0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) signalfd4(r3, &(0x7f0000000000)={[0x1]}, 0x8, 0x0) perf_event_open(&(0x7f0000000500)={0x3, 0x80, 0x6, 0x7f, 0x8, 0x7f, 0x0, 0x6695, 0x0, 0x5, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4, 0x1, @perf_bp={&(0x7f00000004c0), 0x1}, 0x0, 0x8, 0x80000000, 0x4, 0x4b4, 0x9, 0xe5d, 0x0, 0x42e6, 0x0, 0xee20}, 0x0, 0xb, r3, 0x2) 08:16:27 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003e00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000500)={0xa, 0x4e21, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000001740)=[@tclass={{0x14, 0x29, 0x43, 0x8f76}}], 0x18}}], 0x2, 0x0) finit_module(r0, &(0x7f0000000100)=':$:[,\x00', 0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0x7, 0x0, 0x0, 0x20, 0x0, 0x0, 0x1aa04, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000040)}, 0x2420, 0xff, 0x0, 0x1, 0xfff, 0x8, 0x400, 0x0, 0x0, 0x0, 0x604}, 0x0, 0x8, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x164, 0x1a, 0x1, 0x0, 0x20000000, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {0x0, 0x2}, {}, {0x0, 0x0, 0x20000}, 0x0, 0x0, 0xa}, [@algo_aead={0x71, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x128, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001bf2"}}]}, 0x164}}, 0x0) 08:16:27 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r0, 0x800) write$cgroup_netprio_ifpriomap(r0, 0x0, 0x0) 08:16:27 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000003e00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000500)={0xa, 0x4e21, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000001740)=ANY=[@ANYBLOB="14000000002042000200768f000200000200000000000000"], 0x18}}], 0x2, 0x0) ftruncate(r1, 0x1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2, 0x11, r0, 0x0) syz_io_uring_submit(r2, 0x0, 0x0, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) openat(r0, &(0x7f0000000080)='./file0\x00', 0x20800, 0x41) 08:16:27 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000000300)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000000080)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='mode=0x00000000000000ff,nojoliet,overriderockperm']) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = inotify_init1(0x800) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r3, 0x0) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0), 0xa0, &(0x7f0000001540)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@noextend}, {@cache_loose}], [{@func={'func', 0x3d, 'FILE_CHECK'}}, {@uid_gt={'uid>', r3}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}}) creat(&(0x7f0000001600)='./file0\x00', 0x1562bc430628c1dc) setxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), &(0x7f0000000400)={0x0, 0xfb, 0x9e, 0x3, 0x4, "389c25852c0d00", "9d6bb9d73b2e52a6fe1534e209bf46b57e86a9160c032882a572711e99621df6ac7afc55edbc7cedb260ad56039008fa7a2813323a6884c39ffdd6b20a45e7e5e36f6874112c6d9e4cd9bf8f873158147dc8b344ca6a2798c848bb17bd6ca4c94f171a8a034198cc106afe4044b45c0337a7f1053202fc8e3c5258f180547cd5d8312066dd85c454a0"}, 0x9e, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000240)=0x6) readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) 08:16:27 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x6, 0x5) ftruncate(r0, 0x1000003) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$VFAT_IOCTL_READDIR_BOTH(0xffffffffffffffff, 0x82307201, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000640)={{0x1, 0x1, 0x18, r0, {0x8}}, './file1\x00'}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f00000006c0)={0x5, 0x80, 0x7, 0x6f, 0x1, 0x4a, 0x0, 0x4, 0x800a0, 0x5, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000680)}, 0x0, 0x81, 0x1000, 0x4, 0x6, 0x40, 0x800, 0x0, 0x8, 0x0, 0xf4b}) fsetxattr(r2, &(0x7f0000000740)=@known='trusted.overlay.impure\x00', &(0x7f0000000780)='{\x00', 0x2, 0x2) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$BTRFS_IOC_INO_PATHS(r2, 0xc0389423, &(0x7f0000000840)={0x7fff, 0x10, [0xd0, 0x3, 0x7f, 0x97e2], &(0x7f0000000800)=[0x0, 0x0]}) sendmsg$nl_xfrm(r4, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000000)=@updsa={0x158, 0x1a, 0x1, 0x0, 0x0, {{@in=@multicast2, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}, {@in6=@private2, 0x0, 0x33}, @in=@remote, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}, @replay_esn_val={0x1c}]}, 0x158}}, 0x0) syz_mount_image$iso9660(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x22c, 0x4, &(0x7f0000000580)=[{&(0x7f00000002c0)="26cf42042c8a74619332a82cddc86f64de017b50713c85d30947f922080c7bf1f4a4f0a2a980784778cf84ee7cab43dbf3d61c29bee1ff34f829286868abd8aa9d909fcf3449ba7117cab98a3e369b4c5fb02009c047706e10", 0x59}, {&(0x7f0000000340)="ab8f77745ec682533c2443860906656686f4a2f880e82c6b2a30c0456c4c3dfcdfa9ebf7753d2c1931c391e48132d82b8334e013c64b5391d1645be34a7540990c737a9e8b9e01e9b968867c3501c644d023a3e251517fd463", 0x59, 0x800}, {&(0x7f00000003c0)="588f4e3d491af7b40a729f0e41ebfb3ceb9d1512006d35c187b632035f9d28c3c98f1e2e3f81d3675cfd4185d785cee3be7a0389fa7125e4947db07f1468e4ac00656bb5850c13101106591af6c0f1a67a3eee79705e1b2030a2dac0adbbc7b83195036aeb7d3687f21594758e553c27bd1c650ee9511008b61e781fdae1072b55c9901a5b971c7d80bb48395edb", 0x8e, 0x2}, {&(0x7f0000000480)="6d375e96d3646f1842717eedca3aa0fe3de38d45e536c0402b40741fda4ee9dfc1af66bd10a2935948cc3e07f4d35859b48886766909f97c9fa02c831aaccf7d3ca7d188cd01cd8d7f1a1b3197fce55c2c4ff0ed95cc4da68e51255e9abe0998fd34d1857f027d9e5a7e9e0efbd15b07073c010cb4eb67f8fb5d4bcb4fbbc299075b436546d1c2fd92755152bfab4b34b348b8107c0576d3caf4ab77367cb5f5ab2b08693e72cc88ce355aa3a729817532b87980211906c5ad1f44c9238a0d363b45c0112b1cf042c4521809746d407c453752b9ac407b1d8bbbdc133d06", 0xde, 0xfffffffffffffffa}], 0x3, &(0x7f0000000600)={[], [{@mask={'mask', 0x3d, 'MAY_READ'}}, {@dont_appraise}]}) openat$bsg(0xffffffffffffff9c, &(0x7f00000007c0), 0x400180, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000100)={'#! ', './file0', [{0x20, ')'}, {}, {}, {}, {0x20, 'security.capability\x00'}, {0x20, 'security.capability\x00'}, {0x20, '\x00'}], 0xa, "f30e802bb56bccc83b2f1213bddd697670b6950e605d4ca4ec9d485c494644395a20b08f890e424aef565efc3d1a47b325367d3e03d909f73c017acb71a66d310f93d72de55fd18a808c63b28bc17ae2d2196a8ae6724dd448937d22d650f3c781ae6b71ffd8d2c44f1864a2f3009fc893ff1ffd3fd663b791c3eb5b718fdf9cf44c6d22b1b17f6268805522f16175e10eb21a9b202bf62b96269af454"}, 0xd9) 08:16:27 executing program 6: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/bus/input/devices\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000300), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_STOP_P2P_DEVICE(r0, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="5e1bdc78b2015fe2d39a4cfbf1ed9f51c1833e2f653569af4752ef2c501fe3053195bac47c3dd3add3db9b9430aa4be92eeef3c7322c71013543f25c4000e3c4782a17", @ANYRES16=r1, @ANYBLOB="000128bd7000ffdbdf255a000000080048db", @ANYRES32=r2, @ANYBLOB], 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x5) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0xe0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) [ 1112.795318] hpet: Lost 1 RTC interrupts 08:16:45 executing program 7: creat(0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000080)}], 0x1) writev(0xffffffffffffffff, &(0x7f0000001000), 0x0) openat2(0xffffffffffffffff, &(0x7f0000001040)='./file0\x00', &(0x7f0000001080)={0x280400, 0x0, 0x1c}, 0x18) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) creat(&(0x7f0000000040)='./file1\x00', 0xc0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x17, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:16:45 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x6, 0x5) ftruncate(r0, 0x1000003) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$VFAT_IOCTL_READDIR_BOTH(0xffffffffffffffff, 0x82307201, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000640)={{0x1, 0x1, 0x18, r0, {0x8}}, './file1\x00'}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f00000006c0)={0x5, 0x80, 0x7, 0x6f, 0x1, 0x4a, 0x0, 0x4, 0x800a0, 0x5, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000680)}, 0x0, 0x81, 0x1000, 0x4, 0x6, 0x40, 0x800, 0x0, 0x8, 0x0, 0xf4b}) fsetxattr(r2, &(0x7f0000000740)=@known='trusted.overlay.impure\x00', &(0x7f0000000780)='{\x00', 0x2, 0x2) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$BTRFS_IOC_INO_PATHS(r2, 0xc0389423, &(0x7f0000000840)={0x7fff, 0x10, [0xd0, 0x3, 0x7f, 0x97e2], &(0x7f0000000800)=[0x0, 0x0]}) sendmsg$nl_xfrm(r4, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000000)=@updsa={0x158, 0x1a, 0x1, 0x0, 0x0, {{@in=@multicast2, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}, {@in6=@private2, 0x0, 0x33}, @in=@remote, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}, @replay_esn_val={0x1c}]}, 0x158}}, 0x0) syz_mount_image$iso9660(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x22c, 0x4, &(0x7f0000000580)=[{&(0x7f00000002c0)="26cf42042c8a74619332a82cddc86f64de017b50713c85d30947f922080c7bf1f4a4f0a2a980784778cf84ee7cab43dbf3d61c29bee1ff34f829286868abd8aa9d909fcf3449ba7117cab98a3e369b4c5fb02009c047706e10", 0x59}, {&(0x7f0000000340)="ab8f77745ec682533c2443860906656686f4a2f880e82c6b2a30c0456c4c3dfcdfa9ebf7753d2c1931c391e48132d82b8334e013c64b5391d1645be34a7540990c737a9e8b9e01e9b968867c3501c644d023a3e251517fd463", 0x59, 0x800}, {&(0x7f00000003c0)="588f4e3d491af7b40a729f0e41ebfb3ceb9d1512006d35c187b632035f9d28c3c98f1e2e3f81d3675cfd4185d785cee3be7a0389fa7125e4947db07f1468e4ac00656bb5850c13101106591af6c0f1a67a3eee79705e1b2030a2dac0adbbc7b83195036aeb7d3687f21594758e553c27bd1c650ee9511008b61e781fdae1072b55c9901a5b971c7d80bb48395edb", 0x8e, 0x2}, {&(0x7f0000000480)="6d375e96d3646f1842717eedca3aa0fe3de38d45e536c0402b40741fda4ee9dfc1af66bd10a2935948cc3e07f4d35859b48886766909f97c9fa02c831aaccf7d3ca7d188cd01cd8d7f1a1b3197fce55c2c4ff0ed95cc4da68e51255e9abe0998fd34d1857f027d9e5a7e9e0efbd15b07073c010cb4eb67f8fb5d4bcb4fbbc299075b436546d1c2fd92755152bfab4b34b348b8107c0576d3caf4ab77367cb5f5ab2b08693e72cc88ce355aa3a729817532b87980211906c5ad1f44c9238a0d363b45c0112b1cf042c4521809746d407c453752b9ac407b1d8bbbdc133d06", 0xde, 0xfffffffffffffffa}], 0x3, &(0x7f0000000600)={[], [{@mask={'mask', 0x3d, 'MAY_READ'}}, {@dont_appraise}]}) openat$bsg(0xffffffffffffff9c, &(0x7f00000007c0), 0x400180, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000100)={'#! ', './file0', [{0x20, ')'}, {}, {}, {}, {0x20, 'security.capability\x00'}, {0x20, 'security.capability\x00'}, {0x20, '\x00'}], 0xa, "f30e802bb56bccc83b2f1213bddd697670b6950e605d4ca4ec9d485c494644395a20b08f890e424aef565efc3d1a47b325367d3e03d909f73c017acb71a66d310f93d72de55fd18a808c63b28bc17ae2d2196a8ae6724dd448937d22d650f3c781ae6b71ffd8d2c44f1864a2f3009fc893ff1ffd3fd663b791c3eb5b718fdf9cf44c6d22b1b17f6268805522f16175e10eb21a9b202bf62b96269af454"}, 0xd9) 08:16:45 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000000300)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000000080)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='mode=0x00000000000000ff,nojoliet,overriderockperm']) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = inotify_init1(0x800) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r2, 0x0) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0), 0xa0, &(0x7f0000001540)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend}, {@cache_loose}], [{@func={'func', 0x3d, 'FILE_CHECK'}}, {@uid_gt={'uid>', r2}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}}) creat(&(0x7f0000001600)='./file0\x00', 0x1562bc430628c1dc) setxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), &(0x7f0000000400)={0x0, 0xfb, 0x9e, 0x3, 0x4, "389c25852c0d00", "9d6bb9d73b2e52a6fe1534e209bf46b57e86a9160c032882a572711e99621df6ac7afc55edbc7cedb260ad56039008fa7a2813323a6884c39ffdd6b20a45e7e5e36f6874112c6d9e4cd9bf8f873158147dc8b344ca6a2798c848bb17bd6ca4c94f171a8a034198cc106afe4044b45c0337a7f1053202fc8e3c5258f180547cd5d8312066dd85c454a0"}, 0x9e, 0x1) readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) 08:16:45 executing program 4: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="603d2b22f0000000000000000000004f953cbf8ffb0cc72b453a3cb6d10befbbd2c3987796c7f660c50dbdcedbd94b29a3af7caa12f9948acbfd366dda317df40e2ccacdd14f12ac7ea69403d98ef03a0fcdb61a55a913fb2553e2ced41bf0adf94157748a935443c5429685917c9fc9fbc35fb931c108e96d54e852e5b3f1747557f6", 0x83}, {0x0, 0x0, 0x800}], 0x1021000, &(0x7f00000000c0)) 08:16:45 executing program 3: rename(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)='./file0\x00') r0 = syz_open_dev$hidraw(&(0x7f0000000000), 0x635, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open_tree(0xffffffffffffffff, &(0x7f0000000500)='./file0/file0\x00', 0x80901) write$P9_RREADLINK(r1, &(0x7f0000000540)={0x16, 0x17, 0x2, {0xd, './file0/file0'}}, 0x16) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000380)={{{@in6=@ipv4={'\x00', '\xff\xff', @remote}, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@private1, 0x0, 0x6c}}}, 0xe8) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000580)='\x00') bind$inet(r2, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) preadv(r0, &(0x7f0000000480)=[{&(0x7f0000000080)=""/86, 0x56}, {&(0x7f0000000100)=""/210, 0xd2}, {&(0x7f0000000740)=""/4096, 0x1000}, {&(0x7f0000000200)=""/176, 0xb0}, {&(0x7f00000002c0)=""/115, 0x73}, {&(0x7f0000000340)=""/30, 0x1e}], 0x6, 0x7, 0x1f) ftruncate(0xffffffffffffffff, 0x1000003) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) unshare(0x48020200) 08:16:45 executing program 5: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:16:45 executing program 6: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = dup3(0xffffffffffffffff, r0, 0x0) recvfrom$unix(r1, &(0x7f0000000080)=""/34, 0x22, 0x0, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) mount$tmpfs(0x0, &(0x7f00000003c0)='./file1/file0\x00', &(0x7f0000000440), 0x1010, &(0x7f0000000640)=ANY=[@ANYBLOB='huge=never,nr_inodes=77,nr_blocks=g8ek5ke,mode=00000000000000000000006,huge=advise,nr_blocks=030x0}) ptrace$getregset(0x4204, r4, 0x4, &(0x7f0000000380)={&(0x7f00000002c0)=""/165, 0xa5}) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) r5 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) dup2(r5, 0xffffffffffffffff) ioctl$FIOCLEX(r5, 0x5451) 08:16:45 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r0, 0x800) write$cgroup_netprio_ifpriomap(r0, &(0x7f00000003c0)={'bond_slave_1'}, 0xf) (fail_nth: 1) [ 1116.586378] FAULT_INJECTION: forcing a failure. [ 1116.586378] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 1116.588203] CPU: 1 PID: 7569 Comm: syz-executor.1 Not tainted 5.10.155 #1 [ 1116.589062] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1116.590101] Call Trace: [ 1116.590445] dump_stack+0x107/0x167 [ 1116.590909] should_fail.cold+0x5/0xa [ 1116.591446] __alloc_pages_nodemask+0x182/0x680 [ 1116.592076] ? xas_start+0x156/0x530 [ 1116.592633] ? __alloc_pages_slowpath.constprop.0+0x2220/0x2220 [ 1116.593510] ? xas_load+0x66/0x2c0 [ 1116.594054] ? find_get_entry+0x2d9/0x6e0 [ 1116.594667] alloc_pages_current+0x187/0x280 [ 1116.595329] __page_cache_alloc+0x2d2/0x360 [ 1116.595972] pagecache_get_page+0x2c7/0xc80 [ 1116.596928] ? current_time+0x72/0x2c0 [ 1116.597463] grab_cache_page_write_begin+0x64/0xa0 [ 1116.598090] ext4_da_write_begin+0x2f3/0xdf0 [ 1116.598651] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1116.599594] ? ktime_get_coarse_real_ts64+0x15a/0x190 [ 1116.600485] ? ext4_write_begin+0x1180/0x1180 [ 1116.601053] ? copyout_mc+0x140/0x140 [ 1116.602039] ? rcu_read_lock_sched_held+0x3e/0x80 [ 1116.602647] ? __mark_inode_dirty+0x166/0xf10 [ 1116.603252] generic_perform_write+0x1fe/0x4e0 [ 1116.603848] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4a0/0x4a0 [ 1116.604759] ? rwsem_down_read_slowpath+0xba0/0xba0 [ 1116.605403] ext4_buffered_write_iter+0x244/0x4d0 [ 1116.606018] ext4_file_write_iter+0x4fb/0x18e0 [ 1116.606598] ? __lock_acquire+0x1657/0x5b00 [ 1116.607155] ? ext4_file_read_iter+0x4c0/0x4c0 [ 1116.608317] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1116.609482] ? SOFTIRQ_verbose+0x10/0x10 [ 1116.610528] new_sync_write+0x42c/0x660 [ 1116.611182] ? new_sync_read+0x6f0/0x6f0 [ 1116.611890] ? ksys_write+0x12d/0x260 [ 1116.612444] ? lock_release+0x6b0/0x6b0 [ 1116.613019] ? selinux_file_permission+0x36/0x510 [ 1116.613708] ? __fget_files+0x296/0x480 [ 1116.614285] vfs_write+0x747/0xa30 [ 1116.614805] ksys_write+0x12d/0x260 [ 1116.615632] ? __ia32_sys_read+0xb0/0xb0 [ 1116.616213] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1116.616984] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1116.617573] do_syscall_64+0x33/0x40 [ 1116.618055] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1116.618717] RIP: 0033:0x7f7e481d5b19 [ 1116.619185] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1116.621759] RSP: 002b:00007f7e4574b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1116.622634] RAX: ffffffffffffffda RBX: 00007f7e482e8f60 RCX: 00007f7e481d5b19 [ 1116.623491] RDX: 000000000000000f RSI: 00000000200003c0 RDI: 0000000000000004 [ 1116.624337] RBP: 00007f7e4574b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1116.625190] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1116.626041] R13: 00007fff3539efef R14: 00007f7e4574b300 R15: 0000000000022000 08:16:45 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r0, 0x800) write$cgroup_netprio_ifpriomap(r0, &(0x7f00000003c0)={'bond_slave_1'}, 0xf) (fail_nth: 2) 08:16:45 executing program 4: ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800}, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000000)={0x1, 0xc0e2, 0xfffffffffffffffe}) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000200)='netpci0\x00', 0x10) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_OPENAT={0x12, 0x2, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000080)='./file0\x00', 0x2, 0x10000, 0x23456}, 0x539) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f00000000c0)={0x0, 0xfffefffffffffffd}) 08:16:45 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000000300)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000000080)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='mode=0x00000000000000ff,nojoliet,overriderockperm']) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = inotify_init1(0x800) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r2, 0x0) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0), 0xa0, &(0x7f0000001540)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend}, {@cache_loose}], [{@func={'func', 0x3d, 'FILE_CHECK'}}, {@uid_gt={'uid>', r2}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}}) creat(&(0x7f0000001600)='./file0\x00', 0x1562bc430628c1dc) readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) [ 1117.115033] FAULT_INJECTION: forcing a failure. [ 1117.115033] name failslab, interval 1, probability 0, space 0, times 1 [ 1117.118262] CPU: 0 PID: 7587 Comm: syz-executor.1 Not tainted 5.10.155 #1 [ 1117.120163] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1117.122204] Call Trace: [ 1117.122845] dump_stack+0x107/0x167 [ 1117.123750] should_fail.cold+0x5/0xa [ 1117.124677] ? jbd2__journal_start+0x190/0x890 [ 1117.125791] should_failslab+0x5/0x20 [ 1117.126712] kmem_cache_alloc+0x5b/0x360 [ 1117.127740] jbd2__journal_start+0x190/0x890 [ 1117.128819] __ext4_journal_start_sb+0x214/0x430 [ 1117.129982] ext4_da_write_begin+0x51f/0xdf0 [ 1117.131048] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1117.132342] ? ext4_write_begin+0x1180/0x1180 [ 1117.133424] ? copyout_mc+0x140/0x140 [ 1117.134347] ? rcu_read_lock_sched_held+0x3e/0x80 [ 1117.135516] ? __mark_inode_dirty+0x166/0xf10 [ 1117.136617] generic_perform_write+0x1fe/0x4e0 [ 1117.137739] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4a0/0x4a0 [ 1117.139502] ? rwsem_down_read_slowpath+0xba0/0xba0 [ 1117.140721] ext4_buffered_write_iter+0x244/0x4d0 [ 1117.141894] ext4_file_write_iter+0x4fb/0x18e0 [ 1117.142998] ? __lock_acquire+0x1657/0x5b00 [ 1117.144065] ? ext4_file_read_iter+0x4c0/0x4c0 [ 1117.145173] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1117.146426] ? SOFTIRQ_verbose+0x10/0x10 [ 1117.147430] new_sync_write+0x42c/0x660 [ 1117.148389] ? new_sync_read+0x6f0/0x6f0 [ 1117.149374] ? ksys_write+0x12d/0x260 [ 1117.150296] ? lock_release+0x6b0/0x6b0 [ 1117.151259] ? selinux_file_permission+0x36/0x510 [ 1117.152434] ? __fget_files+0x296/0x480 [ 1117.153415] vfs_write+0x747/0xa30 [ 1117.154285] ksys_write+0x12d/0x260 [ 1117.155164] ? __ia32_sys_read+0xb0/0xb0 [ 1117.156159] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1117.157416] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1117.158661] do_syscall_64+0x33/0x40 [ 1117.159574] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1117.160808] RIP: 0033:0x7f7e481d5b19 [ 1117.161701] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1117.166138] RSP: 002b:00007f7e4574b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1117.167980] RAX: ffffffffffffffda RBX: 00007f7e482e8f60 RCX: 00007f7e481d5b19 [ 1117.169691] RDX: 000000000000000f RSI: 00000000200003c0 RDI: 0000000000000004 [ 1117.171407] RBP: 00007f7e4574b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1117.173117] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1117.174814] R13: 00007fff3539efef R14: 00007f7e4574b300 R15: 0000000000022000 [ 1117.176799] hpet: Lost 3 RTC interrupts 08:16:46 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x6, 0x5) ftruncate(r0, 0x1000003) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$VFAT_IOCTL_READDIR_BOTH(0xffffffffffffffff, 0x82307201, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000640)={{0x1, 0x1, 0x18, r0, {0x8}}, './file1\x00'}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f00000006c0)={0x5, 0x80, 0x7, 0x6f, 0x1, 0x4a, 0x0, 0x4, 0x800a0, 0x5, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000680)}, 0x0, 0x81, 0x1000, 0x4, 0x6, 0x40, 0x800, 0x0, 0x8, 0x0, 0xf4b}) fsetxattr(r2, &(0x7f0000000740)=@known='trusted.overlay.impure\x00', &(0x7f0000000780)='{\x00', 0x2, 0x2) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$BTRFS_IOC_INO_PATHS(r2, 0xc0389423, &(0x7f0000000840)={0x7fff, 0x10, [0xd0, 0x3, 0x7f, 0x97e2], &(0x7f0000000800)=[0x0, 0x0]}) sendmsg$nl_xfrm(r4, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000000)=@updsa={0x158, 0x1a, 0x1, 0x0, 0x0, {{@in=@multicast2, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}, {@in6=@private2, 0x0, 0x33}, @in=@remote, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}, @replay_esn_val={0x1c}]}, 0x158}}, 0x0) syz_mount_image$iso9660(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x22c, 0x4, &(0x7f0000000580)=[{&(0x7f00000002c0)="26cf42042c8a74619332a82cddc86f64de017b50713c85d30947f922080c7bf1f4a4f0a2a980784778cf84ee7cab43dbf3d61c29bee1ff34f829286868abd8aa9d909fcf3449ba7117cab98a3e369b4c5fb02009c047706e10", 0x59}, {&(0x7f0000000340)="ab8f77745ec682533c2443860906656686f4a2f880e82c6b2a30c0456c4c3dfcdfa9ebf7753d2c1931c391e48132d82b8334e013c64b5391d1645be34a7540990c737a9e8b9e01e9b968867c3501c644d023a3e251517fd463", 0x59, 0x800}, {&(0x7f00000003c0)="588f4e3d491af7b40a729f0e41ebfb3ceb9d1512006d35c187b632035f9d28c3c98f1e2e3f81d3675cfd4185d785cee3be7a0389fa7125e4947db07f1468e4ac00656bb5850c13101106591af6c0f1a67a3eee79705e1b2030a2dac0adbbc7b83195036aeb7d3687f21594758e553c27bd1c650ee9511008b61e781fdae1072b55c9901a5b971c7d80bb48395edb", 0x8e, 0x2}, {&(0x7f0000000480)="6d375e96d3646f1842717eedca3aa0fe3de38d45e536c0402b40741fda4ee9dfc1af66bd10a2935948cc3e07f4d35859b48886766909f97c9fa02c831aaccf7d3ca7d188cd01cd8d7f1a1b3197fce55c2c4ff0ed95cc4da68e51255e9abe0998fd34d1857f027d9e5a7e9e0efbd15b07073c010cb4eb67f8fb5d4bcb4fbbc299075b436546d1c2fd92755152bfab4b34b348b8107c0576d3caf4ab77367cb5f5ab2b08693e72cc88ce355aa3a729817532b87980211906c5ad1f44c9238a0d363b45c0112b1cf042c4521809746d407c453752b9ac407b1d8bbbdc133d06", 0xde, 0xfffffffffffffffa}], 0x3, &(0x7f0000000600)={[], [{@mask={'mask', 0x3d, 'MAY_READ'}}, {@dont_appraise}]}) openat$bsg(0xffffffffffffff9c, &(0x7f00000007c0), 0x400180, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000100)={'#! ', './file0', [{0x20, ')'}, {}, {}, {}, {0x20, 'security.capability\x00'}, {0x20, 'security.capability\x00'}, {0x20, '\x00'}], 0xa, "f30e802bb56bccc83b2f1213bddd697670b6950e605d4ca4ec9d485c494644395a20b08f890e424aef565efc3d1a47b325367d3e03d909f73c017acb71a66d310f93d72de55fd18a808c63b28bc17ae2d2196a8ae6724dd448937d22d650f3c781ae6b71ffd8d2c44f1864a2f3009fc893ff1ffd3fd663b791c3eb5b718fdf9cf44c6d22b1b17f6268805522f16175e10eb21a9b202bf62b96269af454"}, 0xd9) 08:16:46 executing program 6: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000000300)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000000080)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='mode=0x00000000000000ff,nojoliet,overriderockperm']) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = inotify_init1(0x800) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r2, 0x0) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0), 0xa0, &(0x7f0000001540)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend}, {@cache_loose}], [{@func={'func', 0x3d, 'FILE_CHECK'}}, {@uid_gt={'uid>', r2}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}}) creat(&(0x7f0000001600)='./file0\x00', 0x1562bc430628c1dc) setxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), &(0x7f0000000400)={0x0, 0xfb, 0x9e, 0x3, 0x4, "389c25852c0d00", "9d6bb9d73b2e52a6fe1534e209bf46b57e86a9160c032882a572711e99621df6ac7afc55edbc7cedb260ad56039008fa7a2813323a6884c39ffdd6b20a45e7e5e36f6874112c6d9e4cd9bf8f873158147dc8b344ca6a2798c848bb17bd6ca4c94f171a8a034198cc106afe4044b45c0337a7f1053202fc8e3c5258f180547cd5d8312066dd85c454a0"}, 0x9e, 0x1) readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) 08:16:46 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)={0x0, 0x0}) fcntl$lock(r0, 0x26, &(0x7f0000000000)={0x1, 0x1, 0x5, 0x4000009}) wait4(r1, 0x0, 0x8, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x0, 0x0, 0x0, 0x2, 0xfffffffffffff26d}, r1, 0x2, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) signalfd4(r2, &(0x7f0000000000)={[0x1]}, 0x8, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x1, 0xaf, 0x6, 0x1, 0x0, 0x7, 0x28, 0xd, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_bp={&(0x7f0000000080)}, 0x2008, 0x4, 0xe11, 0x5, 0xd8, 0x5, 0xe4f, 0x0, 0x2, 0x0, 0x4ae}, r1, 0xe, r2, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x4, 0x80, 0x1, 0x7f, 0x5, 0x7f, 0x0, 0x8, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000140), 0x8}, 0x800, 0x9, 0xfff, 0x3, 0x8, 0x40, 0x2ff, 0x0, 0x5753}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 08:16:46 executing program 5: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:16:46 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r0, 0x800) write$cgroup_netprio_ifpriomap(r0, &(0x7f00000003c0)={'bond_slave_1'}, 0xf) (fail_nth: 3) 08:16:46 executing program 7: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r0, 0x0, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0xff, 0x0, 0x5e, 0x18000, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6e, 0x8}, 0x4000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = socket$nl_generic(0x10, 0x3, 0x10) syncfs(0xffffffffffffffff) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}}, 0x0) [ 1117.803522] FAULT_INJECTION: forcing a failure. [ 1117.803522] name failslab, interval 1, probability 0, space 0, times 0 [ 1117.806354] CPU: 0 PID: 7610 Comm: syz-executor.1 Not tainted 5.10.155 #1 [ 1117.807609] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1117.808570] Call Trace: [ 1117.808892] dump_stack+0x107/0x167 [ 1117.809334] should_fail.cold+0x5/0xa [ 1117.809788] ? create_object.isra.0+0x3a/0xa20 [ 1117.810328] should_failslab+0x5/0x20 [ 1117.810776] kmem_cache_alloc+0x5b/0x360 [ 1117.811276] ? lru_cache_add+0x45c/0x800 [ 1117.811782] create_object.isra.0+0x3a/0xa20 [ 1117.812302] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1117.812908] kmem_cache_alloc+0x159/0x360 [ 1117.813412] jbd2__journal_start+0x190/0x890 [ 1117.813945] __ext4_journal_start_sb+0x214/0x430 [ 1117.814567] ext4_da_write_begin+0x51f/0xdf0 [ 1117.815096] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1117.815760] ? ext4_write_begin+0x1180/0x1180 [ 1117.816298] ? copyout_mc+0x140/0x140 [ 1117.816756] ? rcu_read_lock_sched_held+0x3e/0x80 [ 1117.817329] ? __mark_inode_dirty+0x166/0xf10 [ 1117.817870] generic_perform_write+0x1fe/0x4e0 [ 1117.818434] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4a0/0x4a0 [ 1117.819313] ? rwsem_down_read_slowpath+0xba0/0xba0 [ 1117.819931] ext4_buffered_write_iter+0x244/0x4d0 [ 1117.820511] ext4_file_write_iter+0x4fb/0x18e0 [ 1117.821058] ? __lock_acquire+0x1657/0x5b00 [ 1117.821587] ? ext4_file_read_iter+0x4c0/0x4c0 [ 1117.822134] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1117.822749] ? SOFTIRQ_verbose+0x10/0x10 [ 1117.823277] new_sync_write+0x42c/0x660 [ 1117.823767] ? new_sync_read+0x6f0/0x6f0 [ 1117.824251] ? ksys_write+0x12d/0x260 [ 1117.824709] ? lock_release+0x6b0/0x6b0 [ 1117.825185] ? selinux_file_permission+0x36/0x510 [ 1117.825764] ? __fget_files+0x296/0x480 [ 1117.826253] vfs_write+0x747/0xa30 [ 1117.826686] ksys_write+0x12d/0x260 [ 1117.827118] ? __ia32_sys_read+0xb0/0xb0 [ 1117.827640] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1117.828261] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1117.828876] do_syscall_64+0x33/0x40 [ 1117.829321] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1117.829923] RIP: 0033:0x7f7e481d5b19 [ 1117.830364] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1117.833484] RSP: 002b:00007f7e4574b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1117.835762] RAX: ffffffffffffffda RBX: 00007f7e482e8f60 RCX: 00007f7e481d5b19 [ 1117.837911] RDX: 000000000000000f RSI: 00000000200003c0 RDI: 0000000000000004 [ 1117.840347] RBP: 00007f7e4574b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1117.842727] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1117.845220] R13: 00007fff3539efef R14: 00007f7e4574b300 R15: 0000000000022000 [ 1117.847892] hpet: Lost 2 RTC interrupts [ 1121.611516] hpet: Lost 1 RTC interrupts [ 1123.471588] hpet: Lost 1 RTC interrupts [ 1129.911596] hpet: Lost 1 RTC interrupts [ 1132.787622] hpet: Lost 1 RTC interrupts 08:17:03 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r1, 0x0, 0x6, 0x5) ftruncate(r0, 0x1000003) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$VFAT_IOCTL_READDIR_BOTH(0xffffffffffffffff, 0x82307201, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000640)={{0x1, 0x1, 0x18, r0, {0x8}}, './file1\x00'}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f00000006c0)={0x5, 0x80, 0x7, 0x6f, 0x1, 0x4a, 0x0, 0x4, 0x800a0, 0x5, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000680)}, 0x0, 0x81, 0x1000, 0x4, 0x6, 0x40, 0x800, 0x0, 0x8, 0x0, 0xf4b}) fsetxattr(r2, &(0x7f0000000740)=@known='trusted.overlay.impure\x00', &(0x7f0000000780)='{\x00', 0x2, 0x2) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$BTRFS_IOC_INO_PATHS(r2, 0xc0389423, &(0x7f0000000840)={0x7fff, 0x10, [0xd0, 0x3, 0x7f, 0x97e2], &(0x7f0000000800)=[0x0, 0x0]}) sendmsg$nl_xfrm(r4, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000000)=@updsa={0x158, 0x1a, 0x1, 0x0, 0x0, {{@in=@multicast2, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}, {@in6=@private2, 0x0, 0x33}, @in=@remote, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth_trunc={0x4c, 0x14, {{'sha256\x00'}}}, @replay_esn_val={0x1c}]}, 0x158}}, 0x0) syz_mount_image$iso9660(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x22c, 0x4, &(0x7f0000000580)=[{&(0x7f00000002c0)="26cf42042c8a74619332a82cddc86f64de017b50713c85d30947f922080c7bf1f4a4f0a2a980784778cf84ee7cab43dbf3d61c29bee1ff34f829286868abd8aa9d909fcf3449ba7117cab98a3e369b4c5fb02009c047706e10", 0x59}, {&(0x7f0000000340)="ab8f77745ec682533c2443860906656686f4a2f880e82c6b2a30c0456c4c3dfcdfa9ebf7753d2c1931c391e48132d82b8334e013c64b5391d1645be34a7540990c737a9e8b9e01e9b968867c3501c644d023a3e251517fd463", 0x59, 0x800}, {&(0x7f00000003c0)="588f4e3d491af7b40a729f0e41ebfb3ceb9d1512006d35c187b632035f9d28c3c98f1e2e3f81d3675cfd4185d785cee3be7a0389fa7125e4947db07f1468e4ac00656bb5850c13101106591af6c0f1a67a3eee79705e1b2030a2dac0adbbc7b83195036aeb7d3687f21594758e553c27bd1c650ee9511008b61e781fdae1072b55c9901a5b971c7d80bb48395edb", 0x8e, 0x2}, {&(0x7f0000000480)="6d375e96d3646f1842717eedca3aa0fe3de38d45e536c0402b40741fda4ee9dfc1af66bd10a2935948cc3e07f4d35859b48886766909f97c9fa02c831aaccf7d3ca7d188cd01cd8d7f1a1b3197fce55c2c4ff0ed95cc4da68e51255e9abe0998fd34d1857f027d9e5a7e9e0efbd15b07073c010cb4eb67f8fb5d4bcb4fbbc299075b436546d1c2fd92755152bfab4b34b348b8107c0576d3caf4ab77367cb5f5ab2b08693e72cc88ce355aa3a729817532b87980211906c5ad1f44c9238a0d363b45c0112b1cf042c4521809746d407c453752b9ac407b1d8bbbdc133d06", 0xde, 