Debian GNU/Linux 11 syzkaller ttyS0 Warning: Permanently added '[localhost]:31899' (ECDSA) to the list of known hosts. 2022/09/13 13:57:46 fuzzer started 2022/09/13 13:57:46 dialing manager at localhost:36597 syzkaller login: [ 36.124721] cgroup: Unknown subsys name 'net' [ 36.226023] cgroup: Unknown subsys name 'rlimit' 2022/09/13 13:58:00 syscalls: 2215 2022/09/13 13:58:00 code coverage: enabled 2022/09/13 13:58:00 comparison tracing: enabled 2022/09/13 13:58:00 extra coverage: enabled 2022/09/13 13:58:00 setuid sandbox: enabled 2022/09/13 13:58:00 namespace sandbox: enabled 2022/09/13 13:58:00 Android sandbox: enabled 2022/09/13 13:58:00 fault injection: enabled 2022/09/13 13:58:00 leak checking: enabled 2022/09/13 13:58:00 net packet injection: enabled 2022/09/13 13:58:00 net device setup: enabled 2022/09/13 13:58:00 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2022/09/13 13:58:00 devlink PCI setup: PCI device 0000:00:10.0 is not available 2022/09/13 13:58:00 USB emulation: enabled 2022/09/13 13:58:00 hci packet injection: enabled 2022/09/13 13:58:00 wifi device emulation: failed to parse kernel version (6.0.0-rc5-next-20220913) 2022/09/13 13:58:00 802.15.4 emulation: enabled 2022/09/13 13:58:00 fetching corpus: 0, signal 0/2000 (executing program) 2022/09/13 13:58:00 fetching corpus: 50, signal 32824/36120 (executing program) 2022/09/13 13:58:00 fetching corpus: 100, signal 45543/50083 (executing program) 2022/09/13 13:58:00 fetching corpus: 150, signal 55880/61472 (executing program) 2022/09/13 13:58:01 fetching corpus: 200, signal 64052/70648 (executing program) 2022/09/13 13:58:01 fetching corpus: 250, signal 70723/78217 (executing program) 2022/09/13 13:58:01 fetching corpus: 300, signal 78949/87100 (executing program) 2022/09/13 13:58:01 fetching corpus: 350, signal 83479/92377 (executing program) 2022/09/13 13:58:01 fetching corpus: 400, signal 88072/97616 (executing program) 2022/09/13 13:58:01 fetching corpus: 450, signal 92562/102684 (executing program) 2022/09/13 13:58:02 fetching corpus: 500, signal 95919/106617 (executing program) 2022/09/13 13:58:02 fetching corpus: 550, signal 99301/110544 (executing program) 2022/09/13 13:58:02 fetching corpus: 600, signal 102322/114099 (executing program) 2022/09/13 13:58:02 fetching corpus: 650, signal 105629/117814 (executing program) 2022/09/13 13:58:02 fetching corpus: 700, signal 110467/122662 (executing program) 2022/09/13 13:58:03 fetching corpus: 750, signal 112708/125304 (executing program) 2022/09/13 13:58:03 fetching corpus: 800, signal 115526/128379 (executing program) 2022/09/13 13:58:03 fetching corpus: 850, signal 119254/132137 (executing program) 2022/09/13 13:58:03 fetching corpus: 900, signal 122110/135077 (executing program) 2022/09/13 13:58:03 fetching corpus: 950, signal 124251/137454 (executing program) 2022/09/13 13:58:03 fetching corpus: 1000, signal 125984/139466 (executing program) 2022/09/13 13:58:04 fetching corpus: 1050, signal 127914/141604 (executing program) 2022/09/13 13:58:04 fetching corpus: 1100, signal 130473/144089 (executing program) 2022/09/13 13:58:04 fetching corpus: 1150, signal 131682/145611 (executing program) 2022/09/13 13:58:04 fetching corpus: 1200, signal 134300/148165 (executing program) 2022/09/13 13:58:04 fetching corpus: 1250, signal 135438/149605 (executing program) 2022/09/13 13:58:04 fetching corpus: 1300, signal 137036/151279 (executing program) 2022/09/13 13:58:05 fetching corpus: 1350, signal 138561/152845 (executing program) 2022/09/13 13:58:05 fetching corpus: 1400, signal 140226/154524 (executing program) 2022/09/13 13:58:05 fetching corpus: 1450, signal 141409/155838 (executing program) 2022/09/13 13:58:05 fetching corpus: 1500, signal 143959/158019 (executing program) 2022/09/13 13:58:05 fetching corpus: 1550, signal 145348/159374 (executing program) 2022/09/13 13:58:05 fetching corpus: 1600, signal 147410/161112 (executing program) 2022/09/13 13:58:05 fetching corpus: 1650, signal 148992/162551 (executing program) 2022/09/13 13:58:06 fetching corpus: 1700, signal 150460/163807 (executing program) 2022/09/13 13:58:06 fetching corpus: 1750, signal 152832/165640 (executing program) 2022/09/13 13:58:06 fetching corpus: 1800, signal 154125/166789 (executing program) 2022/09/13 13:58:06 fetching corpus: 1850, signal 156266/168388 (executing program) 2022/09/13 13:58:06 fetching corpus: 1900, signal 157608/169533 (executing program) 2022/09/13 13:58:07 fetching corpus: 1950, signal 159018/170665 (executing program) 2022/09/13 13:58:07 fetching corpus: 2000, signal 159955/171485 (executing program) 2022/09/13 13:58:07 fetching corpus: 2050, signal 160983/172318 (executing program) 2022/09/13 13:58:07 fetching corpus: 2100, signal 162093/173154 (executing program) 2022/09/13 13:58:07 fetching corpus: 2150, signal 163728/174283 (executing program) 2022/09/13 13:58:07 fetching corpus: 2200, signal 164739/175062 (executing program) 2022/09/13 13:58:07 fetching corpus: 2250, signal 166058/175973 (executing program) 2022/09/13 13:58:08 fetching corpus: 2300, signal 167687/176977 (executing program) 2022/09/13 13:58:08 fetching corpus: 2350, signal 169889/178253 (executing program) 2022/09/13 13:58:08 fetching corpus: 2400, signal 171036/178998 (executing program) 2022/09/13 13:58:08 fetching corpus: 2450, signal 173070/180095 (executing program) 2022/09/13 13:58:08 fetching corpus: 2500, signal 174421/180812 (executing program) 2022/09/13 13:58:08 fetching corpus: 2550, signal 176166/181682 (executing program) 2022/09/13 13:58:09 fetching corpus: 2600, signal 177385/182306 (executing program) 2022/09/13 13:58:09 fetching corpus: 2650, signal 178221/182780 (executing program) 2022/09/13 13:58:09 fetching corpus: 2672, signal 178557/182980 (executing program) 2022/09/13 13:58:09 fetching corpus: 2672, signal 178557/183049 (executing program) 2022/09/13 13:58:09 fetching corpus: 2672, signal 178557/183135 (executing program) 2022/09/13 13:58:09 fetching corpus: 2672, signal 178557/183220 (executing program) 2022/09/13 13:58:09 fetching corpus: 2672, signal 178557/183301 (executing program) 2022/09/13 13:58:09 fetching corpus: 2672, signal 178557/183382 (executing program) 2022/09/13 13:58:09 fetching corpus: 2672, signal 178557/183468 (executing program) 2022/09/13 13:58:09 fetching corpus: 2672, signal 178557/183559 (executing program) 2022/09/13 13:58:09 fetching corpus: 2672, signal 178557/183644 (executing program) 2022/09/13 13:58:09 fetching corpus: 2672, signal 178557/183733 (executing program) 2022/09/13 13:58:09 fetching corpus: 2672, signal 178557/183808 (executing program) 2022/09/13 13:58:09 fetching corpus: 2672, signal 178557/183879 (executing program) 2022/09/13 13:58:09 fetching corpus: 2672, signal 178557/183952 (executing program) 2022/09/13 13:58:09 fetching corpus: 2672, signal 178557/184021 (executing program) 2022/09/13 13:58:09 fetching corpus: 2672, signal 178557/184114 (executing program) 2022/09/13 13:58:09 fetching corpus: 2672, signal 178557/184201 (executing program) 2022/09/13 13:58:09 fetching corpus: 2672, signal 178557/184274 (executing program) 2022/09/13 13:58:09 fetching corpus: 2672, signal 178557/184361 (executing program) 2022/09/13 13:58:09 fetching corpus: 2672, signal 178557/184437 (executing program) 2022/09/13 13:58:09 fetching corpus: 2672, signal 178557/184511 (executing program) 2022/09/13 13:58:09 fetching corpus: 2672, signal 178557/184596 (executing program) 2022/09/13 13:58:09 fetching corpus: 2672, signal 178557/184689 (executing program) 2022/09/13 13:58:09 fetching corpus: 2672, signal 178557/184754 (executing program) 2022/09/13 13:58:09 fetching corpus: 2672, signal 178557/184830 (executing program) 2022/09/13 13:58:09 fetching corpus: 2672, signal 178557/184913 (executing program) 2022/09/13 13:58:09 fetching corpus: 2672, signal 178557/184995 (executing program) 2022/09/13 13:58:09 fetching corpus: 2672, signal 178557/185094 (executing program) 2022/09/13 13:58:09 fetching corpus: 2672, signal 178557/185171 (executing program) 2022/09/13 13:58:09 fetching corpus: 2672, signal 178557/185254 (executing program) 2022/09/13 13:58:09 fetching corpus: 2672, signal 178557/185335 (executing program) 2022/09/13 13:58:09 fetching corpus: 2672, signal 178557/185416 (executing program) 2022/09/13 13:58:09 fetching corpus: 2672, signal 178557/185491 (executing program) 2022/09/13 13:58:09 fetching corpus: 2672, signal 178557/185564 (executing program) 2022/09/13 13:58:09 fetching corpus: 2672, signal 178557/185645 (executing program) 2022/09/13 13:58:09 fetching corpus: 2672, signal 178557/185730 (executing program) 2022/09/13 13:58:09 fetching corpus: 2672, signal 178557/185824 (executing program) 2022/09/13 13:58:09 fetching corpus: 2672, signal 178557/185856 (executing program) 2022/09/13 13:58:09 fetching corpus: 2672, signal 178557/185856 (executing program) 2022/09/13 13:58:12 starting 8 fuzzer processes 13:58:12 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmmsg$sock(r0, &(0x7f0000002d40)=[{{&(0x7f00000000c0)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)="eaec", 0x2}], 0x1}}, {{&(0x7f0000000280)=@in={0x2, 0x0, @multicast2}, 0x80, 0x0, 0x0, &(0x7f0000001640)=[@txtime={{0x18, 0x1, 0x25}}], 0x18}}], 0x2, 0x0) 13:58:12 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) clone3(&(0x7f0000000200)={0x340022800, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x0, {r2}}, 0x58) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x64010101}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) ioctl$int_in(r7, 0x5421, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000100)={'bond_slave_1\x00'}) sendmsg$inet(r4, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @remote, @broadcast}}}], 0x20}, 0x0) setsockopt$inet_mreqn(r3, 0x0, 0x20, &(0x7f0000000040)={@broadcast, @broadcast, r6}, 0xc) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f00000000c0)={0x3ff, 0x8fa, 0x800}) 13:58:12 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000180), 0x4) 13:58:12 executing program 3: ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, 0x0) 13:58:12 executing program 4: r0 = syz_io_uring_setup(0x76e7, &(0x7f0000000340), &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000280), &(0x7f00000003c0)) io_uring_register$IORING_UNREGISTER_PERSONALITY(r0, 0x7, 0x0, 0x0) [ 61.749932] audit: type=1400 audit(1663077492.506:6): avc: denied { execmem } for pid=284 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 13:58:12 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) chroot(&(0x7f0000000100)='./file0\x00') getcwd(0x0, 0xffffffffffffff4f) 13:58:12 executing program 7: syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), 0xffffffffffffffff) 13:58:12 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) rt_sigqueueinfo(0x0, 0x21, &(0x7f0000000000)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000007ec0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="0067da18940e63a675cb6447e46b2c027c6b084a5944d7d50690de9887aa7b3ff42be69ab280a1dcac3841af8b4a7162cbb83f29ac9c4638eaecc82557ef4e63c6f987c40458414f6deb33962783e38130cedb91dd04d892a3d13ca8f627a3617361090d4e67afb0f83b5f8686d23775584c1972c675e51ee5608655fcd05e4975e4fc1ff7869e9dac50898d2609092215f96fa8ccb0ac742b733f6b6d4ad678aef012b3da59a833cc889e457231005157ac605f6945dc87e68441188d3f028f2ecadb4a83add0"], 0xe4}], 0x1, &(0x7f0000007e00)=[@cred={{0x1c}}], 0x20}, 0x0) perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0xc0, 0xe, 0x5, 0x8, 0x0, 0x2, 0x4000, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0xde, 0x1, @perf_config_ext={0x9, 0x3}, 0x40000, 0x2, 0x8, 0x7, 0xfff, 0x5, 0x7f, 0x0, 0xfff, 