0ada091010f0df837e97e94b65d80bffacd094f77b202b51e786c9f04c2b7684c6b8823dba8b6b1e462cc1a45ea40b63397f02a96aa998eb7"}, 0x8e) 03:37:09 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_kvm_setup_cpu$x86(r3, r2, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 03:37:10 executing program 2: getsockopt$bt_rfcomm_RFCOMM_CONNINFO(0xffffffffffffffff, 0x12, 0x2, &(0x7f0000000540)=""/4096, &(0x7f00000002c0)=0x1000) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020401042b000270f7f8", 0x16}], 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000500)={0x0, r0}, 0x10) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x20) sendto$inet(r2, &(0x7f0000000340)="af776b48fd5acea4377d9bc134910eaba548aafd1417bf4112ac30259cf10e6446eef6189d5a1a0afef5f7f307bc39e7fee294f53d11a5ef1201fad81164f903ef1f7c3afc43060434b2c10cb34f77", 0x4f, 0xc044, 0x0, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) openat$udambuf(0xffffffffffffff9c, 0x0, 0x2) umount2(&(0x7f0000000280)='./file0\x00', 0x3f00000000000000) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1) syz_genetlink_get_family_id$ipvs(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000001600)='IPVS\x00') sendto$inet(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000200)) get_thread_area(0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f00000001c0)={0x0, 0x100000001, 0x4}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r2, 0x84, 0x17, &(0x7f0000001540)={r3, 0x0, 0x86, "2eb42ea964dae56a513675047e8d780ee653f19e2fa4280e641a569542064d503d68c86978670b150c699afbb309dc19dbb258b760907fb4ad6581c515e206892a3a46556d2d1dbf4ef7be58acd0ada091010f0df837e97e94b65d80bffacd094f77b202b51e786c9f04c2b7684c6b8823dba8b6b1e462cc1a45ea40b63397f02a96aa998eb7"}, 0x8e) 03:37:10 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') syz_open_dev$dmmidi(&(0x7f0000000600)='/dev/dmmidi#\x00', 0x2, 0x80) syz_open_dev$sndseq(0x0, 0x0, 0x7e) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x4000040402, 0x0) pipe(&(0x7f0000000880)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) timer_create(0x7, &(0x7f0000000500)={0x0, 0x3a}, &(0x7f0000000540)) clock_gettime(0x4, &(0x7f00000001c0)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) timer_gettime(0x0, &(0x7f0000000180)) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000240)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000400)={r4, 0x56, "625005d9b15f1c21d4b79c08b67447173ef6987aba851e2e4a5d2d7aa294c5afe90bc25746be7675846340f9baa5820c7383647811318e13ff200ee896dbded55efc4ab055893b76b4223d9cabe613f526e67294ce9a"}, 0x0) 03:37:10 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f0000000140)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r2, &(0x7f0000000240)='/', 0x1, 0x1) fcntl$setlease(r2, 0x400, 0x0) setsockopt$XDP_UMEM_FILL_RING(r2, 0x11b, 0x5, 0x0, 0x0) lseek(r2, 0x0, 0x2) fcntl$F_SET_FILE_RW_HINT(r1, 0x40e, &(0x7f0000000100)=0x7) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000480)='/dev/rtc0\x00', 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r3, 0x4, &(0x7f0000000500)=""/34) sendfile(r2, r2, &(0x7f00000000c0), 0x7f8) fsetxattr(r1, &(0x7f00000001c0)=@known='security.evm\x00', &(0x7f0000000280)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x76, 0x1) ioctl$sock_inet_SIOCDELRT(r2, 0x890c, &(0x7f0000000540)={0xffffffffffffff80, {0x2, 0x4e22, @rand_addr=0xe491}, {0x2, 0x4e20}, {0x2, 0x4e24, @broadcast}, 0x4, 0x100000001, 0x2, 0x2, 0x3, 0x0, 0x0, 0x5d07e887, 0x5}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x4000, 0x0) ioctl$RTC_WKALM_RD(r2, 0x80287010, &(0x7f0000000440)) syz_open_pts(r0, 0x2000) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x101200, 0x0) rename(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)='./file0\x00') lstat(0x0, &(0x7f0000000a80)) syz_mount_image$btrfs(&(0x7f00000005c0)='btrfs\x00', 0x0, 0x80, 0x0, 0x0, 0x800000, &(0x7f0000000b00)={[{@device={'device', 0x3d, './file0'}}, {@nodatasum='nodatasum'}, {@nospace_cache='nospace_cache'}, {@metadata_ratio={'metadata_ratio', 0x3d, 0x4706}}, {@thread_pool={'thread_pool'}}], [{@hash='hash'}, {@smackfsroot={'smackfsroot'}}]}) write(0xffffffffffffffff, &(0x7f0000000340), 0x10000014c) clock_gettime(0x0, &(0x7f0000000240)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), 0x0, &(0x7f0000000200), 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) 03:37:10 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f0000000140)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r2, &(0x7f0000000240)='/', 0x1, 0x1) fcntl$setlease(r2, 0x400, 0x0) setsockopt$XDP_UMEM_FILL_RING(r2, 0x11b, 0x5, 0x0, 0x0) lseek(r2, 0x0, 0x2) fcntl$F_SET_FILE_RW_HINT(r1, 0x40e, &(0x7f0000000100)=0x7) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000480)='/dev/rtc0\x00', 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r3, 0x4, &(0x7f0000000500)=""/34) sendfile(r2, r2, &(0x7f00000000c0), 0x7f8) fsetxattr(r1, &(0x7f00000001c0)=@known='security.evm\x00', &(0x7f0000000280)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x76, 0x1) ioctl$sock_inet_SIOCDELRT(r2, 0x890c, &(0x7f0000000540)={0xffffffffffffff80, {0x2, 0x4e22, @rand_addr=0xe491}, {0x2, 0x4e20}, {0x2, 0x4e24, @broadcast}, 0x4, 0x100000001, 0x2, 0x2, 0x3, 0x0, 0x0, 0x5d07e887, 0x5}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x4000, 0x0) ioctl$RTC_WKALM_RD(r2, 0x80287010, &(0x7f0000000440)) syz_open_pts(r0, 0x2000) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x101200, 0x0) rename(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)='./file0\x00') lstat(0x0, &(0x7f0000000a80)) syz_mount_image$btrfs(&(0x7f00000005c0)='btrfs\x00', 0x0, 0x80, 0x0, 0x0, 0x800000, &(0x7f0000000b00)={[{@device={'device', 0x3d, './file0'}}, {@nodatasum='nodatasum'}, {@nospace_cache='nospace_cache'}, {@metadata_ratio={'metadata_ratio', 0x3d, 0x4706}}, {@thread_pool={'thread_pool'}}], [{@hash='hash'}, {@smackfsroot={'smackfsroot'}}]}) write(0xffffffffffffffff, &(0x7f0000000340), 0x10000014c) clock_gettime(0x0, &(0x7f0000000240)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), 0x0, &(0x7f0000000200), 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) 03:37:10 executing program 0: getsockopt$bt_rfcomm_RFCOMM_CONNINFO(0xffffffffffffffff, 0x12, 0x2, &(0x7f0000000540)=""/4096, &(0x7f00000002c0)=0x1000) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020401042b000270f7f8", 0x16}], 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000500)={0x0, r0}, 0x10) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x20) sendto$inet(r2, &(0x7f0000000340)="af776b48fd5acea4377d9bc134910eaba548aafd1417bf4112ac30259cf10e6446eef6189d5a1a0afef5f7f307bc39e7fee294f53d11a5ef1201fad81164f903ef1f7c3afc43060434b2c10cb34f77", 0x4f, 0xc044, 0x0, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) openat$udambuf(0xffffffffffffff9c, 0x0, 0x2) umount2(&(0x7f0000000280)='./file0\x00', 0x3f00000000000000) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1) syz_genetlink_get_family_id$ipvs(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000001600)='IPVS\x00') sendto$inet(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000200)) get_thread_area(0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f00000001c0)={0x0, 0x100000001, 0x4}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r2, 0x84, 0x17, &(0x7f0000001540)={r3, 0x0, 0x86, "2eb42ea964dae56a513675047e8d780ee653f19e2fa4280e641a569542064d503d68c86978670b150c699afbb309dc19dbb258b760907fb4ad6581c515e206892a3a46556d2d1dbf4ef7be58acd0ada091010f0df837e97e94b65d80bffacd094f77b202b51e786c9f04c2b7684c6b8823dba8b6b1e462cc1a45ea40b63397f02a96aa998eb7"}, 0x8e) 03:37:10 executing program 3: r0 = memfd_create(&(0x7f0000000580)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\b\x00\x00\x00\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe9\xaa\x9b\xc3\x14\xd2\xd1y\x1f\x9e\x856\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce(\xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(\xb8\xd9\xa3\xc4p\xf4\\>A\x11U\x99\x8d\xa3\x86\xb7\x1d\x87z\xd3\xc4\xdf\x13/\x97Yy\x8b{\x1df\x8d/\x90\xd3<\xf8\x18\xa4\x88\xcf\x048\xb4\xbe\xfa\xa5\xb7\xd6\xa5&);\x1br\xd2a\xf2\x8b\xa7\x15\xbe\x95\xeb\x1bB\xacoyP\xbb\x1c\xb9S-\xe0oK\xac\x00;S\x8a\x01\xd2\xca<\x04\xaf\x04\x9a\x9d\x84\xa5\x94J>F\xc5V\xc6\xfa\x8e\v\xe1\x82\x03`\xf8\xca\xf4\x89\r^Z44\x91\xeb\xf4$\xf3\x1d\xd5\xbd\xb6ZZ\xd8\xfdS\r\x98\x06/\x9a%m\xcf\xab u\xa6Fw\xde\xb4?\r\xbdK\xfb\xf2\x13\xb3\xfa\x00\xaaP\xc9t\x7f\'\xba\x12', 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) lseek(r0, 0x0, 0x4) sendfile(r0, r0, &(0x7f0000000200), 0xffffffff) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff, 0x10001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000240)={0x2, 0x0, @local}, 0x10) setxattr$security_evm(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000180)='security.evm\x00', &(0x7f00000001c0)=@md5={0x1, "214776881fba4414912acc4ced10572e"}, 0x11, 0x3) connect$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e) ioctl(r1, 0x0, &(0x7f0000000080)="0a5cc80700315f85715070") symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000040)='./file0\x00') rename(&(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='./file0/file0\x00') 03:37:10 executing program 2: getsockopt$bt_rfcomm_RFCOMM_CONNINFO(0xffffffffffffffff, 0x12, 0x2, &(0x7f0000000540)=""/4096, &(0x7f00000002c0)=0x1000) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020401042b000270f7f8", 0x16}], 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000500)={0x0, r0}, 0x10) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x20) sendto$inet(r2, &(0x7f0000000340)="af776b48fd5acea4377d9bc134910eaba548aafd1417bf4112ac30259cf10e6446eef6189d5a1a0afef5f7f307bc39e7fee294f53d11a5ef1201fad81164f903ef1f7c3afc43060434b2c10cb34f77", 0x4f, 0xc044, 0x0, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) openat$udambuf(0xffffffffffffff9c, 0x0, 0x2) umount2(&(0x7f0000000280)='./file0\x00', 0x3f00000000000000) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1) syz_genetlink_get_family_id$ipvs(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000001600)='IPVS\x00') sendto$inet(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000200)) get_thread_area(0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f00000001c0)={0x0, 0x100000001, 0x4}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r2, 0x84, 0x17, &(0x7f0000001540)={r3, 0x0, 0x86, "2eb42ea964dae56a513675047e8d780ee653f19e2fa4280e641a569542064d503d68c86978670b150c699afbb309dc19dbb258b760907fb4ad6581c515e206892a3a46556d2d1dbf4ef7be58acd0ada091010f0df837e97e94b65d80bffacd094f77b202b51e786c9f04c2b7684c6b8823dba8b6b1e462cc1a45ea40b63397f02a96aa998eb7"}, 0x8e) [ 1257.610738] FAT-fs (loop0): Directory bread(block 1025) failed [ 1257.674719] FAT-fs (loop0): Directory bread(block 1026) failed [ 1257.744358] FAT-fs (loop0): Directory bread(block 1027) failed [ 1257.800507] FAT-fs (loop0): Directory bread(block 1028) failed [ 1257.834547] FAT-fs (loop0): Directory bread(block 1029) failed 03:37:10 executing program 2: getsockopt$bt_rfcomm_RFCOMM_CONNINFO(0xffffffffffffffff, 0x12, 0x2, &(0x7f0000000540)=""/4096, &(0x7f00000002c0)=0x1000) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020401042b000270f7f8", 0x16}], 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000500)={0x0, r0}, 0x10) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x20) sendto$inet(r2, &(0x7f0000000340)="af776b48fd5acea4377d9bc134910eaba548aafd1417bf4112ac30259cf10e6446eef6189d5a1a0afef5f7f307bc39e7fee294f53d11a5ef1201fad81164f903ef1f7c3afc43060434b2c10cb34f77", 0x4f, 0xc044, 0x0, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) openat$udambuf(0xffffffffffffff9c, 0x0, 0x2) umount2(&(0x7f0000000280)='./file0\x00', 0x3f00000000000000) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1) syz_genetlink_get_family_id$ipvs(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000001600)='IPVS\x00') sendto$inet(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000200)) get_thread_area(0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f00000001c0)={0x0, 0x100000001, 0x4}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r2, 0x84, 0x17, &(0x7f0000001540)={r3, 0x0, 0x86, "2eb42ea964dae56a513675047e8d780ee653f19e2fa4280e641a569542064d503d68c86978670b150c699afbb309dc19dbb258b760907fb4ad6581c515e206892a3a46556d2d1dbf4ef7be58acd0ada091010f0df837e97e94b65d80bffacd094f77b202b51e786c9f04c2b7684c6b8823dba8b6b1e462cc1a45ea40b63397f02a96aa998eb7"}, 0x8e) [ 1257.864299] FAT-fs (loop0): Directory bread(block 1030) failed [ 1257.895438] FAT-fs (loop0): Directory bread(block 1031) failed [ 1257.939486] FAT-fs (loop0): Directory bread(block 1032) failed [ 1257.973605] FAT-fs (loop0): Directory bread(block 1033) failed [ 1258.009359] FAT-fs (loop0): Directory bread(block 1034) failed 03:37:11 executing program 2: getsockopt$bt_rfcomm_RFCOMM_CONNINFO(0xffffffffffffffff, 0x12, 0x2, &(0x7f0000000540)=""/4096, &(0x7f00000002c0)=0x1000) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020401042b000270f7f8", 0x16}], 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000500)={0x0, r0}, 0x10) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x20) sendto$inet(r2, &(0x7f0000000340)="af776b48fd5acea4377d9bc134910eaba548aafd1417bf4112ac30259cf10e6446eef6189d5a1a0afef5f7f307bc39e7fee294f53d11a5ef1201fad81164f903ef1f7c3afc43060434b2c10cb34f77", 0x4f, 0xc044, 0x0, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) openat$udambuf(0xffffffffffffff9c, 0x0, 0x2) umount2(&(0x7f0000000280)='./file0\x00', 0x3f00000000000000) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1) syz_genetlink_get_family_id$ipvs(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000001600)='IPVS\x00') sendto$inet(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000200)) get_thread_area(0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f00000001c0)={0x0, 0x100000001, 0x4}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r2, 0x84, 0x17, &(0x7f0000001540)={r3, 0x0, 0x86, "2eb42ea964dae56a513675047e8d780ee653f19e2fa4280e641a569542064d503d68c86978670b150c699afbb309dc19dbb258b760907fb4ad6581c515e206892a3a46556d2d1dbf4ef7be58acd0ada091010f0df837e97e94b65d80bffacd094f77b202b51e786c9f04c2b7684c6b8823dba8b6b1e462cc1a45ea40b63397f02a96aa998eb7"}, 0x8e) 03:37:11 executing program 0: getsockopt$bt_rfcomm_RFCOMM_CONNINFO(0xffffffffffffffff, 0x12, 0x2, &(0x7f0000000540)=""/4096, &(0x7f00000002c0)=0x1000) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020401042b000270f7f8", 0x16}], 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000500)={0x0, r0}, 0x10) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x20) sendto$inet(r2, &(0x7f0000000340)="af776b48fd5acea4377d9bc134910eaba548aafd1417bf4112ac30259cf10e6446eef6189d5a1a0afef5f7f307bc39e7fee294f53d11a5ef1201fad81164f903ef1f7c3afc43060434b2c10cb34f77", 0x4f, 0xc044, 0x0, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) openat$udambuf(0xffffffffffffff9c, 0x0, 0x2) umount2(&(0x7f0000000280)='./file0\x00', 0x3f00000000000000) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1) syz_genetlink_get_family_id$ipvs(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000001600)='IPVS\x00') sendto$inet(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000200)) get_thread_area(0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f00000001c0)={0x0, 0x100000001, 0x4}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r2, 0x84, 0x17, &(0x7f0000001540)={r3, 0x0, 0x86, "2eb42ea964dae56a513675047e8d780ee653f19e2fa4280e641a569542064d503d68c86978670b150c699afbb309dc19dbb258b760907fb4ad6581c515e206892a3a46556d2d1dbf4ef7be58acd0ada091010f0df837e97e94b65d80bffacd094f77b202b51e786c9f04c2b7684c6b8823dba8b6b1e462cc1a45ea40b63397f02a96aa998eb7"}, 0x8e) 03:37:11 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f0000000140)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r2, &(0x7f0000000240)='/', 0x1, 0x1) fcntl$setlease(r2, 0x400, 0x0) setsockopt$XDP_UMEM_FILL_RING(r2, 0x11b, 0x5, 0x0, 0x0) lseek(r2, 0x0, 0x2) fcntl$F_SET_FILE_RW_HINT(r1, 0x40e, &(0x7f0000000100)=0x7) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000480)='/dev/rtc0\x00', 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r3, 0x4, &(0x7f0000000500)=""/34) sendfile(r2, r2, &(0x7f00000000c0), 0x7f8) fsetxattr(r1, &(0x7f00000001c0)=@known='security.evm\x00', &(0x7f0000000280)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x76, 0x1) ioctl$sock_inet_SIOCDELRT(r2, 0x890c, &(0x7f0000000540)={0xffffffffffffff80, {0x2, 0x4e22, @rand_addr=0xe491}, {0x2, 0x4e20}, {0x2, 0x4e24, @broadcast}, 0x4, 0x100000001, 0x2, 0x2, 0x3, 0x0, 0x0, 0x5d07e887, 0x5}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x4000, 0x0) ioctl$RTC_WKALM_RD(r2, 0x80287010, &(0x7f0000000440)) syz_open_pts(r0, 0x2000) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x101200, 0x0) rename(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)='./file0\x00') lstat(0x0, &(0x7f0000000a80)) syz_mount_image$btrfs(&(0x7f00000005c0)='btrfs\x00', 0x0, 0x80, 0x0, 0x0, 0x800000, &(0x7f0000000b00)={[{@device={'device', 0x3d, './file0'}}, {@nodatasum='nodatasum'}, {@nospace_cache='nospace_cache'}, {@metadata_ratio={'metadata_ratio', 0x3d, 0x4706}}, {@thread_pool={'thread_pool'}}], [{@hash='hash'}, {@smackfsroot={'smackfsroot'}}]}) write(0xffffffffffffffff, &(0x7f0000000340), 0x10000014c) clock_gettime(0x0, &(0x7f0000000240)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), 0x0, &(0x7f0000000200), 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) 03:37:11 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') syz_open_dev$dmmidi(&(0x7f0000000600)='/dev/dmmidi#\x00', 