0xfffffffffffffffa}], 0x3, &(0x7f0000000600)={[], [{@mask={'mask', 0x3d, 'MAY_READ'}}, {@dont_appraise}]}) openat$bsg(0xffffffffffffff9c, &(0x7f00000007c0), 0x400180, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000100)={'#! ', './file0', [{0x20, ')'}, {}, {}, {}, {0x20, 'security.capability\x00'}, {0x20, 'security.capability\x00'}, {0x20, '\x00'}], 0xa, "f30e802bb56bccc83b2f1213bddd697670b6950e605d4ca4ec9d485c494644395a20b08f890e424aef565efc3d1a47b325367d3e03d909f73c017acb71a66d310f93d72de55fd18a808c63b28bc17ae2d2196a8ae6724dd448937d22d650f3c781ae6b71ffd8d2c44f1864a2f3009fc893ff1ffd3fd663b791c3eb5b718fdf9cf44c6d22b1b17f6268805522f16175e10eb21a9b202bf62b96269af454"}, 0xd9) 08:17:03 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x80100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)={0x0, 0x0}) fcntl$lock(r0, 0x26, &(0x7f0000000000)={0x1, 0x1, 0x5, 0x4000009}) wait4(r1, 0x0, 0x8, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x0, 0x0, 0x0, 0x2, 0xfffffffffffff26d}, r1, 0x2, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) signalfd4(r2, &(0x7f0000000000)={[0x1]}, 0x8, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x1, 0xaf, 0x6, 0x1, 0x0, 0x7, 0x28, 0xd, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_bp={&(0x7f0000000080)}, 0x2008, 0x4, 0xe11, 0x5, 0xd8, 0x5, 0xe4f, 0x0, 0x2, 0x0, 0x4ae}, r1, 0xe, r2, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x4, 0x80, 0x1, 0x7f, 0x5, 0x7f, 0x0, 0x8, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000140), 0x8}, 0x800, 0x9, 0xfff, 0x3, 0x8, 0x40, 0x2ff, 0x0, 0x5753}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 08:17:03 executing program 3: syz_extract_tcp_res(&(0x7f0000000c80)={0x41424344}, 0x5, 0xffff) syz_emit_ethernet(0x12ca, &(0x7f0000001fc0)={@broadcast, @multicast, @void, {@ipv6={0x86dd, @tcp={0xe, 0x6, "639ba5", 0x1294, 0x6, 0x1, @empty, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, {[@dstopts={0x32, 0x10, '\x00', [@padn={0x1, 0x9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @pad1, @pad1, @enc_lim={0x4, 0x1, 0x1}, @generic={0xa7, 0x45, "03c473c4be5cdc771e2865e61c9188175237c1210e657cdbd2fc7b4388de393c84856743de0c531e372f2b4e7471d60e71769c5c72337dd6fe63a4f440f59e2b5f0d1b7ce3"}, @padn={0x1, 0x2, [0x0, 0x0]}, @generic={0x7, 0x24, "db5dc1447b5ad9420aeb4f7ba2a758e5b7561cf2b000ca277c2abe4e2562d8a41cca28fc"}]}, @routing={0x2, 0x2, 0x2, 0xfc, 0x0, [@empty]}, @srh={0x73, 0x4, 0x4, 0x2, 0x71, 0x40, 0x20, [@local, @local]}, @routing={0xc, 0x6, 0x2, 0x10, 0x0, [@private0={0xfc, 0x0, '\x00', 0x1}, @rand_addr=' \x01\x00', @local]}, @hopopts={0x2c, 0x20, '\x00', [@generic={0x3, 0xcb, "79d5f1b4fb28038838c64e33a5ccf857a19c77e4feef21a006c6df411849aa975545ed4909bbe59618b91c3e49cd8caead917d453f669166d5818fdd520711bf89d47e63748306bf313e547365b083609b143b241b5a2f79a7e857f0bf604c973c85d46f6563303fdd7f6190b848dbb3db7cb4f043061ef81a5dfa7feba0bb9130fd8ce93d1cad084e4361966e428ed2020e6729f8669ecd762dad88a3d6fdb7ed360ddbdb3ad5345a6493a3c625293add9a2eb57487ebebfa11e84e078937bf3a6b19db33079bdf75f513"}, @ra={0x5, 0x2, 0x466}, @padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}, @enc_lim={0x4, 0x1, 0x5}, @ra={0x5, 0x2, 0x8}, @pad1, @calipso={0x7, 0x18, {0x1, 0x4, 0xfb, 0x292, [0x60d, 0x6]}}, @jumbo={0xc2, 0x4, 0x9}, @jumbo={0xc2, 0x4, 0x9}]}, @dstopts={0xff, 0x4, '\x00', [@hao={0xc9, 0x10, @private0={0xfc, 0x0, '\x00', 0x1}}, @jumbo={0xc2, 0x4, 0x6}, @ra={0x5, 0x2, 0x54d9}, @jumbo={0xc2, 0x4, 0x1}, @ra={0x5, 0x2, 0x7}]}], {{0x4e22, 0x4e22, r0, 0x41424344, 0x0, 0x0, 0x13, 0x10, 0x6, 0x0, 0x3, {[@generic={0x3, 0x7, "496dba00bc"}, @md5sig={0x13, 0x12, "78df2bb9bd638368edd54c14297da0e0"}, @nop, @exp_fastopen={0xfe, 0xc, 0xf989, "ad8db0ae05d19d7c"}, @generic={0x0, 0xb, "65fae3a139c01f25a3"}, @exp_smc={0xfe, 0x6}]}}, {"e5fde8a9ec7f4c2f99ce4de74ba2008b82247d41c242e0d5278213e966990ac03ec99cc4eec6de33d9462b20973ec62dcfba0f004437526d3d16518776501270225b4474703198d44d93e80430b037b84d8904cc4a35d42a10478c3285c85c858fef4a2b6dd3bf5a265397a99c1d5df9b17a25e7619ccabe7a400c9993c6c8223589480c2baacbced8ec2fe497a3d4c311f16afbe8414ce9627c9f90042a8ad1c4ac3d7266ee66678a076d038cce391f58e5d1d048a540a6267fff21c50d6922d572859d915f31abda77842faab50a752aeffc39a2aee2e36a4db4de33678a174f08da31da83d9a91f3983afc37d23174644f29a3dd16698cfe56496de96b3aa7266b2813d50d101a8b4424b5e92443c593c67cede4e2b7c0dbf36c128e0a745b5c4548a8b1b2762d837f0a780fc665a770d5d778a13d433af3ca57674b15d6b8401a211e429ea0a337c3bb41eed9abe9142fb9a9f20aec0cd2e247be929ebec1d0f685d54bd7c76b3959ef8e808b0cd3678502d0c3c0291e6689f5aadc3ac328bec7d90415520c8326c78ffa4817b1dc2874f65ee9009b01983024afa7e6ac3535fe04ffac408eed4fcad8fa8fccb9e3f93b7ac682c33673cdb3dd347bc8ff98c0e8a5f4c380de351c08c08c1a07401a85838fd58f02db0255802d56c80f7be6cb4826a29ac5befb756e7ed2b29d8a97f4df7a6d19fd4c6bfd5ce11ccb0065efff39f711acd3cd39b3132c9ad3c0ebe8c20585c2b1a8d6cdb44a5631b7dd41a91eb7e25d128bbe67dca90ae904e5987716e81b70ef309fcaeed616d47610dd286c7190a043bc1da044cb9843f88670ffd52d0070bc8cb24cb53a1df5071ca7fbb7aebe819eb4f478f1a15701eeab46d109b512b9f3492a3f8c67e0591f2c8ee96d33d3ef3eb6fdcd81188369974f17ced9aedc1c793c35ede84f4ee50b6f19e7806fbc09786655744018733fa3237b84c572b2a85ceef1836612f325705815b8d8abe248028865abbd385daf0a5b64173b2f5ebfb17f787245d5a1fce89c2a98af16463a824bf059d553c9a79404408afd7af6bac7695bd6b57e7eb17b6fb9c56bdc05e9537065ecd2cd95bdf06d05f43d1c4e8165b7362539b52f8d7175ee43111bee9bb5dc667e35f73501926f2fe098d2421d4b30b263331a9c4151b65a8904ba05c3be89c2835319c25eb6b785416796256dc6bd391bf69e3971af333da76afd40d57ddc973d80e9f007194ad24bc2248ca3645675d07c6dc3d51c62f69316526dc47c7976bdbe86eff01f84d40fbf34bc851c71f1f187e87fde7f6df757d8facd1ebb29ef7db1a3912dcea7483e074a19ae045473385697d715ce51e55c7b5b580e70145a2add559173a08d2b8d3ddb7cb6083b96cc35a2e329d9dd8412ef04236411be029f39c5dffa04aa78431d95752f4b2d4d888a09f3718e40497678f26a92fb4646aba19e690e8e3543a300d69288ac99f42390b0021186fff5d6dcd301121233ec423dfa313984b18073c690f17dae80eebc0e634e0d010e45fb28cf84ecd2fa3c37c1b1ed5ededc5e5f587f271fb0fae5cfe044368d5f2c97848b6ea7c23183f6fc2f13291d329b1c0fbce0b0028e549a5b77e71ba7d46af3f0f3a4819f2f12be42897746c8baa4ea0d8b31d35d050c345583c56b5600fcad40715fe500313a1236cd102c7864f06dcc84d96b79ab6d76a4a7dfa8984a66a2ffdcc5cba852f8dd74e9ad99c5b11532ff118e055b47aa53e692cdaea0903f6688c111caab7d05f927e4c90c7a68f19c5dc1bb20aca047abfade88aadb591e9208b2d9aeed95a0919da10d39969509c51ef93b9ab781fcd9bcbe94b3e956a3ee1c5ee32ea5010245a16bee5f1c6ceb1730f63b92b2818ab62227eff729d5bf4a2f9a0cdb73b99eeab40fc80ae201418933662f7a5c463ed0e1b6306368be88a1ba2b5e587a9026d7c89d75f226fa5510d4a0c9e01d7977b920a15ea09a8320de2d2b9b8c75eef4c2d042bce8ae07045b8cd345b1cccfe175f15d15b8987f152deeb780f581d6c78f977f4614220d964e14d696bdabbd6a5608d4f681dbbb92a7c8c9d5bee946429af78e97d6b1e32cb265245979300ed8d949d2ad82a628a7a849417f5271c4be58026d72bdce25743f15cd8d96e72d6ef7810064978bd8604965488ed9ebc69fb55d9e6fa66982a15ca942cc77a34208e8f825882307f87a56306a413a1adbdc17b7024018646672312bf7cba936d0a7ce7b444f1838e9e10df64529afa4708419eff7f7d9fbc45e0267c50f3c26a0f72774be033999225ac80235d0b275a29cda72701f4ef1adf23ba290cde6f514844a78789f877926f02bfda7a1ebf25165b9e72ae298355c039494ce1d092af6cda0c13390b9f9bc5cff845c582294c6fc2947a34a649774cd74865dee90b67cbc976feba5d3734e951ad9837e68ff3fb456752c0e03c466c79264a989e84d3dd09e12ee9a4fbb1cd71da609a5e89852cd1b52c129764d5b02b5238b14cc577df913ebd7d8d8cecad2b4b075a28dd8113fa5b4913cdcfc8c363cde4ea3f875493d345d2d3707f0d025a1296f1e74daac1f7dc2a5bf4dd41d2b6967ce7f9c81c52fb2ba74b0f0a8a3cd0b024db277164cd9cfa34450c9812a764ecfa175c65ffc2c7ef87892d3331a6656b53163ecc1c73294c871f799dea2e769c13dd09834627c59891733f895959c1e9a95cf62e7f75a35b666d7abf4643e2122394a646d8d0797e1c7120c7de4a6332ea1a990b2b9e171b0994e72cb4b359065a3d6b478c397eddf8816b313202687afe4a65930dd547524d5dddccdd86f69cb93739be266e8d507d3dc9886e544f4cdf025ffc73200b0d0dfc74846bf7863e0ebcb72b889c8ce786879c1e56288e16cb470a6a32f0d808321fbfad65508f78b47235e4b3267487abb2308889f33ff06a40d9d4eb7e434b2f503f8eb1d929ac572d84e83b3755950702865768bc574bae710f151401d32202d328f262ce2e2c88fe4a99485345ad007dbdc91e173eb874e7b519cefa17a1d681f0c55e4770fa981b9172edaa03aba50a50f9248f927d40277eb74108a336bd92fa86f07c6b806564ef6439fb5c58a058f0085e56234764be8eee4f196e78fd9a11dd0cbe70e082dddc031b9e1563fb3d2e7a5161337c646565c57159e1a6deec70851155bd9286dcb9b7db527dcfdc46d56f3be046d116d8f75ed4820d00fea6c01e49a89d9c2db0940f684e2d1e47199c0f4a3befcc0491e5039b4a31061c2dd0146b2e70f3f4b4537135fb66d7c39056f497b7fd27b09b0229e0f98ec6478cef77f503198a8808c5adb1f4607235d34bf15c22b38a47b6b709140dec81a89e675b08930e8ffdfb3687f5a64090a0905f14a08d193587b1dbcbac42af8fc0ce4d858d82e423a3b46e09ada140ea754600fec8b85906eb80683b33e4872d079ae791cbdb260e653af09a0a3d334a81cd9d85c2c12c905c8cd65431d6f6909dacf002b0c2431d5ec1238db11709f6022acd4383722ac3f6c1aaf97744eb9d8275da18a8c8fd47596de9acec37f273191e75caded23f66ee7d0b382c7faee43c56051cb31ef26a65bd1ecf2e4d002a711e6e9e68acda87b6c7bcc0ad806a36b32f4650c3a34249096fd9713d19272988885e0216d4a86f3e5a4760477d4db435a05c347a8e53b75ee95929976e490b0411145dcb454ff98ce70539cdbd026d6fa958b7e8e261c246fee13fa6a0f5730944bdbd8397aad9d607656877ceaf72af603ec5652f06cea8bc968ef220ca5b41f157d778cc724f637c885a88f1ec703ab4d5b2d7f165b1347068a473897a8e308df1504d2226d5807450059cdd60361ea9bfff53f1edb58ea6261ea87683f70e5a750f19ee7ab80514daf188c8b8df78f3ef2b8af36cc2de883497a37bf090a7d36effa83a463d6fd8242bb48f6db00614a466464a52a4cadee2443488d84e3c2c5f6473d6665728f4ac6ee99dc6fec482fc7b5cd98c5d6592cbd85ec2e36674e2a998b1f71fa6af6e344acb1fbf0616f80d6f58d3662f4bf71223b3c44c2afa0a109814c1606a8f55482daca56e48b2c4305e0669e17da921f76d87fadb4a870bb9a2f2d8ae65532c027c89d7a711a0da5928ebf48b9f8e2a799b63dea572020655d67d6256b669abe5768880e712e731694dda9157fa5728293a4ee863214386a531d48b7cac67eb797cb15f0b222c97e9fae35cb123d0b6fc45abdc6d01c77ebe5f8d6d2775666972d261570544c55ce00291fe121e6c741d8892c9b32d2678f2b8e4e3fa574247c3677c2ba8f72a8f643adacf49ab785f732f68e8daee7ea399672773daaf31a032131a2b1975fa2d2f1026b6f4c4184b825d85f293c82892c57fed869c831f0f8b421c4a5f66db4efb5160ae3f7914991a2181be92d9248bc2ec42973a55ac57303ea361a988800027c3b7072bc628ae24767badcfdf672163990be0f1974465e2a4edf2318f79cd5c7d453521b8d52c9e4096b0012f99ffdd70fd9463c9fad68ac118b192da135f3ad064d01ab5a0c2d47de4d28cec23fc8f35922a8ae4e25d61f7f75156d2cb9c3d8e14354ec2ab492b201da6d31567e9556d918e36882b361f73145a4f1d610544238f933bcf32fdf864f32bb347351c3359cf044d759af5cea6797f39ede1fb2bcaa949942fc7aaeb36f1f7bad8851cdfb25c00a4c920c864100cc91ff9983da3ed581528685658bfdb8a9e2228d0703c49ffa16ef9d8f33c0a263dd10bbc18bd507359497b0b53a72fbd0dda06394a4da48ca7ecae5239c4cfb1ee6f98eec8f20937953c05348e9c64c77bb0e5b5e0649a9a1d5f53bad41c0d1342ab9362639cc072973e562a0f3d4167d158a57122650e7465dbd1270a77695f56b61728a76f354463c3afc00cfa3e8565db8de523f84f91c53baa0ae8f08022521a3fb0545a959e73a73405dacae9f1d39bdddd853e3066c39ba2efaec5b4f7c5b774efc01241611c2dc4b2a5d28351b9cc5223b7dbc186e54aa57a187380e5db3d9a789e690eea26ffa59ec4301d8edda17d73872dff5525f6fc1a41279c96fd19e7706e17c30f0d2475801c0e10ec7acae677579d305a7f8a8fd1c82a20338fe2e884b073ce4711bfdb6ef67ccfd4d96bf784aed0a1336eb18bc3cfbb245a660505959e842773d652650ec5682db78cdded3c88301a7d11446ea667a2b790e1f1aa13e4f18b518ee2789e3d32a200a70bd32528e389470f1b5d66b5525a8bc63734f46d74c6bcb3dff06a412bf928f130dba3eb94b1cd7eb97007f14a9da02eed5c8e0ce7af57bd8c63592f5f6c2ef232816014ed65758f0beb9ae87eb8db236314ab3a028465887b70cf8dee5c65f9f55173cc300fd5c5e5289b3d66ea34e494e0b25e874092a19beb684f95585271c8619607d4fc38750be20200bb286ee5af6c19b0164135a4e8a245456144436a1281d1c5dca851459650ab9f90226a3c972cebbc7a2cc4964fbd8dc92c1e4ce6d71805b80942d394875ad13c9cf64e0dc74df3af787aebc89d7836af06ac1b153f8a227551e128189f732d73d574f6d786762ae0758830a67a9ac666422c55b209c11a502df02cbf88bb6bdb4859dfd1b2c7ebe37856e3908b27b10de5106866cd717f4111016da96231292f11dde8978a1ea495f5cb460984edffa35611195014a23df2a782cdb6104738753d73aed98694e4fdd460fdb4e635fbd82ae58934c8d537104876e94159a27a46f64db21c101ef9e20275739875a634957bec5010727904aaad1806cd4ba5"}}}}}}}, 0x0) syz_extract_tcp_res(&(0x7f0000000080), 0xff3, 0xfffffff8) write$tun(0xffffffffffffffff, &(0x7f0000000000)={@val={0x0, 0x6005}, @val={0x1, 0x80, 0x0, 0x9, 0x5, 0x7f}, @arp=@ether_ipv6={0x1, 0x86dd, 0x6, 0x10, 0xa, @local, @private1={0xfc, 0x1, '\x00', 0x1}, @empty, @mcast1}}, 0x42) 08:17:03 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000000300)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000000080)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='mode=0x00000000000000ff,nojoliet,overriderockperm']) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = inotify_init1(0x800) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r2, 0x0) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0), 0xa0, &(0x7f0000001540)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend}, {@cache_loose}], [{@func={'func', 0x3d, 'FILE_CHECK'}}, {@uid_gt={'uid>', r2}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}}) readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) 08:17:03 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000000300)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000000080)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='mode=0x00000000000000ff,nojoliet,overriderockperm']) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = inotify_init1(0x800) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r2, 0x0) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0), 0xa0, &(0x7f0000001540)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend}, {@cache_loose}], [{@func={'func', 0x3d, 'FILE_CHECK'}}, {@uid_gt={'uid>', r2}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}}) creat(&(0x7f0000001600)='./file0\x00', 0x1562bc430628c1dc) readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) 08:17:03 executing program 5: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:17:03 executing program 6: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000000300)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000000080)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='mode=0x00000000000000ff,nojoliet,overriderockperm']) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = inotify_init1(0x800) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r2, 0x0) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0), 0xa0, &(0x7f0000001540)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend}, {@cache_loose}], [{@func={'func', 0x3d, 'FILE_CHECK'}}, {@uid_gt={'uid>', r2}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}}) creat(&(0x7f0000001600)='./file0\x00', 0x1562bc430628c1dc) setxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), &(0x7f0000000400)={0x0, 0xfb, 0x9e, 0x3, 0x4, "389c25852c0d00", "9d6bb9d73b2e52a6fe1534e209bf46b57e86a9160c032882a572711e99621df6ac7afc55edbc7cedb260ad56039008fa7a2813323a6884c39ffdd6b20a45e7e5e36f6874112c6d9e4cd9bf8f873158147dc8b344ca6a2798c848bb17bd6ca4c94f171a8a034198cc106afe4044b45c0337a7f1053202fc8e3c5258f180547cd5d8312066dd85c454a0"}, 0x9e, 0x1) readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) 08:17:03 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r0, 0x800) write$cgroup_netprio_ifpriomap(r0, &(0x7f00000003c0)={'bond_slave_1'}, 0xf) (fail_nth: 4) 08:17:03 executing program 4: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) mknod(&(0x7f0000000040)='./file0\x00', 0x8, 0xccac) writev(r0, &(0x7f0000000440)=[{&(0x7f0000000240)="e8eeec84bc5fae180c4832bf2132fd2cede0467121469aa9e8890350adc5632f953c458dcbdabfcf76b691ebcf660dc0f54a49bad2dd1c8e1d9d12b9527a1c28ee04e60fddb2d9588eb7119aa7780b060cd8cbd5c6bc10fbd24c0bfa3a5d14eacd319f189856f7a91f788806c25bf8"}, {&(0x7f0000000300)="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", 0xfedc}, {&(0x7f00000001c0)="9ef1215126c7d392eb621c640dd0258f81c3142b64070852d9ac4814df04f2b5bd5e52e7c1b0e8bf1ee8df259a5547146e7a09095f58587b0296ab5ed6cc00729926747a804ba96a99213865", 0x4c}], 0x3) 08:17:03 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x3, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r0, 0xc018937e, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, @in_args={0x1}}, './file0\x00'}) syz_io_uring_setup(0x3ee0, &(0x7f0000000140)={0x0, 0x74a3, 0x0, 0x3, 0x350, 0x0, r2}, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000200)) perf_event_open(&(0x7f0000000080)={0x4, 0x80, 0x38, 0x1f, 0x2, 0x80, 0x0, 0x6, 0x4, 0xa, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0xffffffff, 