0x0, 0x6e}, 0xffffffffffffffff, 0x4, r0, 0xa) r1 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r1, 0x40047211, &(0x7f0000000240)=0x1) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', r2, &(0x7f00000001c0)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000c80)={{{@in6=@remote, @in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f0000000d80)=0xe8) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f00000000c0), 0x12) [ 63.103871] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 63.108954] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 63.110888] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 63.113757] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1 [ 63.117005] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9 [ 63.121195] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 63.122692] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9 [ 63.124476] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 63.126719] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 63.133927] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4 [ 63.139359] Bluetooth: hci1: unexpected cc 0x0c25 length: 249 > 3 [ 63.140718] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2 [ 63.147478] Bluetooth: hci1: HCI_REQ-0x0c1a [ 63.150885] Bluetooth: hci0: HCI_REQ-0x0c1a [ 63.163754] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 63.165520] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 63.181716] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 63.182252] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1 [ 63.183397] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 63.186221] Bluetooth: hci5: unexpected cc 0x0c03 length: 249 > 1 [ 63.187603] Bluetooth: hci6: unexpected cc 0x0c03 length: 249 > 1 [ 63.189125] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 63.190929] Bluetooth: hci7: unexpected cc 0x0c03 length: 249 > 1 [ 63.191991] Bluetooth: hci5: unexpected cc 0x1003 length: 249 > 9 [ 63.192891] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 63.193740] Bluetooth: hci2: unexpected cc 0x0c25 length: 249 > 3 [ 63.194120] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 63.199375] Bluetooth: hci2: HCI_REQ-0x0c1a [ 63.199388] Bluetooth: hci5: unexpected cc 0x1001 length: 249 > 9 [ 63.201288] Bluetooth: hci6: unexpected cc 0x1003 length: 249 > 9 [ 63.202596] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 63.203699] Bluetooth: hci7: unexpected cc 0x1003 length: 249 > 9 [ 63.207156] Bluetooth: hci6: unexpected cc 0x1001 length: 249 > 9 [ 63.208464] Bluetooth: hci7: unexpected cc 0x1001 length: 249 > 9 [ 63.211394] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 63.212496] Bluetooth: hci5: unexpected cc 0x0c23 length: 249 > 4 [ 63.217118] Bluetooth: hci5: unexpected cc 0x0c25 length: 249 > 3 [ 63.218207] Bluetooth: hci6: unexpected cc 0x0c23 length: 249 > 4 [ 63.219399] Bluetooth: hci3: unexpected cc 0x0c25 length: 249 > 3 [ 63.221627] Bluetooth: hci5: unexpected cc 0x0c38 length: 249 > 2 [ 63.225078] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 63.226253] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 63.228108] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 63.231172] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 63.233057] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3 [ 63.234497] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 63.239020] Bluetooth: hci7: unexpected cc 0x0c23 length: 249 > 4 [ 63.239298] Bluetooth: hci4: HCI_REQ-0x0c1a [ 63.240730] Bluetooth: hci6: unexpected cc 0x0c25 length: 249 > 3 [ 63.242656] Bluetooth: hci6: unexpected cc 0x0c38 length: 249 > 2 [ 63.250015] Bluetooth: hci3: HCI_REQ-0x0c1a [ 63.252903] Bluetooth: hci5: HCI_REQ-0x0c1a [ 63.252955] Bluetooth: hci7: unexpected cc 0x0c25 length: 249 > 3 [ 63.259606] Bluetooth: hci7: unexpected cc 0x0c38 length: 249 > 2 [ 63.263504] Bluetooth: hci6: HCI_REQ-0x0c1a [ 63.278730] Bluetooth: hci7: HCI_REQ-0x0c1a [ 65.239554] Bluetooth: hci1: command 0x0409 tx timeout [ 65.239946] Bluetooth: hci2: command 0x0409 tx timeout [ 65.241146] Bluetooth: hci0: command 0x0409 tx timeout [ 65.302982] Bluetooth: hci7: command 0x0409 tx timeout [ 65.303911] Bluetooth: hci6: command 0x0409 tx timeout [ 65.304005] Bluetooth: hci3: command 0x0409 tx timeout [ 65.304639] Bluetooth: hci5: command 0x0409 tx timeout [ 65.306104] Bluetooth: hci4: command 0x0409 tx timeout [ 67.286937] Bluetooth: hci2: command 0x041b tx timeout [ 67.286957] Bluetooth: hci0: command 0x041b tx timeout [ 67.287676] Bluetooth: hci1: command 0x041b tx timeout [ 67.350924] Bluetooth: hci4: command 0x041b tx timeout [ 67.350943] Bluetooth: hci3: command 0x041b tx timeout [ 67.351483] Bluetooth: hci5: command 0x041b tx timeout [ 67.352231] Bluetooth: hci6: command 0x041b tx timeout [ 67.352986] Bluetooth: hci7: command 0x041b tx timeout [ 69.334898] Bluetooth: hci1: command 0x040f tx timeout [ 69.335371] Bluetooth: hci0: command 0x040f tx timeout [ 69.335775] Bluetooth: hci2: command 0x040f tx timeout [ 69.398951] Bluetooth: hci7: command 0x040f tx timeout [ 69.398962] Bluetooth: hci5: command 0x040f tx timeout [ 69.400785] Bluetooth: hci6: command 0x040f tx timeout [ 69.401573] Bluetooth: hci3: command 0x040f tx timeout [ 69.402308] Bluetooth: hci4: command 0x040f tx timeout [ 71.383180] Bluetooth: hci2: command 0x0419 tx timeout [ 71.384069] Bluetooth: hci0: command 0x0419 tx timeout [ 71.384851] Bluetooth: hci1: command 0x0419 tx timeout [ 71.446917] Bluetooth: hci4: command 0x0419 tx timeout [ 71.446928] Bluetooth: hci5: command 0x0419 tx timeout [ 71.447661] Bluetooth: hci3: command 0x0419 tx timeout [ 71.450922] Bluetooth: hci6: command 0x0419 tx timeout [ 71.451587] Bluetooth: hci7: command 0x0419 tx timeout [ 115.180452] audit: type=1400 audit(1663077545.937:7): avc: denied { open } for pid=3817 comm="syz-executor.2" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 115.182058] audit: type=1400 audit(1663077545.937:8): avc: denied { kernel } for pid=3817 comm="syz-executor.2" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 115.197804] ------------[ cut here ]------------ [ 115.197826] [ 115.197829] ====================================================== [ 115.197833] WARNING: possible circular locking dependency detected [ 115.197837] 6.0.0-rc5-next-20220913 #1 Not tainted [ 115.197844] ------------------------------------------------------ [ 115.197847] syz-executor.2/3821 is trying to acquire lock: [ 115.197854] ffffffff853fa878 ((console_sem).lock){....}-{2:2}, at: down_trylock+0xe/0x70 [ 115.197893] [ 115.197893] but task is already holding lock: [ 115.197896] ffff88800e38b420 (&ctx->lock){....}-{2:2}, at: __perf_event_task_sched_out+0x53b/0x18d0 [ 115.197925] [ 115.197925] which lock already depends on the new lock. [ 115.197925] [ 115.197928] [ 115.197928] the existing dependency chain (in reverse order) is: [ 115.197932] [ 115.197932] -> #3 (&ctx->lock){....}-{2:2}: [ 115.197946] _raw_spin_lock+0x2a/0x40 [ 115.197964] __perf_event_task_sched_out+0x53b/0x18d0 [ 115.197976] __schedule+0xedd/0x2470 [ 115.197987] schedule+0xda/0x1b0 [ 115.197996] exit_to_user_mode_prepare+0x114/0x1a0 [ 115.198017] syscall_exit_to_user_mode+0x19/0x40 [ 115.198035] do_syscall_64+0x48/0x90 [ 115.198049] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 115.198067] [ 115.198067] -> #2 (&rq->__lock){-.-.}-{2:2}: [ 115.198081] _raw_spin_lock_nested+0x30/0x40 [ 115.198096] raw_spin_rq_lock_nested+0x1e/0x30 [ 115.198109] task_fork_fair+0x63/0x4d0 [ 115.198126] sched_cgroup_fork+0x3d0/0x540 [ 115.198140] copy_process+0x3f9e/0x6df0 [ 115.198151] kernel_clone+0xe7/0x890 [ 115.198160] user_mode_thread+0xad/0xf0 [ 115.198171] rest_init+0x24/0x250 [ 115.198187] arch_call_rest_init+0xf/0x14 [ 115.198207] start_kernel+0x4c1/0x4e6 [ 115.198225] secondary_startup_64_no_verify+0xe0/0xeb [ 115.198239] [ 115.198239] -> #1 (&p->pi_lock){-.-.}-{2:2}: [ 115.198253] _raw_spin_lock_irqsave+0x39/0x60 [ 115.198268] try_to_wake_up+0xab/0x1920 [ 115.198281] up+0x75/0xb0 [ 115.198292] __up_console_sem+0x6e/0x80 [ 115.198309] console_unlock+0x46a/0x590 [ 115.198326] vprintk_emit+0x1bd/0x560 [ 115.198342] vprintk+0x84/0xa0 [ 115.198359] _printk+0xba/0xf1 [ 115.198377] kauditd_hold_skb.cold+0x3f/0x4e [ 115.198391] kauditd_send_queue+0x233/0x290 [ 115.198406] kauditd_thread+0x5da/0x9a0 [ 115.198420] kthread+0x2ed/0x3a0 [ 115.198435] ret_from_fork+0x22/0x30 [ 115.198448] [ 115.198448] -> #0 ((console_sem).lock){....}-{2:2}: [ 115.198462] __lock_acquire+0x2a02/0x5e70 [ 115.198478] lock_acquire+0x1a2/0x530 [ 115.198494] _raw_spin_lock_irqsave+0x39/0x60 [ 115.198510] down_trylock+0xe/0x70 [ 115.198522] __down_trylock_console_sem+0x3b/0xd0 [ 115.198538] vprintk_emit+0x16b/0x560 [ 115.198555] vprintk+0x84/0xa0 [ 115.198571] _printk+0xba/0xf1 [ 115.198588] report_bug.cold+0x72/0xab [ 115.198600] handle_bug+0x3c/0x70 [ 115.198613] exc_invalid_op+0x14/0x50 [ 115.198626] asm_exc_invalid_op+0x16/0x20 [ 115.198642] group_sched_out.part.0+0x2c7/0x460 [ 115.198653] ctx_sched_out+0x8f1/0xc10 [ 115.198662] __perf_event_task_sched_out+0x6d0/0x18d0 [ 115.198675] __schedule+0xedd/0x2470 [ 115.198684] schedule+0xda/0x1b0 [ 115.198693] exit_to_user_mode_prepare+0x114/0x1a0 [ 115.198713] syscall_exit_to_user_mode+0x19/0x40 [ 115.198730] do_syscall_64+0x48/0x90 [ 115.198743] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 115.198760] [ 115.198760] other info that might help us debug this: [ 115.198760] [ 115.198763] Chain exists of: [ 115.198763] (console_sem).lock --> &rq->__lock --> &ctx->lock [ 115.198763] [ 115.198778] Possible unsafe locking scenario: [ 115.198778] [ 115.198780] CPU0 CPU1 [ 115.198783] ---- ---- [ 115.198785] lock(&ctx->lock); [ 115.198791] lock(&rq->__lock); [ 115.198797] lock(&ctx->lock); [ 115.198803] lock((console_sem).lock); [ 115.198812] [ 115.198812] *** DEADLOCK *** [ 115.198812] [ 115.198814] 2 locks held by syz-executor.2/3821: [ 115.198821] #0: ffff88806cf37cd8 (&rq->__lock){-.-.}-{2:2}, at: __schedule+0x1cf/0x2470 [ 115.198846] #1: ffff88800e38b420 (&ctx->lock){....