0x2, 0x80) syz_open_dev$sndseq(0x0, 0x0, 0x7e) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x4000040402, 0x0) pipe(&(0x7f0000000880)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) timer_create(0x7, &(0x7f0000000500)={0x0, 0x3a}, &(0x7f0000000540)) clock_gettime(0x4, &(0x7f00000001c0)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) timer_gettime(0x0, &(0x7f0000000180)) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000240)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000400)={r4, 0x56, "625005d9b15f1c21d4b79c08b67447173ef6987aba851e2e4a5d2d7aa294c5afe90bc25746be7675846340f9baa5820c7383647811318e13ff200ee896dbded55efc4ab055893b76b4223d9cabe613f526e67294ce9a"}, 0x0) 03:37:11 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f0000000140)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r2, &(0x7f0000000240)='/', 0x1, 0x1) fcntl$setlease(r2, 0x400, 0x0) setsockopt$XDP_UMEM_FILL_RING(r2, 0x11b, 0x5, 0x0, 0x0) lseek(r2, 0x0, 0x2) fcntl$F_SET_FILE_RW_HINT(r1, 0x40e, &(0x7f0000000100)=0x7) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000480)='/dev/rtc0\x00', 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r3, 0x4, &(0x7f0000000500)=""/34) sendfile(r2, r2, &(0x7f00000000c0), 0x7f8) fsetxattr(r1, &(0x7f00000001c0)=@known='security.evm\x00', &(0x7f0000000280)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x76, 0x1) ioctl$sock_inet_SIOCDELRT(r2, 0x890c, &(0x7f0000000540)={0xffffffffffffff80, {0x2, 0x4e22, @rand_addr=0xe491}, {0x2, 0x4e20}, {0x2, 0x4e24, @broadcast}, 0x4, 0x100000001, 0x2, 0x2, 0x3, 0x0, 0x0, 0x5d07e887, 0x5}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x4000, 0x0) ioctl$RTC_WKALM_RD(r2, 0x80287010, &(0x7f0000000440)) syz_open_pts(r0, 0x2000) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x101200, 0x0) rename(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)='./file0\x00') lstat(0x0, &(0x7f0000000a80)) syz_mount_image$btrfs(&(0x7f00000005c0)='btrfs\x00', 0x0, 0x80, 0x0, 0x0, 0x800000, &(0x7f0000000b00)={[{@device={'device', 0x3d, './file0'}}, {@nodatasum='nodatasum'}, {@nospace_cache='nospace_cache'}, {@metadata_ratio={'metadata_ratio', 0x3d, 0x4706}}, {@thread_pool={'thread_pool'}}], [{@hash='hash'}, {@smackfsroot={'smackfsroot'}}]}) write(0xffffffffffffffff, &(0x7f0000000340), 0x10000014c) clock_gettime(0x0, &(0x7f0000000240)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), 0x0, &(0x7f0000000200), 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) 03:37:11 executing program 2: getsockopt$bt_rfcomm_RFCOMM_CONNINFO(0xffffffffffffffff, 0x12, 0x2, &(0x7f0000000540)=""/4096, &(0x7f00000002c0)=0x1000) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020401042b000270f7f8", 0x16}], 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000500)={0x0, r0}, 0x10) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x20) sendto$inet(r2, &(0x7f0000000340)="af776b48fd5acea4377d9bc134910eaba548aafd1417bf4112ac30259cf10e6446eef6189d5a1a0afef5f7f307bc39e7fee294f53d11a5ef1201fad81164f903ef1f7c3afc43060434b2c10cb34f77", 0x4f, 0xc044, 0x0, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) openat$udambuf(0xffffffffffffff9c, 0x0, 0x2) umount2(&(0x7f0000000280)='./file0\x00', 0x3f00000000000000) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1) syz_genetlink_get_family_id$ipvs(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000001600)='IPVS\x00') sendto$inet(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000200)) get_thread_area(0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f00000001c0)={0x0, 0x100000001, 0x4}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r2, 0x84, 0x17, &(0x7f0000001540)={r3, 0x0, 0x86, "2eb42ea964dae56a513675047e8d780ee653f19e2fa4280e641a569542064d503d68c86978670b150c699afbb309dc19dbb258b760907fb4ad6581c515e206892a3a46556d2d1dbf4ef7be58acd0ada091010f0df837e97e94b65d80bffacd094f77b202b51e786c9f04c2b7684c6b8823dba8b6b1e462cc1a45ea40b63397f02a96aa998eb7"}, 0x8e) 03:37:11 executing program 0: getsockopt$bt_rfcomm_RFCOMM_CONNINFO(0xffffffffffffffff, 0x12, 0x2, &(0x7f0000000540)=""/4096, &(0x7f00000002c0)=0x1000) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020401042b000270f7f8", 0x16}], 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000500)={0x0, r0}, 0x10) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x20) sendto$inet(r2, &(0x7f0000000340)="af776b48fd5acea4377d9bc134910eaba548aafd1417bf4112ac30259cf10e6446eef6189d5a1a0afef5f7f307bc39e7fee294f53d11a5ef1201fad81164f903ef1f7c3afc43060434b2c10cb34f77", 0x4f, 0xc044, 0x0, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) openat$udambuf(0xffffffffffffff9c, 0x0, 0x2) umount2(&(0x7f0000000280)='./file0\x00', 0x3f00000000000000) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1) syz_genetlink_get_family_id$ipvs(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000001600)='IPVS\x00') sendto$inet(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000200)) get_thread_area(0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f00000001c0)={0x0, 0x100000001, 0x4}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r2, 0x84, 0x17, &(0x7f0000001540)={r3, 0x0, 0x86, "2eb42ea964dae56a513675047e8d780ee653f19e2fa4280e641a569542064d503d68c86978670b150c699afbb309dc19dbb258b760907fb4ad6581c515e206892a3a46556d2d1dbf4ef7be58acd0ada091010f0df837e97e94b65d80bffacd094f77b202b51e786c9f04c2b7684c6b8823dba8b6b1e462cc1a45ea40b63397f02a96aa998eb7"}, 0x8e) 03:37:11 executing program 3: r0 = memfd_create(&(0x7f0000000580)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\b\x00\x00\x00\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe9\xaa\x9b\xc3\x14\xd2\xd1y\x1f\x9e\x856\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce(\xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(\xb8\xd9\xa3\xc4p\xf4\\>A\x11U\x99\x8d\xa3\x86\xb7\x1d\x87z\xd3\xc4\xdf\x13/\x97Yy\x8b{\x1df\x8d/\x90\xd3<\xf8\x18\xa4\x88\xcf\x048\xb4\xbe\xfa\xa5\xb7\xd6\xa5&);\x1br\xd2a\xf2\x8b\xa7\x15\xbe\x95\xeb\x1bB\xacoyP\xbb\x1c\xb9S-\xe0oK\xac\x00;S\x8a\x01\xd2\xca<\x04\xaf\x04\x9a\x9d\x84\xa5\x94J>F\xc5V\xc6\xfa\x8e\v\xe1\x82\x03`\xf8\xca\xf4\x89\r^Z44\x91\xeb\xf4$\xf3\x1d\xd5\xbd\xb6ZZ\xd8\xfdS\r\x98\x06/\x9a%m\xcf\xab u\xa6Fw\xde\xb4?\r\xbdK\xfb\xf2\x13\xb3\xfa\x00\xaaP\xc9t\x7f\'\xba\x12', 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) lseek(r0, 0x0, 0x4) sendfile(r0, r0, &(0x7f0000000200), 0xffffffff) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff, 0x10001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000240)={0x2, 0x0, @local}, 0x10) setxattr$security_evm(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000180)='security.evm\x00', &(0x7f00000001c0)=@md5={0x1, "214776881fba4414912acc4ced10572e"}, 0x11, 0x3) connect$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e) ioctl(r1, 0x0, &(0x7f0000000080)="0a5cc80700315f85715070") symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000040)='./file0\x00') rename(&(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='./file0/file0\x00') [ 1258.830683] FAT-fs (loop0): Directory bread(block 1025) failed 03:37:11 executing program 2: getsockopt$bt_rfcomm_RFCOMM_CONNINFO(0xffffffffffffffff, 0x12, 0x2, &(0x7f0000000540)=""/4096, &(0x7f00000002c0)=0x1000) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e66617400020401042b000270f7f8", 0x16}], 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000500)={0x0, r0}, 0x10) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x20) sendto$inet(r2, &(0x7f0000000340)="af776b48fd5acea4377d9bc134910eaba548aafd1417bf4112ac30259cf10e6446eef6189d5a1a0afef5f7f307bc39e7fee294f53d11a5ef1201fad81164f903ef1f7c3afc43060434b2c10cb34f77", 0x4f, 0xc044, 0x0, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) openat$udambuf(0xffffffffffffff9c, 0x0, 0x2) umount2(&(0x7f0000000280)='./file0\x00', 0x3f00000000000000) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1) syz_genetlink_get_family_id$ipvs(0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000001600)='IPVS\x00') sendto$inet(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000200)) get_thread_area(0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f00000001c0)={0x0, 0x100000001, 0x4}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r2, 0x84, 0x17, &(0x7f0000001540)={r3, 0x0, 0x86, "2eb42ea964dae56a513675047e8d780ee653f19e2fa4280e641a569542064d503d68c86978670b150c699afbb309dc19dbb258b760907fb4ad6581c515e206892a3a46556d2d1dbf4ef7be58acd0ada091010f0df837e97e94b65d80bffacd094f77b202b51e786c9f04c2b7684c6b8823dba8b6b1e462cc1a45ea40b63397f02a96aa998eb7"}, 0x8e) [ 1258.873561] FAT-fs (loop0): Directory bread(block 1026) failed [ 1258.906491] FAT-fs (loop0): Directory bread(block 1027) failed [ 1258.945811] FAT-fs (loop0): Directory bread(block 1028) failed [ 1258.994636] FAT-fs (loop0): Directory bread(block 1029) failed [ 1259.033630] FAT-fs (loop0): Directory bread(block 1030) failed [ 1259.071941] FAT-fs (loop0): Directory bread(block 1031) failed [ 1259.119997] FAT-fs (loop0): Directory bread(block 1032) failed [ 1259.166971] FAT-fs (loop0): Directory bread(block 1033) failed [ 1259.204865] FAT-fs (loop0): Directory bread(block 1034) failed 03:37:12 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f0000000140)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r2, &(0x7f0000000240)='/', 0x1, 0x1) fcntl$setlease(r2, 0x400, 0x0) setsockopt$XDP_UMEM_FILL_RING(r2, 0x11b, 0x5, 0x0, 0x0) lseek(r2, 0x0, 0x2) fcntl$F_SET_FILE_RW_HINT(r1, 0x40e, &(0x7f0000000100)=0x7) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000480)='/dev/rtc0\x00', 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r3, 0x4, &(0x7f0000000500)=""/34) sendfile(r2, r2, &(0x7f00000000c0), 0x7f8) fsetxattr(r1, &(0x7f00000001c0)=@known='security.evm\x00', &(0x7f0000000280)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x76, 0x1) ioctl$sock_inet_SIOCDELRT(r2, 0x890c, &(0x7f0000000540)={0xffffffffffffff80, {0x2, 0x4e22, @rand_addr=0xe491}, {0x2, 0x4e20}, {0x2, 0x4e24, @broadcast}, 0x4, 0x100000001, 0x2, 0x2, 0x3, 0x0, 0x0, 0x5d07e887, 0x5}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x4000, 0x0) ioctl$RTC_WKALM_RD(r2, 0x80287010, &(0x7f0000000440)) syz_open_pts(r0, 0x2000) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x101200, 0x0) rename(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)='./file0\x00') lstat(0x0, &(0x7f0000000a80)) syz_mount_image$btrfs(&(0x7f00000005c0)='btrfs\x00', 0x0, 0x80, 0x0, 0x0, 0x800000, &(0x7f0000000b00)={[{@device={'device', 0x3d, './file0'}}, {@nodatasum='nodatasum'}, {@nospace_cache='nospace_cache'}, {@metadata_ratio={'metadata_ratio', 0x3d, 0x4706}}, {@thread_pool={'thread_pool'}}], [{@hash='hash'}, {@smackfsroot={'smackfsroot'}}]}) write(0xffffffffffffffff, &(0x7f0000000340), 0x10000014c) clock_gettime(0x0, &(0x7f0000000240)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), 0x0, &(0x7f0000000200), 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) 03:37:12 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f0000000140)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r2, &(0x7f0000000240)='/', 0x1, 0x1) fcntl$setlease(r2, 0x400, 0x0) setsockopt$XDP_UMEM_FILL_RING(r2, 0x11b, 0x5, 0x0, 0x0) lseek(r2, 0x0, 0x2) fcntl$F_SET_FILE_RW_HINT(r1, 0x40e, &(0x7f0000000100)=0x7) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000480)='/dev/rtc0\x00', 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r3, 0x4, &(0x7f0000000500)=""/34) sendfile(r2, r2, &(0x7f00000000c0), 0x7f8) fsetxattr(r1, &(0x7f00000001c0)=@known='security.evm\x00', &(0x7f0000000280)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x76, 0x1) ioctl$sock_inet_SIOCDELRT(r2, 0x890c, &(0x7f0000000540)={0xffffffffffffff80, {0x2, 0x4e22, @rand_addr=0xe491}, {0x2, 0x4e20}, {0x2, 0x4e24, @broadcast}, 0x4, 0x100000001, 0x2, 0x2, 0x3, 0x0, 0x0, 0x5d07e887, 0x5}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x4000, 0x0) ioctl$RTC_WKALM_RD(r2, 0x80287010, &(0x7f0000000440)) syz_open_pts(r0, 0x2000) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x101200, 0x0) rename(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)='./file0\x00') lstat(0x0, &(0x7f0000000a80)) syz_mount_image$btrfs(&(0x7f00000005c0)='btrfs\x00', 0x0, 0x80, 0x0, 0x0, 0x800000, &(0x7f0000000b00)={[{@device={'device', 0x3d, './file0'}}, {@nodatasum='nodatasum'}, {@nospace_cache='nospace_cache'}, {@metadata_ratio={'metadata_ratio', 0x3d, 0x4706}}, {@thread_pool={'thread_pool'}}], [{@hash='hash'}, {@smackfsroot={'smackfsroot'}}]}) write(0xffffffffffffffff, &(0x7f0000000340), 0x10000014c) clock_gettime(0x0, &(0x7f0000000240)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), 0x0, &(0x7f0000000200), 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) 03:37:12 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f0000000140)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r2, &(0x7f0000000240)='/', 0x1, 0x1) fcntl$setlease(r2, 0x400, 0x0) setsockopt$XDP_UMEM_FILL_RING(r2, 0x11b, 0x5, 0x0, 0x0) lseek(r2, 0x0, 0x2) fcntl$F_SET_FILE_RW_HINT(r1, 0x40e, &(0x7f0000000100)=0x7) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000480)='/dev/rtc0\x00', 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r3, 0x4, &(0x7f0000000500)=""/34) sendfile(r2, r2, &(0x7f00000000c0), 0x7f8) fsetxattr(r1, &(0x7f00000001c0)=@known='security.evm\x00', &(0x7f0000000280)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x76, 0x1) ioctl$sock_inet_SIOCDELRT(r2, 0x890c, &(0x7f0000000540)={0xffffffffffffff80, {0x2, 0x4e22, @rand_addr=0xe491}, {0x2, 0x4e20}, {0x2, 0x4e24, @broadcast}, 0x4, 0x100000001, 0x2, 0x2, 0x3, 0x0, 0x0, 0x5d07e887, 0x5}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x4000, 0x0) ioctl$RTC_WKALM_RD(r2, 0x80287010, &(0x7f0000000440)) syz_open_pts(r0, 0x2000) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x101200, 0x0) rename(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)='./file0\x00') lstat(0x0, &(0x7f0000000a80)) syz_mount_image$btrfs(&(0x7f00000005c0)='btrfs\x00', 0x0, 0x80, 0x0, 0x0, 0x800000, &(0x7f0000000b00)={[{@device={'device', 0x3d, './file0'}}, {@nodatasum='nodatasum'}, {@nospace_cache='nospace_cache'}, {@metadata_ratio={'metadata_ratio', 0x3d, 0x4706}}, {@thread_pool={'thread_pool'}}], [{@hash='hash'}, {@smackfsroot={'smackfsroot'}}]}) write(0xffffffffffffffff, &(0x7f0000000340), 0x10000014c) clock_gettime(0x0, &(0x7f0000000240)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), 0x0, &(0x7f0000000200), 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) 03:37:12 executing program 0: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x800, 0x0) getsockopt$nfc_llcp(r0, 0x118, 0x1, &(0x7f00000004c0)=""/215, 0xd7) pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) r3 = socket$inet_smc(0x2b, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) listen(r3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) fchown(r2, r5, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x64}, 0x0, &(0x7f0000000140)={0x8}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 03:37:12 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') syz_open_dev$dmmidi(&(0x7f0000000600)='/dev/dmmidi#\x00', 0x2, 0x80) syz_open_dev$sndseq(0x0, 0x0, 0x7e) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x4000040402, 0x0) pipe(&(0x7f0000000880)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) timer_create(0x7, &(0x7f0000000500)={0x0, 0x3a}, &(0x7f0000000540)) clock_gettime(0x4, &(0x7f00000001c0)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) timer_gettime(0x0, &(0x7f0000000180)) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000240)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000400)={r4, 0x56, "625005d9b15f1c21d4b79c08b67447173ef6987aba851e2e4a5d2d7aa294c5afe90bc25746be7675846340f9baa5820c7383647811318e13ff200ee896dbded55efc4ab055893b76b4223d9cabe613f526e67294ce9a"}, 0x0) 03:37:12 executing program 3: r0 = memfd_create(&(0x7f0000000580)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\b\x00\x00\x00\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe9\xaa\x9b\xc3\x14\xd2\xd1y\x1f\x9e\x856\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce(\xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(\xb8\xd9\xa3\xc4p\xf4\\>A\x11U\x99\x8d\xa3\x86\xb7\x1d\x87z\xd3\xc4\xdf\x13/\x97Yy\x8b{\x1df\x8d/\x90\xd3<\xf8\x18\xa4\x88\xcf\x048\xb4\xbe\xfa\xa5\xb7\xd6\xa5&);\x1br\xd2a\xf2\x8b\xa7\x15\xbe\x95\xeb\x1bB\xacoyP\xbb\x1c\xb9S-\xe0oK\xac\x00;S\x8a\x01\xd2\xca<\x04\xaf\x04\x9a\x9d\x84\xa5\x94J>F\xc5V\xc6\xfa\x8e\v\xe1\x82\x03`\xf8\xca\xf4\x89\r^Z44\x91\xeb\xf4$\xf3\x1d\xd5\xbd\xb6ZZ\xd8\xfdS\r\x98\x06/\x9a%m\xcf\xab u\xa6Fw\xde\xb4?