0x4, @perf_config_ext={0x6, 0x187a}, 0x8100, 0x20, 0x5, 0x7, 0x5, 0x2008000, 0x3, 0x0, 0x101, 0x0, 0x3ff}, 0x0, 0x5, r1, 0x3) [ 1134.966025] FAULT_INJECTION: forcing a failure. [ 1134.966025] name failslab, interval 1, probability 0, space 0, times 0 [ 1134.967871] CPU: 0 PID: 7641 Comm: syz-executor.1 Not tainted 5.10.155 #1 [ 1134.968750] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1134.970094] Call Trace: [ 1134.970459] dump_stack+0x107/0x167 [ 1134.971590] should_fail.cold+0x5/0xa [ 1134.972086] ? create_object.isra.0+0x3a/0xa20 [ 1134.972694] should_failslab+0x5/0x20 [ 1134.973203] kmem_cache_alloc+0x5b/0x360 [ 1134.973759] create_object.isra.0+0x3a/0xa20 [ 1134.974344] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1134.975020] kmem_cache_alloc+0x159/0x360 [ 1134.975615] alloc_buffer_head+0x20/0x110 [ 1134.976169] alloc_page_buffers+0x14d/0x6d0 [ 1134.976762] create_empty_buffers+0x2c/0x640 [ 1134.977351] ? start_this_handle+0xfdd/0x1390 [ 1134.977940] ? start_this_handle+0xd57/0x1390 [ 1134.978547] create_page_buffers+0x1bb/0x230 [ 1134.979142] __block_write_begin_int+0x1d1/0x19c0 [ 1134.979813] ? ext4_da_release_space+0x530/0x530 [ 1134.980444] ? rcu_read_lock_sched_held+0x3e/0x80 [ 1134.981098] ? remove_inode_buffers+0x300/0x300 [ 1134.981711] ? jbd2__journal_start+0xf3/0x890 [ 1134.982335] ext4_da_write_begin+0x37d/0xdf0 [ 1134.982923] ? ext4_write_begin+0x1180/0x1180 [ 1134.987579] ? copyout_mc+0x140/0x140 [ 1134.988094] ? rcu_read_lock_sched_held+0x3e/0x80 [ 1134.988737] ? __mark_inode_dirty+0xa3a/0xf10 [ 1134.989326] generic_perform_write+0x1fe/0x4e0 [ 1134.989967] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4a0/0x4a0 [ 1134.990928] ? rwsem_down_read_slowpath+0xba0/0xba0 [ 1134.991647] ext4_buffered_write_iter+0x244/0x4d0 [ 1134.992294] ext4_file_write_iter+0x4fb/0x18e0 [ 1134.992908] ? __lock_acquire+0x1657/0x5b00 [ 1134.993503] ? ext4_file_read_iter+0x4c0/0x4c0 [ 1134.994104] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1134.994774] ? SOFTIRQ_verbose+0x10/0x10 [ 1134.995334] new_sync_write+0x42c/0x660 [ 1134.995893] ? new_sync_read+0x6f0/0x6f0 [ 1134.996440] ? ksys_write+0x12d/0x260 [ 1134.996961] ? lock_release+0x6b0/0x6b0 [ 1134.997491] ? selinux_file_permission+0x36/0x510 [ 1134.998139] ? __fget_files+0x296/0x480 [ 1134.998692] vfs_write+0x747/0xa30 [ 1134.999181] ksys_write+0x12d/0x260 [ 1134.999700] ? __ia32_sys_read+0xb0/0xb0 [ 1135.000245] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1135.000937] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1135.001622] do_syscall_64+0x33/0x40 [ 1135.002118] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1135.002791] RIP: 0033:0x7f7e481d5b19 [ 1135.003287] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1135.005659] RSP: 002b:00007f7e4574b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1135.006646] RAX: ffffffffffffffda RBX: 00007f7e482e8f60 RCX: 00007f7e481d5b19 [ 1135.007634] RDX: 000000000000000f RSI: 00000000200003c0 RDI: 0000000000000004 [ 1135.008653] RBP: 00007f7e4574b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1135.009686] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1135.015753] R13: 00007fff3539efef R14: 00007f7e4574b300 R15: 0000000000022000 [ 1135.023565] hpet: Lost 3 RTC interrupts 08:17:04 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r0, 0x800) write$cgroup_netprio_ifpriomap(r0, &(0x7f00000003c0)={'bond_slave_1'}, 0xf) (fail_nth: 5) [ 1135.251664] hpet: Lost 1 RTC interrupts 08:17:04 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000000300)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000000080)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='mode=0x00000000000000ff,nojoliet,overriderockperm']) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) inotify_init1(0x800) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r1, 0x0) readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) 08:17:04 executing program 6: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000000300)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000000080)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='mode=0x00000000000000ff,nojoliet,overriderockperm']) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = inotify_init1(0x800) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r2, 0x0) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0), 0xa0, &(0x7f0000001540)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend}, {@cache_loose}], [{@func={'func', 0x3d, 'FILE_CHECK'}}, {@uid_gt={'uid>', r2}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}}) creat(&(0x7f0000001600)='./file0\x00', 0x1562bc430628c1dc) setxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), &(0x7f0000000400)={0x0, 0xfb, 0x9e, 0x3, 0x4, "389c25852c0d00", "9d6bb9d73b2e52a6fe1534e209bf46b57e86a9160c032882a572711e99621df6ac7afc55edbc7cedb260ad56039008fa7a2813323a6884c39ffdd6b20a45e7e5e36f6874112c6d9e4cd9bf8f873158147dc8b344ca6a2798c848bb17bd6ca4c94f171a8a034198cc106afe4044b45c0337a7f1053202fc8e3c5258f180547cd5d8312066dd85c454a0"}, 0x9e, 0x1) readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) [ 1135.634892] FAULT_INJECTION: forcing a failure. [ 1135.634892] name failslab, interval 1, probability 0, space 0, times 0 [ 1135.637415] CPU: 1 PID: 7669 Comm: syz-executor.1 Not tainted 5.10.155 #1 [ 1135.638285] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1135.639336] Call Trace: [ 1135.639924] dump_stack+0x107/0x167 [ 1135.640905] should_fail.cold+0x5/0xa [ 1135.641932] ? ext4_find_extent+0xa3d/0xd30 [ 1135.643245] should_failslab+0x5/0x20 [ 1135.643795] __kmalloc+0x72/0x3f0 [ 1135.644262] ext4_find_extent+0xa3d/0xd30 [ 1135.644812] ext4_ext_map_blocks+0x1c8/0x5b90 [ 1135.645406] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1135.646074] ? SOFTIRQ_verbose+0x10/0x10 [ 1135.646595] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1135.647264] ? SOFTIRQ_verbose+0x10/0x10 [ 1135.647822] ? __lock_acquire+0xbb1/0x5b00 [ 1135.648371] ? ext4_ext_release+0x10/0x10 [ 1135.648917] ? lock_release+0x6b0/0x6b0 [ 1135.649432] ? ext4_es_lookup_extent+0x48d/0xbe0 [ 1135.650044] ? lock_downgrade+0x6d0/0x6d0 [ 1135.650590] ? down_read+0x10f/0x430 [ 1135.651075] ? down_write_killable+0x180/0x180 [ 1135.651887] ? rcu_read_lock_sched_held+0x3e/0x80 [ 1135.653189] ? ext4_es_lookup_extent+0xc4/0xbe0 [ 1135.654444] ext4_da_get_block_prep+0xcc8/0x1190 [ 1135.655790] ? ext4_da_release_space+0x530/0x530 [ 1135.657068] ? lock_downgrade+0x6d0/0x6d0 [ 1135.658196] ? create_empty_buffers+0x4a3/0x640 [ 1135.659623] ? do_raw_spin_unlock+0x4f/0x220 [ 1135.660816] ? create_page_buffers+0x139/0x230 [ 1135.662035] __block_write_begin_int+0x3d1/0x19c0 [ 1135.663333] ? ext4_da_release_space+0x530/0x530 [ 1135.664617] ? remove_inode_buffers+0x300/0x300 [ 1135.665870] ? jbd2__journal_start+0xf3/0x890 [ 1135.667080] ext4_da_write_begin+0x37d/0xdf0 [ 1135.668309] ? ext4_write_begin+0x1180/0x1180 [ 1135.669543] ? copyout_mc+0x140/0x140 [ 1135.670570] ? rcu_read_lock_sched_held+0x3e/0x80 [ 1135.671871] ? __mark_inode_dirty+0x166/0xf10 [ 1135.673187] generic_perform_write+0x1fe/0x4e0 [ 1135.674506] ? trace_event_raw_event_file_check_and_advance_wb_err+0x4a0/0x4a0 [ 1135.676499] ? rwsem_down_read_slowpath+0xba0/0xba0 [ 1135.677888] ext4_buffered_write_iter+0x244/0x4d0 [ 1135.679238] ext4_file_write_iter+0x4fb/0x18e0 [ 1135.680542] ? __lock_acquire+0x1657/0x5b00 [ 1135.681761] ? ext4_file_read_iter+0x4c0/0x4c0 [ 1135.683032] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1135.684544] ? SOFTIRQ_verbose+0x10/0x10 [ 1135.685690] new_sync_write+0x42c/0x660 [ 1135.686804] ? new_sync_read+0x6f0/0x6f0 [ 1135.687962] ? ksys_write+0x12d/0x260 [ 1135.689023] ? lock_release+0x6b0/0x6b0 [ 1135.690129] ? selinux_file_permission+0x36/0x510 [ 1135.691506] ? __fget_files+0x296/0x480 [ 1135.692632] vfs_write+0x747/0xa30 [ 1135.693647] ksys_write+0x12d/0x260 [ 1135.694665] ? __ia32_sys_read+0xb0/0xb0 [ 1135.695882] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1135.697353] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1135.698822] do_syscall_64+0x33/0x40 [ 1135.699905] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1135.701375] RIP: 0033:0x7f7e481d5b19 [ 1135.702417] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1135.707682] RSP: 002b:00007f7e4574b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1135.709796] RAX: ffffffffffffffda RBX: 00007f7e482e8f60 RCX: 00007f7e481d5b19 [ 1135.711835] RDX: 000000000000000f RSI: 00000000200003c0 RDI: 0000000000000004 [ 1135.713503] RBP: 00007f7e4574b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1135.715171] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1135.717089] R13: 00007fff3539efef R14: 00007f7e4574b300 R15: 0000000000022000 [ 1135.723726] hpet: Lost 1 RTC interrupts 08:17:04 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000000300)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000000080)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='mode=0x00000000000000ff,nojoliet,overriderockperm']) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = inotify_init1(0x800) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r2, 0x0) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0), 0xa0, &(0x7f0000001540)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend}, {@cache_loose}], [{@func={'func', 0x3d, 'FILE_CHECK'}}, {@uid_gt={'uid>', r2}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}}) creat(&(0x7f0000001600)='./file0\x00', 0x1562bc430628c1dc) readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) 08:17:04 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000000300)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000000080)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='mode=0x00000000000000ff,nojoliet,overriderockperm']) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = inotify_init1(0x800) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r2, 0x0) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0), 0xa0, &(0x7f0000001540)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend}, {@cache_loose}], [{@func={'func', 0x3d, 'FILE_CHECK'}}, {@uid_gt={'uid>', r2}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}}) readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) 08:17:04 executing program 2: r0 = pidfd_open(0x0, 0x0) ioctl$BTRFS_IOC_WAIT_SYNC(r0, 0x40089416, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) signalfd4(r2, &(0x7f0000000000)={[0x1]}, 0x8, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f00000000c0)=0x6) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x4000c0, 0x20) ioctl$TCSETSW2(r3, 0x402c542c, &(0x7f0000000080)={0x10000, 0xfffffffa, 0x40, 0x8, 0x4, "62836a0ef2c7bbe8e860f1a9bb4c27f41a22c2", 0x6, 0x9}) r4 = syz_mount_image$nfs4(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x8aa, 0x8, &(0x7f00000007c0)=[{&(0x7f0000000180)="583d6fffe3eec9c26cc510", 0xb, 0x5}, {&(0x7f00000001c0)="a49cef51a7d247b38824b596468ddc1abbbc87b0c6fd654c0ffc919469a1f2f65244aaa6364c2750965483a88868c5edc8bfb2c600230f1814da9680d4753ed65d34a5d5f52f6de2365bb75aca7356e9c09a3a9d7d3833bf196c27e44fa9254591b2810504814b8045cf9c06737e36cf25d381585658b3736820f396740c0ddd785611dbbf9aee98b9dba76603c0450ac939b3687016a2dfd30231c6cd5e83c76e5b163e5fbe0c1b5a767e7cc51b43e858fe3b0ab87a2238e7e2ec1642244a70ec8dd0078722b290ac", 0xc9, 0x80000000}, {&(0x7f00000002c0)="9f777193de166e92170d226566b06843ca5c53fde6f77879a47d6d31cd5803b213ec93c64b0536d79693816aaa49cd8e78b7518260ba78d6cb7c4387c492fb00788c5c1ffc4ab2e4b599fb8cd707dbec57959357b0642b71507facb5709eeb19d8dd450f702a8d2e817144752ef6c872d665ca6dfc98c0ca16d8ea451e9b8296b20711fd1c96eb47c8dec4e7372e31e1088878c733e18f0e2b08a379cbba06eed1d46a2d92c8a79d75fed5543272dd9e1d585c74c90873e6a6cbe3d2e9cf9c1ff2101a4739cff36e89d2", 0xca, 0x4}, {&(0x7f00000003c0)="d48b84611ed3a2e65378a9d2fdb185b24cdb50d74e70cd786a8a0d7a8e00da642f528152f83aa180795e22737a23f12812bffeaaf00fb405fc08c432441857a1661864dd8c0266a95bafa0e41d71238ba0a18f53f7761b9f50871c97738d59fd7ae601f7b99a1b817bce759e588dc64c9463af5aa24e989a6f0f8d148d487ae93e9fb5bb5464c7a88275f29585706575e54c6d6f0442266d94ef0d30ce7dc95750aaa28216c60dadcdeafdc6a60770fd1f14aa2902f79bad15f669217a36320db0902fcfb5e60ec33771e75ada58b0a5baa0dd0f", 0xd4, 0x7}, {&(0x7f00000004c0)="6f1effb0950721927e281c2b46fd679a41fb318f651e7c6c8cdee209667a4021a8460442f5e83f872a702babc953466769c81ca73f510dbf447b8afb8636fd9dee63af328bb7cd27d11c1d0dd4ece9c0dc9f618132ba935435d2bbb914a9856cffecd134cce7ad32b1107c0d7f679ed10d2fe30e1811fabf50f78ed1675db27b3d8afa67c67c567fa8b474f963c612fd82747fb7d82d", 0x96, 0x2}, {&(0x7f0000000580)="f17eedbe85273f16153740d9268da430c59fdd76057322ed63296386d308fc5990d46bf38eb15f4c602db47442d1f52710b4e31f1160e1d7908df10ca6d5b5a82b94ac40693c8daebba3daf0abe37c0d7257797809c3b0fe4379d6a3638a7039d89b44a9dde0424e252636423fb52da04f4a1a345a38d78eda17", 0x7a, 0x81}, {&(0x7f0000000600)="910a6d07f42f8b78044da8f9e150bf5fbc2bddb74a06e55c1d15b7f48a8e3b7e959aaa2430b71940a0d38ab5032aafc858f5528106f5e55fef79b9920ca9411c32ba3e7eda8f2e5d5ca8b86184f77c6f3c9c0bc344e72fe602a57f06e090e7a65379d1b7e3a4965cde24997525e0068578ef0fadb3a2cd2dce1982ec64edd38d8b834ee4f27aef82158c2c64fad914f267e1764f52", 0x95, 0x2}, {&(0x7f00000006c0)="82bcc80586d1b414070bd54def277497505007f00a4316cdf7bfee87b2ef28d2ede1abd0659bdfd5802f1e543ea00a84104b792c46af78c9a23c031ec42f4a993862d71e22fb7fb54683b4de4c88aff8df3d1bc1b13dcdee721ca2ef8e93ea57b0b61658c70244359d35e2888edb2001c79e820e43a601d6286e65be86b5ded8c99736ce22f49cc511245f9602d8b59503f62f3d7180533cf3b6952e847ef42d4aacc01ee757a5e889278863880ca40090734483176349a39c56fbbb3b3fb21edcc51924b540de01ac846e59572e50485926f7516e6f211009f064dad7681f20ab227ef5e928219b6480c99e49eb2756d9", 0xf1, 0x290}], 0x800, &(0x7f0000000880)={[{'!@'}, {'(\\+@/'}, {'.pending_reads\x00'}, {'.pending_reads\x00'}, {}, {']@'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '$/\x03/#@*(/R'}}, {@audit}, {@pcr={'pcr', 0x3d, 0xf}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '.pending_reads\x00'}}, {@seclabel}, {@smackfsfloor}, {@dont_hash}]}) ioctl$F2FS_IOC_PRECACHE_EXTENTS(r4, 0xf50f, 0x0) ioctl$TIOCL_SETSEL(r1, 0x4b4b, &(0x7f0000000040)={0x2, {0x4, 0x200, 0x2}}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r5, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) sendmmsg$inet6(r5, &(0x7f0000003e00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000500)={0xa, 0x4e21, 0x0, @private2={0xfc, 0x2, '\x00', 0x1}}, 0x1c, 0x0, 0x0, &(0x7f0000001740)}}], 0x2, 0x0) mount$cgroup(0x0, &(0x7f0000000980)='./file0\x00', &(0x7f00000009c0), 0x10, &(0x7f0000000a00)=ANY=[@ANYBLOB='release_age,clone_children,subj_type=smackfstransmute,fowner=\x00'/71, @ANYRESDEC=0xee00, @ANYBLOB=',seclabel,smackfstransmute=.pending_reads\x00,fsuuid=a9a01dac-41j\x00-4186-f822-7f56295c,fsname=,smackfstransmute=,uid=', @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) fdatasync(r5) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) signalfd4(r6, &(0x7f0000000000)={[0x1]}, 0x8, 0x0) perf_event_open(&(0x7f0000000b00)={0x1, 0x80, 0x9, 0x8, 0x20, 0xdf, 0x0, 0x80000001, 0x82c, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb2b, 0x1, @perf_config_ext={0xde6, 0x81}, 0x201b, 0x9, 0x9, 0x0, 0x1, 0x7, 0x3, 0x0, 0x2, 0x0, 0x40}, 0x0, 0xf, r6, 0x1) 08:17:04 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f0000000000)=0x80, 0x4) close_range(r0, 0xffffffffffffffff, 0x0) syz_usb_connect$cdc_ecm(0x0, 0x4d, &(0x7f0000000440)=ANY=[], 0x0) signalfd(r0, &(0x7f0000001100), 0x8) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000003e00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000500)={0xa, 0x4e21, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000001740)=[@tclass={{0x14, 0x29, 0x43, 0x8f76}}], 0x18}}], 0x2, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) sendmmsg$inet6(r2, &(0x7f0000003e00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000500)={0xa, 0x4e21, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000001740)=[@tclass={{0x14, 0x29, 0x43, 0x8f76}}], 0x18}}], 0x2, 0x0) r3 = dup2(r2, r0) syz_usb_connect(0x1, 0xc59, &(0x7f0000000040)={{0x12, 0x1, 0x310, 0x5d, 0xc, 0xa, 0xff, 0x1b80, 0xd700, 0x3d00, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0xc47, 0x4, 0x2, 0x3f, 0x30, 0xf8, [{{0x9, 0x4, 0x14, 0x8, 0xa, 0x3, 0x0, 0x0, 0x5, [], [{{0x9, 0x5, 0x1e, 0x1, 0x210, 0x1f, 0x6, 0x2, [@uac_iso={0x7, 0x25, 