}-{2:2}, at: __perf_event_task_sched_out+0x53b/0x18d0 [ 115.198874] [ 115.198874] stack backtrace: [ 115.198877] CPU: 1 PID: 3821 Comm: syz-executor.2 Not tainted 6.0.0-rc5-next-20220913 #1 [ 115.198890] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 115.198898] Call Trace: [ 115.198901] [ 115.198905] dump_stack_lvl+0x8b/0xb3 [ 115.198920] check_noncircular+0x263/0x2e0 [ 115.198937] ? format_decode+0x26c/0xb50 [ 115.198952] ? print_circular_bug+0x450/0x450 [ 115.198970] ? enable_ptr_key_workfn+0x20/0x20 [ 115.198983] ? __lockdep_reset_lock+0x180/0x180 [ 115.199001] ? format_decode+0x26c/0xb50 [ 115.199016] ? alloc_chain_hlocks+0x1ec/0x5a0 [ 115.199034] __lock_acquire+0x2a02/0x5e70 [ 115.199056] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 115.199079] lock_acquire+0x1a2/0x530 [ 115.199096] ? down_trylock+0xe/0x70 [ 115.199111] ? rcu_read_unlock+0x40/0x40 [ 115.199128] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 115.199149] ? vprintk+0x84/0xa0 [ 115.199168] _raw_spin_lock_irqsave+0x39/0x60 [ 115.199184] ? down_trylock+0xe/0x70 [ 115.199198] down_trylock+0xe/0x70 [ 115.199211] ? vprintk+0x84/0xa0 [ 115.199229] __down_trylock_console_sem+0x3b/0xd0 [ 115.199246] vprintk_emit+0x16b/0x560 [ 115.199264] ? lock_downgrade+0x6d0/0x6d0 [ 115.199282] vprintk+0x84/0xa0 [ 115.199300] _printk+0xba/0xf1 [ 115.199318] ? record_print_text.cold+0x16/0x16 [ 115.199339] ? hrtimer_try_to_cancel+0x163/0x2c0 [ 115.199353] ? lock_downgrade+0x6d0/0x6d0 [ 115.199370] ? report_bug.cold+0x66/0xab [ 115.199385] ? group_sched_out.part.0+0x2c7/0x460 [ 115.199396] report_bug.cold+0x72/0xab [ 115.199411] handle_bug+0x3c/0x70 [ 115.199425] exc_invalid_op+0x14/0x50 [ 115.199440] asm_exc_invalid_op+0x16/0x20 [ 115.199457] RIP: 0010:group_sched_out.part.0+0x2c7/0x460 [ 115.199471] Code: 5e 41 5f e9 3b b7 ef ff e8 36 b7 ef ff 65 8b 1d ab 15 ac 7e 31 ff 89 de e8 d6 b3 ef ff 85 db 0f 84 8a 00 00 00 e8 19 b7 ef ff <0f> 0b e9 a5 fe ff ff e8 0d b7 ef ff 48 8d 7d 10 48 b8 00 00 00 00 [ 115.199482] RSP: 0018:ffff888017eafc48 EFLAGS: 00010006 [ 115.199491] RAX: 0000000040000002 RBX: 0000000000000000 RCX: 0000000000000000 [ 115.199499] RDX: ffff88801831b580 RSI: ffffffff81566027 RDI: 0000000000000005 [ 115.199507] RBP: ffff88801f280000 R08: 0000000000000005 R09: 0000000000000001 [ 115.199514] R10: 0000000000000000 R11: 0000000000000001 R12: ffff88800e38b400 [ 115.199522] R13: ffff88806cf3d100 R14: ffffffff8547bfc0 R15: 0000000000000002 [ 115.199533] ? group_sched_out.part.0+0x2c7/0x460 [ 115.199546] ? group_sched_out.part.0+0x2c7/0x460 [ 115.199559] ctx_sched_out+0x8f1/0xc10 [ 115.199571] __perf_event_task_sched_out+0x6d0/0x18d0 [ 115.199588] ? lock_is_held_type+0xd7/0x130 [ 115.199606] ? __perf_cgroup_move+0x160/0x160 [ 115.199618] ? set_next_entity+0x304/0x550 [ 115.199636] ? update_curr+0x267/0x740 [ 115.199655] ? lock_is_held_type+0xd7/0x130 [ 115.199674] __schedule+0xedd/0x2470 [ 115.199687] ? io_schedule_timeout+0x150/0x150 [ 115.199699] ? __x64_sys_futex_time32+0x480/0x480 [ 115.199714] schedule+0xda/0x1b0 [ 115.199725] exit_to_user_mode_prepare+0x114/0x1a0 [ 115.199746] syscall_exit_to_user_mode+0x19/0x40 [ 115.199764] do_syscall_64+0x48/0x90 [ 115.199778] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 115.199796] RIP: 0033:0x7f480019eb19 [ 115.199804] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 115.199816] RSP: 002b:00007f47fd714218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 115.199826] RAX: 0000000000000001 RBX: 00007f48002b1f68 RCX: 00007f480019eb19 [ 115.199834] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007f48002b1f6c [ 115.199841] RBP: 00007f48002b1f60 R08: 000000000000000e R09: 0000000000000000 [ 115.199849] R10: 000000000000000a R11: 0000000000000246 R12: 00007f48002b1f6c [ 115.199856] R13: 00007ffc3d3bf90f R14: 00007f47fd714300 R15: 0000000000022000 [ 115.199869] [ 115.258995] WARNING: CPU: 1 PID: 3821 at kernel/events/core.c:2309 group_sched_out.part.0+0x2c7/0x460 [ 115.259703] Modules linked in: [ 115.259948] CPU: 1 PID: 3821 Comm: syz-executor.2 Not tainted 6.0.0-rc5-next-20220913 #1 [ 115.260563] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 115.261419] RIP: 0010:group_sched_out.part.0+0x2c7/0x460 [ 115.261835] Code: 5e 41 5f e9 3b b7 ef ff e8 36 b7 ef ff 65 8b 1d ab 15 ac 7e 31 ff 89 de e8 d6 b3 ef ff 85 db 0f 84 8a 00 00 00 e8 19 b7 ef ff <0f> 0b e9 a5 fe ff ff e8 0d b7 ef ff 48 8d 7d 10 48 b8 00 00 00 00 [ 115.263217] RSP: 0018:ffff888017eafc48 EFLAGS: 00010006 [ 115.263623] RAX: 0000000040000002 RBX: 0000000000000000 RCX: 0000000000000000 [ 115.264155] RDX: ffff88801831b580 RSI: ffffffff81566027 RDI: 0000000000000005 [ 115.264704] RBP: ffff88801f280000 R08: 0000000000000005 R09: 0000000000000001 [ 115.265247] R10: 0000000000000000 R11: 0000000000000001 R12: ffff88800e38b400 [ 115.265795] R13: ffff88806cf3d100 R14: ffffffff8547bfc0 R15: 0000000000000002 [ 115.266347] FS: 00007f47fd714700(0000) GS:ffff88806cf00000(0000) knlGS:0000000000000000 [ 115.266954] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 115.267398] CR2: 00007f95bed22710 CR3: 000000003f5ba000 CR4: 0000000000350ee0 [ 115.267944] Call Trace: [ 115.268144] [ 115.268323] ctx_sched_out+0x8f1/0xc10 [ 115.268623] __perf_event_task_sched_out+0x6d0/0x18d0 [ 115.269034] ? lock_is_held_type+0xd7/0x130 [ 115.269376] ? __perf_cgroup_move+0x160/0x160 [ 115.269720] ? set_next_entity+0x304/0x550 [ 115.270055] ? update_curr+0x267/0x740 [ 115.270362] ? lock_is_held_type+0xd7/0x130 [ 115.270697] __schedule+0xedd/0x2470 [ 115.270988] ? io_schedule_timeout+0x150/0x150 [ 115.271342] ? __x64_sys_futex_time32+0x480/0x480 [ 115.271707] schedule+0xda/0x1b0 [ 115.271972] exit_to_user_mode_prepare+0x114/0x1a0 [ 115.272362] syscall_exit_to_user_mode+0x19/0x40 [ 115.272737] do_syscall_64+0x48/0x90 [ 115.273030] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 115.273427] RIP: 0033:0x7f480019eb19 [ 115.273719] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 115.275081] RSP: 002b:00007f47fd714218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 115.275662] RAX: 0000000000000001 RBX: 00007f48002b1f68 RCX: 00007f480019eb19 [ 115.276197] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007f48002b1f6c [ 115.276737] RBP: 00007f48002b1f60 R08: 000000000000000e R09: 0000000000000000 [ 115.277282] R10: 000000000000000a R11: 0000000000000246 R12: 00007f48002b1f6c [ 115.277820] R13: 00007ffc3d3bf90f R14: 00007f47fd714300 R15: 0000000000022000 [ 115.278371] [ 115.278556] irq event stamp: 6964 [ 115.278817] hardirqs last enabled at (6963): [] exit_to_user_mode_prepare+0x109/0x1a0 [ 115.279508] hardirqs last disabled at (6964): [] __schedule+0x1225/0x2470 [ 115.280107] softirqs last enabled at (6520): [] do_ip_setsockopt+0x20f/0x34f0 [ 115.280760] softirqs last disabled at (6518): [] release_sock+0x1b/0x1b0 [ 115.281372] ---[ end trace 0000000000000000 ]--- [ 115.412433] device lo entered promiscuous mode [ 115.458071] syz-executor.2 (3821) used greatest stack depth: 24264 bytes left 13:59:06 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) clone3(&(0x7f0000000200)={0x340022800, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x0, {r2}}, 0x58) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x64010101}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) ioctl$int_in(r7, 0x5421, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000100)={'bond_slave_1\x00'}) sendmsg$inet(r4, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @remote, @broadcast}}}], 0x20}, 0x0) setsockopt$inet_mreqn(r3, 0x0, 0x20, &(0x7f0000000040)={@broadcast, @broadcast, r6}, 0xc) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f00000000c0)={0x3ff, 0x8fa, 0x800}) [ 115.558229] device lo left promiscuous mode [ 115.648807] hrtimer: interrupt took 17092 ns [ 115.868754] device lo entered promiscuous mode 13:59:06 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) clone3(&(0x7f0000000200)={0x340022800, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x0, {r2}}, 0x58) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x64010101}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) ioctl$int_in(r7, 0x5421, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000100)={'bond_slave_1\x00'}) sendmsg$inet(r4, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @remote, @broadcast}}}], 0x20}, 0x0) setsockopt$inet_mreqn(r3, 0x0, 0x20, &(0x7f0000000040)={@broadcast, @broadcast, r6}, 0xc) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f00000000c0)={0x3ff, 0x8fa, 0x800}) 13:59:06 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) rt_sigqueueinfo(0x0, 0x21, &(0x7f0000000000)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000007ec0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="0067da18940e63a675cb6447e46b2c027c6b084a5944d7d50690de9887aa7b3ff42be69ab280a1dcac3841af8b4a7162cbb83f29ac9c4638eaecc82557ef4e63c6f987c40458414f6deb33962783e38130cedb91dd04d892a3d13ca8f627a3617361090d4e67afb0f83b5f8686d23775584c1972c675e51ee5608655fcd05e4975e4fc1ff7869e9dac50898d2609092215f96fa8ccb0ac742b733f6b6d4ad678aef012b3da59a833cc889e457231005157ac605f6945dc87e68441188d3f028f2ecadb4a83add0"], 0xe4}], 0x1, &(0x7f0000007e00)=[@cred={{0x1c}}], 0x20}, 0x0) perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0xc0, 0xe, 0x5, 0x8, 0x0, 0x2, 0x4000, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0xde, 0x1, @perf_config_ext={0x9, 0x3}, 0x40000, 0x2, 0x8, 0x7, 0xfff, 0x5, 0x7f, 0x0, 0xfff, 0x0, 0x6e}, 0xffffffffffffffff, 0x4, r0, 0xa) r1 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r1, 0x40047211, &(0x7f0000000240)=0x1) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', r2, &(0x7f00000001c0)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000c80)={{{@in6=@remote, @in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f0000000d80)=0xe8) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f00000000c0), 0x12) 13:59:06 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) rt_sigqueueinfo(0x0, 0x21, &(0x7f0000000000)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000007ec0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="0067da18940e63a675cb6447e46b2c027c6b084a5944d7d50690de9887aa7b3ff42be69ab280a1dcac3841af8b4a7162cbb83f29ac9c4638eaecc82557ef4e63c6f987c40458414f6deb33962783e38130cedb91dd04d892a3d13ca8f627a3617361090d4e67afb0f83b5f8686d23775584c1972c675e51ee5608655fcd05e4975e4fc1ff7869e9dac50898d2609092215f96fa8ccb0ac742b733f6b6d4ad678aef012b3da59a833cc889e457231005157ac605f6945dc87e68441188d3f028f2ecadb4a83add0"], 0xe4}], 0x1, &(0x7f0000007e00)=[@cred={{0x1c}}], 0x20}, 0x0) perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0xc0, 0xe, 0x5, 0x8, 0x0, 0x2, 0x4000, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0xde, 0x1, @perf_config_ext={0x9, 0x3}, 0x40000, 0x2, 0x8, 0x7, 0xfff, 0x5, 0x7f, 0x0, 0xfff, 0x0, 0x6e}, 0xffffffffffffffff, 0x4, r0, 0xa) r1 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r1, 0x40047211, &(0x7f0000000240)=0x1) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', r2, &(0x7f00000001c0)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000c80)={{{@in6=@remote, @in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f0000000d80)=0xe8) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f00000000c0), 0x12) [ 116.132904] device lo left promiscuous mode [ 116.191197] device lo entered promiscuous mode 13:59:07 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) rt_sigqueueinfo(0x0, 0x21, &(0x7f0000000000)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000007ec0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="0067da18940e63a675cb6447e46b2c027c6b084a5944d7d50690de9887aa7b3ff42be69ab280a1dcac3841af8b4a7162cbb83f29ac9c4638eaecc82557ef4e63c6f987c40458414f6deb33962783e38130cedb91dd04d892a3d13ca8f627a3617361090d4e67afb0f83b5f8686d23775584c1972c675e51ee5608655fcd05e4975e4fc1ff7869e9dac50898d2609092215f96fa8ccb0ac742b733f6b6d4ad678aef012b3da59a833cc889e457231005157ac605f6945dc87e68441188d3f028f2ecadb4a83add0"], 0xe4}], 0x1, &(0x7f0000007e00)=[@cred={{0x1c}}], 0x20}, 0x0) perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0xc0, 0xe, 0x5, 0x8, 0x0, 0x2, 0x4000, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0xde, 0x1, @perf_config_ext={0x9, 0x3}, 0x40000, 0x2, 0x8, 0x7, 0xfff, 0x5, 0x7f, 0x0, 0xfff, 0x0, 0x6e}, 0xffffffffffffffff, 0x4, r0, 0xa) r1 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r1, 0x40047211, &(0x7f0000000240)=0x1) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', r2, &(0x7f00000001c0)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000c80)={{{@in6=@remote, @in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f0000000d80)=0xe8) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f00000000c0), 0x12) 13:59:07 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) clone3(&(0x7f0000000200)={0x340022800, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x0, {r2}}, 0x58) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x64010101}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) ioctl$int_in(r7, 0x5421, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000100)={'bond_slave_1\x00'}) sendmsg$inet(r4, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @remote, @broadcast}}}], 0x20}, 0x0) setsockopt$inet_mreqn(r3, 