\r\xbdK\xfb\xf2\x13\xb3\xfa\x00\xaaP\xc9t\x7f\'\xba\x12', 0x0) pwrite64(r0, &(0x7f0000000000)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) lseek(r0, 0x0, 0x4) sendfile(r0, r0, &(0x7f0000000200), 0xffffffff) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffbff, 0x10001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000240)={0x2, 0x0, @local}, 0x10) setxattr$security_evm(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000180)='security.evm\x00', &(0x7f00000001c0)=@md5={0x1, "214776881fba4414912acc4ced10572e"}, 0x11, 0x3) connect$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e) ioctl(r1, 0x0, &(0x7f0000000080)="0a5cc80700315f85715070") symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000040)='./file0\x00') rename(&(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='./file0/file0\x00') [ 1260.107853] net_ratelimit: 30 callbacks suppressed [ 1260.107896] protocol 88fb is buggy, dev hsr_slave_0 [ 1260.118527] protocol 88fb is buggy, dev hsr_slave_1 03:37:13 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f0000000140)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r2, &(0x7f0000000240)='/', 0x1, 0x1) fcntl$setlease(r2, 0x400, 0x0) setsockopt$XDP_UMEM_FILL_RING(r2, 0x11b, 0x5, 0x0, 0x0) lseek(r2, 0x0, 0x2) fcntl$F_SET_FILE_RW_HINT(r1, 0x40e, &(0x7f0000000100)=0x7) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000480)='/dev/rtc0\x00', 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r3, 0x4, &(0x7f0000000500)=""/34) sendfile(r2, r2, &(0x7f00000000c0), 0x7f8) fsetxattr(r1, &(0x7f00000001c0)=@known='security.evm\x00', &(0x7f0000000280)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x76, 0x1) ioctl$sock_inet_SIOCDELRT(r2, 0x890c, &(0x7f0000000540)={0xffffffffffffff80, {0x2, 0x4e22, @rand_addr=0xe491}, {0x2, 0x4e20}, {0x2, 0x4e24, @broadcast}, 0x4, 0x100000001, 0x2, 0x2, 0x3, 0x0, 0x0, 0x5d07e887, 0x5}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x4000, 0x0) ioctl$RTC_WKALM_RD(r2, 0x80287010, &(0x7f0000000440)) syz_open_pts(r0, 0x2000) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x101200, 0x0) rename(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)='./file0\x00') lstat(0x0, &(0x7f0000000a80)) syz_mount_image$btrfs(&(0x7f00000005c0)='btrfs\x00', 0x0, 0x80, 0x0, 0x0, 0x800000, &(0x7f0000000b00)={[{@device={'device', 0x3d, './file0'}}, {@nodatasum='nodatasum'}, {@nospace_cache='nospace_cache'}, {@metadata_ratio={'metadata_ratio', 0x3d, 0x4706}}, {@thread_pool={'thread_pool'}}], [{@hash='hash'}, {@smackfsroot={'smackfsroot'}}]}) write(0xffffffffffffffff, &(0x7f0000000340), 0x10000014c) clock_gettime(0x0, &(0x7f0000000240)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), 0x0, &(0x7f0000000200), 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) [ 1260.427284] protocol 88fb is buggy, dev hsr_slave_0 [ 1260.432521] protocol 88fb is buggy, dev hsr_slave_1 [ 1260.507261] protocol 88fb is buggy, dev hsr_slave_0 [ 1260.512402] protocol 88fb is buggy, dev hsr_slave_1 [ 1260.517566] protocol 88fb is buggy, dev hsr_slave_0 [ 1260.522646] protocol 88fb is buggy, dev hsr_slave_1 [ 1260.527773] protocol 88fb is buggy, dev hsr_slave_0 [ 1260.532829] protocol 88fb is buggy, dev hsr_slave_1 03:37:13 executing program 5: setrlimit(0x400000000000007, &(0x7f0000000000)={0x4, 0x4}) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) 03:37:13 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") fgetxattr(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[], 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) ioctl$SG_IO(r1, 0x2285, &(0x7f00000003c0)={0x53, 0x0, 0x6, 0x0, @scatter={0x0, 0x200000, 0x0}, &(0x7f0000000580)="5f39203a1ec6", 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) 03:37:13 executing program 0: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x800, 0x0) getsockopt$nfc_llcp(r0, 0x118, 0x1, &(0x7f00000004c0)=""/215, 0xd7) pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) r3 = socket$inet_smc(0x2b, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) listen(r3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) fchown(r2, r5, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x64}, 0x0, &(0x7f0000000140)={0x8}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 03:37:13 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) r3 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f00000015c0)={r3}) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2}) dup3(r0, r1, 0x0) 03:37:13 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000040)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000017740)={0x90, r1, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r2}, {0x74, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x3}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8}}}]}}]}, 0x90}}, 0x0) 03:37:13 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") fgetxattr(0xffffffffffffffff, &(0x7f00000005c0)=ANY=[], 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) ioctl$SG_IO(r1, 0x2285, &(0x7f00000003c0)={0x53, 0x0, 0x6, 0x0, @scatter={0x0, 0x200000, 0x0}, &(0x7f0000000580)="5f39203a1ec6", 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) [ 1260.956218] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.5'. 03:37:13 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000040)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000017740)={0x90, r1, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r2}, {0x74, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x3}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8}}}]}}]}, 0x90}}, 0x0) 03:37:14 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') syz_open_dev$dmmidi(&(0x7f0000000600)='/dev/dmmidi#\x00', 0x2, 0x80) syz_open_dev$sndseq(0x0, 0x0, 0x7e) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x4000040402, 0x0) pipe(&(0x7f0000000880)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) timer_create(0x7, &(0x7f0000000500)={0x0, 0x3a}, &(0x7f0000000540)) clock_gettime(0x4, &(0x7f00000001c0)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) timer_gettime(0x0, &(0x7f0000000180)) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000240)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000400)={r4, 0x56, "625005d9b15f1c21d4b79c08b67447173ef6987aba851e2e4a5d2d7aa294c5afe90bc25746be7675846340f9baa5820c7383647811318e13ff200ee896dbded55efc4ab055893b76b4223d9cabe613f526e67294ce9a"}, 0x0) [ 1261.201257] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.5'. 03:37:14 executing program 3: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f00000002c0)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f00000000c0)={r1, r0, r0}, &(0x7f0000000100)=""/18, 0x12, &(0x7f00000001c0)={&(0x7f0000000080)={'poly1305-generic\x00'}, &(0x7f0000000180)}) 03:37:14 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000040)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000017740)={0x90, r1, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r2}, {0x74, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x3}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8}}}]}}]}, 0x90}}, 0x0) 03:37:14 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f0000000140)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) pwrite64(r2, &(0x7f0000000240)='/', 0x1, 0x1) fcntl$setlease(r2, 0x400, 0x0) setsockopt$XDP_UMEM_FILL_RING(r2, 0x11b, 0x5, 0x0, 0x0) lseek(r2, 0x0, 0x2) fcntl$F_SET_FILE_RW_HINT(r1, 0x40e, &(0x7f0000000100)=0x7) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000480)='/dev/rtc0\x00', 0xffffffffffffffff}, 0x30) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r3, 0x4, &(0x7f0000000500)=""/34) sendfile(r2, r2, &(0x7f00000000c0), 0x7f8) fsetxattr(r1, &(0x7f00000001c0)=@known='security.evm\x00', &(0x7f0000000280)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x76, 0x1) ioctl$sock_inet_SIOCDELRT(r2, 0x890c, &(0x7f0000000540)={0xffffffffffffff80, {0x2, 0x4e22, @rand_addr=0xe491}, {0x2, 0x4e20}, {0x2, 0x4e24, @broadcast}, 0x4, 0x100000001, 0x2, 0x2, 0x3, 0x0, 0x0, 0x5d07e887, 0x5}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x4000, 0x0) ioctl$RTC_WKALM_RD(r2, 0x80287010, &(0x7f0000000440)) syz_open_pts(r0, 0x2000) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x101200, 0x0) rename(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)='./file0\x00') lstat(0x0, &(0x7f0000000a80)) syz_mount_image$btrfs(&(0x7f00000005c0)='btrfs\x00', 0x0, 0x80, 0x0, 0x0, 0x800000, &(0x7f0000000b00)={[{@device={'device', 0x3d, './file0'}}, {@nodatasum='nodatasum'}, {@nospace_cache='nospace_cache'}, {@metadata_ratio={'metadata_ratio', 0x3d, 0x4706}}, {@thread_pool={'thread_pool'}}], [{@hash='hash'}, {@smackfsroot={'smackfsroot'}}]}) write(0xffffffffffffffff, &(0x7f0000000340), 0x10000014c) clock_gettime(0x0, &(0x7f0000000240)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), 0x0, &(0x7f0000000200), 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) [ 1261.417465] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.5'. 03:37:14 executing program 3: r0 = socket$inet(0x2, 0x803, 0x10000000000016) setsockopt$inet_buf(r0, 0x0, 0x20, &(0x7f0000000000), 0x2e8) 03:37:14 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000040)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000017740)={0x90, r1, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r2}, {0x74, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x3}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8}}}]}}]}, 0x90}}, 0x0) 03:37:14 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") syz_emit_ethernet(0x2a, &(0x7f0000000080)={@local, @link_local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x689, 0x0, @remote, @local}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) [ 1261.701359] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.5'. 03:37:14 executing program 0: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x800, 0x0) getsockopt$nfc_llcp(r0, 0x118, 0x1, &(0x7f00000004c0)=""/215, 0xd7) pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) r3 = socket$inet_smc(0x2b, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) listen(r3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) fchown(r2, r5, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x64}, 0x0, &(0x7f0000000140)={0x8}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 03:37:14 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x84007ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() mknod(&(0x7f0000000140)='./file0\x00', 0x10001040, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r2 = gettid() kcmp(r1, r2, 0x4, 0xffffffffffffffff, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r2, 0x1000000000016) tkill(r1, 0xf) 03:37:14 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x14, 0x4000400000003, 0x1, 0xffffffffffffffff}, 0x14}}, 0x0) [ 1262.025454] [ 1262.027155] ====================================================== [ 1262.033466] WARNING: possible circular locking dependency detected [ 1262.039884] 5.0.0-rc7+ #82 Not tainted [ 1262.043765] ------------------------------------------------------ [ 1262.050081] syz-executor.3/24882 is trying to acquire lock: [ 1262.055790] 000000002bfc4b15 (&pipe->mutex/1){+.+.}, at: fifo_open+0x159/0xb00 [ 1262.063172] [ 1262.063172] but task is already holding lock: [ 1262.069140] 0000000046e8f434 (&sig->cred_guard_mutex){+.+.}, at: __do_execve_file.isra.0+0x376/0x23f0 [ 1262.078520] [ 1262.078520] which lock already depends on the new lock. [ 1262.078520] [ 1262.086829] [ 1262.086829] the existing dependency chain (in reverse order) is: [ 1262.094444] [ 1262.094444] -> #2 (&sig->cred_guard_mutex){+.+.}: [ 1262.100799] __mutex_lock+0xf7/0x1310 [ 1262.105125] mutex_lock_killable_nested+0x16/0x20 [ 1262.110535] lock_trace+0x4a/0xe0 [ 1262.114511] proc_pid_stack+0x13e/0x2c0 [ 1262.119095] proc_single_show+0xf6/0x180 [ 1262.123731] seq_read+0x4db/0x1130 [ 1262.127823] do_iter_read+0x4a9/0x660 [ 1262.132146] vfs_readv+0xf0/0x160 [ 1262.136121] do_preadv+0x1c4/0x280 [ 1262.140183] __x64_sys_preadv+0x9a/0xf0 [ 1262.144679] do_syscall_64+0x103/0x610 [ 1262.149096] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1262.154804] [ 1262.154804] -> #1 (&p->lock){+.+.}: [ 1262.159925] __mutex_lock+0xf7/0x1310 [ 1262.164261] mutex_lock_nested+0x16/0x20 [ 1262.168848] seq_read+0x71/0x1130 [ 1262.172819] proc_reg_read+0x1fa/0x2c0 [ 1262.177228] do_iter_read+0x4a9/0x660 [ 1262.181551] vfs_readv+0xf0/0x160 [ 1262.185581] default_file_splice_read+0x475/0x890 [ 1262.190937] do_splice_to+0x12a/0x190 [ 1262.195248] do_splice+0xf7c/0x1330 [ 1262.199415] __x64_sys_splice+0x2c6/0x330 [ 1262.204074] do_syscall_64+0x103/0x610 [ 1262.208486] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1262.214206] [ 1262.214206] -> #0 (&pipe->mutex/1){+.+.}: [ 1262.219829] lock_acquire+0x16f/0x3f0 [ 1262.224158] __mutex_lock+0xf7/0x1310 [ 1262.228476] mutex_lock_nested+0x16/0x20 [ 1262.233046] fifo_open+0x159/0xb00 [ 1262.237154] do_dentry_open+0x47d/0x1130 [ 1262.241721] vfs_open+0xa0/0xd0 [ 1262.245507] path_openat+0x10d7/0x4690 [ 1262.249901] do_filp_open+0x1a1/0x280 [ 1262.254205] do_open_execat+0x13b/0x6d0 [ 1262.258701] __do_execve_file.isra.0+0x178d/0x23f0 [ 1262.264225] __x64_sys_execve+0x8f/0xc0 [ 1262.268719] do_syscall_64+0x103/0x610 [ 1262.273112] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1262.278799] [ 1262.278799] other info that might help us debug this: [ 1262.278799] [ 1262.286919] Chain exists of: [ 1262.286919] &pipe->mutex/1 --> &p->lock --> &sig->cred_guard_mutex [ 1262.286919] [ 1262.297741] Possible unsafe locking scenario: [ 1262.297741] [ 1262.303775] CPU0 CPU1 [ 1262.308422] ---- ---- [ 1262.313076] lock(&sig->cred_guard_mutex); [ 1262.317378] lock(&p->lock); [ 1262.322983] lock(&sig->cred_guard_mutex); [ 1262.329803] lock(&pipe->mutex/1); [ 1262.333412] [ 1262.333412] *** DEADLOCK *** [ 1262.333412] [ 1262.339456] 1 lock held by syz-executor.3/24882: [ 1262.344187] #0: 0000000046e8f434 (&sig->cred_guard_mutex){+.+.}, at: __do_execve_file.isra.0+0x376/0x23f0 [ 1262.353975] [ 1262.353975] stack backtrace: [ 1262.358462] CPU: 1 PID: 24882 Comm: syz-executor.3 Not tainted 5.0.0-rc7+ #82 [ 1262.365715] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1262.375048] Call Trace: [ 1262.377625] dump_stack+0x172/0x1f0 [ 1262.381238] print_circular_bug.isra.0.cold+0x1cc/0x28f [ 1262.386589] __lock_acquire+0x2f00/0x4700 [ 1262.390778] ? kasan_check_read+0x11/0x20 [ 1262.394914] ? mark_held_locks+0x100/0x100 [ 1262.399134] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1262.404220] ? kasan_kmalloc+0x9/0x10 [ 1262.408005] ? __kmalloc+0x15c/0x740 [ 1262.411705] ? vfs_open+0xa0/0xd0 [ 1262.415143] ? path_openat+0x10d7/0x4690 [ 1262.419189] ? do_filp_open+0x1a1/0x280 [ 1262.423149] ? do_open_execat+0x13b/0x6d0 [ 1262.427292] ? __do_execve_file.isra.0+0x178d/0x23f0 [ 1262.432400] ? __x64_sys_execve+0x8f/0xc0 [ 1262.436541] ? do_syscall_64+0x103/0x610 [ 1262.440588] ? __lock_is_held+0xb6/0x140 [ 1262.444637] ? fifo_open+0x159/0xb00 [ 1262.448348] lock_acquire+0x16f/0x3f0 [ 1262.452134] ? fifo_open+0x159/0xb00 [ 1262.455832] ? fifo_open+0x159/0xb00 [ 1262.459531] __mutex_lock+0xf7/0x1310 [ 1262.463316] ? fifo_open+0x159/0xb00 [ 1262.467013] ? fifo_open+0x159/0xb00 [ 1262.470711] ? __lock_is_held+0xb6/0x140 [ 1262.474770] ? fifo_open+0x2b5/0xb00 [ 1262.478469] ? mutex_trylock+0x1e0/0x1e0 [ 1262.482514] ? fifo_open+0x2b5/0xb00 [ 1262.486221] ? kasan_check_read+0x11/0x20 [ 1262.490356] ? lock_downgrade+0x810/0x810 [ 1262.494492] mutex_lock_nested+0x16/0x20 [ 1262.498539] ? mutex_lock_nested+0x16/0x20 [ 1262.502757] fifo_open+0x159/0xb00 [ 1262.506289] do_dentry_open+0x47d/0x1130 [ 1262.510347] ? pipe_release+0x280/0x280 [ 1262.514310] ? chown_common+0x5c0/0x5c0 [ 1262.518282] ? inode_permission+0xb4/0x570 [ 1262.522504] vfs_open+0xa0/0xd0 [ 1262.525767] path_openat+0x10d7/0x4690 [ 1262.529639] ? save_stack+0x45/0xd0 [ 1262.533250] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1262.538337] ? kasan_kmalloc+0x9/0x10 [ 1262.542121] ? kmem_cache_alloc_trace+0x151/0x760 [ 1262.546946] ? __lock_acquire+0x4b0/0x4700 [ 1262.551168] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 1262.555823] ? __lock_acquire+0x53b/0x4700 [ 1262.560042] ? save_stack+0xa9/0xd0 [ 1262.563653] ? save_stack+0x45/0xd0 [ 1262.567325] ? fs_reclaim_acquire+0x20/0x20 [ 1262.571635] do_filp_open+0x1a1/0x280 [ 1262.575422] ? may_open_dev+0x100/0x100 [ 1262.579392] ? new_task_smack+0x91/0x220 [ 1262.583471] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 1262.588907] ? debug_mutex_init+0x2d/0x60 [ 1262.593058] ? __mutex_init+0xef/0x130 [ 1262.596933] do_open_execat+0x13b/0x6d0 [ 1262.600903] ? unregister_binfmt+0x170/0x170 [ 1262.605296] ? lock_downgrade+0x810/0x810 [ 1262.609443] ? kasan_check_read+0x11/0x20 [ 1262.613576] ? do_raw_spin_unlock+0x57/0x270 [ 1262.617969] __do_execve_file.isra.0+0x178d/0x23f0 [ 1262.622897] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1262.627902] ? copy_strings_kernel+0x110/0x110 [ 1262.632468] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1262.638003] ? getname_flags+0x277/0x5b0 [ 1262.642051] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1262.647399] __x64_sys_execve+0x8f/0xc0 [ 1262.651365] do_syscall_64+0x103/0x610 [ 1262.655240] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1262.660414] RIP: 0033:0x457e29 [ 1262.663599] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1262.682482] RSP: 002b:00007f7cb7501c78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 1262.690180] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457e29 [ 1262.697436] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000000 [ 1262.704691] RBP: 000000000073c040 R08: 0000000000000000 R09: 0000000000000000 [ 1262.711944] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7cb75026d4 [ 1262.719200] R13: 00000000004be413 R14: 00000000004ced00 R15: 00000000ffffffff [ 1262.777747] kobject: 'loop4' (0000000014b4fb06): kobject_uevent_env [ 1262.785453] kobject: 'loop4' (0000000014b4fb06): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1262.836003] kobject: 'loop2' (0000000007ef8ac7): kobject_uevent_env [ 1262.845391] kobject: 'loop2' (0000000007ef8ac7): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1262.875783] kobject: 'loop1' (000000005373470d): kobject_uevent_env [ 1262.896688] kobject: 'loop1' (000000005373470d): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1262.974176] kobject: 