0x1, 0x80, 0x30}, @uac_iso={0x7, 0x25, 0x1, 0x80, 0x4, 0x71b}]}}, {{0x9, 0x5, 0x0, 0x0, 0x200, 0x2, 0x6, 0x1, [@generic={0xee, 0x1, "10d50888dd43ec68d88503bdfcf0ec50beedee3a91a970f872366651a36eaa7ad48357675767d971277fd6eb955dd4324fc02f85dc2e9b977c736cda359c154fd9ced1635776005615958eb92306629c7acbfd741526d4c9a0dc937ef6e85a6f1e63f6d539700745cd58a00d922801c4e8cfe1f847c9455e080057aa597fad8ed55885ee43d941d9146ce6f6cdc5127d58c7abd6378d6ba4591852b15554f02038c9ab3dce5c3a7946ecb5de463bb81dfd24ce49f33c927a0cdbaf7a7ed43e97558b36445a20583f7a2d5fd54219e353d8a080371edbc6ab9b665a7e6455e3d7548e7c0008a8546c8e52be12"}]}}, {{0x9, 0x5, 0x0, 0x0, 0x400, 0x1f, 0x7, 0xfe}}, {{0x9, 0x5, 0x7, 0x3, 0x8, 0x1, 0x9, 0x6, [@generic={0x6f, 0x5, "8c90350578296d7f237dcf1bf91be01841862029982a5e8db01d6c63ba01286eac9d8f6d74eaf648044c55c9ae9ac421871417fce6c53095ff105e262da47a54ad8716d6ebbc8a93d7802c9e756c893e7977ac3ba739c00053cb572a48b2cfe9097175a3ce9ecff2b943c2e9ab"}, @generic={0xed, 0xd, "97d429c81d6b5d530ace91a38d915639d9a0029458b924bd8723da08ab4425dc2207590aebfb319056ebf035ec87e4c5bd265f479257eebfa52fe5c0a9581258ff62853e30cf58da52a51628121b37e512791bbed079df9e7472f5e060d61ab94b4843033ee2df2baf4e745a402e50e41417c8254872809f62d78d62d5cb92cc0c59b7f2f1dfc665a6db9f93fa72464ce7b7bdcc3760f0b23473da3115c04d120211a10a612166441bb134a85d0956128f6d3792a77380449f00f1b9e3cd1a7d49f27e254838bea2339e811e780068bad4b46a26a8805798640accf81c3190aa6f13f2eb3e5a9dc5f44274"}]}}, {{0x9, 0x5, 0x80, 0x10, 0x448, 0xd7, 0x1, 0x2}}, {{0x9, 0x5, 0x6, 0x2, 0x400, 0x9, 0x6, 0x7d}}, {{0x9, 0x5, 0x4, 0x2, 0x20, 0x6, 0x40, 0x91, [@generic={0x69, 0x4, "ea1b0af3268b2a503b1b19f417de1992363fd05dec075fc9f22f7ec6a56f4a5c2346a0b1fbccc2add07cb81f6a6c8c91d5cdb78b61cc005a03e9dd499adb63b7c5748bcd7e05f286edeb2d003879214874dc1c96ef76c68cf56bc86b84258047cc7c8bfe0698e6"}, @uac_iso={0x7, 0x25, 0x1, 0x0, 0x58, 0x401}]}}, {{0x9, 0x5, 0xb, 0x0, 0x0, 0xdd, 0x12, 0x80}}, {{0x9, 0x5, 0xe, 0x8, 0x400, 0x1, 0x1, 0x8, [@generic={0xe0, 0x3, "8cccfe94599e151fd978844bd49e62d3bcff30a7f668a3d66a7b54a1a8196c5441cfac57cbf8fe790c097bb707bf5868b48910fc59650a7ecf9ef695d8dea7596c404973572829ef7e808448e4fdd23c150fb0510fa440c77a496533fc8041f6161f37237d317161b3d7f895b579134484cccf92ee7b355f572ab28256288f111ecdf1cbc2a52692de06e3286c1f20c35c14f722873f532a42f1fad2e6c406e74b81bd248757bb47453eea20cd24bcad7f9ceea6903efd2a61dd2649e2d893e2244c9ac8e375a052b095b7c3cfee4483dac3d77e17b44f2083a4ff24ac1c"}]}}, {{0x9, 0x5, 0xa, 0x4, 0x3ff, 0x0, 0x4, 0x1}}]}}, {{0x9, 0x4, 0x28, 0x1f, 0x2, 0xa4, 0xf8, 0x6a, 0x0, [@generic={0x6c, 0x4, "253dd9f6ae84e4447d68062e0d43cff11ce6500668cbadef2978f4f8f7bcaa1489d932e6a5352bb39a5d8e85d50523bd592b9d7d08bffcf4e4a5eda543c301898862495d281f1cce0cd4ccfd47d9e685ec5670a231dda27ad164a88950a21a1fd8f7ad8babf3616d424a"}, @uac_control={{0xa, 0x24, 0x1, 0x6f, 0x3}, [@mixer_unit={0xb, 0x24, 0x4, 0x6, 0x9, "d785835d50a5"}, @output_terminal={0x9, 0x24, 0x3, 0x4, 0x1, 0x2, 0x5, 0xf1}, @selector_unit={0xa, 0x24, 0x5, 0x4, 0x7f, "da1cb4aecd"}, @feature_unit={0xb, 0x24, 0x6, 0x5, 0x2, 0x2, [0x8, 0x2], 0x1f}]}], [{{0x9, 0x5, 0x4, 0x10, 0x8, 0x6b, 0x2, 0x1}}, {{0x9, 0x5, 0x4, 0x10, 0x400, 0x0, 0x4, 0x8, [@uac_iso={0x7, 0x25, 0x1, 0x1, 0x7f, 0x7fff}, @uac_iso={0x7, 0x25, 0x1, 0x80, 0x3, 0xffff}]}}]}}, {{0x9, 0x4, 0xb8, 0x4, 0x0, 0x7a, 0x83, 0x90, 0x7f, [@generic={0xf5, 0xd, "a3b7435773c33bd6bd407cd681792944b06c6a3a793d5fd6c14d98580acb414d77ac719f226bda857e59adc31a9f3db730f6cf3dfd889125d5b9677e473abc5663906f2eec5de78d228f4723a9a6e12055ac16cc407c9f16bc2edf0902da5cdacc7094f2556002dd45cdc3c0204811b016c267366bf29b8590fd6d500055c4f4dd56ef6c279c4e2b037537aee9f1e1a578a750070fe378fd85fc73ad6a19f6aec3e6373fb8ff373ed4ccabcbd29b29bd26bf5cb4de2a9ff3f9e0132ae98d12ee6a8d4e79003c834f9ce815c73745a5101102ced73af455f456c1b6810fa3dec95a78b87146e7d3bc1d27ec1ce521d1a9d945e3"}, @cdc_ecm={{0xa, 0x24, 0x6, 0x0, 0x0, "cb5c6211bb"}, {0x5, 0x24, 0x0, 0x57}, {0xd, 0x24, 0xf, 0x1, 0x3b3, 0x0, 0xffff, 0x8}, [@mdlm={0x15, 0x24, 0x12, 0x7fff}, @mbim_extended={0x8, 0x24, 0x1c, 0x7d, 0x0, 0x7}, @network_terminal={0x7, 0x24, 0xa, 0x2, 0x18, 0x2, 0x3}]}]}}, {{0x9, 0x4, 0xa3, 0x2, 0xc, 0xb1, 0x6a, 0x42, 0x2, [], [{{0x9, 0x5, 0x5, 0x4, 0x3ff, 0x50, 0x2, 0x40, [@generic={0xe7, 0x10, "3487cc4a5f56f339374c1357dda50fde3f73b96539897e1bfc6c5a38e0b77d9d77f601e5807913fe871b249c25c6a3e6a24575ba56f1dac0a2f321f5bfab03dadb6d2ac90c00551a0af64821b9afbb5d3ac64337ed41ce256dabbdc6042a6a3dcc77e96bc2d8ffb76e740ca8cf224127d6593a91d06b7fe444fa639886cc5b59c26a15919afdb6701c70eaec877b37f1e6a96d39adaa0c728e11bdb96351e78cbcc1a70051c61468859122292a51cf001a03f103a62918116b8a101ec9c1d7ae06058fe6a064bb91365d6a9562d7d5e30ca0e75d47a6756649361be1608c28c32a8866f94b"}, @uac_iso={0x7, 0x25, 0x1, 0x80, 0x3, 0x6}]}}, {{0x9, 0x5, 0xb, 0x0, 0x400, 0x0, 0x2, 0x8}}, {{0x9, 0x5, 0xc, 0x3, 0x40, 0x80, 0x2, 0x4, [@generic={0x21, 0x24, "963542de901dfef80093147a959ad5bc3337a88363136a076fc1c64211d91c"}]}}, {{0x9, 0x5, 0x8, 0x10, 0x10, 0xfc, 0x2, 0x3f, [@uac_iso={0x7, 0x25, 0x1, 0x82, 0x9, 0xfff}]}}, {{0x9, 0x5, 0x7, 0x10, 0x10, 0x34, 0x9, 0x26, [@uac_iso={0x7, 0x25, 0x1, 0x1, 0x1, 0x2394}]}}, {{0x9, 0x5, 0x0, 0x1, 0x10, 0x1, 0x6, 0xb9, [@generic={0x43, 0x8, "c3b63c528ff54f5abedcf8bfb77d13d5ceb6ecb6fd002113dae3e5cd260ec289d3264fe8a122cf5bd41b37ae5a6aa31ed3201b3992847fbd27f60005298f9425af"}, @generic={0x76, 0x1, "82c6caf640f7707dc537eff62853d1745143f82ab3656ba119d8f64e0e5c387358cbc89e9bb2d344f58ccc85060d2769053441b1b654746626471b0890b90746f8bfe5164fb805eb4264886ed3cf682ba3cfe23fb2058ca9c51fce88df40554086a8018ccc681327bad21f8b829797eb8b21b4a0"}]}}, {{0x9, 0x5, 0xa, 0x0, 0x20, 0x3d, 0x40, 0x9, [@generic={0xa5, 0x22, "87a721d8b211dcdc8e8dde8142896ba2480bbb8269b5d8ed2380c603763ff1d0622692effafd8d0f260d57255592b7575581f8f583d7ed6449c89bdc96a665f2bb8ce6c27896751c2a91a32561a90a5b89887f1601498181e4754b04aafbe345c1f97dcbf3f5e0b636c63432790e6ea7e85fb24be968cd8eb6b56e9f11753ddfecfb41ec8e913f017bc783a47909211168d36338be9f066d7f33e9c6084c95d93be51d"}]}}, {{0x9, 0x5, 0x2, 0x10, 0x8, 0xfc, 0x0, 0x80, [@generic={0xda, 0x11, "1c0cfb6b8b61e062fca5e7d0d8315b836a4dc0b3cc1fc77a621eaf30cf7ed034f5c6f7d1dc4004e911e37ed25028a729514deece727997b32de52a85a3d89b0860e23af16682d3d0e75266a9a86023e805def6274eaa02f2b5777fb0aa60446c822677d9294c645ec2e83517d3ac16c8d45e1901da70e29e5acf57cb17ececb8f98a4f30c3f782fa41412f38b4180e2458f69f1d48a8de5e47297b605b448d849aa368be9c63d75f2c66f07c8acbe431caf7e8b660fd9c37ba7028e127850bca8a3c56fd2b3be00d0f1cd0745e66103e5156cbc9f2c23437"}, @generic={0xdc, 0x2, "51bce62386285ebaa34451ef1a3d28f4ec677c93d0598f7663a1c1634631dd6da5cb763d6e4d0770db1cdddf5b7607aabfbe25d462da703d9b6ffeb29977cc0d57ae434c805225d4a2cb23e471803524a95bed3eece4d1bef058dc3db86778602e3c905256e04c661c5989fa68e38aa09409a759c0ef62132627d80faa342c8bfb2c98c947da2d9a89a002a0654ba762b9b0f0290a8b91631c373d34a31dd7c539bca834837c64ffb99f269f56524d0caef7d51c8d4b9ea4d2f4520c1542a6eda69a7f0ac090b499e0b0df534e7ec5548710e3598fff896a4e26"}]}}, {{0x9, 0x5, 0xf, 0x0, 0x200, 0xc5, 0x1, 0x3}}, {{0x9, 0x5, 0x2, 0x0, 0x3ff, 0x2, 0xff, 0x5, [@generic={0x5c, 0xc, "3a31a550045c276675eb3ab8b941c24c0a8ff2fde64b0cb641b41d5a49495c6aae1de1d73e8a4f38c746e6cbadd375590f042018aab6d45ffbd826bb37422e91e0377cd147ec931ece3d394a23e0fc8dd416da2e9bc61134bbe7"}]}}, {{0x9, 0x5, 0x0, 0x3, 0x200, 0xc1, 0xff, 0x4, [@generic={0xc5, 0xa, "d0d21f36809c28b181cc6a0f75a3479b098e5d4b472813278a1aad1a3092e5e325ca77f25aadefe9e93c9e601b86f7399dfa6c382babcb9dc2ceb4c28269115f6189b492eb487affea0ca5f35d4c52843e3729a278ad9a6f206510f054d96584095f02322a4832f652a5b273e10a07ffbf675e9fae4faa02cf487f03da91ddca91dc1a04b670c78eba552c40a74e427512c4fd8982ce54101cd5e8d7ef73b2ea2e3214fdc7718763b46cf0fd6858662cde0c83f2168fe11b02ba091a03dc0bc94f5d65"}, @generic={0x67, 0xa, "8475da877f80fb74a4c6345410b29e97c9c18781bdf11a48b79b419288722a3439e4c412d098184c5558f665d265d70e2bdeecceb6c091280d140f451c0860b70ee3f75bdb1d4152545b29f715f06db13bcd65fb23d8c2f5d5ac7665a37ae1fbfa814ceb6f"}]}}, {{0x9, 0x5, 0x0, 0x0, 0x10, 0x0, 0x1, 0x2}}]}}]}}]}}, &(0x7f0000001080)={0xa, &(0x7f0000000cc0)={0xa, 0x6, 0x250, 0x40, 0xb2, 0x9, 0x10, 0x2}, 0xa6, &(0x7f0000000d00)={0x5, 0xf, 0xa6, 0x5, [@wireless={0xb, 0x10, 0x1, 0x8, 0x4, 0x8, 0x8, 0x5}, @wireless={0xb, 0x10, 0x1, 0x4, 0x8, 0x20, 0x1, 0x8, 0x6}, @generic={0x74, 0x10, 0xa, "8c9fc7903c1c61f72c84ebca2260fb70c1b1264c7801ed9bc9fbec56500a84d38c4ce3172f03a8f8d33d90847e83402ec0ed7af08bdfa82f2d194ba2bbff5446ddbbe0aad2c4e86f41f52e1cee5011893c1299139a41ee48c5532ab8d51bcaf3cf3ab3f0919bbdaa218aab54e4f07405a8"}, @ssp_cap={0x14, 0x10, 0xa, 0x7, 0x2, 0x3, 0x0, 0x5, [0x30, 0x3f]}, @ptm_cap={0x3}]}, 0x6, [{0x6c, &(0x7f0000000dc0)=@string={0x6c, 0x3, "55793793040dda9f158d1e152d9d2a7bd9f55d51be1207d4f09e569b520cfd2ec12943b1400cd70fed9c53770dd5b057f1acf8c2525c9dad1ba447d2724628d33d6bb78d3db203fe7ab3de1d40ed8560470d44c11adf41d1a0ba5a02a6cdabd764e510d11835c4cb37a0"}}, {0x4, &(0x7f0000000e40)=@lang_id={0x4, 0x3, 0xc07}}, {0x76, &(0x7f0000000e80)=@string={0x76, 0x3, "10e5ac1b9d68bacb47ade3efb281b12c7270a2718385afb0ce4655feb79ee4c446c3bc6f02bf61e1dea08b0bac3f2e8decd7e96d0dcd706c061ac1c432e72265a5970a1e963a21d9e4cd37a3f1c3f7b391c9d8910937873ed9cf95fffa64ebf3795c9d87e5ea836b8cd22d461d4bbfe538a90245"}}, {0xf5, &(0x7f0000001140)=ANY=[@ANYBLOB="f503dd0e11e404d92a29692de31038a99661f775b9eb19815efcf6cef1621c3974587eef3346e7e9ced173d6c3ee4f14ebd913901e53d6584b3f5ff243ce2b059de5fbb5c504d26fb2b34f85df35e48310d1fc89bb58b6a1a4af68a7c21c6b1c2e67eb203d665f50c595716a7e241019e2c0a02c868e3395331fa89ff0a2ebb1273609ecba5dc41a0c52e5a6ebdf77e5012230e9c32442752bd59a97b37a8aa003a5c6cc28697c7681fd3ad630805e4248864dac94563a7cc49925852e8ed7fcd668d868e6496422fa8775a63435aee2294b306274b66f7662c4864c33f52a5293e75125b703df7c62eb12815ca2b6591d7633f7a497bd5dca5ef546c56328dd8e19138d3999422f84003fc76a5e"]}, {0x1c, &(0x7f0000001000)=@string={0x1c, 0x3, "fe302ad4c801b26e35ca0084add03e6879d8c33218b11c603c0d"}}, {0x4, &(0x7f0000001040)=@lang_id={0x4, 0x3, 0x1c01}}]}) r4 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_TIOCOUTQ(r4, 0x5411, &(0x7f0000000f00)) ioctl$HIDIOCINITREPORT(r3, 0x40045506, 0x20000000) [ 1136.407323] udc-core: couldn't find an available UDC or it's busy [ 1136.408448] misc raw-gadget: fail, usb_gadget_probe_driver returned -19 [ 1136.434772] udc-core: couldn't find an available UDC or it's busy [ 1136.434792] misc raw-gadget: fail, usb_gadget_probe_driver returned -19 [ 1137.208900] nfs4: Unknown parameter '!@' [ 1137.326181] nfs4: Unknown parameter '!@' [ 1137.349515] cgroup: Unknown subsys name 'release_age' [ 1145.159854] hpet: Lost 1 RTC interrupts [ 1151.971569] kmemleak: 28 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 08:17:29 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r0, 0x800) write$cgroup_netprio_ifpriomap(r0, &(0x7f00000003c0)={'bond_slave_1'}, 0xf) (fail_nth: 6) 08:17:29 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000000300)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000000080)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='mode=0x00000000000000ff,nojoliet,overriderockperm']) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) inotify_init1(0x800) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) 08:17:29 executing program 2: r0 = pidfd_open(0x0, 0x0) ioctl$BTRFS_IOC_WAIT_SYNC(r0, 0x40089416, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) signalfd4(r2, &(0x7f0000000000)={[0x1]}, 0x8, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f00000000c0)=0x6) r3 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x4000c0, 0x20) ioctl$TCSETSW2(r3, 0x402c542c, &(0x7f0000000080)={0x10000, 0xfffffffa, 0x40, 0x8, 0x4, "62836a0ef2c7bbe8e860f1a9bb4c27f41a22c2", 0x6, 0x9}) r4 = syz_mount_image$nfs4(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x8aa, 0x8, &(0x7f00000007c0)=[{&(0x7f0000000180)="583d6fffe3eec9c26cc510", 0xb, 0x5}, {&(0x7f00000001c0)="a49cef51a7d247b38824b596468ddc1abbbc87b0c6fd654c0ffc919469a1f2f65244aaa6364c2750965483a88868c5edc8bfb2c600230f1814da9680d4753ed65d34a5d5f52f6de2365bb75aca7356e9c09a3a9d7d3833bf196c27e44fa9254591b2810504814b8045cf9c06737e36cf25d381585658b3736820f396740c0ddd785611dbbf9aee98b9dba76603c0450ac939b3687016a2dfd30231c6cd5e83c76e5b163e5fbe0c1b5a767e7cc51b43e858fe3b0ab87a2238e7e2ec1642244a70ec8dd0078722b290ac", 0xc9, 0x80000000}, {&(0x7f00000002c0)="9f777193de166e92170d226566b06843ca5c53fde6f77879a47d6d31cd5803b213ec93c64b0536d79693816aaa49cd8e78b7518260ba78d6cb7c4387c492fb00788c5c1ffc4ab2e4b599fb8cd707dbec57959357b0642b71507facb5709eeb19d8dd450f702a8d2e817144752ef6c872d665ca6dfc98c0ca16d8ea451e9b8296b20711fd1c96eb47c8dec4e7372e31e1088878c733e18f0e2b08a379cbba06eed1d46a2d92c8a79d75fed5543272dd9e1d585c74c90873e6a6cbe3d2e9cf9c1ff2101a4739cff36e89d2", 0xca, 0x4}, {&(0x7f00000003c0)="d48b84611ed3a2e65378a9d2fdb185b24cdb50d74e70cd786a8a0d7a8e00da642f528152f83aa180795e22737a23f12812bffeaaf00fb405fc08c432441857a1661864dd8c0266a95bafa0e41d71238ba0a18f53f7761b9f50871c97738d59fd7ae601f7b99a1b817bce759e588dc64c9463af5aa24e989a6f0f8d148d487ae93e9fb5bb5464c7a88275f29585706575e54c6d6f0442266d94ef0d30ce7dc95750aaa28216c60dadcdeafdc6a60770fd1f14aa2902f79bad15f669217a36320db0902fcfb5e60ec33771e75ada58b0a5baa0dd0f", 0xd4, 0x7}, {&(0x7f00000004c0)="6f1effb0950721927e281c2b46fd679a41fb318f651e7c6c8cdee209667a4021a8460442f5e83f872a702babc953466769c81ca73f510dbf447b8afb8636fd9dee63af328bb7cd27d11c1d0dd4ece9c0dc9f618132ba935435d2bbb914a9856cffecd134cce7ad32b1107c0d7f679ed10d2fe30e1811fabf50f78ed1675db27b3d8afa67c67c567fa8b474f963c612fd82747fb7d82d", 0x96, 0x2}, {&(0x7f0000000580)="f17eedbe85273f16153740d9268da430c59fdd76057322ed63296386d308fc5990d46bf38eb15f4c602db47442d1f52710b4e31f1160e1d7908df10ca6d5b5a82b94ac40693c8daebba3daf0abe37c0d7257797809c3b0fe4379d6a3638a7039d89b44a9dde0424e252636423fb52da04f4a1a345a38d78eda17", 0x7a, 0x81}, {&(0x7f0000000600)="910a6d07f42f8b78044da8f9e150bf5fbc2bddb74a06e55c1d15b7f48a8e3b7e959aaa2430b71940a0d38ab5032aafc858f5528106f5e55fef79b9920ca9411c32ba3e7eda8f2e5d5ca8b86184f77c6f3c9c0bc344e72fe602a57f06e090e7a65379d1b7e3a4965cde24997525e0068578ef0fadb3a2cd2dce1982ec64edd38d8b834ee4f27aef82158c2c64fad914f267e1764f52", 0x95, 0x2}, {&(0x7f00000006c0)="82bcc80586d1b414070bd54def277497505007f00a4316cdf7bfee87b2ef28d2ede1abd0659bdfd5802f1e543ea00a84104b792c46af78c9a23c031ec42f4a993862d71e22fb7fb54683b4de4c88aff8df3d1bc1b13dcdee721ca2ef8e93ea57b0b61658c70244359d35e2888edb2001c79e820e43a601d6286e65be86b5ded8c99736ce22f49cc511245f9602d8b59503f62f3d7180533cf3b6952e847ef42d4aacc01ee757a5e889278863880ca40090734483176349a39c56fbbb3b3fb21edcc51924b540de01ac846e59572e50485926f7516e6f211009f064dad7681f20ab227ef5e928219b6480c99e49eb2756d9", 0xf1, 0x290}], 0x800, &(0x7f0000000880)={[{'!