0x0, 0x20, &(0x7f0000000040)={@broadcast, @broadcast, r6}, 0xc) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f00000000c0)={0x3ff, 0x8fa, 0x800}) [ 116.361225] device lo left promiscuous mode [ 116.396485] device lo entered promiscuous mode 13:59:08 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmmsg$sock(r0, &(0x7f0000002d40)=[{{&(0x7f00000000c0)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)="eaec", 0x2}], 0x1}}, {{&(0x7f0000000280)=@in={0x2, 0x0, @multicast2}, 0x80, 0x0, 0x0, &(0x7f0000001640)=[@txtime={{0x18, 0x1, 0x25}}], 0x18}}], 0x2, 0x0) 13:59:08 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) rt_sigqueueinfo(0x0, 0x21, &(0x7f0000000000)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000007ec0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="0067da18940e63a675cb6447e46b2c027c6b084a5944d7d50690de9887aa7b3ff42be69ab280a1dcac3841af8b4a7162cbb83f29ac9c4638eaecc82557ef4e63c6f987c40458414f6deb33962783e38130cedb91dd04d892a3d13ca8f627a3617361090d4e67afb0f83b5f8686d23775584c1972c675e51ee5608655fcd05e4975e4fc1ff7869e9dac50898d2609092215f96fa8ccb0ac742b733f6b6d4ad678aef012b3da59a833cc889e457231005157ac605f6945dc87e68441188d3f028f2ecadb4a83add0"], 0xe4}], 0x1, &(0x7f0000007e00)=[@cred={{0x1c}}], 0x20}, 0x0) perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0xc0, 0xe, 0x5, 0x8, 0x0, 0x2, 0x4000, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0xde, 0x1, @perf_config_ext={0x9, 0x3}, 0x40000, 0x2, 0x8, 0x7, 0xfff, 0x5, 0x7f, 0x0, 0xfff, 0x0, 0x6e}, 0xffffffffffffffff, 0x4, r0, 0xa) r1 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r1, 0x40047211, &(0x7f0000000240)=0x1) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', r2, &(0x7f00000001c0)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000c80)={{{@in6=@remote, @in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f0000000d80)=0xe8) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f00000000c0), 0x12) 13:59:08 executing program 7: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) rt_sigqueueinfo(0x0, 0x21, &(0x7f0000000000)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000007ec0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="0067da18940e63a675cb6447e46b2c027c6b084a5944d7d50690de9887aa7b3ff42be69ab280a1dcac3841af8b4a7162cbb83f29ac9c4638eaecc82557ef4e63c6f987c40458414f6deb33962783e38130cedb91dd04d892a3d13ca8f627a3617361090d4e67afb0f83b5f8686d23775584c1972c675e51ee5608655fcd05e4975e4fc1ff7869e9dac50898d2609092215f96fa8ccb0ac742b733f6b6d4ad678aef012b3da59a833cc889e457231005157ac605f6945dc87e68441188d3f028f2ecadb4a83add0"], 0xe4}], 0x1, &(0x7f0000007e00)=[@cred={{0x1c}}], 0x20}, 0x0) perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0xc0, 0xe, 0x5, 0x8, 0x0, 0x2, 0x4000, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0xde, 0x1, @perf_config_ext={0x9, 0x3}, 0x40000, 0x2, 0x8, 0x7, 0xfff, 0x5, 0x7f, 0x0, 0xfff, 0x0, 0x6e}, 0xffffffffffffffff, 0x4, r0, 0xa) r1 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r1, 0x40047211, &(0x7f0000000240)=0x1) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', r2, &(0x7f00000001c0)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000c80)={{{@in6=@remote, @in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f0000000d80)=0xe8) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f00000000c0), 0x12) 13:59:08 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000180), 0x4) 13:59:08 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) chroot(&(0x7f0000000100)='./file0\x00') getcwd(0x0, 0xffffffffffffff4f) 13:59:08 executing program 4: r0 = syz_io_uring_setup(0x76e7, &(0x7f0000000340), &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000280), &(0x7f00000003c0)) io_uring_register$IORING_UNREGISTER_PERSONALITY(r0, 0x7, 0x0, 0x0) 13:59:08 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) rt_sigqueueinfo(0x0, 0x21, &(0x7f0000000000)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000007ec0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="0067da18940e63a675cb6447e46b2c027c6b084a5944d7d50690de9887aa7b3ff42be69ab280a1dcac3841af8b4a7162cbb83f29ac9c4638eaecc82557ef4e63c6f987c40458414f6deb33962783e38130cedb91dd04d892a3d13ca8f627a3617361090d4e67afb0f83b5f8686d23775584c1972c675e51ee5608655fcd05e4975e4fc1ff7869e9dac50898d2609092215f96fa8ccb0ac742b733f6b6d4ad678aef012b3da59a833cc889e457231005157ac605f6945dc87e68441188d3f028f2ecadb4a83add0"], 0xe4}], 0x1, &(0x7f0000007e00)=[@cred={{0x1c}}], 0x20}, 0x0) perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0xc0, 0xe, 0x5, 0x8, 0x0, 0x2, 0x4000, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0xde, 0x1, @perf_config_ext={0x9, 0x3}, 0x40000, 0x2, 0x8, 0x7, 0xfff, 0x5, 0x7f, 0x0, 0xfff, 0x0, 0x6e}, 0xffffffffffffffff, 0x4, r0, 0xa) r1 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r1, 0x40047211, &(0x7f0000000240)=0x1) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', r2, &(0x7f00000001c0)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000c80)={{{@in6=@remote, @in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f0000000d80)=0xe8) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f00000000c0), 0x12) 13:59:08 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) rt_sigqueueinfo(0x0, 0x21, &(0x7f0000000000)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000007ec0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000008c0)=ANY=[@ANYBLOB="86ffffe2506e325affafff000000000000000000000000600a451685ac0a7bc45895b67191df0ef6a04b9a6318ef9cafef2664bfaac8227903fd79e84ec86989e828b9dbd58609e0bb40bc1f9331b8792c4d8a7365da1497b8fa015d310cae61d187b6ce90fb6bc7104bb2009a7789cdda9185d864e9130eb363de689e7e7ab3cc904438d0ac79a43cb02cd6e2ae306f0d61095a15c2d5789e597a0002baaddaf6faeeca8175f90fcd0f9891f4b89646950aa62ee9e78aadbc55f3266e4fcfbae21470692591f1deb9538c8fe29c2878db0408000f000000000000000000000000006f617112cea42a85dfce88f104c79cd414d12d8c090007b3", @ANYRES32, @ANYBLOB="0067da18940e63a675cb6447e46b2c027c6b084a5944d7d50690de9887aa7b3ff42be69ab280a1dcac3841af8b4a7162cbb83f29ac9c4638eaecc82557ef4e63c6f987c40458414f6deb33962783e38130cedb91dd04d892a3d13ca8f627a3617361090d4e67afb0f83b5f8686d23775584c1972c675e51ee5608655fcd05e4975e4fc1ff7869e9dac50898d2609092215f96fa8ccb0ac742b733f6b6d4ad678aef012b3da59a833cc889e457231005157ac605f6945dc87e68441188d3f028f2ecadb4a83add0"], 0xe4}], 0x1, &(0x7f0000007e00)=[@cred={{0x1c}}], 0x20}, 0x0) perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0xc0, 0xe, 0x5, 0x8, 0x0, 0x2, 0x4000, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0xde, 0x1, @perf_config_ext={0x9, 0x3}, 0x40000, 0x2, 0x8, 0x7, 0xfff, 0x5, 0x7f, 0x0, 0xfff, 0x0, 0x6e}, 0xffffffffffffffff, 0x4, r0, 0xa) r1 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r1, 0x40047211, &(0x7f0000000240)=0x1) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', r2, &(0x7f00000001c0)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000c80)={{{@in6=@remote, @in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f0000000d80)=0xe8) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f00000000c0), 0x12) 13:59:08 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmmsg$sock(r0, &(0x7f0000002d40)=[{{&(0x7f00000000c0)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)="eaec", 0x2}], 0x1}}, {{&(0x7f0000000280)=@in={0x2, 0x0, @multicast2}, 0x80, 0x0, 0x0, &(0x7f0000001640)=[@txtime={{0x18, 0x1, 0x25}}], 0x18}}], 0x2, 0x0) 13:59:08 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000180), 0x4) 13:59:08 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) rt_sigqueueinfo(0x0, 0x21, &(0x7f0000000000)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000007ec0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="0067da18940e63a675cb6447e46b2c027c6b084a5944d7d50690de9887aa7b3ff42be69ab280a1dcac3841af8b4a7162cbb83f29ac9c4638eaecc82557ef4e63c6f987c40458414f6deb33962783e38130cedb91dd04d892a3d13ca8f627a3617361090d4e67afb0f83b5f8686d23775584c1972c675e51ee5608655fcd05e4975e4fc1ff7869e9dac50898d2609092215f96fa8ccb0ac742b733f6b6d4ad678aef012b3da59a833cc889e457231005157ac605f6945dc87e68441188d3f028f2ecadb4a83add0"], 0xe4}], 0x1, &(0x7f0000007e00)=[@cred={{0x1c}}], 0x20}, 0x0) perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0xc0, 0xe, 0x5, 0x8, 0x0, 0x2, 0x4000, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0xde, 0x1, @perf_config_ext={0x9, 0x3}, 0x40000, 0x2, 0x8, 0x7, 0xfff, 0x5, 0x7f, 0x0, 0xfff, 0x0, 0x6e}, 0xffffffffffffffff, 0x4, r0, 0xa) r1 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r1, 0x40047211, &(0x7f0000000240)=0x1) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', r2, &(0x7f00000001c0)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000c80)={{{@in6=@remote, @in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f0000000d80)=0xe8) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f00000000c0), 0x12) 13:59:08 executing program 7: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) rt_sigqueueinfo(0x0, 0x21, &(0x7f0000000000)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000007ec0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="0067da18940e63a675cb6447e46b2c027c6b084a5944d7d50690de9887aa7b3ff42be69ab280a1dcac3841af8b4a7162cbb83f29ac9c4638eaecc82557ef4e63c6f987c40458414f6deb33962783e38130cedb91dd04d892a3d13ca8f627a3617361090d4e67afb0f83b5f8686d23775584c1972c675e51ee5608655fcd05e4975e4fc1ff7869e9dac50898d2609092215f96fa8ccb0ac742b733f6b6d4ad678aef012b3da59a833cc889e457231005157ac605f6945dc87e68441188d3f028f2ecadb4a83add0"], 0xe4}], 0x1, &(0x7f0000007e00)=[@cred={{0x1c}}], 0x20}, 0x0) perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0xc0, 0xe, 0x5, 0x8, 0x0, 0x2, 0x4000, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0xde, 0x1, @perf_config_ext={0x9, 0x3}, 0x40000, 0x2, 0x8, 0x7, 0xfff, 0x5, 0x7f, 0x0, 0xfff, 0x0, 0x6e}, 0xffffffffffffffff, 0x4, r0, 0xa) r1 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r1, 0x40047211, &(0x7f0000000240)=0x1) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', r2, &(0x7f00000001c0)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000c80)={{{@in6=@remote, @in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f0000000d80)=0xe8) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f00000000c0), 0x12) 13:59:08 executing program 4: r0 = syz_io_uring_setup(0x76e7, &(0x7f0000000340), &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000280), &(0x7f00000003c0)) io_uring_register$IORING_UNREGISTER_PERSONALITY(r0, 0x7, 0x0, 0x0) 13:59:08 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmmsg$sock(r0, &(0x7f0000002d40)=[{{&(0x7f00000000c0)=@in={0x2, 0x0, @dev}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)="eaec", 0x2}], 0x1}}, {{&(0x7f0000000280)=@in={0x2, 0x0, @multicast2}, 0x80, 0x0, 0x0, &(0x7f0000001640)=[@txtime={{0x18, 0x1, 0x25}}], 0x18}}], 0x2, 0x0) 13:59:08 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) chroot(&(0x7f0000000100)='./file0\x00') getcwd(0x0, 0xffffffffffffff4f) 13:59:08 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000180), 0x4) 13:59:08 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) chroot(&(0x7f0000000100)='./file0\x00') getcwd(0x0, 0xffffffffffffff4f) 13:59:08 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) rt_sigqueueinfo(0x0, 0x21, &(0x7f0000000000)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000007ec0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="0067da18940e63a675cb6447e46b2c027c6b084a5944d7d50690de9887aa7b3ff42be69ab280a1dcac3841af8b4a7162cbb83f29ac9c4638eaecc82557ef4e63c6f987c40458414f6deb33962783e38130cedb91dd04d892a3d13ca8f627a3617361090d4e67afb0f83b5f8686d23775584c1972c675e51ee5608655fcd05e4975e4fc1ff7869e9dac50898d2609092215f96fa8ccb0ac742b733f6b6d4ad678aef012b3da59a833cc889e457231005157ac605f6945dc87e68441188d3f028f2ecadb4a83add0"], 