'batman_adv' (0000000022d123d5): kobject_uevent_env [ 1262.982008] kobject: 'batman_adv' (0000000022d123d5): kobject_uevent_env: filter function caused the event to drop! [ 1263.007260] kobject: 'batman_adv' (0000000022d123d5): kobject_cleanup, parent (null) [ 1263.016051] kobject: 'batman_adv' (0000000022d123d5): calling ktype release [ 1263.023383] kobject: (0000000022d123d5): dynamic_kobj_release [ 1263.029463] kobject: 'batman_adv': free name [ 1263.034051] kobject: 'rx-0' (00000000b684bdac): kobject_cleanup, parent 0000000014bd577e [ 1263.042465] kobject: 'rx-0' (00000000b684bdac): auto cleanup 'remove' event [ 1263.049672] kobject: 'rx-0' (00000000b684bdac): kobject_uevent_env [ 1263.056080] kobject: 'rx-0' (00000000b684bdac): fill_kobj_path: path = '/devices/virtual/net/syz_tun/queues/rx-0' [ 1263.066696] kobject: 'rx-0' (00000000b684bdac): auto cleanup kobject_del [ 1263.073691] kobject: 'rx-0' (00000000b684bdac): calling ktype release [ 1263.080335] kobject: 'rx-0': free name [ 1263.084474] kobject: 'loop0' (00000000e6abc240): kobject_uevent_env [ 1263.089814] kobject: 'tx-0' (00000000dd4d502f): kobject_cleanup, parent 0000000014bd577e [ 1263.090931] kobject: 'loop0' (00000000e6abc240): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1263.101895] kobject: 'tx-0' (00000000dd4d502f): auto cleanup 'remove' event [ 1263.115958] kobject: 'tx-0' (00000000dd4d502f): kobject_uevent_env [ 1263.122706] kobject: 'tx-0' (00000000dd4d502f): fill_kobj_path: path = '/devices/virtual/net/syz_tun/queues/tx-0' [ 1263.133386] kobject: 'tx-0' (00000000dd4d502f): auto cleanup kobject_del [ 1263.140495] kobject: 'tx-0' (00000000dd4d502f): calling ktype release [ 1263.147294] kobject: 'tx-0': free name [ 1263.151227] kobject: 'queues' (0000000014bd577e): kobject_cleanup, parent (null) [ 1263.159721] kobject: 'queues' (0000000014bd577e): calling ktype release [ 1263.166507] kobject: 'queues' (0000000014bd577e): kset_release [ 1263.172676] kobject: 'queues': free name [ 1263.177004] kobject: 'syz_tun' (0000000000cde60f): kobject_uevent_env [ 1263.183657] kobject: 'syz_tun' (0000000000cde60f): fill_kobj_path: path = '/devices/virtual/net/syz_tun' [ 1263.207577] kobject: 'syz_tun' (0000000000cde60f): kobject_cleanup, parent (null) [ 1263.216079] kobject: 'syz_tun' (0000000000cde60f): calling ktype release [ 1263.224432] kobject: 'syz_tun': free name [ 1263.418400] kobject: 'rx-0' (000000009372a75c): kobject_cleanup, parent 00000000f3ee16a6 [ 1263.426664] kobject: 'rx-0' (000000009372a75c): auto cleanup 'remove' event [ 1263.449413] kobject: 'rx-0' (000000009372a75c): kobject_uevent_env [ 1263.455760] kobject: 'rx-0' (000000009372a75c): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1263.486654] kobject: 'rx-0' (000000009372a75c): auto cleanup kobject_del [ 1263.496313] kobject: 'rx-0' (000000009372a75c): calling ktype release [ 1263.503046] kobject: 'rx-0': free name [ 1263.506997] kobject: 'tx-0' (00000000e6fe7000): kobject_cleanup, parent 00000000f3ee16a6 [ 1263.515394] kobject: 'tx-0' (00000000e6fe7000): auto cleanup 'remove' event [ 1263.522840] kobject: 'tx-0' (00000000e6fe7000): kobject_uevent_env [ 1263.529260] kobject: 'tx-0' (00000000e6fe7000): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1263.539473] kobject: 'tx-0' (00000000e6fe7000): auto cleanup kobject_del [ 1263.546359] kobject: 'tx-0' (00000000e6fe7000): calling ktype release [ 1263.553086] kobject: 'tx-0': free name [ 1263.556990] kobject: 'queues' (00000000f3ee16a6): kobject_cleanup, parent (null) [ 1263.565543] kobject: 'queues' (00000000f3ee16a6): calling ktype release [ 1263.572411] kobject: 'queues' (00000000f3ee16a6): kset_release [ 1263.579588] kobject: 'queues': free name [ 1263.583945] kobject: 'ip6gre0' (0000000025f53c91): kobject_uevent_env [ 1263.590716] kobject: 'ip6gre0' (0000000025f53c91): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1263.602177] kobject: 'batman_adv' (000000001fc51584): kobject_uevent_env [ 1263.609146] kobject: 'batman_adv' (000000001fc51584): kobject_uevent_env: filter function caused the event to drop! [ 1263.637456] kobject: 'batman_adv' (000000001fc51584): kobject_cleanup, parent (null) [ 1263.646247] kobject: 'batman_adv' (000000001fc51584): calling ktype release [ 1263.673740] kobject: (000000001fc51584): dynamic_kobj_release [ 1263.683827] kobject: 'batman_adv': free name [ 1263.688500] kobject: 'rx-0' (000000002623ea0c): kobject_cleanup, parent 00000000ad72b08a [ 1263.696781] kobject: 'rx-0' (000000002623ea0c): auto cleanup 'remove' event [ 1263.704025] kobject: 'rx-0' (000000002623ea0c): kobject_uevent_env [ 1263.710465] kobject: 'rx-0' (000000002623ea0c): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1263.720667] kobject: 'rx-0' (000000002623ea0c): auto cleanup kobject_del [ 1263.727656] kobject: 'rx-0' (000000002623ea0c): calling ktype release [ 1263.734282] kobject: 'rx-0': free name [ 1263.738348] kobject: 'tx-0' (00000000dc6afb72): kobject_cleanup, parent 00000000ad72b08a [ 1263.746635] kobject: 'tx-0' (00000000dc6afb72): auto cleanup 'remove' event [ 1263.753866] kobject: 'tx-0' (00000000dc6afb72): kobject_uevent_env [ 1263.760316] kobject: 'tx-0' (00000000dc6afb72): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1263.770891] kobject: 'tx-0' (00000000dc6afb72): auto cleanup kobject_del [ 1263.778151] kobject: 'tx-0' (00000000dc6afb72): calling ktype release [ 1263.784772] kobject: 'tx-0': free name [ 1263.788829] kobject: 'queues' (00000000ad72b08a): kobject_cleanup, parent (null) [ 1263.807223] kobject: 'queues' (00000000ad72b08a): calling ktype release [ 1263.814054] kobject: 'queues' (00000000ad72b08a): kset_release [ 1263.820151] kobject: 'queues': free name [ 1263.824552] kobject: 'ip6gretap0' (00000000faa87a24): kobject_uevent_env [ 1263.831534] kobject: 'ip6gretap0' (00000000faa87a24): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1263.887319] kobject: 'ip6gre0' (0000000025f53c91): kobject_cleanup, parent (null) [ 1263.895856] kobject: 'ip6gre0' (0000000025f53c91): auto cleanup 'remove' event [ 1263.903268] kobject: 'ip6gre0' (0000000025f53c91): kobject_uevent_env [ 1263.910034] kobject: 'ip6gre0' (0000000025f53c91): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1263.920392] kobject: 'ip6gre0' (0000000025f53c91): calling ktype release [ 1263.927533] kobject: 'ip6gre0': free name [ 1263.931716] kobject: 'ip6gretap0' (00000000faa87a24): kobject_cleanup, parent (null) [ 1263.940486] kobject: 'ip6gretap0' (00000000faa87a24): auto cleanup 'remove' event [ 1263.948211] kobject: 'ip6gretap0' (00000000faa87a24): kobject_uevent_env [ 1263.955034] kobject: 'ip6gretap0' (00000000faa87a24): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1263.965642] kobject: 'ip6gretap0' (00000000faa87a24): calling ktype release [ 1263.972761] kobject: 'ip6gretap0': free name [ 1264.021185] kobject: 'rx-0' (000000004028c7cc): kobject_cleanup, parent 000000007551b5ac [ 1264.029496] kobject: 'rx-0' (000000004028c7cc): auto cleanup 'remove' event [ 1264.036585] kobject: 'rx-0' (000000004028c7cc): kobject_uevent_env [ 1264.043308] kobject: 'rx-0' (000000004028c7cc): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1264.053551] kobject: 'rx-0' (000000004028c7cc): auto cleanup kobject_del [ 1264.060462] kobject: 'rx-0' (000000004028c7cc): calling ktype release [ 1264.067044] kobject: 'rx-0': free name [ 1264.071025] kobject: 'tx-0' (00000000c3d2dc98): kobject_cleanup, parent 000000007551b5ac [ 1264.079300] kobject: 'tx-0' (00000000c3d2dc98): auto cleanup 'remove' event [ 1264.086389] kobject: 'tx-0' (00000000c3d2dc98): kobject_uevent_env [ 1264.092794] kobject: 'tx-0' (00000000c3d2dc98): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1264.102884] kobject: 'tx-0' (00000000c3d2dc98): auto cleanup kobject_del [ 1264.109774] kobject: 'tx-0' (00000000c3d2dc98): calling ktype release [ 1264.116363] kobject: 'tx-0': free name [ 1264.120313] kobject: 'queues' (000000007551b5ac): kobject_cleanup, parent (null) [ 1264.128746] kobject: 'queues' (000000007551b5ac): calling ktype release [ 1264.135485] kobject: 'queues' (000000007551b5ac): kset_release [ 1264.141480] kobject: 'queues': free name [ 1264.145724] kobject: 'ip6tnl0' (0000000057f32e87): kobject_uevent_env [ 1264.152347] kobject: 'ip6tnl0' (0000000057f32e87): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1264.207365] kobject: 'ip6tnl0' (0000000057f32e87): kobject_cleanup, parent (null) [ 1264.215885] kobject: 'ip6tnl0' (0000000057f32e87): auto cleanup 'remove' event [ 1264.223395] kobject: 'ip6tnl0' (0000000057f32e87): kobject_uevent_env [ 1264.230084] kobject: 'ip6tnl0' (0000000057f32e87): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1264.240477] kobject: 'ip6tnl0' (0000000057f32e87): calling ktype release [ 1264.247413] kobject: 'ip6tnl0': free name [ 1264.297472] kobject: 'batman_adv' (0000000092bbefe9): kobject_uevent_env [ 1264.304350] kobject: 'batman_adv' (0000000092bbefe9): kobject_uevent_env: filter function caused the event to drop! [ 1264.314970] kobject: 'batman_adv' (0000000092bbefe9): kobject_cleanup, parent (null) [ 1264.323741] kobject: 'batman_adv' (0000000092bbefe9): calling ktype release [ 1264.330863] kobject: (0000000092bbefe9): dynamic_kobj_release [ 1264.336745] kobject: 'batman_adv': free name [ 1264.341315] kobject: 'rx-0' (00000000040961ea): kobject_cleanup, parent 00000000a51fbeb1 [ 1264.349555] kobject: 'rx-0' (00000000040961ea): auto cleanup 'remove' event [ 1264.356671] kobject: 'rx-0' (00000000040961ea): kobject_uevent_env [ 1264.363018] kobject: 'rx-0' (00000000040961ea): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1264.373107] kobject: 'rx-0' (00000000040961ea): auto cleanup kobject_del [ 1264.380092] kobject: 'rx-0' (00000000040961ea): calling ktype release [ 1264.386681] kobject: 'rx-0': free name [ 1264.390630] kobject: 'tx-0' (0000000055a417d9): kobject_cleanup, parent 00000000a51fbeb1 [ 1264.398894] kobject: 'tx-0' (0000000055a417d9): auto cleanup 'remove' event [ 1264.405980] kobject: 'tx-0' (0000000055a417d9): kobject_uevent_env [ 1264.412322] kobject: 'tx-0' (0000000055a417d9): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1264.422410] kobject: 'tx-0' (0000000055a417d9): auto cleanup kobject_del [ 1264.429594] kobject: 'tx-0' (0000000055a417d9): calling ktype release [ 1264.436177] kobject: 'tx-0': free name [ 1264.440123] kobject: 'queues' (00000000a51fbeb1): kobject_cleanup, parent (null) [ 1264.448883] kobject: 'queues' (00000000a51fbeb1): calling ktype release [ 1264.455616] kobject: 'queues' (00000000a51fbeb1): kset_release [ 1264.461641] kobject: 'queues': free name [ 1264.465898] kobject: 'sit0.0' (00000000c9b0c428): kobject_uevent_env [ 1264.472536] kobject: 'sit0.0' (00000000c9b0c428): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1264.483097] kobject: 'rx-0' (000000008958323e): kobject_cleanup, parent 0000000093b81140 [ 1264.491427] kobject: 'rx-0' (000000008958323e): auto cleanup 'remove' event [ 1264.498578] kobject: 'rx-0' (000000008958323e): kobject_uevent_env [ 1264.504897] kobject: 'rx-0' (000000008958323e): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1264.515164] kobject: 'rx-0' (000000008958323e): auto cleanup kobject_del [ 1264.522062] kobject: 'rx-0' (000000008958323e): calling ktype release [ 1264.528677] kobject: 'rx-0': free name [ 1264.532576] kobject: 'tx-0' (00000000e0eb146d): kobject_cleanup, parent 0000000093b81140 [ 1264.540828] kobject: 'tx-0' (00000000e0eb146d): auto cleanup 'remove' event [ 1264.547953] kobject: 'tx-0' (00000000e0eb146d): kobject_uevent_env [ 1264.554278] kobject: 'tx-0' (00000000e0eb146d): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1264.564701] kobject: 'tx-0' (00000000e0eb146d): auto cleanup kobject_del [ 1264.571603] kobject: 'tx-0' (00000000e0eb146d): calling ktype release [ 1264.578290] kobject: 'tx-0': free name [ 1264.582191] kobject: 'queues' (0000000093b81140): kobject_cleanup, parent (null) [ 1264.590649] kobject: 'queues' (0000000093b81140): calling ktype release [ 1264.597455] kobject: 'queues' (0000000093b81140): kset_release [ 1264.603426] kobject: 'queues': free name [ 1264.607798] kobject: 'sit0' (00000000e00c393f): kobject_uevent_env [ 1264.614559] kobject: 'sit0' (00000000e00c393f): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1264.677311] kobject: 'sit0.0' (00000000c9b0c428): kobject_cleanup, parent (null) [ 1264.685750] kobject: 'sit0.0' (00000000c9b0c428): auto cleanup 'remove' event [ 1264.693329] kobject: 'sit0.0' (00000000c9b0c428): kobject_uevent_env [ 1264.699866] kobject: 'sit0.0' (00000000c9b0c428): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1264.710147] kobject: 'sit0.0' (00000000c9b0c428): calling ktype release [ 1264.716936] kobject: 'sit0.0': free name [ 1264.721063] kobject: 'sit0' (00000000e00c393f): kobject_cleanup, parent (null) [ 1264.729314] kobject: 'sit0' (00000000e00c393f): auto cleanup 'remove' event [ 1264.736406] kobject: 'sit0' (00000000e00c393f): kobject_uevent_env [ 1264.742745] kobject: 'sit0' (00000000e00c393f): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1264.752838] kobject: 'sit0' (00000000e00c393f): calling ktype release [ 1264.759482] kobject: 'sit0': free name [ 1264.807430] kobject: 'rx-0' (00000000f2bca42b): kobject_cleanup, parent 00000000bc0f0b86 [ 1264.815710] kobject: 'rx-0' (00000000f2bca42b): auto cleanup 'remove' event [ 1264.823099] kobject: 'rx-0' (00000000f2bca42b): kobject_uevent_env [ 1264.829515] kobject: 'rx-0' (00000000f2bca42b): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1264.840404] kobject: 'rx-0' (00000000f2bca42b): auto cleanup kobject_del [ 1264.847313] kobject: 'rx-0' (00000000f2bca42b): calling ktype release [ 1264.854291] kobject: 'rx-0': free name [ 1264.858254] kobject: 'tx-0' (00000000efdf69a0): kobject_cleanup, parent 00000000bc0f0b86 [ 1264.866508] kobject: 'tx-0' (00000000efdf69a0): auto cleanup 'remove' event [ 1264.873659] kobject: 'tx-0' (00000000efdf69a0): kobject_uevent_env [ 1264.880138] kobject: 'tx-0' (00000000efdf69a0): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1264.890253] kobject: 'tx-0' (00000000efdf69a0): auto cleanup kobject_del [ 1264.897126] kobject: 'tx-0' (00000000efdf69a0): calling ktype release [ 1264.903758] kobject: 'tx-0': free name [ 1264.907686] kobject: 'queues' (00000000bc0f0b86): kobject_cleanup, parent (null) [ 1264.916103] kobject: 'queues' (00000000bc0f0b86): calling ktype release [ 1264.922910] kobject: 'queues' (00000000bc0f0b86): kset_release [ 1264.928921] kobject: 'queues': free name [ 1264.933562] kobject: 'ip6_vti0' (0000000009ded11d): kobject_uevent_env [ 1264.940405] kobject: 'ip6_vti0' (0000000009ded11d): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1264.954053] IPVS: ftp: loaded support on port[0] = 21 [ 1264.962645] kobject: 'lo' (000000004ada836d): kobject_add_internal: parent: 'net', set: 'devices' [ 1264.972116] kobject: 'lo' (000000004ada836d): kobject_uevent_env [ 1264.978357] kobject: 'lo' (000000004ada836d): fill_kobj_path: path = '/devices/virtual/net/lo' [ 1264.987285] kobject: 'queues' (00000000371c35a3): kobject_add_internal: parent: 'lo', set: '' [ 1264.996559] kobject: 'queues' (00000000371c35a3): kobject_uevent_env [ 1265.003242] kobject: 'queues' (00000000371c35a3): kobject_uevent_env: filter function caused the event to drop! [ 1265.013553] kobject: 'rx-0' (0000000072aa35df): kobject_add_internal: parent: 'queues', set: 'queues' [ 1265.023055] kobject: 'rx-0' (0000000072aa35df): kobject_uevent_env [ 1265.029474] kobject: 'rx-0' (0000000072aa35df): fill_kobj_path: path = '/devices/virtual/net/lo/queues/rx-0' [ 1265.039569] kobject: 'tx-0' (00000000440e0e7a): kobject_add_internal: parent: 'queues', set: 'queues' [ 1265.049143] kobject: 'tx-0' (00000000440e0e7a): kobject_uevent_env [ 1265.055526] kobject: 'tx-0' (00000000440e0e7a): fill_kobj_path: path = '/devices/virtual/net/lo/queues/tx-0' [ 1265.066198] kobject: 'ip6_vti0' (0000000009ded11d): kobject_cleanup, parent (null) [ 1265.066353] kobject: 'tunl0' (000000002620cc2a): kobject_add_internal: parent: 'net', set: 'devices' [ 1265.076279] kobject: 'ip6_vti0' (0000000009ded11d): auto cleanup 'remove' event [ 1265.084761] kobject: 'tunl0' (000000002620cc2a): kobject_uevent_env [ 1265.094421] kobject: 'ip6_vti0' (0000000009ded11d): kobject_uevent_env [ 1265.098223] kobject: 'tunl0' (000000002620cc2a): fill_kobj_path: path = '/devices/virtual/net/tunl0' [ 1265.105105] kobject: 'ip6_vti0' (0000000009ded11d): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1265.114250] kobject: 'queues' (0000000025ea7f61): kobject_add_internal: parent: 'tunl0', set: '' [ 1265.127123] kobject: 'ip6_vti0' (0000000009ded11d): calling ktype release [ 1265.134083] kobject: 'queues' (0000000025ea7f61): kobject_uevent_env [ 1265.143369] kobject: 'ip6_vti0': free name [ 1265.148695] kobject: 'queues' (0000000025ea7f61): kobject_uevent_env: filter function caused the event to drop! [ 1265.162495] kobject: 'rx-0' (0000000009e317bf): kobject_add_internal: parent: 'queues', set: 'queues' [ 1265.171982] kobject: 'rx-0' (0000000009e317bf): kobject_uevent_env [ 1265.178407] kobject: 'rx-0' (0000000009e317bf): fill_kobj_path: path = '/devices/virtual/net/tunl0/queues/rx-0' [ 1265.188775] kobject: 'tx-0' (000000009d36bf2a): kobject_add_internal: parent: 'queues', set: 'queues' [ 1265.198349] kobject: 'tx-0' (000000009d36bf2a): kobject_uevent_env [ 1265.204736] kobject: 'tx-0' (000000009d36bf2a): fill_kobj_path: path = '/devices/virtual/net/tunl0/queues/tx-0' [ 