@'}, {'(\\+@/'}, {'.pending_reads\x00'}, {'.pending_reads\x00'}, {}, {']@'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '$/\x03/#@*(/R'}}, {@audit}, {@pcr={'pcr', 0x3d, 0xf}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '.pending_reads\x00'}}, {@seclabel}, {@smackfsfloor}, {@dont_hash}]}) ioctl$F2FS_IOC_PRECACHE_EXTENTS(r4, 0xf50f, 0x0) ioctl$TIOCL_SETSEL(r1, 0x4b4b, &(0x7f0000000040)={0x2, {0x4, 0x200, 0x2}}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r5, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) sendmmsg$inet6(r5, &(0x7f0000003e00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000500)={0xa, 0x4e21, 0x0, @private2={0xfc, 0x2, '\x00', 0x1}}, 0x1c, 0x0, 0x0, &(0x7f0000001740)}}], 0x2, 0x0) mount$cgroup(0x0, &(0x7f0000000980)='./file0\x00', &(0x7f00000009c0), 0x10, &(0x7f0000000a00)=ANY=[@ANYBLOB='release_age,clone_children,subj_type=smackfstransmute,fowner=\x00'/71, @ANYRESDEC=0xee00, @ANYBLOB=',seclabel,smackfstransmute=.pending_reads\x00,fsuuid=a9a01dac-41j\x00-4186-f822-7f56295c,fsname=,smackfstransmute=,uid=', @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) fdatasync(r5) r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) signalfd4(r6, &(0x7f0000000000)={[0x1]}, 0x8, 0x0) perf_event_open(&(0x7f0000000b00)={0x1, 0x80, 0x9, 0x8, 0x20, 0xdf, 0x0, 0x80000001, 0x82c, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb2b, 0x1, @perf_config_ext={0xde6, 0x81}, 0x201b, 0x9, 0x9, 0x0, 0x1, 0x7, 0x3, 0x0, 0x2, 0x0, 0x40}, 0x0, 0xf, r6, 0x1) 08:17:29 executing program 3: ioctl$TCSETSF2(0xffffffffffffffff, 0x402c542d, &(0x7f0000000000)={0x0, 0x9, 0x0, 0x0, 0x5, "77004a6efdff00"}) ftruncate(0xffffffffffffffff, 0x4) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) ioctl$TUNSETOWNER(r0, 0x400454cc, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r1, 0x800) write$cgroup_netprio_ifpriomap(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="626f9ff2e8575b6176655fce05ea3fabdf1967c18883b6acb9b25b0a296531ffffc31a5b5243f7557f00f939c9c96efb940c919c82b3"], 0xf) r2 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendfile(r2, r0, 0x0, 0x7fed) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000004, 0x1010, r1, 0x0) ioctl$KDSETKEYCODE(r1, 0x4b4d, &(0x7f0000000040)={0x0, 0x8000}) r3 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x9ad, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) sendmmsg$inet6(r3, &(0x7f0000003e00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000500)={0xa, 0x4e21, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1400000000000000290000e34a5070c0bbb82fad59e2643ce3630f969c692adf7b8d4f418b6c069b0767c10000000000000000000000000000dd6a985646171cd9b1dfffc02afd5c57f756ddf129ad9fcc78911782cbb962e7d86c235bc9198e07cea039429e07a367d479647b48481bc0c53429d6ea5f2bf8194b5d322b14ac98191e9676b5f7a0980898996c83d4123be6ecfce1454affa124a0e4265af0052118e167d10719627defbc0b11cf5c3ce8f865594c6f67642e7b9f7f4957075076cb374b8abdb7fa9fdd382e7c6f7da07250eaf39d5ac1488863f498461a95edec9110"], 0x18}}], 0x2, 0x0) pwrite64(r3, &(0x7f0000000080)="cc615b309a5f15009751b0266b158e779b7ad3caf36a444c12d290bc4735df819efc6c30b1baae771217d9e96afe182bc2fc487db19edf38fbc442e46e5db819874fea4caf2c5d103b5777f213eb5ab96c664c7b084ea505aa8d4cb82d67ce4063495e279a869ff19ea70e7478dcb7f19a91a763f2e4f466544f161cb539f4ec72df153ae16487ba95ab42c42e31afe7c36b7065890ed6d694a36ea2d279c8b36a6f", 0xa2, 0x100000000) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x420000, 0x0) ioctl$TUNSETQUEUE(r4, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) 08:17:29 executing program 6: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x101001, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r1, 0x800) write$cgroup_netprio_ifpriomap(r1, &(0x7f00000003c0)={'bond_slave_1'}, 0xf) r2 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) sendfile(r2, r1, 0x0, 0x8000) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xa, 0x12, r1, 0x0) write$rfkill(r1, &(0x7f0000000140)={0x200, 0x8, 0x2, 0x1, 0x1}, 0x8) write$rfkill(r0, &(0x7f0000000080)={0x8, 0x2, 0x2}, 0x8) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000040)={r0, 0x7ff, 0x1ff00, 0x5}) pread64(r2, &(0x7f0000000400)=""/4096, 0x1000, 0x7f) write$rfkill(r3, &(0x7f00000000c0)={0x800, 0x6, 0x1, 0x1, 0x1}, 0x8) ftruncate(r3, 0x3) sendmsg$NL80211_CMD_STOP_SCHED_SCAN(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0000000000000000000000000000000000ae141134006e8fccf844f27ecb2a468ba70351553218d2d08d81c498d38c24da5f1773175a483c675a76"], 0x20}, 0x1, 0x0, 0x0, 0x841}, 0x0) 08:17:29 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000000300)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000000080)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='mode=0x00000000000000ff,nojoliet,overriderockperm']) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = inotify_init1(0x800) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r2, 0x0) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0), 0xa0, &(0x7f0000001540)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend}, {@cache_loose}], [{@func={'func', 0x3d, 'FILE_CHECK'}}, {@uid_gt={'uid>', r2}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}}) creat(&(0x7f0000001600)='./file0\x00', 0x1562bc430628c1dc) readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) 08:17:29 executing program 4: clock_adjtime(0x1, &(0x7f0000000000)={0x31a3, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x6, 0x7fffffff, 0x0, 0x0, 0x400000000000, 0x0, 0x3, 0x0, 0x800000000, 0xffffffffffffffff, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x7ff}) clock_adjtime(0x5, &(0x7f0000000100)={0x6, 0x100000000, 0x3, 0x6, 0x8, 0x7, 0x6, 0x2, 0xbaa4, 0xff, 0x0, 0x1, 0x8000000000000, 0x1000, 0x2, 0x8, 0xb35, 0x0, 0xb37, 0x0, 0x1, 0x7, 0x7fff, 0x6, 0x0, 0x4bf59624}) 08:17:29 executing program 5: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:17:30 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCSPTLCK(r2, 0x40045431, &(0x7f0000000000)) ioctl$TIOCGPTPEER(r1, 0x5441, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, 0x0) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='stack\x00') ioctl$TIOCVHANGUP(r3, 0x5437, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r4 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f0000000080)={0x8, 0x0, 0x100, 0x0, 0x5, 0x7fff, 0x2, 0x1000a1}) dup(r4) mmap$IORING_OFF_SQ_RING(&(0x7f0000ff2000/0x3000)=nil, 0x3000, 0x3000001, 0x10, r4, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$TIOCGWINSZ(r0, 0x5413, &(0x7f00000000c0)) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x644e2, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) 08:17:30 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000000300)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000000080)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='mode=0x00000000000000ff,nojoliet,overriderockperm']) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = inotify_init1(0x800) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r2, 0x0) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0), 0xa0, &(0x7f0000001540)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend}, {@cache_loose}], [{@func={'func', 0x3d, 'FILE_CHECK'}}, {@uid_gt={'uid>', r2}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}}) readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) 08:17:30 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000005c0)='fdinfo/3\x00') r1 = epoll_create(0x1) r2 = signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000000100)={0x60000008}) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f0000000000)={{0x1, 0x1, 0x18, r1, {0x2}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r3, 0xc0189374, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) r4 = epoll_create(0x1) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r1, &(0x7f0000000140)) 08:17:30 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r0, 0x800) write$cgroup_netprio_ifpriomap(r0, &(0x7f00000003c0)={'bond_slave_1'}, 0xf) 08:17:30 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000000300)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000000080)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='mode=0x00000000000000ff,nojoliet,overriderockperm']) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) inotify_init1(0x800) readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) 08:17:30 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f00000003c0)=[{{&(0x7f0000000240)={0x2, 0x4f20, @loopback}, 0x10, 0x0}}, {{&(0x7f0000000000)={0x2, 0x4e22, @multicast2}, 0x10, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="24000000000000000000000007000000891204", @ANYRESHEX=r0, @ANYBLOB="420f645e922ef4b5ecb0e53892e7942550bcee06ec630da94bc08cf2954e5d1401974d1da7df31ff67c0e23d6954a68072a171153171d39a2ef46d811fae3428262539f724bbc474f0937e49b72a5a8ff7086c8f62eb59269474da45586ad5c14bdb9ee5fa3af057b9ad92968be4e535255eb26ea6bc9297ad0561ca0e832091a939937b741242dee52dc03ed904b6d9df7aa65648ea24dfc2e80fce9ad2506ff1510944ec95d4d89a005c1836e2ddbe2c8655745a38bf65c0857dfadaceb80fd4a5b72a3ee7bd0dafc4e09007a0263aef43b3f8a17fd56b7c210edea495a4df19e9793b059d", @ANYRESHEX=r0, @ANYRES16=r0, @ANYRES32=r0], 0x28}}], 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000200)=ANY=[@ANYBLOB="0100000001000000723b34e71f75fa6dbf46696d18000000", @ANYRES32=r0, @ANYBLOB="050000004d0000002e2f66696c653000"]) setsockopt$inet6_udp_int(r0, 0x11, 0x1, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet6_udp_int(r1, 0x11, 0x65, &(0x7f0000000080)=0x80000001, 0x4) 08:17:30 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x0, &(0x7f0000000200)=ANY=[]) openat(r0, &(0x7f0000000000)='./file1\x00', 0x2000, 0x10) [ 1162.047712] audit: type=1400 audit(1669105050.846:32): avc: denied { block_suspend } for pid=7745 comm="syz-executor.6" capability=36 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 08:17:30 executing program 5: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:17:30 executing program 3: r0 = syz_io_uring_setup(0x21, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000002a40)=0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000002600)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r0, 0x4008941a, &(0x7f0000000000)) syz_io_uring_submit(r1, r2, &(0x7f0000000100)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x1}, 0x0) io_uring_enter(r0, 0x76d3, 0x0, 0x0, 0x0, 0x0) 08:17:30 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCSPTLCK(r2, 0x40045431, &(0x7f0000000000)) ioctl$TIOCGPTPEER(r1, 0x5441, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, 0x0) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='stack\x00') ioctl$TIOCVHANGUP(r3, 0x5437, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, 0x0) r4 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f0000000080)={0x8, 0x0, 0x100, 0x0, 0x5, 0x7fff, 0x2, 0x1000a1}) dup(r4) mmap$IORING_OFF_SQ_RING(&(0x7f0000ff2000/0x3000)=nil, 0x3000, 0x3000001, 0x10, r4, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$TIOCGWINSZ(r0, 0x5413, &(0x7f00000000c0)) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x644e2, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) 08:17:31 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000000300)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000000080)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='mode=0x00000000000000ff,nojoliet,overriderockperm']) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) 08:17:31 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r0, 0x800) write$cgroup_netprio_ifpriomap(r0, &(0x7f00000003c0)={'bond_slave_1'}, 0xf) 08:17:31 executing program 6: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000580)) syz_open_procfs(0x0, &(0x7f0000000040)='net/anycast6\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/anycast6\x00') kcmp(0x0, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, r1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(r2, 0x4018f50b, &(0x7f0000000000)={0x0, 0x7, 0x401}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(r1, &(0x7f00000000c0)='cpuset.memory_pressure\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r3, 0x0, 0x41, &(0x7f00000002c0)=ANY=[@ANYBLOB="6d616e676c6500000000000000000000000000000000000000000000000000009b000000874f8c3c8b9de22b459e634a17f1c27e976dea7ed14d3dca26b23c0660f6095f7a5eccbf462d33b84cfe5e8623afffa86784e5e2963414df82535b13b4f0d0123b2b2569e7fbfc7dc017171f7f976cbe8a26da9db891c55d0c71f50e2556f737883ea95ee818c77ce87e66743370b077960e8ee20a41f6551f1040697d42cb874f873ac201a542e4fe41b763ef6b142c7d0ee940164ce64d9669573e"], &(0x7f0000000140)=0xbf) r4 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) sendmmsg$inet6(r4, &(0x7f0000003e00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000500)={0xa, 0x4e21, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000001740)=[@tclass={{0x14, 0x29, 0x43, 0x8f76}}], 0x18}}], 0x2, 0x0) ioctl$FS_IOC_GETVERSION(r4, 0x80087601, &(0x7f0000000180)) mount$cgroup(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f00000001c0)={[{@subsystem='freezer'}]}) 08:17:31 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$pidfd(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000003e00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000500)={0xa, 0x4e21, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000001740)=ANY=[@ANYBLOB="148e00000000007628db092b5a1378248f00000000"], 0x18}}], 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = openat$bsg(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000000)={r4, 0x1, 0x7, @local}, 0x10) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000000280)={'gre0\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="67726576617030000000000005000400", @ANYRES32=0x0, @ANYBLOB="00100040688d0448000000054700001c00660000020490780000000064010102890761ffffffff00", @ANYRESOCT]}) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r2, 0x89f4, &(0x7f0000000380)={'ip6tnl0\x00', &(0x7f0000000300)={'ip6_vti0\x00', 0x0, 0x29, 0x6, 0x1, 0x8, 0x20, @loopback, @remote, 0x10, 0x8000, 0x3ff, 0x4}}) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r3, 0x89f9, &(0x7f0000000440)={'syztnl1\x00', &(0x7f00000003c0)={'ip6gre0\x00', 0x0, 0x29, 0x9, 0x30, 0xff, 0x37, @loopback, @private2={0xfc, 0x2, '\x00', 0x1}, 0x40, 0x40, 0x7, 0x40}}) getsockopt$inet_mreqn(r2, 0x0, 0x0, &(0x7f0000000480)={@initdev, @loopback, 0x0}, &(0x7f00000004c0)=0xc) sendmsg$ETHTOOL_MSG_CHANNELS_GET(r2, &(0x7f0000000740)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000700)={&(0x7f0000000580)={0x174, 0x0, 0x401, 0x70bd28, 0x25dfdbfb, {}, [@HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'batadv_slave_0\x00'}]}, @HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x4}, @HEADER={0x64, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvtap0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_hsr\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x174}, 0x1, 0x0, 0x0, 0x800}, 0x14) getpid() r9 = dup(r0) dup2(r0, r9) r10 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.stat\x00', 0x0, 0x0) getdents64(r10, &(0x7f0000001d00)=""/4085, 0xff5) 08:17:31 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f0000000080)=[{&(0x7f0000001380)="3ead823d27b1f38d16b83fca92a1f8f4a79624a264eb3d23f624cb63a9a475c4336e3015462fa8b76b1c5fb9b159eaa406698e2f3dcd71c5ba4e666731496d8ddd1bbaae50714c9ccdc53444b41f6df995ce4a1e6b9807bce8fa3e046360e5d1b228a3367e2315a985fcf8542b6a2e58eff19d99aa1de724345dd5786c63d31c197c760ac73dc10c91fcf49125d4dd5e1d4c952eeabf70f80b092c914e00cd0e75bdea96065d75447e5e2917619f3d3e2662b99fac83e65ca6fb6fc547ce903e960595bafc4990dfa6263d2dd2268b3f6f3df3b1603e198bc4011a4b1c43c686ff811d9a346aabe8c9f33c2c5e0ab15e288917c0de80a9d49e72e1efc8db344b3a715702fd03a0e9e2387cc5032967d44d8b3b68383f6c89c842ec2eadc06d1e5133067d6b3f11647561748b7d4185cab428d5fbf98ea4100f2276af2fec68da7e57d65c185e261b6790c65ebb5f98cb027d065d424a65705b15be6eda2b4ba4f6a337f711fc7088d216cb59a744bc5a0d0f059b11d6d7c0784065277076525027223b82fdcc899b2de92a710082edf89a57c0bf416899d2f8ad2cad43e5018b52025096784ecd82a29c00a8bf5ffa6e3b75fe641acf39885c084ae7e546f04224aeb23f61d99fc464a533fc6b87790e335057b54dbff233ced4a7ef90884dc7d90d678cc080024b9b4a4ed04d7e600583f7f536f833ea05f170a62ed942378a0cef6b8ef991d1be3a4d68bf99060cd90f7b704177f06a99b376ce412cdd5226f2615777e7d78cfbbbd0edddd94674081b84b73fbd9f5c61f5de1fa84e77ddca25eea63a027e477b05fd4b7ca36d6b2ea8498c3505edd2493f9e85ea1ba073d77985ba2e0e36d77b289ae0510fd31ff33a1b459be34e2066ac9d7a74fe1c09efc83e244bcab98e43ddd8fa16805b1a58bab551794f6e9143ea93515cba6d10ca13550611318d0566972df2e0ccb0de965a9d21bc2e800ab57ce0a16408a431ac97dfac7d882f79be85555d7552139fdf34c1475c5d49fdd421391da05f3fa3938aaa5b1ef20fcc842fc365cdc46ee76a146e3c524b30780d54c8db9cd01a8cd6c26d8efb946e7868631b8808ce16805eedc68e1711e0ed78b9aa12b08d2945a2dfa5356d8b07d010bff1a3a067b71cc164e512b7b5006350fcd61c09209fcd7489391feca969882655310b7eb300d606543caf85bbab53e6eee7ed1457d8b8a5a0ff4c8a38a5d7b482bb6489138275c062b4edf36e7bbf9fbd15c98d117df171274099b1daf4b395c82128f7b683e7be189e391dda6eca9e6653872903e83598b0901269d7768af8d4b0f10cbb5339134819b3495b97fd607c559bcd0b1855d53a919532b89e08ddcc483a49a8c4fe3fbc9d7abe545ff0f1ffea7ccdeba463c6016f444528e6e52bbe4cab1e224c373eea4b6a9c868be1c4315c70a9b2c5f93a6c6404b5a018b31baa55709afcca89c84cc1d2a8cacdf7d471ae036d4fbe59a50ca006f0f1b1a5511deca77e38073878f2375a822d7d3b9fe567e13329b47ff6cfcc71d238b74bff9b4ba6698881a4506c7f701820946e7997fb5fe4c0ea8be3f5bfcba9168c698e3357a6871a63b1c8201141c37aa23f8a2b50fc906666a96722ba2bd5cafa767b70aaf2a2d486850df6de8056513756a873e7c9776f934e0cadbed93c9b21ead09bb1cf2b966f17dee23cc51757a9c0c997599a0dad2f2ab3980248c17f321226fb5ca7aaa12a0c90f17f2c7880d805b57b47bd3966b2b3c77de0e94577e2a2cecaf901fd2906fd1d7c53e994b3ba29cfbf10a8668c33174a94f15c9b298bf278f2243c3d59915c53d88e203335abce30fc4cb9783f2d7721a7f83e5ad8438c7c2ace235581ee9e8d6754fc633aef85c78b3b8d07bddc9ac2224d554d91f9026a624a34a6a1101e93650c1ebd02b1c5a0c776e77684145767befa7a048798fcd29420042dfa414978aa84d7dc8a03052338450834b15f06916d567ecccb4bb3fe7ccef0644883280d4c3471e1d52e4a73518db41241a1fa0e4615cb2abfd95eabd97e667d77459aa2485d4494e7ef07d8b789c527034f15b7de2ec6", 