0xe4}], 0x1, &(0x7f0000007e00)=[@cred={{0x1c}}], 0x20}, 0x0) perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0xc0, 0xe, 0x5, 0x8, 0x0, 0x2, 0x4000, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0xde, 0x1, @perf_config_ext={0x9, 0x3}, 0x40000, 0x2, 0x8, 0x7, 0xfff, 0x5, 0x7f, 0x0, 0xfff, 0x0, 0x6e}, 0xffffffffffffffff, 0x4, r0, 0xa) r1 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r1, 0x40047211, &(0x7f0000000240)=0x1) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', r2, &(0x7f00000001c0)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000c80)={{{@in6=@remote, @in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f0000000d80)=0xe8) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f00000000c0), 0x12) 13:59:08 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) rt_sigqueueinfo(0x0, 0x21, &(0x7f0000000000)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000007ec0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000008c0)=ANY=[@ANYBLOB="86ffffe2506e325affafff000000000000000000000000600a451685ac0a7bc45895b67191df0ef6a04b9a6318ef9cafef2664bfaac8227903fd79e84ec86989e828b9dbd58609e0bb40bc1f9331b8792c4d8a7365da1497b8fa015d310cae61d187b6ce90fb6bc7104bb2009a7789cdda9185d864e9130eb363de689e7e7ab3cc904438d0ac79a43cb02cd6e2ae306f0d61095a15c2d5789e597a0002baaddaf6faeeca8175f90fcd0f9891f4b89646950aa62ee9e78aadbc55f3266e4fcfbae21470692591f1deb9538c8fe29c2878db0408000f000000000000000000000000006f617112cea42a85dfce88f104c79cd414d12d8c090007b3", @ANYRES32, @ANYBLOB="0067da18940e63a675cb6447e46b2c027c6b084a5944d7d50690de9887aa7b3ff42be69ab280a1dcac3841af8b4a7162cbb83f29ac9c4638eaecc82557ef4e63c6f987c40458414f6deb33962783e38130cedb91dd04d892a3d13ca8f627a3617361090d4e67afb0f83b5f8686d23775584c1972c675e51ee5608655fcd05e4975e4fc1ff7869e9dac50898d2609092215f96fa8ccb0ac742b733f6b6d4ad678aef012b3da59a833cc889e457231005157ac605f6945dc87e68441188d3f028f2ecadb4a83add0"], 0xe4}], 0x1, &(0x7f0000007e00)=[@cred={{0x1c}}], 0x20}, 0x0) perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0xc0, 0xe, 0x5, 0x8, 0x0, 0x2, 0x4000, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0xde, 0x1, @perf_config_ext={0x9, 0x3}, 0x40000, 0x2, 0x8, 0x7, 0xfff, 0x5, 0x7f, 0x0, 0xfff, 0x0, 0x6e}, 0xffffffffffffffff, 0x4, r0, 0xa) r1 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r1, 0x40047211, &(0x7f0000000240)=0x1) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', r2, &(0x7f00000001c0)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000c80)={{{@in6=@remote, @in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f0000000d80)=0xe8) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f00000000c0), 0x12) 13:59:08 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) chroot(&(0x7f0000000100)='./file0\x00') getcwd(0x0, 0xffffffffffffff4f) 13:59:08 executing program 4: r0 = syz_io_uring_setup(0x76e7, &(0x7f0000000340), &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000280), &(0x7f00000003c0)) io_uring_register$IORING_UNREGISTER_PERSONALITY(r0, 0x7, 0x0, 0x0) 13:59:08 executing program 1: r0 = syz_io_uring_setup(0x76e7, &(0x7f0000000340), &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000280), &(0x7f00000003c0)) io_uring_register$IORING_UNREGISTER_PERSONALITY(r0, 0x7, 0x0, 0x0) 13:59:08 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) chroot(&(0x7f0000000100)='./file0\x00') getcwd(0x0, 0xffffffffffffff4f) 13:59:08 executing program 1: r0 = syz_io_uring_setup(0x76e7, &(0x7f0000000340), &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000280), &(0x7f00000003c0)) io_uring_register$IORING_UNREGISTER_PERSONALITY(r0, 0x7, 0x0, 0x0) 13:59:08 executing program 7: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) rt_sigqueueinfo(0x0, 0x21, &(0x7f0000000000)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000007ec0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="0067da18940e63a675cb6447e46b2c027c6b084a5944d7d50690de9887aa7b3ff42be69ab280a1dcac3841af8b4a7162cbb83f29ac9c4638eaecc82557ef4e63c6f987c40458414f6deb33962783e38130cedb91dd04d892a3d13ca8f627a3617361090d4e67afb0f83b5f8686d23775584c1972c675e51ee5608655fcd05e4975e4fc1ff7869e9dac50898d2609092215f96fa8ccb0ac742b733f6b6d4ad678aef012b3da59a833cc889e457231005157ac605f6945dc87e68441188d3f028f2ecadb4a83add0"], 0xe4}], 0x1, &(0x7f0000007e00)=[@cred={{0x1c}}], 0x20}, 0x0) perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0xc0, 0xe, 0x5, 0x8, 0x0, 0x2, 0x4000, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0xde, 0x1, @perf_config_ext={0x9, 0x3}, 0x40000, 0x2, 0x8, 0x7, 0xfff, 0x5, 0x7f, 0x0, 0xfff, 0x0, 0x6e}, 0xffffffffffffffff, 0x4, r0, 0xa) r1 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r1, 0x40047211, &(0x7f0000000240)=0x1) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', r2, &(0x7f00000001c0)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000c80)={{{@in6=@remote, @in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f0000000d80)=0xe8) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f00000000c0), 0x12) 13:59:08 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) rt_sigqueueinfo(0x0, 0x21, &(0x7f0000000000)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000007ec0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="0067da18940e63a675cb6447e46b2c027c6b084a5944d7d50690de9887aa7b3ff42be69ab280a1dcac3841af8b4a7162cbb83f29ac9c4638eaecc82557ef4e63c6f987c40458414f6deb33962783e38130cedb91dd04d892a3d13ca8f627a3617361090d4e67afb0f83b5f8686d23775584c1972c675e51ee5608655fcd05e4975e4fc1ff7869e9dac50898d2609092215f96fa8ccb0ac742b733f6b6d4ad678aef012b3da59a833cc889e457231005157ac605f6945dc87e68441188d3f028f2ecadb4a83add0"], 0xe4}], 0x1, &(0x7f0000007e00)=[@cred={{0x1c}}], 0x20}, 0x0) perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0xc0, 0xe, 0x5, 0x8, 0x0, 0x2, 0x4000, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0xde, 0x1, @perf_config_ext={0x9, 0x3}, 0x40000, 0x2, 0x8, 0x7, 0xfff, 0x5, 0x7f, 0x0, 0xfff, 0x0, 0x6e}, 0xffffffffffffffff, 0x4, r0, 0xa) r1 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r1, 0x40047211, &(0x7f0000000240)=0x1) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', r2, &(0x7f00000001c0)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000c80)={{{@in6=@remote, @in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f0000000d80)=0xe8) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f00000000c0), 0x12) 13:59:08 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) chroot(&(0x7f0000000100)='./file0\x00') getcwd(0x0, 0xffffffffffffff4f) 13:59:08 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000180), 0x4) 13:59:08 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) rt_sigqueueinfo(0x0, 0x21, &(0x7f0000000000)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000007ec0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000008c0)=ANY=[@ANYBLOB="86ffffe2506e325affafff000000000000000000000000600a451685ac0a7bc45895b67191df0ef6a04b9a6318ef9cafef2664bfaac8227903fd79e84ec86989e828b9dbd58609e0bb40bc1f9331b8792c4d8a7365da1497b8fa015d310cae61d187b6ce90fb6bc7104bb2009a7789cdda9185d864e9130eb363de689e7e7ab3cc904438d0ac79a43cb02cd6e2ae306f0d61095a15c2d5789e597a0002baaddaf6faeeca8175f90fcd0f9891f4b89646950aa62ee9e78aadbc55f3266e4fcfbae21470692591f1deb9538c8fe29c2878db0408000f000000000000000000000000006f617112cea42a85dfce88f104c79cd414d12d8c090007b3", @ANYRES32, @ANYBLOB="0067da18940e63a675cb6447e46b2c027c6b084a5944d7d50690de9887aa7b3ff42be69ab280a1dcac3841af8b4a7162cbb83f29ac9c4638eaecc82557ef4e63c6f987c40458414f6deb33962783e38130cedb91dd04d892a3d13ca8f627a3617361090d4e67afb0f83b5f8686d23775584c1972c675e51ee5608655fcd05e4975e4fc1ff7869e9dac50898d2609092215f96fa8ccb0ac742b733f6b6d4ad678aef012b3da59a833cc889e457231005157ac605f6945dc87e68441188d3f028f2ecadb4a83add0"], 0xe4}], 0x1, &(0x7f0000007e00)=[@cred={{0x1c}}], 0x20}, 0x0) perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0xc0, 0xe, 0x5, 0x8, 0x0, 0x2, 0x4000, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0xde, 0x1, @perf_config_ext={0x9, 0x3}, 0x40000, 0x2, 0x8, 0x7, 0xfff, 0x5, 0x7f, 0x0, 0xfff, 0x0, 0x6e}, 0xffffffffffffffff, 0x4, r0, 0xa) r1 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r1, 0x40047211, &(0x7f0000000240)=0x1) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', r2, &(0x7f00000001c0)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000c80)={{{@in6=@remote, @in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f0000000d80)=0xe8) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f00000000c0), 0x12) 13:59:08 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) rt_sigqueueinfo(0x0, 0x21, &(0x7f0000000000)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000007ec0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="0067da18940e63a675cb6447e46b2c027c6b084a5944d7d50690de9887aa7b3ff42be69ab280a1dcac3841af8b4a7162cbb83f29ac9c4638eaecc82557ef4e63c6f987c40458414f6deb33962783e38130cedb91dd04d892a3d13ca8f627a3617361090d4e67afb0f83b5f8686d23775584c1972c675e51ee5608655fcd05e4975e4fc1ff7869e9dac50898d2609092215f96fa8ccb0ac742b733f6b6d4ad678aef012b3da59a833cc889e457231005157ac605f6945dc87e68441188d3f028f2ecadb4a83add0"], 0xe4}], 0x1, &(0x7f0000007e00)=[@cred={{0x1c}}], 0x20}, 0x0) perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0xc0, 0xe, 0x5, 0x8, 0x0, 0x2, 0x4000, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0xde, 0x1, @perf_config_ext={0x9, 0x3}, 0x40000, 0x2, 0x8, 0x7, 0xfff, 0x5, 0x7f, 0x0, 0xfff, 0x0, 0x6e}, 0xffffffffffffffff, 0x4, r0, 0xa) r1 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r1, 0x40047211, &(0x7f0000000240)=0x1) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', r2, &(0x7f00000001c0)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000c80)={{{@in6=@remote, @in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f0000000d80)=0xe8) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f00000000c0), 0x12) 13:59:08 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) clone3(&(0x7f0000000200)={0x340022800, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x0, {r2}}, 0x58) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x64010101}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) ioctl$int_in(r7, 0x5421, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000100)={'bond_slave_1\x00'}) sendmsg$inet(r4, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @remote, @broadcast}}}], 0x20}, 0x0) setsockopt$inet_mreqn(r3, 0x0, 0x20, &(0x7f0000000040)={@broadcast, @broadcast, r6}, 0xc) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f00000000c0)={0x3ff, 0x8fa, 0x800}) 13:59:08 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) rt_sigqueueinfo(0x0, 0x21, &(0x7f0000000000)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000007ec0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000008c0)=ANY=[@ANYBLOB="86ffffe2506e325affafff000000000000000000000000600a451685ac0a7bc45895b67191df0ef6a04b9a6318ef9cafef2664bfaac8227903fd79e84ec86989e828b9dbd58609e0bb40bc1f9331b8792c4d8a7365da1497b8fa015d310cae61d187b6ce90fb6bc7104bb2009a7789cdda9185d864e9130eb363de689e7e7ab3cc904438d0ac79a43cb02cd6e2ae306f0d61095a15c2d5789e597a0002baaddaf6faeeca8175f90fcd0f9891f4b89646950aa62ee9e78aadbc55f3266e4fcfbae21470692591f1deb9538c8fe29c2878db0408000f000000000000000000000000006f617112cea42a85dfce88f104c79cd414d12d8c090007b3", @ANYRES32, @ANYBLOB="0067da18940e63a675cb6447e46b2c027c6b084a5944d7d50690de9887aa7b3ff42be69ab280a1dcac3841af8b4a7162cbb83f29ac9c4638eaecc82557ef4e63c6f987c40458414f6deb33962783e38130cedb91dd04d892a3d13ca8f627a3617361090d4e67afb0f83b5f8686d23775584c1972c675e51ee5608655fcd05e4975e4fc1ff7869e9dac50898d2609092215f96fa8ccb0ac742b733f6b6d4ad678aef012b3da59a833cc889e457231005157ac605f6945dc87e68441188d3f028f2ecadb4a83add0"], 