1265.215648] kobject: 'gre0' (000000002fe6aa64): kobject_add_internal: parent: 'net', set: 'devices' [ 1265.225364] kobject: 'gre0' (000000002fe6aa64): kobject_uevent_env [ 1265.231808] kobject: 'gre0' (000000002fe6aa64): fill_kobj_path: path = '/devices/virtual/net/gre0' [ 1265.241044] kobject: 'queues' (0000000026444f79): kobject_add_internal: parent: 'gre0', set: '' [ 1265.250468] kobject: 'queues' (0000000026444f79): kobject_uevent_env [ 1265.257018] kobject: 'queues' (0000000026444f79): kobject_uevent_env: filter function caused the event to drop! [ 1265.267332] kobject: 'rx-0' (000000006f418b67): kobject_add_internal: parent: 'queues', set: 'queues' [ 1265.276834] kobject: 'rx-0' (000000006f418b67): kobject_uevent_env [ 1265.283285] kobject: 'rx-0' (000000006f418b67): fill_kobj_path: path = '/devices/virtual/net/gre0/queues/rx-0' [ 1265.293559] kobject: 'tx-0' (000000006c3181c7): kobject_add_internal: parent: 'queues', set: 'queues' [ 1265.303060] kobject: 'tx-0' (000000006c3181c7): kobject_uevent_env [ 1265.307301] net_ratelimit: 30 callbacks suppressed [ 1265.307307] protocol 88fb is buggy, dev hsr_slave_0 [ 1265.309535] kobject: 'tx-0' (000000006c3181c7): fill_kobj_path: path = '/devices/virtual/net/gre0/queues/tx-0' [ 1265.314352] protocol 88fb is buggy, dev hsr_slave_1 [ 1265.380455] kobject: 'rx-0' (000000008232d25f): kobject_cleanup, parent 00000000d74647c8 [ 1265.388798] kobject: 'rx-0' (000000008232d25f): auto cleanup 'remove' event [ 1265.395886] kobject: 'rx-0' (000000008232d25f): kobject_uevent_env [ 1265.402224] kobject: 'rx-0' (000000008232d25f): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1265.412362] kobject: 'rx-0' (000000008232d25f): auto cleanup kobject_del [ 1265.419307] kobject: 'rx-0' (000000008232d25f): calling ktype release [ 1265.425913] kobject: 'rx-0': free name [ 1265.429944] kobject: 'tx-0' (000000004a632c6c): kobject_cleanup, parent 00000000d74647c8 [ 1265.438270] kobject: 'tx-0' (000000004a632c6c): auto cleanup 'remove' event [ 1265.445416] kobject: 'tx-0' (000000004a632c6c): kobject_uevent_env [ 1265.451788] kobject: 'tx-0' (000000004a632c6c): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1265.461918] kobject: 'tx-0' (000000004a632c6c): auto cleanup kobject_del [ 1265.468854] kobject: 'tx-0' (000000004a632c6c): calling ktype release [ 1265.475466] kobject: 'tx-0': free name [ 1265.479401] kobject: 'queues' (00000000d74647c8): kobject_cleanup, parent (null) [ 1265.487906] kobject: 'queues' (00000000d74647c8): calling ktype release [ 1265.494729] kobject: 'queues' (00000000d74647c8): kset_release [ 1265.500766] kobject: 'queues': free name [ 1265.505132] kobject: 'ip_vti0' (00000000f4da5684): kobject_uevent_env [ 1265.511844] kobject: 'ip_vti0' (00000000f4da5684): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1265.523216] kobject: 'gretap0' (00000000ca449d81): kobject_add_internal: parent: 'net', set: 'devices' [ 1265.533285] kobject: 'gretap0' (00000000ca449d81): kobject_uevent_env [ 1265.539960] kobject: 'gretap0' (00000000ca449d81): fill_kobj_path: path = '/devices/virtual/net/gretap0' [ 1265.549686] kobject: 'queues' (000000003692d455): kobject_add_internal: parent: 'gretap0', set: '' [ 1265.559420] kobject: 'queues' (000000003692d455): kobject_uevent_env [ 1265.565958] kobject: 'queues' (000000003692d455): kobject_uevent_env: filter function caused the event to drop! [ 1265.576269] kobject: 'rx-0' (00000000cf6cc706): kobject_add_internal: parent: 'queues', set: 'queues' [ 1265.585757] kobject: 'rx-0' (00000000cf6cc706): kobject_uevent_env [ 1265.592173] kobject: 'rx-0' (00000000cf6cc706): fill_kobj_path: path = '/devices/virtual/net/gretap0/queues/rx-0' [ 1265.602709] kobject: 'tx-0' (0000000049275807): kobject_add_internal: parent: 'queues', set: 'queues' [ 1265.612349] kobject: 'tx-0' (0000000049275807): kobject_uevent_env [ 1265.618770] kobject: 'tx-0' (0000000049275807): fill_kobj_path: path = '/devices/virtual/net/gretap0/queues/tx-0' [ 1265.629791] kobject: 'batman_adv' (00000000e8a8c2b9): kobject_add_internal: parent: 'gretap0', set: '' [ 1265.640325] kobject: 'erspan0' (0000000032a81834): kobject_add_internal: parent: 'net', set: 'devices' [ 1265.650461] kobject: 'erspan0' (0000000032a81834): kobject_uevent_env [ 1265.657120] kobject: 'erspan0' (0000000032a81834): fill_kobj_path: path = '/devices/virtual/net/erspan0' [ 1265.666960] kobject: 'queues' (00000000eef42b43): kobject_add_internal: parent: 'erspan0', set: '' [ 1265.676720] kobject: 'queues' (00000000eef42b43): kobject_uevent_env [ 1265.683274] kobject: 'queues' (00000000eef42b43): kobject_uevent_env: filter function caused the event to drop! [ 1265.693552] kobject: 'rx-0' (000000000d301b06): kobject_add_internal: parent: 'queues', set: 'queues' [ 1265.703037] kobject: 'rx-0' (000000000d301b06): kobject_uevent_env [ 1265.709455] kobject: 'rx-0' (000000000d301b06): fill_kobj_path: path = '/devices/virtual/net/erspan0/queues/rx-0' [ 1265.719984] kobject: 'tx-0' (000000009da87f01): kobject_add_internal: parent: 'queues', set: 'queues' [ 1265.729526] kobject: 'tx-0' (000000009da87f01): kobject_uevent_env [ 1265.735921] kobject: 'tx-0' (000000009da87f01): fill_kobj_path: path = '/devices/virtual/net/erspan0/queues/tx-0' [ 1265.746885] kobject: 'batman_adv' (000000003d0be5ea): kobject_add_internal: parent: 'erspan0', set: '' [ 1265.757337] kobject: 'ip_vti0' (0000000048a12821): kobject_add_internal: parent: 'net', set: 'devices' [ 1265.767765] kobject: 'ip_vti0' (0000000048a12821): kobject_uevent_env [ 1265.774439] kobject: 'ip_vti0' (0000000048a12821): fill_kobj_path: path = '/devices/virtual/net/ip_vti0' [ 1265.784191] kobject: 'queues' (0000000044c83c74): kobject_add_internal: parent: 'ip_vti0', set: '' [ 1265.794020] kobject: 'queues' (0000000044c83c74): kobject_uevent_env [ 1265.800617] kobject: 'queues' (0000000044c83c74): kobject_uevent_env: filter function caused the event to drop! [ 1265.810953] kobject: 'rx-0' (00000000a532169f): kobject_add_internal: parent: 'queues', set: 'queues' [ 1265.820418] kobject: 'rx-0' (00000000a532169f): kobject_uevent_env [ 1265.826789] kobject: 'rx-0' (00000000a532169f): fill_kobj_path: path = '/devices/virtual/net/ip_vti0/queues/rx-0' [ 1265.837383] kobject: 'tx-0' (000000007d196a76): kobject_add_internal: parent: 'queues', set: 'queues' [ 1265.846920] kobject: 'tx-0' (000000007d196a76): kobject_uevent_env [ 1265.853352] kobject: 'tx-0' (000000007d196a76): fill_kobj_path: path = '/devices/virtual/net/ip_vti0/queues/tx-0' [ 1265.864329] kobject: 'ip_vti0' (00000000f4da5684): kobject_cleanup, parent (null) [ 1265.864520] kobject: 'ip6_vti0' (00000000f3e2832e): kobject_add_internal: parent: 'net', set: 'devices' [ 1265.876367] kobject: 'ip_vti0' (00000000f4da5684): auto cleanup 'remove' event [ 1265.883144] kobject: 'ip6_vti0' (00000000f3e2832e): kobject_uevent_env [ 1265.892326] kobject: 'ip_vti0' (00000000f4da5684): kobject_uevent_env [ 1265.896619] kobject: 'ip6_vti0' (00000000f3e2832e): fill_kobj_path: path = '/devices/virtual/net/ip6_vti0' [ 1265.903290] kobject: 'ip_vti0' (00000000f4da5684): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1265.913055] kobject: 'queues' (00000000716b3c02): kobject_add_internal: parent: 'ip6_vti0', set: '' [ 1265.925777] kobject: 'ip_vti0' (00000000f4da5684): calling ktype release [ 1265.933584] kobject: 'queues' (00000000716b3c02): kobject_uevent_env [ 1265.942778] kobject: 'ip_vti0': free name [ 1265.946880] kobject: 'queues' (00000000716b3c02): kobject_uevent_env: filter function caused the event to drop! [ 1265.961312] kobject: 'rx-0' (00000000a7602fab): kobject_add_internal: parent: 'queues', set: 'queues' [ 1265.970836] kobject: 'rx-0' (00000000a7602fab): kobject_uevent_env [ 1265.977291] kobject: 'rx-0' (00000000a7602fab): fill_kobj_path: path = '/devices/virtual/net/ip6_vti0/queues/rx-0' [ 1265.987932] kobject: 'tx-0' (0000000020e92c7d): kobject_add_internal: parent: 'queues', set: 'queues' [ 1265.997459] kobject: 'tx-0' (0000000020e92c7d): kobject_uevent_env [ 1266.003865] kobject: 'tx-0' (0000000020e92c7d): fill_kobj_path: path = '/devices/virtual/net/ip6_vti0/queues/tx-0' [ 1266.063170] kobject: 'batman_adv' (00000000035d33a9): kobject_uevent_env [ 1266.070061] kobject: 'batman_adv' (00000000035d33a9): kobject_uevent_env: filter function caused the event to drop! [ 1266.080675] kobject: 'batman_adv' (00000000035d33a9): kobject_cleanup, parent (null) [ 1266.089507] kobject: 'batman_adv' (00000000035d33a9): calling ktype release [ 1266.096641] kobject: (00000000035d33a9): dynamic_kobj_release [ 1266.102585] kobject: 'batman_adv': free name [ 1266.107171] kobject: 'rx-0' (0000000098dc4dbf): kobject_cleanup, parent 0000000084e009e2 [ 1266.115471] kobject: 'rx-0' (0000000098dc4dbf): auto cleanup 'remove' event [ 1266.122628] kobject: 'rx-0' (0000000098dc4dbf): kobject_uevent_env [ 1266.129027] kobject: 'rx-0' (0000000098dc4dbf): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1266.139239] kobject: 'rx-0' (0000000098dc4dbf): auto cleanup kobject_del [ 1266.146132] kobject: 'rx-0' (0000000098dc4dbf): calling ktype release [ 1266.152885] kobject: 'rx-0': free name [ 1266.156846] kobject: 'tx-0' (000000008ccf724d): kobject_cleanup, parent 0000000084e009e2 [ 1266.165152] kobject: 'tx-0' (000000008ccf724d): auto cleanup 'remove' event [ 1266.172319] kobject: 'tx-0' (000000008ccf724d): kobject_uevent_env [ 1266.178704] kobject: 'tx-0' (000000008ccf724d): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1266.188830] kobject: 'tx-0' (000000008ccf724d): auto cleanup kobject_del [ 1266.195775] kobject: 'tx-0' (000000008ccf724d): calling ktype release [ 1266.202429] kobject: 'tx-0': free name [ 1266.206365] kobject: 'queues' (0000000084e009e2): kobject_cleanup, parent (null) [ 1266.215084] kobject: 'queues' (0000000084e009e2): calling ktype release [ 1266.221922] kobject: 'queues' (0000000084e009e2): kset_release [ 1266.227950] kobject: 'queues': free name [ 1266.232287] kobject: 'erspan0' (00000000d809d612): kobject_uevent_env [ 1266.238927] kobject: 'erspan0' (00000000d809d612): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1266.249500] kobject: 'sit0' (00000000bcdb0411): kobject_add_internal: parent: 'net', set: 'devices' [ 1266.259414] kobject: 'sit0' (00000000bcdb0411): kobject_uevent_env [ 1266.265812] kobject: 'sit0' (00000000bcdb0411): fill_kobj_path: path = '/devices/virtual/net/sit0' [ 1266.275093] kobject: 'queues' (00000000bec64667): kobject_add_internal: parent: 'sit0', set: '' [ 1266.284593] kobject: 'queues' (00000000bec64667): kobject_uevent_env [ 1266.291157] kobject: 'queues' (00000000bec64667): kobject_uevent_env: filter function caused the event to drop! [ 1266.301447] kobject: 'rx-0' (000000007dfeee83): kobject_add_internal: parent: 'queues', set: 'queues' [ 1266.310930] kobject: 'rx-0' (000000007dfeee83): kobject_uevent_env [ 1266.317351] kobject: 'rx-0' (000000007dfeee83): fill_kobj_path: path = '/devices/virtual/net/sit0/queues/rx-0' [ 1266.327604] kobject: 'tx-0' (000000001aae8153): kobject_add_internal: parent: 'queues', set: 'queues' [ 1266.337124] kobject: 'tx-0' (000000001aae8153): kobject_uevent_env [ 1266.343531] kobject: 'tx-0' (000000001aae8153): fill_kobj_path: path = '/devices/virtual/net/sit0/queues/tx-0' [ 1266.347280] protocol 88fb is buggy, dev hsr_slave_0 [ 1266.354657] kobject: 'ip6tnl0' (00000000c4b7cbb4): kobject_add_internal: parent: 'net', set: 'devices' [ 1266.358737] protocol 88fb is buggy, dev hsr_slave_1 [ 1266.368629] kobject: 'ip6tnl0' (00000000c4b7cbb4): kobject_uevent_env [ 1266.379899] kobject: 'ip6tnl0' (00000000c4b7cbb4): fill_kobj_path: path = '/devices/virtual/net/ip6tnl0' [ 1266.389652] kobject: 'queues' (00000000dece7c07): kobject_add_internal: parent: 'ip6tnl0', set: '' [ 1266.399432] kobject: 'queues' (00000000dece7c07): kobject_uevent_env [ 1266.405978] kobject: 'queues' (00000000dece7c07): kobject_uevent_env: filter function caused the event to drop! [ 1266.416457] kobject: 'rx-0' (00000000e7cf5406): kobject_add_internal: parent: 'queues', set: 'queues' [ 1266.425905] kobject: 'rx-0' (00000000e7cf5406): kobject_uevent_env [ 1266.432649] kobject: 'rx-0' (00000000e7cf5406): fill_kobj_path: path = '/devices/virtual/net/ip6tnl0/queues/rx-0' [ 1266.443201] kobject: 'tx-0' (0000000043aff74a): kobject_add_internal: parent: 'queues', set: 'queues' [ 1266.452708] kobject: 'tx-0' (0000000043aff74a): kobject_uevent_env [ 1266.459170] kobject: 'tx-0' (0000000043aff74a): fill_kobj_path: path = '/devices/virtual/net/ip6tnl0/queues/tx-0' [ 1266.470202] kobject: 'erspan0' (00000000d809d612): kobject_cleanup, parent (null) [ 1266.470343] kobject: 'ip6gre0' (00000000cd278dda): kobject_add_internal: parent: 'net', set: 'devices' [ 1266.478881] kobject: 'erspan0' (00000000d809d612): auto cleanup 'remove' event [ 1266.488757] kobject: 'ip6gre0' (00000000cd278dda): kobject_uevent_env [ 1266.498218] kobject: 'erspan0' (00000000d809d612): kobject_uevent_env [ 1266.502317] kobject: 'ip6gre0' (00000000cd278dda): fill_kobj_path: path = '/devices/virtual/net/ip6gre0' [ 1266.510256] kobject: 'erspan0' (00000000d809d612): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1266.518535] kobject: 'queues' (00000000cc0dd285): kobject_add_internal: parent: 'ip6gre0', set: '' [ 1266.531458] kobject: 'erspan0' (00000000d809d612): calling ktype release [ 1266.538464] kobject: 'queues' (00000000cc0dd285): kobject_uevent_env [ 1266.545534] kobject: 'erspan0': free name [ 1266.551829] kobject: 'queues' (00000000cc0dd285): kobject_uevent_env: filter function caused the event to drop! [ 1266.566214] kobject: 'rx-0' (0000000040eb5742): kobject_add_internal: parent: 'queues', set: 'queues' [ 1266.575667] kobject: 'rx-0' (0000000040eb5742): kobject_uevent_env [ 1266.582140] kobject: 'rx-0' (0000000040eb5742): fill_kobj_path: path = '/devices/virtual/net/ip6gre0/queues/rx-0' [ 1266.592679] kobject: 'tx-0' (00000000ca050cbd): kobject_add_internal: parent: 'queues', set: 'queues' [ 1266.602195] kobject: 'tx-0' (00000000ca050cbd): kobject_uevent_env [ 1266.608626] kobject: 'tx-0' (00000000ca050cbd): fill_kobj_path: path = '/devices/virtual/net/ip6gre0/queues/tx-0' [ 1266.668379] kobject: 'batman_adv' (00000000045d07c5): kobject_uevent_env [ 1266.675248] kobject: 'batman_adv' (00000000045d07c5): kobject_uevent_env: filter function caused the event to drop! [ 1266.685872] kobject: 'batman_adv' (00000000045d07c5): kobject_cleanup, parent (null) [ 1266.694652] kobject: 'batman_adv' (00000000045d07c5): calling ktype release [ 1266.701777] kobject: (00000000045d07c5): dynamic_kobj_release [ 1266.707696] kobject: 'batman_adv': free name [ 1266.712196] kobject: 'rx-0' (00000000ec82a094): kobject_cleanup, parent 00000000115d32e2 [ 1266.720434] kobject: 'rx-0' (00000000ec82a094): auto cleanup 'remove' event [ 1266.727563] kobject: 'rx-0' (00000000ec82a094): kobject_uevent_env [ 1266.733865] kobject: 'rx-0' (00000000ec82a094): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1266.743936] kobject: 'rx-0' (00000000ec82a094): auto cleanup kobject_del [ 1266.750809] kobject: 'rx-0' (00000000ec82a094): calling ktype release [ 1266.757415] kobject: 'rx-0': free name [ 1266.761343] kobject: 'tx-0' (00000000a78ddf50): kobject_cleanup, parent 00000000115d32e2 [ 1266.769613] kobject: 'tx-0' (00000000a78ddf50): auto cleanup 'remove' event [ 1266.776703] kobject: 'tx-0' (00000000a78ddf50): kobject_uevent_env [ 1266.783064] kobject: 'tx-0' (00000000a78ddf50): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1266.793306] kobject: 'tx-0' (00000000a78ddf50): auto cleanup kobject_del [ 1266.800198] kobject: 'tx-0' (00000000a78ddf50): calling ktype release [ 1266.806777] kobject: 'tx-0': free name [ 1266.810905] kobject: 'queues' (00000000115d32e2): kobject_cleanup, parent (null) [ 1266.819347] kobject: 'queues' (00000000115d32e2): calling ktype release [ 1266.826094] kobject: 'queues' (00000000115d32e2): kset_release [ 1266.832127] kobject: 'queues': free name [ 1266.836397] kobject: 'gretap0' (000000000807c5d1): kobject_uevent_env [ 1266.837265] protocol 88fb is buggy, dev hsr_slave_0 [ 1266.843020] kobject: 'gretap0' (000000000807c5d1): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1266.848013] protocol 88fb is buggy, dev hsr_slave_1 [ 1266.863354] protocol 88fb is buggy, dev hsr_slave_0 [ 1266.868396] protocol 88fb is buggy, dev hsr_slave_1 [ 1266.873434] protocol 88fb is buggy, dev hsr_slave_0 [ 1266.878491] protocol 88fb is buggy, dev hsr_slave_1 [ 1266.883959] kobject: 'syz_tun' (00000000851672e0): kobject_add_internal: parent: 'net', set: 'devices' [ 1266.893906] kobject: 'syz_tun' (00000000851672e0): kobject_uevent_env [ 1266.900598] kobject: 'syz_tun' (00000000851672e0): fill_kobj_path: path = '/devices/virtual/net/syz_tun' [ 1266.910378] kobject: 'queues' (000000004b0e8beb): kobject_add_internal: parent: 'syz_tun', set: '' [ 1266.920245] kobject: 'queues' (000000004b0e8beb): kobject_uevent_env [ 1266.926725] kobject: 'queues' (000000004b0e8beb): kobject_uevent_env: filter function caused the event to drop! [ 1266.937495] kobject: 'rx-0' (000000004a2c753d): kobject_add_internal: parent: 'queues', set: 'queues' [ 1266.946872] kobject: 'rx-0' (000000004a2c753d): kobject_uevent_env [ 1266.953239] kobject: 'rx-0' (000000004a2c753d): fill_kobj_path: path = '/devices/virtual/net/syz_tun/queues/rx-0' [ 1266.964001] kobject: 'tx-0' (00000000a392130a): kobject_add_internal: parent: 'queues', set: 'queues' [ 1266.973466] kobject: 'tx-0' (00000000a392130a): kobject_uevent_env [ 1266.979847] kobject: 