0x5c3}], 0x1) r1 = fork() fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000000)={0x0, r1}) fallocate(0xffffffffffffffff, 0x2, 0x200, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000380)={&(0x7f0000000240)={0x124, 0x22, 0x2, 0x70bd28, 0x25dfdbfd, {0xf}, [@generic="11966e902e8204fe71fe99724a6a891a11560a13f7fe66b13934e9b67bc0a03f7fdee17aa7733b8fc222df55651f15da72aea8e29841fc0cf3ce9ae6e5faa4dca282cbea910e0a5ca0f1ecdeaf9372f6e24dc89524dfad9e0395", @nested={0xb4, 0x77, 0x0, 0x1, [@generic="208ad46e6f275e583e6757d098771ecb09e348becd52cb3d5eb8edf594bba5582c02b40bf10c7bab2c8172ad8cf343", @generic="d6b2df828ea1d0599f", @generic="97e1a86008f25a0d8dae74260f0e60e243222fc53d2f7503c2222732b30f6a92c7c5ec2274f6baa3b986b333349569efc4ab2000c43127513a0d7e6af5ac8b488260c12df70852df760336a2", @typed={0x1b, 0x3f, 0x0, 0x0, @str='trusted.overlay.origin\x00'}, @typed={0x8, 0x3f, 0x0, 0x0, @u32=0x2}, @typed={0x8, 0x79, 0x0, 0x0, @pid=r1}]}]}, 0x124}, 0x1, 0x0, 0x0, 0x20000}, 0x20018844) setsockopt$inet6_int(r2, 0x29, 0x2, &(0x7f00000000c0)=0x3f, 0x4) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000000)=0x255f, 0x4) sendmsg$inet6(r2, &(0x7f0000001e40)={&(0x7f0000001d00)={0xa, 0x4e23, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, 0x1c, 0x0}, 0x0) recvmmsg(r2, &(0x7f0000001f00)=[{{0x0, 0x0, 0x0}}], 0x1, 0xc7bce561360a3f0a, 0x0) socket$inet6_icmp(0xa, 0x2, 0x3a) fsetxattr$trusted_overlay_origin(r2, &(0x7f0000000040), &(0x7f00000000c0), 0x2, 0x2) fcntl$getown(r0, 0x9) close(0xffffffffffffffff) ioctl$TIOCL_SETSEL(r0, 0x541c, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r3 = open$dir(&(0x7f0000000100)='./file0\x00', 0x2c940, 0x0) ioctl$BTRFS_IOC_LOGICAL_INO(r3, 0xc0389424, &(0x7f00000001c0)={0x87b, 0x48, '\x00', 0x1, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) 08:17:31 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r0, 0x800) write$cgroup_netprio_ifpriomap(r0, &(0x7f00000003c0)={'bond_slave_1', 0x32, 0x2}, 0xf) 08:17:31 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x2e, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d2420000120300000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e31313435383439333100"/192, 0xc0, 0x400}, {&(0x7f0000010100)="0000000000000000000000006856d49a00cc4371bd6a7c893f280045010040000c00000000000000ddf4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000040000003700000000000000", 0x40, 0x540}, {&(0x7f0000010300)="030000000400"/32, 0x20, 0x640}, {&(0x7f0000010400)="03000000040000000500000016000f000300040000000000000000000f00698c", 0x20, 0x800}, {&(0x7f0000010500)="ff030000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000ddf4655fddf4655fddf4655f00"/2080, 0x820, 0xc00}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f00000000000004002000000000000800050000000af301000400000000000000000000000100000010000000", 0x40, 0x1500}, {&(0x7f0000010f00)="2000000064e828b364e828b300000000ddf4655f00"/32, 0x20, 0x1580}, {&(0x7f0000011000)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af3020004000000000000000000000002000000300000000200000004000000320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000ddf4655f00"/160, 0xa0, 0x1600}, {&(0x7f0000011100)="8081000000180000ddf4655fddf4655fddf4655f00000000000001002000000010000800000000000af3020004000000000000000000000002000000400000000200000004000000420000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000ddf4655f00"/160, 0xa0, 0x1700}, {&(0x7f0000011200)="c041000000300000ddf4655fddf4655fddf4655f00000000000002002000000000000800000000000af301000400000000000000000000000c00000020000000", 0x40, 0x1e00}, {&(0x7f0000011300)="20000000000000000000000000000000ddf4655f00"/32, 0x20, 0x1e80}, {&(0x7f0000011400)="ed41000000040000ddf4655fddf4655fddf4655f00000000000002002000000000000800030000000af301000400000000000000000000000100000050000000000000000000000000000000000000000000000000000000000000000000000000000000e736ebb30000000000000000000000000000000000000000000000002000000064e828b364e828b364e828b3ddf4655f64e828b30000000000000000", 0xa0, 0x1f00}, {&(0x7f0000011500)="ed8100001a040000ddf4655fddf4655fddf4655f00000000000001002000000000000800010000000af30100040000000000000000000000020000006000000000000000000000000000000000000000000000000000000000000000000000000000000068cf8b090000000000000000000000000000000000000000000000002000000064e828b364e828b364e828b3ddf4655f64e828b30000000000000000", 0xa0, 0x2000}, {&(0x7f0000011600)="ffa1000026000000ddf4655fddf4655fddf4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3131343538343933312f66696c65302f66696c653000000000000000000000000000000000000000000000b6c73cca0000000000000000000000000000000000000000000000002000000064e828b364e828b364e828b3ddf4655f64e828b30000000000000000", 0xa0, 0x2100}, {&(0x7f0000011700)="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", 0x1a0, 0x2200}, {&(0x7f0000011900)="ed81000064000000ddf4655fddf4655fddf4655f00000000000001002000000000000800010000000af301000400000000000000000000000100000090000000000000000000000000000000000000000000000000000000000000000000000000000000802240f70000000000000000000000000000000000000000000000002000000064e828b364e828b364e828b3ddf4655f64e828b30000000000000000", 0xa0, 0x2400}, {&(0x7f0000011a00)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531000000100000001000050166696c6532000000100000001000050166696c6533000000110000009403090166696c652e636f6c64000000", 0x80, 0x4000}, {&(0x7f0000011b00)="0b0000000c0001022e00000002000000f40302022e2e00"/32, 0x20, 0x8000}, {&(0x7f0000011c00)="00000000000400"/32, 0x20, 0x8400}, {&(0x7f0000011d00)="00000000000400"/32, 0x20, 0x8800}, {&(0x7f0000011e00)="00000000000400"/32, 0x20, 0x8c00}, {&(0x7f0000011f00)="00000000000400"/32, 0x20, 0x9000}, {&(0x7f0000012000)="00000000000400"/32, 0x20, 0x9400}, {&(0x7f0000012100)="00000000000400"/32, 0x20, 0x9800}, {&(0x7f0000012200)="00000000000400"/32, 0x20, 0x9c00}, {&(0x7f0000012300)="00000000000400"/32, 0x20, 0xa000}, {&(0x7f0000012400)="00000000000400"/32, 0x20, 0xa400}, {&(0x7f0000012500)="00000000000400"/32, 0x20, 0xa800}, {&(0x7f0000012600)="00000000000400"/32, 0x20, 0xac00}, {&(0x7f0000012700)="111fc00601000000803a0900803a090000000000060000000000000005000000", 0x20, 0xc000}, {&(0x7f0000012800)="0200"/32, 0x20, 0xc400}, {&(0x7f0000012900)="0300"/32, 0x20, 0xc800}, {&(0x7f0000012a00)="0400"/32, 0x20, 0xcc00}, {&(0x7f0000012b00)="0500"/32, 0x20, 0xd000}, {&(0x7f0000012c00)="000000000000000001000000000000000000000032ed2fbf0000000000000000000000000000000008000000000000000000000000000000000000000000000000c00100"/96, 0x60, 0xd400}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a090000000000060000000000000005000000", 0x20, 0x10000}, {&(0x7f0000012e00)="0200"/32, 0x20, 0x10400}, {&(0x7f0000012f00)="0300"/32, 0x20, 0x10800}, {&(0x7f0000013000)="0400"/32, 0x20, 0x10c00}, {&(0x7f0000013100)="0500"/32, 0x20, 0x11000}, {&(0x7f0000013200)="000000000000000001000000000000000000000032ed2fbf0000000000000000000000000000000008000000000000000000000000000000000000000000000000c00100"/96, 0x60, 0x11400}, {&(0x7f0000013300)="0c0000000c0001022e000000020000000c0002022e2e00000d0000001000050166696c65300000000e000000d803050766696c653100"/64, 0x40, 0x14000}, {&(0x7f0000013400)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkal\x00\x00\x00\x00\x00\x00', 0x420, 0x18000}, {&(0x7f0000013900)='syzkallers\x00'/32, 0x20, 0x1c000}, {&(0x7f0000000040)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallers\x00'/128, 0x80, 0x24000}], 0x0, &(0x7f0000013b00)) [ 1163.219277] EXT4-fs warning (device loop2): ext4_enable_quotas:6443: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 1163.230889] EXT4-fs (loop2): mount failed [ 1163.293234] EXT4-fs warning (device loop2): ext4_enable_quotas:6443: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 1163.297943] EXT4-fs (loop2): mount failed [ 1173.396182] hpet: Lost 1 RTC interrupts 08:17:47 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000000300)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000000080)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='mode=0x00000000000000ff,nojoliet,overriderockperm']) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) inotify_init1(0x800) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r1, 0x0) readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) 08:17:47 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = eventfd2(0xffffffff, 0x80000) ioctl$F2FS_IOC_DEFRAGMENT(r1, 0xc010f508, &(0x7f00000000c0)={0x8, 0x6}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), r0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000180)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_FRAME_WAIT_CANCEL(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x34, r2, 0x400, 0x70bd29, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x4f}, @NL80211_ATTR_COOKIE={0xc, 0x58, 0x76}]}, 0x34}, 0x1, 0x0, 0x0, 0x4044840}, 0x1) r4 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x34, r6, 0x5, 0x0, 0x0, {{0x2}, {@val={0x8, 0x3, r7}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x96c}]]}, 0x34}}, 0x0) sendmsg$NL80211_CMD_JOIN_IBSS(r4, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0xb8, r6, 0x220, 0x70bd28, 0x25dfdbfc, {{}, {@void, @void}}, [@NL80211_ATTR_PRIVACY={0x4}, @NL80211_ATTR_MCAST_RATE={0x8, 0x6b, 0x8}, @NL80211_ATTR_HT_CAPABILITY={0x1e, 0x1f, {0x400, 0x0, 0x5, 0x0, {0x8, 0x1, 0x0, 0x8a, 0x0, 0x1, 0x0, 0x3, 0x1}, 0x400, 0x800, 0x5}}, @NL80211_ATTR_BSS_BASIC_RATES={0x1c, 0x24, [{0x14, 0x1}, {0x18, 0x1}, {0x16, 0x1}, {0x6, 0x1}, {0x30, 0x1}, {0x77}, {0x60, 0x1}, {0x36, 0x1}, {0x48}, {0x6}, {0x2, 0x1}, {0x6, 0x1}, {0xc810b1e1057754b6}, {0x3, 0x1}, {0x48}, {0x18}, {0xb, 0x1}, {0x9, 0x1}, {0x0, 0x1}, {0x6c, 0x1}, {0x1b}, {0x1}, {0x2}, {0x2, 0x1}]}, @NL80211_ATTR_HT_CAPABILITY={0x1e, 0x1f, {0x2, 0x1, 0x6, 0x0, {0x100000000, 0x9, 0x0, 0x7, 0x0, 0x1, 0x1}, 0x8, 0x8}}, @NL80211_ATTR_SSID={0x1a, 0x34, @random="68d2d49e6376212305f33ff8d34a166568307bd578b5"}, @NL80211_ATTR_HT_CAPABILITY_MASK={0x1e, 0x94, {0x400, 0x3, 0x0, 0x0, {0x3, 0x7, 0x0, 0x3f, 0x0, 0x1, 0x0, 0x1}, 0x8, 0x8, 0x2}}]}, 0xb8}, 0x1, 0x0, 0x0, 0x810}, 0x8000) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 08:17:47 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000000300)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000000080)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='mode=0x00000000000000ff,nojoliet,overriderockperm']) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) 08:17:47 executing program 5: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:17:47 executing program 6: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000003e00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000500)={0xa, 0x4e21, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000001740)=[@tclass={{0x14, 0x29, 0x43, 0x8f76}}], 0x18}}], 0x2, 0x0) write$binfmt_elf64(r1, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0xd8, 0x8, 0x4, 0xa09, 0x3, 0x3, 0x1, 0x2a8, 0x40, 0x1a2, 0x1, 0x100, 0x38, 0x1, 0x0, 0x0, 0x8}, [{0x5, 0xfffffd4b, 0x5, 0x0, 0x9, 0x6}, {0x4, 0xfffffff7, 0x8, 0x80000001, 0x5, 0x385, 0xfff, 0x1}], "37cacaa561", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x5b5) fallocate(r0, 0x0, 0x0, 0x7) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) sendmmsg$inet6(r2, &(0x7f0000003e00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000500)={0xa, 0x4e21, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000001740)=[@tclass={{0x14, 0x29, 0x43, 0x8f76}}], 0x18}}], 0x2, 0x0) preadv2(r2, &(0x7f0000000200)=[{&(0x7f0000000000)=""/48, 0x30}, {&(0x7f0000000080)=""/185, 0xb9}, {&(0x7f0000000140)=""/13, 0xd}, {&(0x7f0000000180)=""/101, 0x65}], 0x4, 0x7fff, 0x80000001, 0x39) fallocate(r0, 0x8, 0x2000000, 0x8000) 08:17:47 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="23212a2e45ac3409"], 0xb8) pread64(r0, &(0x7f00000002c0)=""/206, 0xce, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x400}}, './file1\x00'}) openat(r2, &(0x7f0000000040)='./file1\x00', 0x14e80, 0x70) close(r1) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) 08:17:47 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r0, 0x800) write$cgroup_netprio_ifpriomap(r0, &(0x7f00000003c0)={'bond_slave_1', 0x32, 0x3}, 0xf) 08:17:47 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000000300)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000000080)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='mode=0x00000000000000ff,nojoliet,overriderockperm']) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) 08:17:48 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup(r0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000080)={@local, 0x78, r3}) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8916, &(0x7f0000000000)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, r3}) socketpair(0x5, 0xde96fb0227c7b19f, 0x1f, &(0x7f0000000100)={0xffffffffffffffff}) accept4$packet(r1, &(0x7f0000000180)={0x11, 0x0, 0x0}, 0xfffffffffffffffd, 0x80800) setsockopt$packet_add_memb(r4, 0x107, 0x1, &(0x7f00000001c0)={r5, 0x1, 0x6, @multicast}, 0x10) r6 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r6, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) connect$inet6(r6, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}}, 0x1c) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_NOP={0x0, 0x3}, 0x5) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r6, &(0x7f0000004d00), 0x4000000000000b3, 0x4000880) 08:17:48 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000000300)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000000080)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='mode=0x00000000000000ff,nojoliet,overriderockperm']) readv(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) 08:17:48 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r0, 0x800) write$cgroup_netprio_ifpriomap(r0, &(0x7f00000003c0)={'bond_slave_1', 0x32, 0x4}, 0xf) 08:17:48 executing program 6: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000003e00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000500)={0xa, 0x4e21, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000001740)=[@tclass={{0x14, 0x29, 0x43, 0x8f76}}], 0x18}}], 0x2, 0x0) write$binfmt_elf64(r1, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0xd8, 0x8, 0x4, 0xa09, 0x3, 0x3, 0x1, 0x2a8, 0x40, 0x1a2, 0x1, 0x100, 0x38, 0x1, 0x0, 0x0, 0x8}, [{0x5, 0xfffffd4b, 0x5, 0x0, 0x9, 0x6}, {0x4, 0xfffffff7, 0x8, 0x80000001, 0x5, 0x385, 0xfff, 0x1}], "37cacaa561", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x5b5) fallocate(r0, 0x0, 0x0, 0x7) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) sendmmsg$inet6(r2, &(0x7f0000003e00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000500)={0xa, 0x4e21, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000001740)=[@tclass={{0x14, 0x29, 0x43, 0x8f76}}], 0x18}}], 0x2, 0x0) preadv2(r2, &(0x7f0000000200)=[{&(0x7f0000000000)=""/48, 0x30}, {&(0x7f0000000080)=""/185, 0xb9}, {&(0x7f0000000140)=""/13, 0xd}, {&(0x7f0000000180)=""/101, 0x65}], 0x4, 0x7fff, 0x80000001, 0x39) fallocate(r0, 0x8, 0x2000000, 0x8000) 08:17:48 executing program 5: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) [ 1182.620260] hpet: Lost 1 RTC interrupts [ 1183.012292] hpet: Lost 1 RTC interrupts [ 1184.040444] hpet: Lost 3 RTC interrupts [ 1184.412362] hpet: Lost 2 RTC interrupts [ 1185.288357] hpet: Lost 1 RTC interrupts [ 1185.516358] hpet: Lost 1 RTC interrupts [ 1192.856259] hpet: Lost 1 RTC interrupts 08:18:04 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000000300)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000000080)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='mode=0x00000000000000ff,nojoliet,overriderockperm']) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) inotify_init1(0x800) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) 08:18:04 executing program 6: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000003e00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000500)={0xa, 0x4e21, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000001740)=[@tclass={{0x14, 0x29, 0x43, 0x8f76}}], 0x18}}], 0x2, 0x0) write$binfmt_elf64(r1, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0xd8, 0x8, 0x4, 0xa09, 0x3, 0x3, 0x1, 0x2a8, 0x40, 0x1a2, 0x1, 0x100, 0x38, 0x1, 0x0, 0x0, 0x8}, [{0x5, 0xfffffd4b, 0x5, 0x0, 0x9, 0x6}, {0x4, 0xfffffff7, 0x8, 0x80000001, 0x5, 0x385, 0xfff, 