0xe4}], 0x1, &(0x7f0000007e00)=[@cred={{0x1c}}], 0x20}, 0x0) perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0xc0, 0xe, 0x5, 0x8, 0x0, 0x2, 0x4000, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0xde, 0x1, @perf_config_ext={0x9, 0x3}, 0x40000, 0x2, 0x8, 0x7, 0xfff, 0x5, 0x7f, 0x0, 0xfff, 0x0, 0x6e}, 0xffffffffffffffff, 0x4, r0, 0xa) r1 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r1, 0x40047211, &(0x7f0000000240)=0x1) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', r2, &(0x7f00000001c0)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000c80)={{{@in6=@remote, @in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f0000000d80)=0xe8) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f00000000c0), 0x12) 13:59:08 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000180), 0x4) 13:59:08 executing program 1: r0 = syz_io_uring_setup(0x76e7, &(0x7f0000000340), &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000280), &(0x7f00000003c0)) io_uring_register$IORING_UNREGISTER_PERSONALITY(r0, 0x7, 0x0, 0x0) 13:59:08 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) clone3(&(0x7f0000000200)={0x340022800, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x0, {r2}}, 0x58) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x64010101}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) ioctl$int_in(r7, 0x5421, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000100)={'bond_slave_1\x00'}) sendmsg$inet(r4, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @remote, @broadcast}}}], 0x20}, 0x0) setsockopt$inet_mreqn(r3, 0x0, 0x20, &(0x7f0000000040)={@broadcast, @broadcast, r6}, 0xc) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f00000000c0)={0x3ff, 0x8fa, 0x800}) 13:59:08 executing program 7: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) clone3(&(0x7f0000000200)={0x340022800, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x0, {r2}}, 0x58) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x64010101}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) ioctl$int_in(r7, 0x5421, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000100)={'bond_slave_1\x00'}) sendmsg$inet(r4, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @remote, @broadcast}}}], 0x20}, 0x0) setsockopt$inet_mreqn(r3, 0x0, 0x20, &(0x7f0000000040)={@broadcast, @broadcast, r6}, 0xc) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f00000000c0)={0x3ff, 0x8fa, 0x800}) 13:59:08 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) rt_sigqueueinfo(0x0, 0x21, &(0x7f0000000000)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000007ec0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="0067da18940e63a675cb6447e46b2c027c6b084a5944d7d50690de9887aa7b3ff42be69ab280a1dcac3841af8b4a7162cbb83f29ac9c4638eaecc82557ef4e63c6f987c40458414f6deb33962783e38130cedb91dd04d892a3d13ca8f627a3617361090d4e67afb0f83b5f8686d23775584c1972c675e51ee5608655fcd05e4975e4fc1ff7869e9dac50898d2609092215f96fa8ccb0ac742b733f6b6d4ad678aef012b3da59a833cc889e457231005157ac605f6945dc87e68441188d3f028f2ecadb4a83add0"], 0xe4}], 0x1, &(0x7f0000007e00)=[@cred={{0x1c}}], 0x20}, 0x0) perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0xc0, 0xe, 0x5, 0x8, 0x0, 0x2, 0x4000, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0xde, 0x1, @perf_config_ext={0x9, 0x3}, 0x40000, 0x2, 0x8, 0x7, 0xfff, 0x5, 0x7f, 0x0, 0xfff, 0x0, 0x6e}, 0xffffffffffffffff, 0x4, r0, 0xa) r1 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r1, 0x40047211, &(0x7f0000000240)=0x1) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', r2, &(0x7f00000001c0)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000c80)={{{@in6=@remote, @in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f0000000d80)=0xe8) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f00000000c0), 0x12) 13:59:08 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) rt_sigqueueinfo(0x0, 0x21, &(0x7f0000000000)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000007ec0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="0067da18940e63a675cb6447e46b2c027c6b084a5944d7d50690de9887aa7b3ff42be69ab280a1dcac3841af8b4a7162cbb83f29ac9c4638eaecc82557ef4e63c6f987c40458414f6deb33962783e38130cedb91dd04d892a3d13ca8f627a3617361090d4e67afb0f83b5f8686d23775584c1972c675e51ee5608655fcd05e4975e4fc1ff7869e9dac50898d2609092215f96fa8ccb0ac742b733f6b6d4ad678aef012b3da59a833cc889e457231005157ac605f6945dc87e68441188d3f028f2ecadb4a83add0"], 0xe4}], 0x1, &(0x7f0000007e00)=[@cred={{0x1c}}], 0x20}, 0x0) perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0xc0, 0xe, 0x5, 0x8, 0x0, 0x2, 0x4000, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0xde, 0x1, @perf_config_ext={0x9, 0x3}, 0x40000, 0x2, 0x8, 0x7, 0xfff, 0x5, 0x7f, 0x0, 0xfff, 0x0, 0x6e}, 0xffffffffffffffff, 0x4, r0, 0xa) r1 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r1, 0x40047211, &(0x7f0000000240)=0x1) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', r2, &(0x7f00000001c0)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000c80)={{{@in6=@remote, @in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f0000000d80)=0xe8) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f00000000c0), 0x12) [ 117.813765] device lo entered promiscuous mode 13:59:08 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000180), 0x4) [ 117.832540] device lo entered promiscuous mode 13:59:08 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) rt_sigqueueinfo(0x0, 0x21, &(0x7f0000000000)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000007ec0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="0067da18940e63a675cb6447e46b2c027c6b084a5944d7d50690de9887aa7b3ff42be69ab280a1dcac3841af8b4a7162cbb83f29ac9c4638eaecc82557ef4e63c6f987c40458414f6deb33962783e38130cedb91dd04d892a3d13ca8f627a3617361090d4e67afb0f83b5f8686d23775584c1972c675e51ee5608655fcd05e4975e4fc1ff7869e9dac50898d2609092215f96fa8ccb0ac742b733f6b6d4ad678aef012b3da59a833cc889e457231005157ac605f6945dc87e68441188d3f028f2ecadb4a83add0"], 0xe4}], 0x1, &(0x7f0000007e00)=[@cred={{0x1c}}], 0x20}, 0x0) perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0xc0, 0xe, 0x5, 0x8, 0x0, 0x2, 0x4000, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0xde, 0x1, @perf_config_ext={0x9, 0x3}, 0x40000, 0x2, 0x8, 0x7, 0xfff, 0x5, 0x7f, 0x0, 0xfff, 0x0, 0x6e}, 0xffffffffffffffff, 0x4, r0, 0xa) r1 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r1, 0x40047211, &(0x7f0000000240)=0x1) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', r2, &(0x7f00000001c0)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000c80)={{{@in6=@remote, @in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f0000000d80)=0xe8) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f00000000c0), 0x12) 13:59:08 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) clone3(&(0x7f0000000200)={0x340022800, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x0, {r2}}, 0x58) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x64010101}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) ioctl$int_in(r7, 0x5421, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000100)={'bond_slave_1\x00'}) sendmsg$inet(r4, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @remote, @broadcast}}}], 0x20}, 0x0) setsockopt$inet_mreqn(r3, 0x0, 0x20, &(0x7f0000000040)={@broadcast, @broadcast, r6}, 0xc) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f00000000c0)={0x3ff, 0x8fa, 0x800}) [ 117.901693] device lo entered promiscuous mode 13:59:08 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) rt_sigqueueinfo(0x0, 0x21, &(0x7f0000000000)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000007ec0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="0067da18940e63a675cb6447e46b2c027c6b084a5944d7d50690de9887aa7b3ff42be69ab280a1dcac3841af8b4a7162cbb83f29ac9c4638eaecc82557ef4e63c6f987c40458414f6deb33962783e38130cedb91dd04d892a3d13ca8f627a3617361090d4e67afb0f83b5f8686d23775584c1972c675e51ee5608655fcd05e4975e4fc1ff7869e9dac50898d2609092215f96fa8ccb0ac742b733f6b6d4ad678aef012b3da59a833cc889e457231005157ac605f6945dc87e68441188d3f028f2ecadb4a83add0"], 0xe4}], 0x1, &(0x7f0000007e00)=[@cred={{0x1c}}], 0x20}, 0x0) perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0xc0, 0xe, 0x5, 0x8, 0x0, 0x2, 0x4000, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0xde, 0x1, @perf_config_ext={0x9, 0x3}, 0x40000, 0x2, 0x8, 0x7, 0xfff, 0x5, 0x7f, 0x0, 0xfff, 0x0, 0x6e}, 0xffffffffffffffff, 0x4, r0, 0xa) r1 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r1, 0x40047211, &(0x7f0000000240)=0x1) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', r2, &(0x7f00000001c0)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000c80)={{{@in6=@remote, @in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f0000000d80)=0xe8) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f00000000c0), 0x12) [ 117.935034] device lo left promiscuous mode [ 118.147089] device lo entered promiscuous mode [ 118.253588] device lo left promiscuous mode 13:59:09 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) clone3(&(0x7f0000000200)={0x340022800, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x0, {r2}}, 0x58) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x64010101}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) ioctl$int_in(r7, 0x5421, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000100)={'bond_slave_1\x00'}) sendmsg$inet(r4, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @remote, @broadcast}}}], 0x20}, 0x0) setsockopt$inet_mreqn(r3, 0x0, 0x20, &(0x7f0000000040)={@broadcast, @broadcast, r6}, 0xc) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f00000000c0)={0x3ff, 0x8fa, 0x800}) 13:59:09 executing program 4: r0 = getpid() sched_setaffinity(r0, 0x8, &(0x7f0000000040)=0x4000000000000006) 13:59:09 executing program 7: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) clone3(&(0x7f0000000200)={0x340022800, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x0, {r2}}, 0x58) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x64010101}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) ioctl$int_in(r7, 0x5421, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000100)={'bond_slave_1\x00'}) sendmsg$inet(r4, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @remote, @broadcast}}}], 0x20}, 0x0) setsockopt$inet_mreqn(r3, 0x0, 0x20, &(0x7f0000000040)={@broadcast, @broadcast, r6}, 0xc) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f00000000c0)={0x3ff, 0x8fa, 0x800}) 13:59:09 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) clone3(&(0x7f0000000200)={0x340022800, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x0, {r2}}, 0x58) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x64010101}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) ioctl$int_in(r7, 0x5421, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000100)={'bond_slave_1\x00'}) sendmsg$inet(r4, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @remote, @broadcast}}}], 0x20}, 0x0) setsockopt$inet_mreqn(r3, 0x0, 0x20, &(0x7f0000000040)={@broadcast, @broadcast, r6}, 0xc) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f00000000c0)={0x3ff, 0x8fa, 0x800}) 13:59:09 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000500)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}]}}) openat(0xffffffffffffff9c, 0x0, 0x42, 0x0) 13:59:09 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) clone3(&(0x7f0000000200)={0x340022800, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x0, {r2}}, 