'tx-0' (00000000a392130a): fill_kobj_path: path = '/devices/virtual/net/syz_tun/queues/tx-0' [ 1266.990881] kobject: 'batman_adv' (00000000de012c3d): kobject_add_internal: parent: 'syz_tun', set: '' [ 1267.001108] kobject: 'gretap0' (000000000807c5d1): kobject_cleanup, parent (null) [ 1267.004470] kobject: 'ip6gretap0' (00000000d38523f5): kobject_add_internal: parent: 'net', set: 'devices' [ 1267.012347] kobject: 'gretap0' (000000000807c5d1): auto cleanup 'remove' event [ 1267.020049] kobject: 'ip6gretap0' (00000000d38523f5): kobject_uevent_env [ 1267.026927] kobject: 'gretap0' (000000000807c5d1): kobject_uevent_env [ 1267.033741] kobject: 'ip6gretap0' (00000000d38523f5): fill_kobj_path: path = '/devices/virtual/net/ip6gretap0' [ 1267.042965] kobject: 'gretap0' (000000000807c5d1): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1267.050714] kobject: 'queues' (000000008ba70fde): kobject_add_internal: parent: 'ip6gretap0', set: '' [ 1267.063286] kobject: 'gretap0' (000000000807c5d1): calling ktype release [ 1267.070900] kobject: 'queues' (000000008ba70fde): kobject_uevent_env [ 1267.080093] kobject: 'gretap0': free name [ 1267.084035] kobject: 'queues' (000000008ba70fde): kobject_uevent_env: filter function caused the event to drop! [ 1267.084061] kobject: 'rx-0' (000000000ad3f813): kobject_add_internal: parent: 'queues', set: 'queues' [ 1267.084108] kobject: 'rx-0' (000000000ad3f813): kobject_uevent_env [ 1267.114195] kobject: 'rx-0' (000000000ad3f813): fill_kobj_path: path = '/devices/virtual/net/ip6gretap0/queues/rx-0' [ 1267.124945] kobject: 'tx-0' (00000000afd3bc23): kobject_add_internal: parent: 'queues', set: 'queues' [ 1267.134388] kobject: 'tx-0' (00000000afd3bc23): kobject_uevent_env [ 1267.140750] kobject: 'tx-0' (00000000afd3bc23): fill_kobj_path: path = '/devices/virtual/net/ip6gretap0/queues/tx-0' [ 1267.152156] kobject: 'batman_adv' (000000001aeeae0a): kobject_add_internal: parent: 'ip6gretap0', set: '' [ 1267.205824] kobject: 'rx-0' (00000000c03ab4e9): kobject_cleanup, parent 000000009b3845bb [ 1267.214115] kobject: 'rx-0' (00000000c03ab4e9): auto cleanup 'remove' event [ 1267.221376] kobject: 'rx-0' (00000000c03ab4e9): kobject_uevent_env [ 1267.227743] kobject: 'rx-0' (00000000c03ab4e9): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1267.237944] kobject: 'rx-0' (00000000c03ab4e9): auto cleanup kobject_del [ 1267.244790] kobject: 'rx-0' (00000000c03ab4e9): calling ktype release [ 1267.251383] kobject: 'rx-0': free name [ 1267.255315] kobject: 'tx-0' (00000000d98012a9): kobject_cleanup, parent 000000009b3845bb [ 1267.263586] kobject: 'tx-0' (00000000d98012a9): auto cleanup 'remove' event [ 1267.270696] kobject: 'tx-0' (00000000d98012a9): kobject_uevent_env [ 1267.277022] kobject: 'tx-0' (00000000d98012a9): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1267.287102] kobject: 'tx-0' (00000000d98012a9): auto cleanup kobject_del [ 1267.293979] kobject: 'tx-0' (00000000d98012a9): calling ktype release [ 1267.300660] kobject: 'tx-0': free name [ 1267.304554] kobject: 'queues' (000000009b3845bb): kobject_cleanup, parent (null) [ 1267.313246] kobject: 'queues' (000000009b3845bb): calling ktype release [ 1267.320050] kobject: 'queues' (000000009b3845bb): kset_release [ 1267.326038] kobject: 'queues': free name [ 1267.330481] kobject: 'gre0' (00000000fc449686): kobject_uevent_env [ 1267.336821] kobject: 'gre0' (00000000fc449686): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1267.347414] kobject: 'bridge0' (000000008facdf72): kobject_add_internal: parent: 'net', set: 'devices' [ 1267.357419] kobject: 'bridge0' (000000008facdf72): kobject_uevent_env [ 1267.364016] kobject: 'bridge0' (000000008facdf72): fill_kobj_path: path = '/devices/virtual/net/bridge0' [ 1267.373727] kobject: 'queues' (00000000d79c3ac2): kobject_add_internal: parent: 'bridge0', set: '' [ 1267.383376] kobject: 'queues' (00000000d79c3ac2): kobject_uevent_env [ 1267.391037] kobject: 'queues' (00000000d79c3ac2): kobject_uevent_env: filter function caused the event to drop! [ 1267.401360] kobject: 'rx-0' (00000000bb8ca348): kobject_add_internal: parent: 'queues', set: 'queues' [ 1267.410799] kobject: 'rx-0' (00000000bb8ca348): kobject_uevent_env [ 1267.417132] kobject: 'rx-0' (00000000bb8ca348): fill_kobj_path: path = '/devices/virtual/net/bridge0/queues/rx-0' [ 1267.427623] kobject: 'tx-0' (000000007904fb43): kobject_add_internal: parent: 'queues', set: 'queues' [ 1267.437048] kobject: 'tx-0' (000000007904fb43): kobject_uevent_env [ 1267.443682] kobject: 'tx-0' (000000007904fb43): fill_kobj_path: path = '/devices/virtual/net/bridge0/queues/tx-0' [ 1267.454859] kobject: 'brif' (00000000a22d3b67): kobject_add_internal: parent: 'bridge0', set: '' [ 1267.464489] kobject: 'batman_adv' (000000005fb5a046): kobject_add_internal: parent: 'bridge0', set: '' [ 1267.474746] kobject: 'gre0' (00000000fc449686): kobject_cleanup, parent (null) [ 1267.474949] kobject: 'vcan0' (00000000190cd380): kobject_add_internal: parent: 'net', set: 'devices' [ 1267.485719] kobject: 'gre0' (00000000fc449686): auto cleanup 'remove' event [ 1267.492810] kobject: 'vcan0' (00000000190cd380): kobject_uevent_env [ 1267.502141] kobject: 'gre0' (00000000fc449686): kobject_uevent_env [ 1267.505940] kobject: 'vcan0' (00000000190cd380): fill_kobj_path: path = '/devices/virtual/net/vcan0' [ 1267.506027] kobject: 'queues' (0000000025b787a5): kobject_add_internal: parent: 'vcan0', set: '' [ 1267.512461] kobject: 'gre0' (00000000fc449686): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1267.521617] kobject: 'queues' (0000000025b787a5): kobject_uevent_env [ 1267.521626] kobject: 'queues' (0000000025b787a5): kobject_uevent_env: filter function caused the event to drop! [ 1267.521649] kobject: 'rx-0' (000000009117dc2f): kobject_add_internal: parent: 'queues', set: 'queues' [ 1267.533842] kobject: 'gre0' (00000000fc449686): calling ktype release [ 1267.541211] kobject: 'rx-0' (000000009117dc2f): kobject_uevent_env [ 1267.541243] kobject: 'rx-0' (000000009117dc2f): fill_kobj_path: path = '/devices/virtual/net/vcan0/queues/rx-0' [ 1267.550475] kobject: 'gre0': free name [ 1267.558083] kobject: 'tx-0' (000000007ead7c92): kobject_add_internal: parent: 'queues', set: 'queues' [ 1267.604230] kobject: 'tx-0' (000000007ead7c92): kobject_uevent_env [ 1267.610616] kobject: 'tx-0' (000000007ead7c92): fill_kobj_path: path = '/devices/virtual/net/vcan0/queues/tx-0' [ 1267.663536] kobject: 'rx-0' (000000006f24ef8f): kobject_cleanup, parent 0000000094f9be27 [ 1267.671847] kobject: 'rx-0' (000000006f24ef8f): auto cleanup 'remove' event [ 1267.679157] kobject: 'rx-0' (000000006f24ef8f): kobject_uevent_env [ 1267.685484] kobject: 'rx-0' (000000006f24ef8f): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1267.695628] kobject: 'rx-0' (000000006f24ef8f): auto cleanup kobject_del [ 1267.702598] kobject: 'rx-0' (000000006f24ef8f): calling ktype release [ 1267.709445] kobject: 'rx-0': free name [ 1267.713361] kobject: 'tx-0' (00000000db068519): kobject_cleanup, parent 0000000094f9be27 [ 1267.721626] kobject: 'tx-0' (00000000db068519): auto cleanup 'remove' event [ 1267.728960] kobject: 'tx-0' (00000000db068519): kobject_uevent_env [ 1267.735280] kobject: 'tx-0' (00000000db068519): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1267.745362] kobject: 'tx-0' (00000000db068519): auto cleanup kobject_del [ 1267.752348] kobject: 'tx-0' (00000000db068519): calling ktype release [ 1267.758955] kobject: 'tx-0': free name [ 1267.762862] kobject: 'queues' (0000000094f9be27): kobject_cleanup, parent (null) [ 1267.771345] kobject: 'queues' (0000000094f9be27): calling ktype release [ 1267.778142] kobject: 'queues' (0000000094f9be27): kset_release [ 1267.784118] kobject: 'queues': free name [ 1267.789206] kobject: 'tunl0' (00000000d5f0cffe): kobject_uevent_env [ 1267.795634] kobject: 'tunl0' (00000000d5f0cffe): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1267.806344] kobject: 'bond0' (000000000c2bbc5f): kobject_add_internal: parent: 'net', set: 'devices' [ 1267.816140] kobject: 'bond0' (000000000c2bbc5f): kobject_uevent_env [ 1267.822612] kobject: 'bond0' (000000000c2bbc5f): fill_kobj_path: path = '/devices/virtual/net/bond0' [ 1267.831999] kobject: 'queues' (0000000026df26b5): kobject_add_internal: parent: 'bond0', set: '' [ 1267.841487] kobject: 'queues' (0000000026df26b5): kobject_uevent_env [ 1267.848090] kobject: 'queues' (0000000026df26b5): kobject_uevent_env: filter function caused the event to drop! [ 1267.858626] kobject: 'rx-0' (000000001c92f55a): kobject_add_internal: parent: 'queues', set: 'queues' [ 1267.868065] kobject: 'rx-0' (000000001c92f55a): kobject_uevent_env [ 1267.874414] kobject: 'rx-0' (000000001c92f55a): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-0' [ 1267.884741] kobject: 'rx-1' (00000000a678c0c6): kobject_add_internal: parent: 'queues', set: 'queues' [ 1267.894174] kobject: 'rx-1' (00000000a678c0c6): kobject_uevent_env [ 1267.900544] kobject: 'rx-1' (00000000a678c0c6): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-1' [ 1267.910981] kobject: 'rx-2' (00000000e6545f79): kobject_add_internal: parent: 'queues', set: 'queues' [ 1267.920393] kobject: 'rx-2' (00000000e6545f79): kobject_uevent_env [ 1267.926735] kobject: 'rx-2' (00000000e6545f79): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-2' [ 1267.937064] kobject: 'rx-3' (0000000092bf1bf2): kobject_add_internal: parent: 'queues', set: 'queues' [ 1267.946477] kobject: 'rx-3' (0000000092bf1bf2): kobject_uevent_env [ 1267.952883] kobject: 'rx-3' (0000000092bf1bf2): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-3' [ 1267.963215] kobject: 'rx-4' (00000000347228f8): kobject_add_internal: parent: 'queues', set: 'queues' [ 1267.972660] kobject: 'rx-4' (00000000347228f8): kobject_uevent_env [ 1267.979045] kobject: 'rx-4' (00000000347228f8): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-4' [ 1267.989546] kobject: 'rx-5' (000000007bccc3ec): kobject_add_internal: parent: 'queues', set: 'queues' [ 1267.998975] kobject: 'rx-5' (000000007bccc3ec): kobject_uevent_env [ 1268.005315] kobject: 'rx-5' (000000007bccc3ec): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-5' [ 1268.015662] kobject: 'rx-6' (0000000027c517b4): kobject_add_internal: parent: 'queues', set: 'queues' [ 1268.025068] kobject: 'rx-6' (0000000027c517b4): kobject_uevent_env [ 1268.031430] kobject: 'rx-6' (0000000027c517b4): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-6' [ 1268.041752] kobject: 'rx-7' (00000000f44a1d00): kobject_add_internal: parent: 'queues', set: 'queues' [ 1268.051172] kobject: 'rx-7' (00000000f44a1d00): kobject_uevent_env [ 1268.057636] kobject: 'rx-7' (00000000f44a1d00): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-7' [ 1268.068016] kobject: 'rx-8' (00000000bc46eff9): kobject_add_internal: parent: 'queues', set: 'queues' [ 1268.077455] kobject: 'rx-8' (00000000bc46eff9): kobject_uevent_env [ 1268.083807] kobject: 'rx-8' (00000000bc46eff9): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-8' [ 1268.094125] kobject: 'rx-9' (00000000b32ee89a): kobject_add_internal: parent: 'queues', set: 'queues' [ 1268.103538] kobject: 'rx-9' (00000000b32ee89a): kobject_uevent_env [ 1268.109915] kobject: 'rx-9' (00000000b32ee89a): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-9' [ 1268.120400] kobject: 'rx-10' (00000000d5a397ba): kobject_add_internal: parent: 'queues', set: 'queues' [ 1268.129946] kobject: 'rx-10' (00000000d5a397ba): kobject_uevent_env [ 1268.136380] kobject: 'rx-10' (00000000d5a397ba): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-10' [ 1268.146880] kobject: 'rx-11' (000000007f422e7d): kobject_add_internal: parent: 'queues', set: 'queues' [ 1268.156381] kobject: 'rx-11' (000000007f422e7d): kobject_uevent_env [ 1268.162830] kobject: 'rx-11' (000000007f422e7d): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-11' [ 1268.173308] kobject: 'rx-12' (00000000956d4fec): kobject_add_internal: parent: 'queues', set: 'queues' [ 1268.182806] kobject: 'rx-12' (00000000956d4fec): kobject_uevent_env [ 1268.189357] kobject: 'rx-12' (00000000956d4fec): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-12' [ 1268.199872] kobject: 'rx-13' (00000000f03617bc): kobject_add_internal: parent: 'queues', set: 'queues' [ 1268.209368] kobject: 'rx-13' (00000000f03617bc): kobject_uevent_env [ 1268.215785] kobject: 'rx-13' (00000000f03617bc): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-13' [ 1268.226278] kobject: 'rx-14' (000000003ea6f914): kobject_add_internal: parent: 'queues', set: 'queues' [ 1268.235776] kobject: 'rx-14' (000000003ea6f914): kobject_uevent_env [ 1268.242227] kobject: 'rx-14' (000000003ea6f914): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-14' [ 1268.252889] kobject: 'rx-15' (00000000bdd63755): kobject_add_internal: parent: 'queues', set: 'queues' [ 1268.262403] kobject: 'rx-15' (00000000bdd63755): kobject_uevent_env [ 1268.268897] kobject: 'rx-15' (00000000bdd63755): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-15' [ 1268.279423] kobject: 'tx-0' (00000000f1adea54): kobject_add_internal: parent: 'queues', set: 'queues' [ 1268.288886] kobject: 'tx-0' (00000000f1adea54): kobject_uevent_env [ 1268.295218] kobject: 'tx-0' (00000000f1adea54): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-0' [ 1268.305528] kobject: 'tx-1' (0000000070d73ab8): kobject_add_internal: parent: 'queues', set: 'queues' [ 1268.315001] kobject: 'tx-1' (0000000070d73ab8): kobject_uevent_env [ 1268.321357] kobject: 'tx-1' (0000000070d73ab8): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-1' [ 1268.331664] kobject: 'tx-2' (000000009f37bcc4): kobject_add_internal: parent: 'queues', set: 'queues' [ 1268.341136] kobject: 'tx-2' (000000009f37bcc4): kobject_uevent_env [ 1268.347663] kobject: 'tx-2' (000000009f37bcc4): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-2' [ 1268.358006] kobject: 'tx-3' (000000007ad3c7ab): kobject_add_internal: parent: 'queues', set: 'queues' [ 1268.367475] kobject: 'tx-3' (000000007ad3c7ab): kobject_uevent_env [ 1268.373803] kobject: 'tx-3' (000000007ad3c7ab): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-3' [ 1268.384390] kobject: 'tx-4' (000000009e85a775): kobject_add_internal: parent: 'queues', set: 'queues' [ 1268.393912] kobject: 'tx-4' (000000009e85a775): kobject_uevent_env [ 1268.400273] kobject: 'tx-4' (000000009e85a775): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-4' [ 1268.410606] kobject: 'tx-5' (000000004d7b3baa): kobject_add_internal: parent: 'queues', set: 'queues' [ 1268.420048] kobject: 'tx-5' (000000004d7b3baa): kobject_uevent_env [ 1268.426376] kobject: 'tx-5' (000000004d7b3baa): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-5' [ 1268.436922] kobject: 'tx-6' (000000006e8191f8): kobject_add_internal: parent: 'queues', set: 'queues' [ 1268.446406] kobject: 'tx-6' (000000006e8191f8): kobject_uevent_env [ 1268.452763] kobject: 'tx-6' (000000006e8191f8): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-6' [ 1268.463086] kobject: 'tx-7' (000000000509715e): kobject_add_internal: parent: 'queues', set: 'queues' [ 1268.472528] kobject: 'tx-7' (000000000509715e): kobject_uevent_env [ 1268.478889] kobject: 'tx-7' (000000000509715e): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-7' [ 1268.489223] kobject: 'tx-8' (000000002d65cd55): kobject_add_internal: parent: 'queues', set: 'queues' [ 1268.498708] kobject: 'tx-8' (000000002d65cd55): kobject_uevent_env [ 1268.505048] kobject: 'tx-8' (000000002d65cd55): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-8' [ 1268.515600] kobject: 'tx-9' (000000000bdcf672): kobject_add_internal: parent: 'queues', set: 'queues' [ 1268.525089] kobject: 'tx-9' (000000000bdcf672): kobject_uevent_env [ 1268.531441] kobject: 'tx-9' (000000000bdcf672): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-9' [ 1268.541750] kobject: 'tx-10' (00000000fbb7ac56): kobject_add_internal: parent: 'queues', set: 'queues' [ 1268.551301] kobject: 'tx-10' (00000000fbb7ac56): kobject_uevent_env [ 1268.557750] kobject: 'tx-10' (00000000fbb7ac56): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-10' [ 1268.568244] kobject: 'tx-11' (00000000a1cdacdb): kobject_add_internal: parent: 'queues', set: 'queues' [ 1268.577793] kobject: 'tx-11' (00000000a1cdacdb): kobject_uevent_env [ 1268.584219] kobject: 'tx-11' (00000000a1cdacdb): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-11' [ 1268.594719] kobject: 'tx-12' (0000000093539936): kobject_add_internal: parent: 'queues', set: 'queues' [ 1268.604251] kobject: 'tx-12' (0000000093539936): kobject_uevent_env [ 1268.610738] kobject: 'tx-12' (0000000093539936): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-12' [ 1268.621302] kobject: 'tx-13' (0000000062fd20b9): kobject_add_internal: parent: 'queues', set: 'queues' [ 1268.630879] kobject: 'tx-13' (0000000062fd20b9): kobject_uevent_env [ 1268.637639] kobject: 'tx-13' (0000000062fd20b9): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-13' [ 1268.648165] kobject: 'tx-14' (00000000bde6b9a5): kobject_add_internal: parent: 'queues', set: 'queues' [ 1268.657817] kobject: 'tx-14' (00000000bde6b9a5): kobject_uevent_env [ 1268.664225] kobject: 'tx-14' (00000000bde6b9a5): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-14' [ 1268.674781] kobject: 'tx-15' (000000002f84b28f): kobject_add_internal: parent: 'queues', set: 'queues' [ 1268.684351] kobject: 'tx-15' (000000002f84b28f): kobject_uevent_env [ 1268.690790] kobject: 