0x58) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x64010101}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) ioctl$int_in(r7, 0x5421, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000100)={'bond_slave_1\x00'}) sendmsg$inet(r4, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @remote, @broadcast}}}], 0x20}, 0x0) setsockopt$inet_mreqn(r3, 0x0, 0x20, &(0x7f0000000040)={@broadcast, @broadcast, r6}, 0xc) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f00000000c0)={0x3ff, 0x8fa, 0x800}) 13:59:09 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) rt_sigqueueinfo(0x0, 0x21, &(0x7f0000000000)) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000007ec0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="0067da18940e63a675cb6447e46b2c027c6b084a5944d7d50690de9887aa7b3ff42be69ab280a1dcac3841af8b4a7162cbb83f29ac9c4638eaecc82557ef4e63c6f987c40458414f6deb33962783e38130cedb91dd04d892a3d13ca8f627a3617361090d4e67afb0f83b5f8686d23775584c1972c675e51ee5608655fcd05e4975e4fc1ff7869e9dac50898d2609092215f96fa8ccb0ac742b733f6b6d4ad678aef012b3da59a833cc889e457231005157ac605f6945dc87e68441188d3f028f2ecadb4a83add0"], 0xe4}], 0x1, &(0x7f0000007e00)=[@cred={{0x1c}}], 0x20}, 0x0) perf_event_open(&(0x7f00000005c0)={0x0, 0x80, 0xc0, 0xe, 0x5, 0x8, 0x0, 0x2, 0x4000, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0xde, 0x1, @perf_config_ext={0x9, 0x3}, 0x40000, 0x2, 0x8, 0x7, 0xfff, 0x5, 0x7f, 0x0, 0xfff, 0x0, 0x6e}, 0xffffffffffffffff, 0x4, r0, 0xa) r1 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r1, 0x40047211, &(0x7f0000000240)=0x1) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', r2, &(0x7f00000001c0)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000c80)={{{@in6=@remote, @in6=@mcast1}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f0000000d80)=0xe8) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f00000000c0), 0x12) 13:59:09 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) clone3(&(0x7f0000000200)={0x340022800, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x0, {r2}}, 0x58) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x64010101}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) ioctl$int_in(r7, 0x5421, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000100)={'bond_slave_1\x00'}) sendmsg$inet(r4, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @remote, @broadcast}}}], 0x20}, 0x0) setsockopt$inet_mreqn(r3, 0x0, 0x20, &(0x7f0000000040)={@broadcast, @broadcast, r6}, 0xc) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f00000000c0)={0x3ff, 0x8fa, 0x800}) [ 118.289939] device lo left promiscuous mode [ 118.321879] device lo entered promiscuous mode 13:59:09 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000500)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}]}}) openat(0xffffffffffffff9c, 0x0, 0x42, 0x0) [ 118.364151] device lo left promiscuous mode 13:59:09 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) clone3(&(0x7f0000000200)={0x340022800, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x0, {r2}}, 0x58) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x64010101}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) ioctl$int_in(r7, 0x5421, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000100)={'bond_slave_1\x00'}) sendmsg$inet(r4, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @remote, @broadcast}}}], 0x20}, 0x0) setsockopt$inet_mreqn(r3, 0x0, 0x20, &(0x7f0000000040)={@broadcast, @broadcast, r6}, 0xc) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f00000000c0)={0x3ff, 0x8fa, 0x800}) 13:59:09 executing program 4: r0 = getpid() sched_setaffinity(r0, 0x8, &(0x7f0000000040)=0x4000000000000006) [ 118.415288] device lo left promiscuous mode [ 118.513004] device lo entered promiscuous mode [ 118.514419] device lo entered promiscuous mode [ 118.544440] device lo entered promiscuous mode [ 118.607443] device lo entered promiscuous mode [ 118.609463] device lo entered promiscuous mode 13:59:09 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000500)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}]}}) openat(0xffffffffffffff9c, 0x0, 0x42, 0x0) 13:59:09 executing program 6: socket$packet(0x11, 0x3, 0x300) syz_emit_ethernet(0xc2, &(0x7f0000000300)={@local, @link_local, @void, {@ipv4={0x800, @udp={{0x6, 0x4, 0x0, 0x0, 0xb4, 0x0, 0x0, 0x0, 0x11, 0x0, @local, @rand_addr=0x64010100, {[@rr={0x7, 0x3}]}}, {0x0, 0x0, 0x9c, 0x0, @wg=@initiation={0x1, 0x0, "9a9d3ea024eda0bce77faf76c7e49bb391e48d9cbeef7a253704a4691ee7e6fe", "0c184a37a61703d8175d34d07ec567437534446cfafdba5a2b3b52a27c3196465df7adb5f93d80c8ccf8bfe0f4da7657", "57948902d76044d579f5ac2653f518a9beb9f8f9ddc38c537038d734", {"b776339e7af87f71d2bc85b7193f727a", "bd7cb8937b109bfc000000000000c14c"}}}}}}}, 0x0) 13:59:09 executing program 4: r0 = getpid() sched_setaffinity(r0, 0x8, &(0x7f0000000040)=0x4000000000000006) 13:59:09 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) clone3(&(0x7f0000000200)={0x340022800, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x0, {r2}}, 0x58) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x64010101}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) ioctl$int_in(r7, 0x5421, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000100)={'bond_slave_1\x00'}) sendmsg$inet(r4, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @remote, @broadcast}}}], 0x20}, 0x0) setsockopt$inet_mreqn(r3, 0x0, 0x20, &(0x7f0000000040)={@broadcast, @broadcast, r6}, 0xc) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f00000000c0)={0x3ff, 0x8fa, 0x800}) 13:59:09 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_mount_image$tmpfs(&(0x7f0000000200), &(0x7f0000000240)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB]) mknodat$loop(r0, &(0x7f0000000540)='./file0\x00', 0x0, 0x1) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) fchownat(r0, &(0x7f0000000140)='./file0\x00', 0x0, 0xee01, 0x0) [ 118.693815] device lo left promiscuous mode [ 118.714603] device lo left promiscuous mode [ 118.734040] device lo left promiscuous mode [ 118.775428] device lo entered promiscuous mode 13:59:09 executing program 7: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) clone3(&(0x7f0000000200)={0x340022800, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x0, {r2}}, 0x58) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x64010101}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) ioctl$int_in(r7, 0x5421, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000100)={'bond_slave_1\x00'}) sendmsg$inet(r4, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @remote, @broadcast}}}], 0x20}, 0x0) setsockopt$inet_mreqn(r3, 0x0, 0x20, &(0x7f0000000040)={@broadcast, @broadcast, r6}, 0xc) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f00000000c0)={0x3ff, 0x8fa, 0x800}) 13:59:09 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) clone3(&(0x7f0000000200)={0x340022800, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x0, {r2}}, 0x58) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x64010101}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) ioctl$int_in(r7, 0x5421, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000100)={'bond_slave_1\x00'}) sendmsg$inet(r4, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @remote, @broadcast}}}], 0x20}, 0x0) setsockopt$inet_mreqn(r3, 0x0, 0x20, &(0x7f0000000040)={@broadcast, @broadcast, r6}, 0xc) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f00000000c0)={0x3ff, 0x8fa, 0x800}) 13:59:09 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x26e1, 0x0) ioctl$FITRIM(r0, 0x6609, 0x0) 13:59:09 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_mount_image$tmpfs(&(0x7f0000000200), &(0x7f0000000240)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB]) mknodat$loop(r0, &(0x7f0000000540)='./file0\x00', 0x0, 0x1) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) fchownat(r0, &(0x7f0000000140)='./file0\x00', 0x0, 0xee01, 0x0) 13:59:09 executing program 6: socket$packet(0x11, 0x3, 0x300) syz_emit_ethernet(0xc2, &(0x7f0000000300)={@local, @link_local, @void, {@ipv4={0x800, @udp={{0x6, 0x4, 0x0, 0x0, 0xb4, 0x0, 0x0, 0x0, 0x11, 0x0, @local, @rand_addr=0x64010100, {[@rr={0x7, 0x3}]}}, {0x0, 0x0, 0x9c, 0x0, @wg=@initiation={0x1, 0x0, "9a9d3ea024eda0bce77faf76c7e49bb391e48d9cbeef7a253704a4691ee7e6fe", "0c184a37a61703d8175d34d07ec567437534446cfafdba5a2b3b52a27c3196465df7adb5f93d80c8ccf8bfe0f4da7657", "57948902d76044d579f5ac2653f518a9beb9f8f9ddc38c537038d734", {"b776339e7af87f71d2bc85b7193f727a", "bd7cb8937b109bfc000000000000c14c"}}}}}}}, 0x0) 13:59:09 executing program 4: r0 = getpid() sched_setaffinity(r0, 0x8, &(0x7f0000000040)=0x4000000000000006) 13:59:09 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x26e1, 0x0) ioctl$FITRIM(r0, 0x6609, 0x0) 13:59:09 executing program 6: socket$packet(0x11, 0x3, 0x300) syz_emit_ethernet(0xc2, &(0x7f0000000300)={@local, @link_local, @void, {@ipv4={0x800, @udp={{0x6, 0x4, 0x0, 0x0, 0xb4, 0x0, 0x0, 0x0, 0x11, 0x0, @local, @rand_addr=0x64010100, {[@rr={0x7, 0x3}]}}, {0x0, 0x0, 0x9c, 0x0, @wg=@initiation={0x1, 0x0, "9a9d3ea024eda0bce77faf76c7e49bb391e48d9cbeef7a253704a4691ee7e6fe", "0c184a37a61703d8175d34d07ec567437534446cfafdba5a2b3b52a27c3196465df7adb5f93d80c8ccf8bfe0f4da7657", "57948902d76044d579f5ac2653f518a9beb9f8f9ddc38c537038d734", {"b776339e7af87f71d2bc85b7193f727a", "bd7cb8937b109bfc000000000000c14c"}}}}}}}, 0x0) 13:59:09 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_mount_image$tmpfs(&(0x7f0000000200), &(0x7f0000000240)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB]) mknodat$loop(r0, &(0x7f0000000540)='./file0\x00', 0x0, 0x1) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) fchownat(r0, &(0x7f0000000140)='./file0\x00', 0x0, 0xee01, 0x0) 13:59:09 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) clone3(&(0x7f0000000200)={0x340022800, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x0, {r2}}, 0x58) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x64010101}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) ioctl$int_in(r7, 0x5421, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000100)={'bond_slave_1\x00'}) sendmsg$inet(r4, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @remote, @broadcast}}}], 0x20}, 0x0) setsockopt$inet_mreqn(r3, 0x0, 0x20, &(0x7f0000000040)={@broadcast, @broadcast, r6}, 0xc) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f00000000c0)={0x3ff, 0x8fa, 0x800}) 13:59:09 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000500)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}]}}) openat(0xffffffffffffff9c, 0x0, 0x42, 0x0) [ 118.886991] device lo left promiscuous mode [ 118.903313] device lo entered promiscuous mode 13:59:09 executing program 6: socket$packet(0x11, 0x3, 0x300) syz_emit_ethernet(0xc2, &(0x7f0000000300)={@local, @link_local, @void, {@ipv4={0x800, @udp={{0x6, 0x4, 0x0, 0x0, 0xb4, 0x0, 0x0, 0x0, 0x11, 0x0, @local, @rand_addr=0x64010100, {[@rr={0x7, 0x3}]}}, {0x0, 0x0, 0x9c, 0x0, @wg=@initiation={0x1, 0x0, "9a9d3ea024eda0bce77faf76c7e49bb391e48d9cbeef7a253704a4691ee7e6fe", "0c184a37a61703d8175d34d07ec567437534446cfafdba5a2b3b52a27c3196465df7adb5f93d80c8ccf8bfe0f4da7657", "57948902d76044d579f5ac2653f518a9beb9f8f9ddc38c537038d734", {"b776339e7af87f71d2bc85b7193f727a", "bd7cb8937b109bfc000000000000c14c"}}}}}}}, 0x0) 13:59:09 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f73665df41100080120000200004000f80000200040000000000000000000010000000000000002", 0x2d}, {&(0x7f0000010400)="f8ffff0fffffff0fff", 0x9, 0x10000}], 0x0, &(0x7f0000011000)) [ 118.923789] loop4: detected capacity change from 0 to 256 [ 118.951421] device lo entered