'tx-15' (000000002f84b28f): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-15' [ 1268.701739] kobject: 'batman_adv' (0000000059f50a16): kobject_add_internal: parent: 'bond0', set: '' [ 1268.711834] kobject: 'tunl0' (00000000d5f0cffe): kobject_cleanup, parent (null) [ 1268.712296] kobject: 'team0' (0000000023e18191): kobject_add_internal: parent: 'net', set: 'devices' [ 1268.723416] kobject: 'tunl0' (00000000d5f0cffe): auto cleanup 'remove' event [ 1268.729990] kobject: 'team0' (0000000023e18191): kobject_uevent_env [ 1268.736863] kobject: 'tunl0' (00000000d5f0cffe): kobject_uevent_env [ 1268.743172] kobject: 'team0' (0000000023e18191): fill_kobj_path: path = '/devices/virtual/net/team0' [ 1268.743248] kobject: 'queues' (0000000041a580f0): kobject_add_internal: parent: 'team0', set: '' [ 1268.752227] kobject: 'tunl0' (00000000d5f0cffe): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1268.758917] kobject: 'queues' (0000000041a580f0): kobject_uevent_env [ 1268.758925] kobject: 'queues' (0000000041a580f0): kobject_uevent_env: filter function caused the event to drop! [ 1268.758946] kobject: 'rx-0' (0000000066c3a972): kobject_add_internal: parent: 'queues', set: 'queues' [ 1268.771027] kobject: 'tunl0' (00000000d5f0cffe): calling ktype release [ 1268.778852] kobject: 'rx-0' (0000000066c3a972): kobject_uevent_env [ 1268.785218] kobject: 'tunl0': free name [ 1268.795357] kobject: 'rx-0' (0000000066c3a972): fill_kobj_path: path = '/devices/virtual/net/team0/queues/rx-0' [ 1268.795433] kobject: 'rx-1' (000000004b76fb98): kobject_add_internal: parent: 'queues', set: 'queues' [ 1268.841326] kobject: 'rx-1' (000000004b76fb98): kobject_uevent_env [ 1268.847707] kobject: 'rx-1' (000000004b76fb98): fill_kobj_path: path = '/devices/virtual/net/team0/queues/rx-1' [ 1268.858002] kobject: 'rx-2' (000000008308d0c7): kobject_add_internal: parent: 'queues', set: 'queues' [ 1268.867422] kobject: 'rx-2' (000000008308d0c7): kobject_uevent_env [ 1268.873763] kobject: 'rx-2' (000000008308d0c7): fill_kobj_path: path = '/devices/virtual/net/team0/queues/rx-2' [ 1268.884074] kobject: 'rx-3' (00000000584f5c3b): kobject_add_internal: parent: 'queues', set: 'queues' [ 1268.893476] kobject: 'rx-3' (00000000584f5c3b): kobject_uevent_env [ 1268.899835] kobject: 'rx-3' (00000000584f5c3b): fill_kobj_path: path = '/devices/virtual/net/team0/queues/rx-3' [ 1268.910300] kobject: 'rx-4' (00000000cf72d5ac): kobject_add_internal: parent: 'queues', set: 'queues' [ 1268.919727] kobject: 'rx-4' (00000000cf72d5ac): kobject_uevent_env [ 1268.926069] kobject: 'rx-4' (00000000cf72d5ac): fill_kobj_path: path = '/devices/virtual/net/team0/queues/rx-4' [ 1268.936789] kobject: 'rx-5' (00000000948f7035): kobject_add_internal: parent: 'queues', set: 'queues' [ 1268.946195] kobject: 'rx-5' (00000000948f7035): kobject_uevent_env [ 1268.952562] kobject: 'rx-5' (00000000948f7035): fill_kobj_path: path = '/devices/virtual/net/team0/queues/rx-5' [ 1268.962858] kobject: 'rx-6' (00000000dabd99e0): kobject_add_internal: parent: 'queues', set: 'queues' [ 1268.973168] kobject: 'rx-6' (00000000dabd99e0): kobject_uevent_env [ 1268.979642] kobject: 'rx-6' (00000000dabd99e0): fill_kobj_path: path = '/devices/virtual/net/team0/queues/rx-6' [ 1268.990998] kobject: 'rx-7' (00000000e74cc7bf): kobject_add_internal: parent: 'queues', set: 'queues' [ 1269.000464] kobject: 'rx-7' (00000000e74cc7bf): kobject_uevent_env [ 1269.006793] kobject: 'rx-7' (00000000e74cc7bf): fill_kobj_path: path = '/devices/virtual/net/team0/queues/rx-7' [ 1269.017135] kobject: 'rx-8' (0000000036a65767): kobject_add_internal: parent: 'queues', set: 'queues' [ 1269.026540] kobject: 'rx-8' (0000000036a65767): kobject_uevent_env [ 1269.032914] kobject: 'rx-8' (0000000036a65767): fill_kobj_path: path = '/devices/virtual/net/team0/queues/rx-8' [ 1269.043417] kobject: 'rx-9' (00000000a985f745): kobject_add_internal: parent: 'queues', set: 'queues' [ 1269.052843] kobject: 'rx-9' (00000000a985f745): kobject_uevent_env [ 1269.059291] kobject: 'rx-9' (00000000a985f745): fill_kobj_path: path = '/devices/virtual/net/team0/queues/rx-9' [ 1269.069610] kobject: 'rx-10' (0000000019f7ecbe): kobject_add_internal: parent: 'queues', set: 'queues' [ 1269.079099] kobject: 'rx-10' (0000000019f7ecbe): kobject_uevent_env [ 1269.085513] kobject: 'rx-10' (0000000019f7ecbe): fill_kobj_path: path = '/devices/virtual/net/team0/queues/rx-10' [ 1269.096006] kobject: 'rx-11' (000000000d1ec7bf): kobject_add_internal: parent: 'queues', set: 'queues' [ 1269.105496] kobject: 'rx-11' (000000000d1ec7bf): kobject_uevent_env [ 1269.111952] kobject: 'rx-11' (000000000d1ec7bf): fill_kobj_path: path = '/devices/virtual/net/team0/queues/rx-11' [ 1269.122413] kobject: 'rx-12' (0000000013e31fa5): kobject_add_internal: parent: 'queues', set: 'queues' [ 1269.131916] kobject: 'rx-12' (0000000013e31fa5): kobject_uevent_env [ 1269.138350] kobject: 'rx-12' (0000000013e31fa5): fill_kobj_path: path = '/devices/virtual/net/team0/queues/rx-12' [ 1269.148861] kobject: 'rx-13' (000000001362ba0b): kobject_add_internal: parent: 'queues', set: 'queues' [ 1269.158351] kobject: 'rx-13' (000000001362ba0b): kobject_uevent_env [ 1269.164761] kobject: 'rx-13' (000000001362ba0b): fill_kobj_path: path = '/devices/virtual/net/team0/queues/rx-13' [ 1269.175493] kobject: 'rx-14' (00000000bf48f9a0): kobject_add_internal: parent: 'queues', set: 'queues' [ 1269.185009] kobject: 'rx-14' (00000000bf48f9a0): kobject_uevent_env [ 1269.191451] kobject: 'rx-14' (00000000bf48f9a0): fill_kobj_path: path = '/devices/virtual/net/team0/queues/rx-14' [ 1269.202021] kobject: 'rx-15' (00000000e6ee60f3): kobject_add_internal: parent: 'queues', set: 'queues' [ 1269.211629] kobject: 'rx-15' (00000000e6ee60f3): kobject_uevent_env [ 1269.218084] kobject: 'rx-15' (00000000e6ee60f3): fill_kobj_path: path = '/devices/virtual/net/team0/queues/rx-15' [ 1269.228595] kobject: 'tx-0' (000000007e645512): kobject_add_internal: parent: 'queues', set: 'queues' [ 1269.238096] kobject: 'tx-0' (000000007e645512): kobject_uevent_env [ 1269.244433] kobject: 'tx-0' (000000007e645512): fill_kobj_path: path = '/devices/virtual/net/team0/queues/tx-0' [ 1269.254748] kobject: 'tx-1' (000000006d5d9f3a): kobject_add_internal: parent: 'queues', set: 'queues' [ 1269.264188] kobject: 'tx-1' (000000006d5d9f3a): kobject_uevent_env [ 1269.270545] kobject: 'tx-1' (000000006d5d9f3a): fill_kobj_path: path = '/devices/virtual/net/team0/queues/tx-1' [ 1269.280843] kobject: 'tx-2' (000000009324b6d6): kobject_add_internal: parent: 'queues', set: 'queues' [ 1269.290320] kobject: 'tx-2' (000000009324b6d6): kobject_uevent_env [ 1269.296659] kobject: 'tx-2' (000000009324b6d6): fill_kobj_path: path = '/devices/virtual/net/team0/queues/tx-2' [ 1269.307281] kobject: 'tx-3' (00000000f4f1471d): kobject_add_internal: parent: 'queues', set: 'queues' [ 1269.316705] kobject: 'tx-3' (00000000f4f1471d): kobject_uevent_env [ 1269.323073] kobject: 'tx-3' (00000000f4f1471d): fill_kobj_path: path = '/devices/virtual/net/team0/queues/tx-3' [ 1269.333376] kobject: 'tx-4' (00000000c410e77d): kobject_add_internal: parent: 'queues', set: 'queues' [ 1269.342849] kobject: 'tx-4' (00000000c410e77d): kobject_uevent_env [ 1269.349208] kobject: 'tx-4' (00000000c410e77d): fill_kobj_path: path = '/devices/virtual/net/team0/queues/tx-4' [ 1269.359524] kobject: 'tx-5' (00000000686cb5b8): kobject_add_internal: parent: 'queues', set: 'queues' [ 1269.368974] kobject: 'tx-5' (00000000686cb5b8): kobject_uevent_env [ 1269.375298] kobject: 'tx-5' (00000000686cb5b8): fill_kobj_path: path = '/devices/virtual/net/team0/queues/tx-5' [ 1269.385601] kobject: 'tx-6' (0000000079a2863d): kobject_add_internal: parent: 'queues', set: 'queues' [ 1269.396753] kobject: 'tx-6' (0000000079a2863d): kobject_uevent_env [ 1269.403132] kobject: 'tx-6' (0000000079a2863d): fill_kobj_path: path = '/devices/virtual/net/team0/queues/tx-6' [ 1269.413428] kobject: 'tx-7' (000000000e21318d): kobject_add_internal: parent: 'queues', set: 'queues' [ 1269.422903] kobject: 'tx-7' (000000000e21318d): kobject_uevent_env [ 1269.429425] kobject: 'tx-7' (000000000e21318d): fill_kobj_path: path = '/devices/virtual/net/team0/queues/tx-7' [ 1269.439752] kobject: 'tx-8' (0000000016bb55ec): kobject_add_internal: parent: 'queues', set: 'queues' [ 1269.449298] kobject: 'tx-8' (0000000016bb55ec): kobject_uevent_env [ 1269.455628] kobject: 'tx-8' (0000000016bb55ec): fill_kobj_path: path = '/devices/virtual/net/team0/queues/tx-8' [ 1269.465941] kobject: 'tx-9' (000000008156b921): kobject_add_internal: parent: 'queues', set: 'queues' [ 1269.475507] kobject: 'tx-9' (000000008156b921): kobject_uevent_env [ 1269.481884] kobject: 'tx-9' (000000008156b921): fill_kobj_path: path = '/devices/virtual/net/team0/queues/tx-9' [ 1269.492194] kobject: 'tx-10' (000000004bf26077): kobject_add_internal: parent: 'queues', set: 'queues' [ 1269.501766] kobject: 'tx-10' (000000004bf26077): kobject_uevent_env [ 1269.508216] kobject: 'tx-10' (000000004bf26077): fill_kobj_path: path = '/devices/virtual/net/team0/queues/tx-10' [ 1269.518719] kobject: 'tx-11' (00000000d8d45977): kobject_add_internal: parent: 'queues', set: 'queues' [ 1269.528251] kobject: 'tx-11' (00000000d8d45977): kobject_uevent_env [ 1269.534686] kobject: 'tx-11' (00000000d8d45977): fill_kobj_path: path = '/devices/virtual/net/team0/queues/tx-11' [ 1269.545191] kobject: 'tx-12' (00000000373b2f2b): kobject_add_internal: parent: 'queues', set: 'queues' [ 1269.554755] kobject: 'tx-12' (00000000373b2f2b): kobject_uevent_env [ 1269.561459] kobject: 'tx-12' (00000000373b2f2b): fill_kobj_path: path = '/devices/virtual/net/team0/queues/tx-12' [ 1269.571975] kobject: 'tx-13' (00000000bbd967ec): kobject_add_internal: parent: 'queues', set: 'queues' [ 1269.581512] kobject: 'tx-13' (00000000bbd967ec): kobject_uevent_env [ 1269.587975] kobject: 'tx-13' (00000000bbd967ec): fill_kobj_path: path = '/devices/virtual/net/team0/queues/tx-13' [ 1269.598485] kobject: 'tx-14' (000000008c017e62): kobject_add_internal: parent: 'queues', set: 'queues' [ 1269.608058] kobject: 'tx-14' (000000008c017e62): kobject_uevent_env [ 1269.614496] kobject: 'tx-14' (000000008c017e62): fill_kobj_path: path = '/devices/virtual/net/team0/queues/tx-14' [ 1269.624998] kobject: 'tx-15' (0000000090cea1a5): kobject_add_internal: parent: 'queues', set: 'queues' [ 1269.634917] kobject: 'tx-15' (0000000090cea1a5): kobject_uevent_env [ 1269.641392] kobject: 'tx-15' (0000000090cea1a5): fill_kobj_path: path = '/devices/virtual/net/team0/queues/tx-15' [ 1269.652299] kobject: 'batman_adv' (000000007eae2905): kobject_add_internal: parent: 'team0', set: '' [ 1269.708013] kobject: 'batman_adv' (000000000b4cded0): kobject_uevent_env [ 1269.714910] kobject: 'batman_adv' (000000000b4cded0): kobject_uevent_env: filter function caused the event to drop! [ 1269.725566] kobject: 'batman_adv' (000000000b4cded0): kobject_cleanup, parent (null) [ 1269.734360] kobject: 'batman_adv' (000000000b4cded0): calling ktype release [ 1269.741484] kobject: (000000000b4cded0): dynamic_kobj_release [ 1269.747384] kobject: 'batman_adv': free name [ 1269.752179] kobject: 'rx-0' (000000006c124fed): kobject_cleanup, parent 0000000045408e2d [ 1269.760434] kobject: 'rx-0' (000000006c124fed): auto cleanup 'remove' event [ 1269.767557] kobject: 'rx-0' (000000006c124fed): kobject_uevent_env [ 1269.774289] kobject: 'rx-0' (000000006c124fed): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1269.784362] kobject: 'rx-0' (000000006c124fed): auto cleanup kobject_del [ 1269.791233] kobject: 'rx-0' (000000006c124fed): calling ktype release [ 1269.797848] kobject: 'rx-0': free name [ 1269.801758] kobject: 'tx-3' (00000000e531aaef): kobject_cleanup, parent 0000000045408e2d [ 1269.810041] kobject: 'tx-3' (00000000e531aaef): auto cleanup 'remove' event [ 1269.817559] kobject: 'tx-3' (00000000e531aaef): kobject_uevent_env [ 1269.823889] kobject: 'tx-3' (00000000e531aaef): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1269.833992] kobject: 'tx-3' (00000000e531aaef): auto cleanup kobject_del [ 1269.840923] kobject: 'tx-3' (00000000e531aaef): calling ktype release [ 1269.847537] kobject: 'tx-3': free name [ 1269.851454] kobject: 'tx-2' (0000000036531ad9): kobject_cleanup, parent 0000000045408e2d [ 1269.859709] kobject: 'tx-2' (0000000036531ad9): auto cleanup 'remove' event [ 1269.866805] kobject: 'tx-2' (0000000036531ad9): kobject_uevent_env [ 1269.873155] kobject: 'tx-2' (0000000036531ad9): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1269.883225] kobject: 'tx-2' (0000000036531ad9): auto cleanup kobject_del [ 1269.890112] kobject: 'tx-2' (0000000036531ad9): calling ktype release [ 1269.896691] kobject: 'tx-2': free name [ 1269.900633] kobject: 'tx-1' (0000000038ae7b97): kobject_cleanup, parent 0000000045408e2d [ 1269.908880] kobject: 'tx-1' (0000000038ae7b97): auto cleanup 'remove' event [ 1269.915960] kobject: 'tx-1' (0000000038ae7b97): kobject_uevent_env [ 1269.922294] kobject: 'tx-1' (0000000038ae7b97): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1269.932379] kobject: 'tx-1' (0000000038ae7b97): auto cleanup kobject_del [ 1269.939271] kobject: 'tx-1' (0000000038ae7b97): calling ktype release [ 1269.945848] kobject: 'tx-1': free name [ 1269.950032] kobject: 'tx-0' (0000000066cdd8c5): kobject_cleanup, parent 0000000045408e2d [ 1269.958393] kobject: 'tx-0' (0000000066cdd8c5): auto cleanup 'remove' event [ 1269.965524] kobject: 'tx-0' (0000000066cdd8c5): kobject_uevent_env [ 1269.972221] kobject: 'tx-0' (0000000066cdd8c5): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1269.982303] kobject: 'tx-0' (0000000066cdd8c5): auto cleanup kobject_del [ 1269.989186] kobject: 'tx-0' (0000000066cdd8c5): calling ktype release [ 1269.995760] kobject: 'tx-0': free name [ 1269.999682] kobject: 'queues' (0000000045408e2d): kobject_cleanup, parent (null) [ 1270.008120] kobject: 'queues' (0000000045408e2d): calling ktype release [ 1270.014859] kobject: 'queues' (0000000045408e2d): kset_release [ 1270.020856] kobject: 'queues': free name [ 1270.025114] kobject: 'wlan3' (0000000098508f24): kobject_uevent_env [ 1270.031585] kobject: 'wlan3' (0000000098508f24): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1270.041792] kobject: 'net' (00000000d4886fbe): kobject_cleanup, parent (null) [ 1270.049963] kobject: 'net' (00000000d4886fbe): calling ktype release [ 1270.056457] kobject: 'net': free name [ 1270.060526] kobject: 'dummy0' (0000000051d9cb87): kobject_add_internal: parent: 'net', set: 'devices' [ 1270.070439] kobject: 'dummy0' (0000000051d9cb87): kobject_uevent_env [ 1270.076943] kobject: 'dummy0' (0000000051d9cb87): fill_kobj_path: path = '/devices/virtual/net/dummy0' [ 1270.086742] kobject: 'queues' (000000000f471461): kobject_add_internal: parent: 'dummy0', set: '' [ 1270.096342] kobject: 'queues' (000000000f471461): kobject_uevent_env [ 1270.102878] kobject: 'queues' (000000000f471461): kobject_uevent_env: filter function caused the event to drop! [ 1270.113145] kobject: 'rx-0' (00000000546bad54): kobject_add_internal: parent: 'queues', set: 'queues' [ 1270.122541] kobject: 'rx-0' (00000000546bad54): kobject_uevent_env [ 1270.128899] kobject: 'rx-0' (00000000546bad54): fill_kobj_path: path = '/devices/virtual/net/dummy0/queues/rx-0' [ 1270.139336] kobject: 'tx-0' (000000006cd34d6c): kobject_add_internal: parent: 'queues', set: 'queues' [ 1270.148836] kobject: 'tx-0' (000000006cd34d6c): kobject_uevent_env [ 1270.155175] kobject: 'tx-0' (000000006cd34d6c): fill_kobj_path: path = '/devices/virtual/net/dummy0/queues/tx-0' [ 1270.166044] kobject: 'batman_adv' (000000003cb16c11): kobject_add_internal: parent: 'dummy0', set: '' [ 1270.176208] kobject: 'wlan3' (0000000098508f24): kobject_cleanup, parent (null) [ 1270.176404] kobject: 'nlmon0' (00000000d587b860): kobject_add_internal: parent: 'net', set: 'devices' [ 1270.187456] kobject: 'wlan3' (0000000098508f24): auto cleanup 'remove' event [ 1270.194419] kobject: 'nlmon0' (00000000d587b860): kobject_uevent_env [ 1270.203587] kobject: 'wlan3' (0000000098508f24): kobject_uevent_env [ 1270.207968] kobject: 'nlmon0' (00000000d587b860): fill_kobj_path: path = '/devices/virtual/net/nlmon0' [ 1270.214231] kobject: 'wlan3' (0000000098508f24): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1270.223635] kobject: 'queues' (0000000021af9bdc): kobject_add_internal: parent: 'nlmon0', set: '' [ 1270.234040] kobject: 'wlan3' (0000000098508f24): calling ktype release [ 1270.245572] kobject: 'queues' (0000000021af9bdc): kobject_uevent_env [ 1270.250265] kobject: 'wlan3': free name [ 1270.256535] kobject: 'queues' (0000000021af9bdc): kobject_uevent_env: filter function caused the event to drop! [ 1270.256563] kobject: 'rx-0' (000000000e967ea5): kobject_add_internal: parent: 'queues', set: 'queues' [ 1270.256606] kobject: 'rx-0' (000000000e967ea5): kobject_uevent_env [ 1270.286850] kobject: 'rx-0' (000000000e967ea5): fill_kobj_path: path = '/devices/virtual/net/nlmon0/queues/rx-0' [ 1270.297293] kobject: 'tx-0' (000000002772d006): kobject_add_internal: parent: 'queues', set: 'queues' [ 1270.306737] kobject: 'tx-0' (000000002772d006): kobject_uevent_env [ 1270.313113] kobject: 'tx-0' (000000002772d006): fill_kobj_path: path = '/devices/virtual/net/nlmon0/queues/tx-0' [ 1270.324083] kobject: 'rfkill18' (00000000d567aa0e): kobject_uevent_env [ 1270.324086] chnl_net:caif_netlink_parms(): no params data found [ 1270.324164] kobject: 'caif0' (00000000241c4396): kobject_add_internal: parent: 'net', set: 'devices' [ 1270.333467] kobject: 'rfkill18' (00000000d567aa0e): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim14/ieee80211/phy15/rfkill18' [ 1270.337663] kobject: 'caif0' (00000000241c4396): kobject_uevent_env [ 1270.365409] kobject: 'caif0' (00000000241c4396): fill_kobj_path: path = '/devices/virtual/net/caif0' [ 1270.374790] kobject: 'queues' (00000000c42364a3): kobject_add_internal: parent: 'caif0', set: '' [ 1270.384274] kobject: 'queues' (00000000c42364a3): kobject_uevent_env [ 1270.390789] kobject: 'queues' (00000000c42364a3): kobject_uevent_env: filter function caused the event to drop! [ 1270.401053] kobject: 'rx-0' (000000009dec9607): kobject_add_internal: parent: 'queues', set: 'queues' [ 1270.410467] kobject: 'rx-0' (000000009dec9607): kobject_uevent_env [ 1270.416826] kobject: 'rx-0' (000000009dec9607): fill_kobj_path: path = '/devices/virtual/net/caif0/queues/rx-0' [ 1270.427147] kobject: 'tx-0' (00000000b7545626): kobject_add_internal: parent: 'queues', set: 'queues' [ 1270.436660] kobject: 'tx-0' (00000000b7545626): kobject_uevent_env [ 1270.443036] kobject: 'tx-0' (00000000b7545626): fill_kobj_path: path = '/devices/virtual/net/caif0/queues/tx-0' [ 1270.507525] kobject: 'phy15' (00000000d1e2b826): kobject_uevent_env [ 1270.514052] kobject: 'phy15' (00000000d1e2b826): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim14/ieee80211/phy15' [ 1270.517282] net_ratelimit: 20 callbacks suppressed [ 1270.517289] protocol 88fb is buggy, dev hsr_slave_0 [ 1270.528541] kobject: 'ieee80211' (00000000cac7b427): kobject_cleanup, parent (null) [ 1270.530819] protocol 88fb is buggy, dev hsr_slave_1 [ 1270.550323] kobject: 'ieee80211' (00000000cac7b427): calling ktype release [ 1270.557424] kobject: 'ieee80211': free name [ 1270.561863] kobject: 'hwsim14' (000000005fb39d06): kobject_uevent_env [ 1270.562813] kobject: 'batadv0' (000000001f9c049e): kobject_add_internal: parent: 'net', set: 'devices' [ 1270.568638] kobject: 'hwsim14' (000000005fb39d06): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim14' [ 1270.581391] kobject: 'batadv0' (000000001f9c049e): kobject_uevent_env [ 1270.595486] kobject: 'batadv0' (000000001f9c049e): fill_kobj_path: path = '/devices/virtual/net/batadv0' [ 1270.607496] kobject: 'hwsim14' (000000005fb39d06): kobject_uevent_env [ 1270.608283] kobject: 'queues' (000000007681070f): kobject_add_internal: parent: 'batadv0', set: '' [ 1270.616272] kobject: 'hwsim14' (000000005fb39d06): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim14' [ 1270.625942] kobject: 'queues' (000000007681070f): kobject_uevent_env [ 1270.635640] kobject: 'hwsim14' (000000005fb39d06): kobject_cleanup, parent (null) [ 1270.641045] kobject: 'queues' (000000007681070f): kobject_uevent_env: filter function caused the event to drop! [ 1270.652599] kobject: 'hwsim14' (000000005fb39d06): calling ktype release [ 1270.659845] kobject: 'rx-0' (000000003bda90a9): kobject_add_internal: parent: 'queues', set: 'queues' [ 1270.666708] kobject: 'hwsim14': free name [ 1270.676108] kobject: 'rx-0' (000000003bda90a9): kobject_uevent_env [ 1270.683484] kobject: 'phy15' (00000000d1e2b826): kobject_cleanup, parent (null) [ 1270.686653] kobject: 'rx-0' (000000003bda90a9): fill_kobj_path: path = '/devices/virtual/net/batadv0/queues/rx-0' [ 1270.695013] kobject: 'phy15' (00000000d1e2b826): calling ktype release [ 1270.705468] kobject: 'tx-0' (000000002a3df712): kobject_add_internal: parent: 'queues', set: 'queues' [ 1270.715017] kobject: 'rfkill18' (00000000d567aa0e): kobject_cleanup, parent (null) [ 1270.721602] kobject: 'tx-0' (000000002a3df712): kobject_uevent_env [ 1270.733152] kobject: 'rfkill18' (00000000d567aa0e): calling ktype release [ 1270.736458] kobject: 'tx-0' (000000002a3df712): fill_kobj_path: path = '/devices/virtual/net/batadv0/queues/tx-0' [ 1270.743453] kobject: 'rfkill18': free name [ 1270.754671] kobject: 'mesh' (0000000068b8815c): kobject_add_internal: parent: 'batadv0', set: '' [ 1270.761234] kobject: 'phy15': free name [ 1270.768328] kobject: 'vxcan0' (00000000fad5747e): kobject_add_internal: parent: 'net', set: 'devices' [ 1270.781356] kobject: 'vxcan0' (00000000fad5747e): kobject_uevent_env [ 1270.787910] kobject: 'vxcan0' (00000000fad5747e): fill_kobj_path: path = '/devices/virtual/net/vxcan0' [ 1270.797467] kobject: 'queues' (00000000aa431a13): kobject_add_internal: parent: 'vxcan0', set: '' [ 1270.807016] kobject: 'queues' (00000000aa431a13): kobject_uevent_env [ 1270.813542] kobject: 'queues' (00000000aa431a13): kobject_uevent_env: filter function caused the event to drop! [ 1270.823806] kobject: 'rx-0' (000000003f31a166): kobject_add_internal: parent: 'queues', set: 'queues' [ 1270.833240] kobject: 'rx-0' (000000003f31a166): kobject_uevent_env [ 1270.839625] kobject: 'rx-0' (000000003f31a166): fill_kobj_path: path = '/devices/virtual/net/vxcan0/queues/rx-0' [ 1270.850035] kobject: 'tx-0' (00000000e1232c3b): kobject_add_internal: parent: 'queues', set: 'queues' [ 1270.859537] kobject: 'tx-0' (00000000e1232c3b): kobject_uevent_env [ 1270.865880] kobject: 'tx-0' (00000000e1232c3b): fill_kobj_path: path = '/devices/virtual/net/vxcan0/queues/tx-0' [ 1270.876658] kobject: 'vxcan1' (000000001fd4b2aa): kobject_add_internal: parent: 'net', set: 'devices' [ 1270.886584] kobject: 'vxcan1' (000000001fd4b2aa): kobject_uevent_env [ 1270.893119] kobject: 'vxcan1' (000000001fd4b2aa): fill_kobj_path: path = '/devices/virtual/net/vxcan1' [ 1270.902704] kobject: 'queues' (000000000976bdbe): kobject_add_internal: parent: 'vxcan1', set: '' [ 1270.912273] kobject: 'queues' (000000000976bdbe): kobject_uevent_env [ 1270.918791] kobject: 'queues' (000000000976bdbe): kobject_uevent_env: filter function caused the event to drop! [ 1270.929065] kobject: 'rx-0' (0000000070e88d54): kobject_add_internal: parent: 'queues', set: 'queues' [ 1270.938942] kobject: 'rx-0' (0000000070e88d54): kobject_uevent_env [ 1270.945273] kobject: 'rx-0' (0000000070e88d54): fill_kobj_path: path = '/devices/virtual/net/vxcan1/queues/rx-0' [ 1270.955718] kobject: 'tx-0' (000000000aa118a1): kobject_add_internal: parent: 'queues', set: 'queues' [ 1270.965215] kobject: 'tx-0' (000000000aa118a1): kobject_uevent_env [ 1270.971597] kobject: 'tx-0' (000000000aa118a1): fill_kobj_path: path = '/devices/virtual/net/vxcan1/queues/tx-0' [ 1270.987368] protocol 88fb is buggy, dev hsr_slave_0 [ 1270.992413] protocol 88fb is buggy, dev hsr_slave_1 [ 1270.997497] protocol 88fb is buggy, dev hsr_slave_0 [ 1271.002532] protocol 88fb is buggy, dev hsr_slave_1 [ 1271.007607] protocol 88fb is buggy, dev hsr_slave_0 [ 1271.012622] protocol 88fb is buggy, dev hsr_slave_1 [ 1271.017701] protocol 88fb is buggy, dev hsr_slave_0 [ 1271.022722] protocol 88fb is buggy, dev hsr_slave_1 [ 1271.057851] kobject: 'batman_adv' (00000000a9979196): kobject_uevent_env [ 1271.064727] kobject: 'batman_adv' (00000000a9979196): kobject_uevent_env: filter function caused the event to drop! [ 1271.075511] kobject: 'batman_adv' (00000000a9979196): kobject_cleanup, parent (null) [ 1271.084284] kobject: 'batman_adv' (00000000a9979196): calling ktype release [ 1271.091411] kobject: (00000000a9979196): dynamic_kobj_release [ 1271.097332] kobject: 'batman_adv': free name [ 1271.102123] kobject: 'rx-0' (00000000e4797ae4): kobject_cleanup, parent 0000000022dc7955 [ 1271.110366] kobject: 'rx-0' (00000000e4797ae4): auto cleanup 'remove' event [ 1271.117491] kobject: 'rx-0' (00000000e4797ae4): kobject_uevent_env [ 1271.123789] kobject: 'rx-0' (00000000e4797ae4): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1271.133856] kobject: 'rx-0' (00000000e4797ae4): auto cleanup kobject_del [ 1271.140903] kobject: 'rx-0' (00000000e4797ae4): calling ktype release [ 1271.147521] kobject: 'rx-0': free name [ 1271.151426] kobject: 'tx-3' (00000000e398b97f): kobject_cleanup, parent 0000000022dc7955 [ 1271.159887] kobject: 'tx-3' (00000000e398b97f): auto cleanup 'remove' event [ 1271.166980] kobject: 'tx-3' (00000000e398b97f): kobject_uevent_env [ 1271.173328] kobject: 'tx-3' (00000000e398b97f): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1271.183441] kobject: 'tx-3' (00000000e398b97f): auto cleanup kobject_del [ 1271.190349] kobject: 'tx-3' (00000000e398b97f): calling ktype release [ 1271.196938] kobject: 'tx-3': free name [ 1271.200883] kobject: 'tx-2' (00000000175f6225): kobject_cleanup, parent 0000000022dc7955 [ 1271.209124] kobject: 'tx-2' (00000000175f6225): auto cleanup 'remove' event [ 1271.216207] kobject: 'tx-2' (00000000175f6225): kobject_uevent_env [ 1271.222554] kobject: 'tx-2' (00000000175f6225): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1271.232623] kobject: 'tx-2' (00000000175f6225): auto cleanup kobject_del [ 1271.239516] kobject: 'tx-2' (00000000175f6225): calling ktype release [ 1271.246095] kobject: 'tx-2': free name [ 1271.250036] kobject: 'tx-1' (00000000212ec815): kobject_cleanup, parent 0000000022dc7955 [ 1271.258302] kobject: 'tx-1' (00000000212ec815): auto cleanup 'remove' event [ 1271.265394] kobject: 'tx-1' (00000000212ec815): kobject_uevent_env [ 1271.271990] kobject: 'tx-1' (00000000212ec815): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1271.282084] kobject: 'tx-1' (00000000212ec815): auto cleanup kobject_del [ 1271.289425] kobject: 'tx-1' (00000000212ec815): calling ktype release [ 1271.296004] kobject: 'tx-1': free name [ 1271.299945] kobject: 'tx-0' (00000000a026dff7): kobject_cleanup, parent 0000000022dc7955 [ 1271.308200] kobject: 'tx-0' (00000000a026dff7): auto cleanup 'remove' event [ 1271.315292] kobject: 'tx-0' (00000000a026dff7): kobject_uevent_env [ 1271.321647] kobject: 'tx-0' (00000000a026dff7): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1271.331724] kobject: 'tx-0' (00000000a026dff7): auto cleanup kobject_del [ 1271.338615] kobject: 'tx-0' (00000000a026dff7): calling ktype release [ 1271.345197] kobject: 'tx-0': free name [ 1271.349111] kobject: 'queues' (0000000022dc7955): kobject_cleanup, parent (null) [ 1271.357544] kobject: 'queues' (0000000022dc7955): calling ktype release [ 1271.364285] kobject: 'queues' (0000000022dc7955): kset_release [ 1271.370274] kobject: 'queues': free name [ 1271.374597] kobject: 'wlan2' (00000000c81dc341): kobject_uevent_env [ 1271.381049] kobject: 'wlan2' (00000000c81dc341): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1271.391999] kobject: 'net' (0000000074bf5430): kobject_cleanup, parent (null) [ 1271.400450] kobject: 'net' (0000000074bf5430): calling ktype release [ 1271.406962] kobject: 'net': free name [ 1271.411296] kobject: 'veth0' (0000000039713382): kobject_add_internal: parent: 'net', set: 'devices' [ 1271.421013] kobject: 'veth0' (0000000039713382): kobject_uevent_env [ 1271.427472] kobject: 'veth0' (0000000039713382): fill_kobj_path: path = '/devices/virtual/net/veth0' [ 1271.436802] kobject: 'queues' (000000006b11651b): kobject_add_internal: parent: 'veth0', set: '' [ 1271.446292] kobject: 'queues' (000000006b11651b): kobject_uevent_env [ 1271.452840] kobject: 'queues' (000000006b11651b): kobject_uevent_env: filter function caused the event to drop! [ 1271.463106] kobject: 'rx-0' (0000000050af1c58): kobject_add_internal: parent: 'queues', set: 'queues' [ 1271.472512] kobject: 'rx-0' (0000000050af1c58): kobject_uevent_env [ 1271.478887] kobject: 'rx-0' (0000000050af1c58): fill_kobj_path: path = '/devices/virtual/net/veth0/queues/rx-0' [ 1271.489200] kobject: 'tx-0' (00000000e5dc6dce): kobject_add_internal: parent: 'queues', set: 'queues' [ 1271.498691] kobject: 'tx-0' (00000000e5dc6dce): kobject_uevent_env [ 1271.505038] kobject: 'tx-0' (00000000e5dc6dce): fill_kobj_path: path = '/devices/virtual/net/veth0/queues/tx-0' [ 1271.515827] kobject: 'batman_adv' (000000009db06528): kobject_add_internal: parent: 'veth0', set: '' [ 1271.525960] kobject: 'veth1' (00000000e85602c2): kobject_add_internal: parent: 'net', set: 'devices' [ 1271.535844] kobject: 'veth1' (00000000e85602c2): kobject_uevent_env [ 1271.542310] kobject: 'veth1' (00000000e85602c2): fill_kobj_path: path = '/devices/virtual/net/veth1' [ 1271.552099] kobject: 'queues' (00000000727a9418): kobject_add_internal: parent: 'veth1', set: '' [ 1271.561622] kobject: 'queues' (00000000727a9418): kobject_uevent_env [ 1271.568155] kobject: 'queues' (00000000727a9418): kobject_uevent_env: filter function caused the event to drop! [ 1271.578436] kobject: 'rx-0' (000000008cd3595b): kobject_add_internal: parent: 'queues', set: 'queues' [ 1271.587876] kobject: 'rx-0' (000000008cd3595b): kobject_uevent_env [ 1271.594212] kobject: 'rx-0' (000000008cd3595b): fill_kobj_path: path = '/devices/virtual/net/veth1/queues/rx-0' [ 1271.604534] kobject: 'tx-0' (0000000003e0ca1a): kobject_add_internal: parent: 'queues', set: 'queues' [ 1271.613986] kobject: 'tx-0' (0000000003e0ca1a): kobject_uevent_env [ 1271.620356] kobject: 'tx-0' (0000000003e0ca1a): fill_kobj_path: path = '/devices/virtual/net/veth1/queues/tx-0' [ 1271.631246] kobject: 'batman_adv' (000000002265e7a7): kobject_add_internal: parent: 'veth1', set: '' [ 1271.641360] kobject: 'wlan2' (00000000c81dc341): kobject_cleanup, parent (null) [ 1271.641615] kobject: 'veth0_to_bridge' (000000008cf9cc98): kobject_add_internal: parent: 'net', set: 'devices' [ 1271.652872] kobject: 'wlan2' (00000000c81dc341): auto cleanup 'remove' event [ 1271.660637] kobject: 'veth0_to_bridge' (000000008cf9cc98): kobject_uevent_env [ 1271.667252] kobject: 'wlan2' (00000000c81dc341): kobject_uevent_env [ 1271.674386] kobject: 'veth0_to_bridge' (000000008cf9cc98): fill_kobj_path: path = '/devices/virtual/net/veth0_to_bridge' [ 1271.683817] kobject: 'wlan2' (00000000c81dc341): kobject_uevent_env: uevent_suppress caused the event to drop! [ 1271.692102] kobject: 'queues' (000000003642445b): kobject_add_internal: parent: 'veth0_to_bridge', set: '' [ 1271.705081] kobject: 'wlan2' (00000000c81dc341): calling ktype release [ 1271.712584] kobject: 'queues' (000000003642445b): kobject_uevent_env [ 1271.722279] kobject: 'wlan2': free name [ 1271.725728] kobject: 'queues' (000000003642445b): kobject_uevent_env: filter function caused the event to drop! [ 1271.725754] kobject: 'rx-0' (00000000df1bdde6): kobject_add_internal: parent: 'queues', set: 'queues' [ 1271.725801] kobject: 'rx-0' (00000000df1bdde6): kobject_uevent_env [ 1271.725831] kobject: 'rx-0' (00000000df1bdde6): fill_kobj_path: path = '/devices/virtual/net/veth0_to_bridge/queues/rx-0' [ 1271.766909] kobject: 'tx-0' (00000000643ac66a): kobject_add_internal: parent: 'queues', set: 'queues' [ 1271.776938] kobject: 'tx-0' (00000000643ac66a): kobject_uevent_env [ 1271.783306] kobject: 'tx-0' (00000000643ac66a): fill_kobj_path: path = '/devices/virtual/net/veth0_to_bridge/queues/tx-0' [ 1271.795197] kobject: 'batman_adv' (000000009b8bf1fa): kobject_add_internal: parent: 'veth0_to_bridge', set: '' [ 1271.806269] kobject: 'bridge_slave_0' (000000002c62e18b): kobject_add_internal: parent: 'net', set: 'devices' [ 1271.816674] kobject: 'bridge_slave_0' (000000002c62e18b): kobject_uevent_env [ 1271.823924] kobject: 'bridge_slave_0' (000000002c62e18b): fill_kobj_path: path = '/devices/virtual/net/bridge_slave_0' [ 1271.834880] kobject: 'queues' (00000000463d7abb): kobject_add_internal: parent: 'bridge_slave_0', set: '' [ 1271.845166] kobject: 'queues' (00000000463d7abb): kobject_uevent_env [ 1271.851672] kobject: 'queues' (00000000463d7abb): kobject_uevent_env: filter function caused the event to drop! [ 1271.861940] kobject: 'rx-0' (0000000074fa03da): kobject_add_internal: parent: 'queues', set: 'queues' [ 1271.871368] kobject: 'rx-0' (0000000074fa03da): kobject_uevent_env [ 1271.877749] kobject: 'rx-0' (0000000074fa03da): fill_kobj_path: path = '/devices/virtual/net/bridge_slave_0/queues/rx-0' [ 1271.888873] kobject: 'tx-0' (00000000580fcdc9): kobject_add_internal: parent: 'queues', set: 'queues' [ 1271.898360] kobject: 'tx-0' (00000000580fcdc9): kobject_uevent_env [ 1271.904708] kobject: 'tx-0' (00000000580fcdc9): fill_kobj_path: path = '/devices/virtual/net/bridge_slave_0/queues/tx-0' [ 1271.916269] kobject: 'batman_adv' (0000000002733ac3): kobject_add_internal: parent: 'bridge_slave_0', set: '' [ 1271.927463] kobject: 'rfkill17' (000000008ec76525): kobject_uevent_env [ 1271.927646] kobject: 'veth1_to_bridge' (0000000017b78b3f): kobject_add_internal: parent: 'net', set: 'devices' [ 1271.934601] kobject: 'rfkill17' (000000008ec76525): fill_kobj_path: path = '/devices/virtual/mac80211_hwsim/hwsim13/ieee80211/phy14/rfkill17' [ 1271.945238] kobject: 'veth1_to_bridge' (0000000017b78b3f): kobject_uevent_env [ 1271.964944] kobject: 'veth1_to_bridge' (0000000017b78b3f): fill_kobj_path: path = '/devices/virtual/net/veth1_to_bridge' [ 1271.976049] kobject: 'queues' (00000000a7eecd96): kobject_add_internal: parent: 'veth1_to_bridge', set: '' [ 1271.986406] kobject: 'queues' (00000000a7eecd96): kobject_uevent_env [ 1271.992912] kobject: 'queues' (00000000a7eecd96): kobject_uevent_env: filter function caused the event to drop! [ 1272.003188] kobject: 'rx-0' (00000000ada90324): kobject_add_internal: parent: 'queues', set: 'queues' [ 1272.012590] kobject: 'rx-0' (00000000ada90324): kobject_uevent_env [ 1272.018962] kobject: 'rx-0' (00000000ada90324): fill_kobj_path: path = '/devices/virtual/net/veth1_to_bridge/queues/rx-0' [ 1272.030128] kobject: 'tx-0' (00000000dc40beb2): kobject_add_internal: parent: 'queues', set: 'queues' [ 1272.039618] kobject: 'tx-0' (00000000dc40beb2): kobject_uevent_env [ 1272.045965] kobject: 'tx-0' (00000000dc40beb2): fill_kobj_path: path = '/devices/virtual/net/veth1_to_bridge/queues/tx-0'