promiscuous mode [ 118.991367] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 118.997847] FAT-fs (loop4): error, invalid access to FAT (entry 0x000000ff) [ 118.998378] FAT-fs (loop4): Filesystem has been set read-only [ 119.007134] loop4: detected capacity change from 0 to 256 [ 119.008635] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 119.009564] FAT-fs (loop4): error, invalid access to FAT (entry 0x000000ff) [ 119.010324] FAT-fs (loop4): Filesystem has been set read-only [ 119.342940] device lo entered promiscuous mode 13:59:10 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_mount_image$tmpfs(&(0x7f0000000200), &(0x7f0000000240)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB]) mknodat$loop(r0, &(0x7f0000000540)='./file0\x00', 0x0, 0x1) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) fchownat(r0, &(0x7f0000000140)='./file0\x00', 0x0, 0xee01, 0x0) 13:59:10 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) clone3(&(0x7f0000000200)={0x340022800, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x0, {r2}}, 0x58) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x4e20, @rand_addr=0x64010101}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) ioctl$int_in(r7, 0x5421, 0xfffffffffffffffd) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000100)={'bond_slave_1\x00'}) sendmsg$inet(r4, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @remote, @broadcast}}}], 0x20}, 0x0) setsockopt$inet_mreqn(r3, 0x0, 0x20, &(0x7f0000000040)={@broadcast, @broadcast, r6}, 0xc) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f00000000c0)={0x3ff, 0x8fa, 0x800}) 13:59:10 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f73665df41100080120000200004000f80000200040000000000000000000010000000000000002", 0x2d}, {&(0x7f0000010400)="f8ffff0fffffff0fff", 0x9, 0x10000}], 0x0, &(0x7f0000011000)) 13:59:10 executing program 7: r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_PAN_ID(r1, &(0x7f0000000c40)={0x0, 0x0, &(0x7f0000000c00)={&(0x7f0000000b80)={0x14, r0, 0x1}, 0x14}}, 0x0) 13:59:10 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = getgid() getgroups(0x2, &(0x7f0000000100)=[0x0, 0x0]) getgroups(0x1, &(0x7f0000000180)=[0x0]) r4 = getgid() r5 = getegid() setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="020000000100000000000000040000000000000008000400", @ANYRES32=0xee01, @ANYBLOB="01000000", @ANYRES32=0xee00, @ANYBLOB="08000400", @ANYRES32=r0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r1, @ANYBLOB="08000100", @ANYRES32=r3, @ANYBLOB="08000200", @ANYRES32=r4, @ANYBLOB='\b\x00\a\x00', @ANYRES32=r5, @ANYBLOB="08000300", @ANYRES32=r0, @ANYBLOB="08000200", @ANYRES32=r2, @ANYBLOB="100000000000000020"], 0x6c, 0x0) 13:59:10 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x26e1, 0x0) ioctl$FITRIM(r0, 0x6609, 0x0) 13:59:10 executing program 6: io_setup(0x5, &(0x7f0000000140)=0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_destroy(r0) 13:59:10 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x101042, 0x0) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0xf1887000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) sendmsg$MPTCP_PM_CMD_GET_ADDR(r1, &(0x7f0000000580)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x64, 0x0, 0x200, 0x70bd26, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x4}, @MPTCP_PM_ATTR_ADDR={0x40, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @remote}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x9b}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @loopback}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}]}, 0x64}, 0x1, 0x0, 0x0, 0x804}, 0x20000005) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/module/sysrq', 0x0, 0x0) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="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", 0x341}], 0x1) [ 119.497056] loop4: detected capacity change from 0 to 256 [ 119.499275] device lo left promiscuous mode [ 119.512124] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 119.517142] FAT-fs (loop4): error, invalid access to FAT (entry 0x000000ff) [ 119.518159] FAT-fs (loop4): Filesystem has been set read-only 13:59:10 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x26e1, 0x0) ioctl$FITRIM(r0, 0x6609, 0x0) 13:59:10 executing program 7: r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_PAN_ID(r1, &(0x7f0000000c40)={0x0, 0x0, &(0x7f0000000c00)={&(0x7f0000000b80)={0x14, r0, 0x1}, 0x14}}, 0x0) 13:59:10 executing program 6: io_setup(0x5, &(0x7f0000000140)=0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_destroy(r0) 13:59:10 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = getgid() getgroups(0x2, &(0x7f0000000100)=[0x0, 0x0]) getgroups(0x1, &(0x7f0000000180)=[0x0]) r4 = getgid() r5 = getegid() setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="020000000100000000000000040000000000000008000400", @ANYRES32=0xee01, @ANYBLOB="01000000", @ANYRES32=0xee00, @ANYBLOB="08000400", @ANYRES32=r0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r1, @ANYBLOB="08000100", @ANYRES32=r3, @ANYBLOB="08000200", @ANYRES32=r4, @ANYBLOB='\b\x00\a\x00', @ANYRES32=r5, @ANYBLOB="08000300", @ANYRES32=r0, @ANYBLOB="08000200", @ANYRES32=r2, @ANYBLOB="100000000000000020"], 0x6c, 0x0) 13:59:10 executing program 3: r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_PAN_ID(r1, &(0x7f0000000c40)={0x0, 0x0, &(0x7f0000000c00)={&(0x7f0000000b80)={0x14, r0, 0x1}, 0x14}}, 0x0) 13:59:10 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f73665df41100080120000200004000f80000200040000000000000000000010000000000000002", 0x2d}, {&(0x7f0000010400)="f8ffff0fffffff0fff", 0x9, 0x10000}], 0x0, &(0x7f0000011000)) [ 119.609514] device lo entered promiscuous mode 13:59:10 executing program 5: r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_PAN_ID(r1, &(0x7f0000000c40)={0x0, 0x0, &(0x7f0000000c00)={&(0x7f0000000b80)={0x14, r0, 0x1}, 0x14}}, 0x0) [ 119.697038] loop4: detected capacity change from 0 to 256 [ 119.707051] FAT-fs (loop4): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 119.718541] FAT-fs (loop4): error, invalid access to FAT (entry 0x000000ff) [ 119.718569] FAT-fs (loop4): Filesystem has been set read-only 13:59:10 executing program 7: r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_PAN_ID(r1, &(0x7f0000000c40)={0x0, 0x0, &(0x7f0000000c00)={&(0x7f0000000b80)={0x14, r0, 0x1}, 0x14}}, 0x0) 13:59:10 executing program 6: io_setup(0x5, &(0x7f0000000140)=0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_destroy(r0) 13:59:10 executing program 3: r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_PAN_ID(r1, &(0x7f0000000c40)={0x0, 0x0, &(0x7f0000000c00)={&(0x7f0000000b80)={0x14, r0, 0x1}, 0x14}}, 0x0) 13:59:10 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x101042, 0x0) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0xf1887000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) sendmsg$MPTCP_PM_CMD_GET_ADDR(r1, &(0x7f0000000580)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x64, 0x0, 0x200, 0x70bd26, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x4}, @MPTCP_PM_ATTR_ADDR={0x40, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @remote}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x9b}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @loopback}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}]}, 0x64}, 0x1, 0x0, 0x0, 0x804}, 0x20000005) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/module/sysrq', 0x0, 0x0) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="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", 0x341}], 0x1) 13:59:10 executing program 2: syz_mount_image$tmpfs(0x0, &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = getgid() getgroups(0x2, &(0x7f0000000100)=[0x0, 0x0]) getgroups(0x1, &(0x7f0000000180)=[0x0]) r4 = getgid() r5 = getegid() setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="020000000100000000000000040000000000000008000400", @ANYRES32=0xee01, @ANYBLOB="01000000", @ANYRES32=0xee00, @ANYBLOB="08000400", @ANYRES32=r0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r1, @ANYBLOB="08000100", @ANYRES32=r3, @ANYBLOB="08000200", @ANYRES32=r4, @ANYBLOB='\b\x00\a\x00', @ANYRES32=r5, @ANYBLOB="08000300", @ANYRES32=r0, @ANYBLOB="08000200", @ANYRES32=r2, @ANYBLOB="100000000000000020"], 0x6c, 0x0) 13:59:10 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x101042, 0x0) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0xf1887000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) sendmsg$MPTCP_PM_CMD_GET_ADDR(r1, &(0x7f0000000580)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x64, 0x0, 0x200, 0x70bd26, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x4}, @MPTCP_PM_ATTR_ADDR={0x40, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @remote}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x9b}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @loopback}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}]}, 0x64}, 0x1, 0x0, 0x0, 0x804}, 0x20000005) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000240)='/sys/module/sysrq', 0x0, 0x0) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000140)="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", 0x341}], 0x1) 13:59:10 executing program 5: r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_PAN_ID(r1, &(0x7f0000000c40)={0x0, 0x0, &(0x7f0000000c00)={&(0x7f0000000b80)={0x14, r0, 0x1}, 0x14}}, 0x0) 13:59:10 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0 VM DIAGNOSIS: 13:59:06 Registers: info registers vcpu 0 RAX=ffffed1003b5f358 RBX=0000000004607005 RCX=ffffffff81691b18 RDX=ffffed1003b5f359 RSI=0000000000000008 RDI=ffff88801daf9ac0 RBP=ffff88803d231438 RSP=ffff88803df5f910 R8 =0000000000000000 R9 =ffff88801daf9ac7 R10=ffffed1003b5f358 R11=0000000000000001 R12=ffff88803df5fcf8 R13=0000000004607025 R14=dffffc0000000000 R15=00007f3057a9b000 RIP=ffffffff81691b1d RFL=00000246 [---Z-P-] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f3057a666f4 CR3=000000001f0a2000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM01=0000000000000000 0000000000000000 00007f3057a75470 00007f3057a74f20 YMM02=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM03=0000000000000000 0000000000000000 756e20796d6d7564 20736e6f6974706f YMM04=0000000000000000 0000000000000000 2f2f2f2f2f2f2f2f 2f2f2f2f2f2f2f2f YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM06=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 73253d656d616e6c 6165722073253d73 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000 info registers vcpu 1 RAX=0000000000000032 RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8 RSI=ffffffff822b25c1 RDI=ffffffff8763fae0 RBP=ffffffff8763faa0 RSP=ffff888017eaf698 R8 =0000000000000001 R9 =000000000000000a R10=0000000000000032 R11=0000000000000001 R12=0000000000000032 R13=ffffffff8763faa0 R14=0000000000000010 R15=ffffffff822b25b0 RIP=ffffffff822b2619 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007f47fd714700 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f95bed22710 CR3=000000003f5ba000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM01=0000000000000000 0000000000000000 00007f48002857c0 00007f48002857c8 YMM02=0000000000000000 0000000000000000 00007f48002857e0 00007f48002857c0 YMM03=0000000000000000 0000000000000000 00007f48002857c8 00007f48002857c0 YMM04=0000000000000000 0000000000000000 ffffffffffffffff ffffffff00000000 YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM06=0000000000000000 0000000000000000 0000000000000000 000000524f525245 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 0000000000000000 00524f5252450040 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000