0x1}], "37cacaa561", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x5b5) fallocate(r0, 0x0, 0x0, 0x7) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) sendmmsg$inet6(r2, &(0x7f0000003e00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000500)={0xa, 0x4e21, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000001740)=[@tclass={{0x14, 0x29, 0x43, 0x8f76}}], 0x18}}], 0x2, 0x0) preadv2(r2, &(0x7f0000000200)=[{&(0x7f0000000000)=""/48, 0x30}, {&(0x7f0000000080)=""/185, 0xb9}, {&(0x7f0000000140)=""/13, 0xd}, {&(0x7f0000000180)=""/101, 0x65}], 0x4, 0x7fff, 0x80000001, 0x39) fallocate(r0, 0x8, 0x2000000, 0x8000) 08:18:04 executing program 4: r0 = creat(&(0x7f0000000040)='./file1\x00', 0x0) ioctl$FITRIM(r0, 0xc0c0583b, &(0x7f0000000000)={0x0, 0x0, 0x6ce7}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r1, 0x800) write$cgroup_netprio_ifpriomap(r1, &(0x7f00000003c0)={'bond_slave_1'}, 0xf) r2 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendfile(r2, r1, 0x0, 0x8000) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xa, 0x12, r1, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file1\x00', 0x4822c0, 0xcc) syncfs(r3) openat(r1, &(0x7f0000000080)='./file1\x00', 0x30b240, 0x0) 08:18:04 executing program 5: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:18:04 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000000300)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000000080)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='mode=0x00000000000000ff,nojoliet,overriderockperm']) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) 08:18:04 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080), 0x20000, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) sendmmsg$inet6(r2, &(0x7f0000003e00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000500)={0xa, 0x4e21, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000001740)=[@tclass={{0x14, 0x29, 0x43, 0x8f76}}], 0x18}}], 0x2, 0x0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f00000001c0)={0x400, 0x81, 0x2, 0x0, 0x0, [{{r1}, 0x3f}, {{r2}, 0x4}]}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x1f3000, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x0, 0xee00}}, './file0/../file0\x00'}) perf_event_open(0x0, 0x0, 0x4, r3, 0x1) mount$bind(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180), 0x20, 0x0) 08:18:04 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r0, 0x800) write$cgroup_netprio_ifpriomap(r0, &(0x7f00000003c0)={'bond_slave_1', 0x32, 0x5}, 0xf) 08:18:04 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000000300)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000000080)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='mode=0x00000000000000ff,nojoliet,overriderockperm']) readv(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) 08:18:05 executing program 0: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000000300)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000000080)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='mode=0x00000000000000ff,nojoliet,overriderockperm']) readv(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) 08:18:05 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r0, 0x800) write$cgroup_netprio_ifpriomap(r0, &(0x7f00000003c0)={'bond_slave_1', 0x32, 0x6}, 0xf) 08:18:05 executing program 6: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000003e00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000500)={0xa, 0x4e21, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000001740)=[@tclass={{0x14, 0x29, 0x43, 0x8f76}}], 0x18}}], 0x2, 0x0) write$binfmt_elf64(r1, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0xd8, 0x8, 0x4, 0xa09, 0x3, 0x3, 0x1, 0x2a8, 0x40, 0x1a2, 0x1, 0x100, 0x38, 0x1, 0x0, 0x0, 0x8}, [{0x5, 0xfffffd4b, 0x5, 0x0, 0x9, 0x6}, {0x4, 0xfffffff7, 0x8, 0x80000001, 0x5, 0x385, 0xfff, 0x1}], "37cacaa561", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x5b5) fallocate(r0, 0x0, 0x0, 0x7) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) sendmmsg$inet6(r2, &(0x7f0000003e00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000500)={0xa, 0x4e21, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000001740)=[@tclass={{0x14, 0x29, 0x43, 0x8f76}}], 0x18}}], 0x2, 0x0) preadv2(r2, &(0x7f0000000200)=[{&(0x7f0000000000)=""/48, 0x30}, {&(0x7f0000000080)=""/185, 0xb9}, {&(0x7f0000000140)=""/13, 0xd}, {&(0x7f0000000180)=""/101, 0x65}], 0x4, 0x7fff, 0x80000001, 0x39) fallocate(r0, 0x8, 0x2000000, 0x8000) 08:18:05 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/ip_mr_vif\x00') preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000100)=""/149, 0xfffffdf2}, {&(0x7f0000000000)=""/53, 0x35}, {&(0x7f0000000300)=""/237, 0x103}], 0x3, 0x8, 0x400) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f00000001c0)={'syz_tun\x00', &(0x7f0000000080)=@ethtool_link_settings={0x4d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}) [ 1199.308886] hpet: Lost 10 RTC interrupts [ 1200.532534] hpet: Lost 1 RTC interrupts [ 1200.968482] hpet: Lost 1 RTC interrupts [ 1201.612493] hpet: Lost 1 RTC interrupts [ 1204.320572] hpet: Lost 1 RTC interrupts 08:18:22 executing program 5: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:18:22 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000000300)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000000080)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='mode=0x00000000000000ff,nojoliet,overriderockperm']) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) inotify_init1(0x800) readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) 08:18:22 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) 08:18:22 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080), 0x2001, 0x0) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x80010, r0, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80002}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0xc, 0x6, 0x0, 0x0, 0x0, {0x0, 0x0, 0x1}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x41}, 0x20000001) syz_io_uring_submit(r1, 0x0, &(0x7f0000000040)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x5, 0x0, @fd_index=0x5, 0x8, 0x0, 0xc1, 0x0, 0x1}, 0x1086adf2) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8", 0x16}, {0x0, 0x0, 0x4000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB]) 08:18:22 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000000300)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000000080)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='mode=0x00000000000000ff,nojoliet,overriderockperm']) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) 08:18:22 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r0, 0x800) write$cgroup_netprio_ifpriomap(r0, &(0x7f00000003c0)={'bond_slave_1', 0x32, 0x8}, 0xf) 08:18:22 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x8000}], 0x0, &(0x7f00000001c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000005c0)='./file1\x00', &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r3, 0x0) mount$9p_tcp(&(0x7f0000000500), &(0x7f0000000540)='./file0\x00', &(0x7f0000000580), 0x0, &(0x7f0000000680)={'trans=tcp,', {'port', 0x3d, 0x4e22}, 0x2c, {[{@afid={'afid', 0x3d, 0x80}}, {@mmap}, {@version_9p2000}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@aname={'aname', 0x3d, 'vfat\x00'}}, {@privport}, {@dfltuid={'dfltuid', 0x3d, r3}}, {@version_9p2000}, {@mmap}]}}) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000001) openat(r0, &(0x7f0000000000)='./file0\x00', 0x8000, 0x100) r4 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) syz_mount_image$nfs4(&(0x7f00000000c0), &(0x7f0000000180)='./file1\x00', 0x1, 0x2, &(0x7f0000000240)=[{&(0x7f0000000300)="2855f92e01a27d9c099a969573afdf790ebdb6e9bdcc89102cf0d2f96698982350c35c12f737d3d499abf9816647a2840b436aae84181f9ebc55696c6cebf73e6d430a5c34677aba667806c60113833faf19b6e623733abe33309775e2c0c57999f1deda876cf7d78c306bece8bbdf6c5db8e80f05c7fe13dc6fdc2c56ba9f1c37a9582168b0a87b6af1e4d94f15456afb0bbd65319d5d91696768658e69c98600a0458489c08102e861e3279489501fc210d0587b842f3d6d5f81f3107c56e213338d99df019fc21478c48c0d093362a21d845aa91aed0ef2fb16d2e14f00fdfdaf870b5c61f592f03110446e7b5be3", 0xf0}, {&(0x7f00000001c0)="15c3d89e85e6b1419736803130f3b4dd96bbad948df1195d61756d1923fa31381a4008270f24bbb56a0633c25816c28dae798b9d569a55ed41ee5d4487", 0x3d, 0xfffffffffffffffc}], 0x2030, &(0x7f0000000480)={[{'([$$(g'}, {'['}, {}], [{@obj_user}, {@fowner_eq={'fowner', 0x3d, r5}}, {@seclabel}, {@subj_user}, {@obj_role={'obj_role', 0x3d, 'vfat\x00'}}, {@euid_eq={'euid', 0x3d, 0xee00}}]}) ftruncate(r4, 0x1000003) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80000001) close(r1) 08:18:22 executing program 6: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000003e00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000500)={0xa, 0x4e21, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000001740)=[@tclass={{0x14, 0x29, 0x43, 0x8f76}}], 0x18}}], 0x2, 0x0) write$binfmt_elf64(r1, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0xd8, 0x8, 0x4, 0xa09, 0x3, 0x3, 0x1, 0x2a8, 0x40, 0x1a2, 0x1, 0x100, 0x38, 0x1, 0x0, 0x0, 0x8}, [{0x5, 0xfffffd4b, 0x5, 0x0, 0x9, 0x6}, {0x4, 0xfffffff7, 0x8, 0x80000001, 0x5, 0x385, 0xfff, 0x1}], "37cacaa561", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x5b5) fallocate(r0, 0x0, 0x0, 0x7) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) sendmmsg$inet6(r2, &(0x7f0000003e00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000500)={0xa, 0x4e21, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000001740)=[@tclass={{0x14, 0x29, 0x43, 0x8f76}}], 0x18}}], 0x2, 0x0) preadv2(r2, &(0x7f0000000200)=[{&(0x7f0000000000)=""/48, 0x30}, {&(0x7f0000000080)=""/185, 0xb9}, {&(0x7f0000000140)=""/13, 0xd}, {&(0x7f0000000180)=""/101, 0x65}], 0x4, 0x7fff, 0x80000001, 0x39) 08:18:22 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, 0x0) readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) [ 1213.535524] FAT-fs (loop2): Unrecognized mount option "@" or missing value 08:18:22 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r0, 0x800) write$cgroup_netprio_ifpriomap(r0, &(0x7f00000003c0)={'bond_slave_1', 0x32, 0x9}, 0xf) [ 1213.694986] FAT-fs (loop2): Unrecognized mount option "@" or missing value [ 1216.988845] hpet: Lost 1 RTC interrupts [ 1224.124895] hpet: Lost 2 RTC interrupts [ 1227.308721] hpet: Lost 1 RTC interrupts [ 1229.160929] hpet: Lost 1 RTC interrupts [ 1229.896813] hpet: Lost 1 RTC interrupts 08:18:39 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r0, 0x800) write$cgroup_netprio_ifpriomap(r0, &(0x7f00000003c0)={'bond_slave_1', 0x32, 0xc}, 0xf) 08:18:39 executing program 6: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000003e00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000500)={0xa, 0x4e21, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000001740)=[@tclass={{0x14, 0x29, 0x43, 0x8f76}}], 0x18}}], 0x2, 0x0) write$binfmt_elf64(r1, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0xd8, 0x8, 0x4, 0xa09, 0x3, 0x3, 0x1, 0x2a8, 0x40, 0x1a2, 0x1, 0x100, 0x38, 0x1, 0x0, 0x0, 0x8}, [{0x5, 0xfffffd4b, 0x5, 0x0, 0x9, 0x6}, {0x4, 0xfffffff7, 0x8, 0x80000001, 0x5, 0x385, 0xfff, 0x1}], "37cacaa561", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x5b5) fallocate(r0, 0x0, 0x0, 0x7) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) sendmmsg$inet6(r2, &(0x7f0000003e00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000500)={0xa, 0x4e21, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000001740)=[@tclass={{0x14, 0x29, 0x43, 0x8f76}}], 0x18}}], 0x2, 0x0) 08:18:39 executing program 4: syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) readv(r0, &(0x7f0000000280)=[{&(0x7f00000000c0)=""/118, 0x76}, {&(0x7f0000000140)=""/214, 0xd6}, {&(0x7f0000000040)=""/63, 0x3f}, {&(0x7f0000000240)=""/1, 0x1}], 0x4) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x14, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x0) fallocate(r1, 0x30, 0x476d, 0x80) 08:18:39 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) creat(&(0x7f0000000080)='./file0\x00', 0x60) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000540)='./file0\x00', 0x80) pwrite64(r2, &(0x7f00000000c0), 0x17, 0x10001) openat$tun(0xffffffffffffff9c, &(0x7f00000190c0), 0x0, 0x0) eventfd2(0x9, 0x80001) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x4, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open_by_handle_at(r2, &(0x7f0000000100)=@reiserfs_4={0x10, 0x4, {0x6a9, 0x3ff, 0xff, 0x3f}}, 0x200) fallocate(r1, 0x3, 0xe3ff, 0x8000) 08:18:39 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000000300)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000000080)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='mode=0x00000000000000ff,nojoliet,overriderockperm']) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) 08:18:39 executing program 5: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:18:39 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000000300)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000000080)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='mode=0x00000000000000ff,nojoliet,overriderockperm']) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) 08:18:39 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, 0x0) readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) 08:18:39 executing program 6: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000003e00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000500)={0xa, 0x4e21, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000001740)=[@tclass={{0x14, 0x29, 0x43, 0x8f76}}], 0x18}}], 0x2, 0x0) write$binfmt_elf64(r1, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0xd8, 0x8, 0x4, 0xa09, 0x3, 0x3, 0x1, 0x2a8, 0x40, 0x1a2, 0x1, 0x100, 0x38, 0x1, 0x0, 0x0, 0x8}, [{0x5, 0xfffffd4b, 0x5, 0x0, 0x9, 0x6}, {0x4, 0xfffffff7, 0x8, 0x80000001, 0x5, 0x385, 0xfff, 0x1}], "37cacaa561", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x5b5) fallocate(r0, 0x0, 0x0, 0x7) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) 08:18:39 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, 0x0) readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) 08:18:39 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r0, 0x800) write$cgroup_netprio_ifpriomap(r0, &(0x7f00000003c0)={'bond_slave_1', 0x32, 0xd}, 0xf) 08:18:39 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000000300)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000000080)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='mode=0x00000000000000ff,nojoliet,overriderockperm']) readv(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) 08:18:39 executing program 5: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:18:39 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x2, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x157) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) socket$unix(0x1, 0x2, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000200), 0x400200, 0x0) openat(r1, &(0x7f0000000240)='./file0\x00', 0x40, 0xc9) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f00000001c0)={{0x1, 0x1, 0x18}, './file1\x00'}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r0, 0x0, 0x200f5ef, 0x0) 08:18:39 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x1000002) ioctl$EXT4_IOC_CLEAR_ES_CACHE(r0, 0x6628) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) getsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f0000000140), &(0x7f0000000180)=0x4) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r2, 0x0, r1, 0x0, 0x200f5ef, 0x1081030000000000) 08:18:39 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000000300)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000000080)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='mode=0x00000000000000ff,nojoliet,overriderockperm']) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) 08:18:40 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) 08:18:40 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r0, 0x800) write$cgroup_netprio_ifpriomap(r0, &(0x7f00000003c0)={'bond_slave_1', 0x32, 0xe}, 0xf) 08:18:40 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000000300)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000000080)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='mode=0x00000000000000ff,nojoliet,overriderockperm']) readv(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) 08:18:40 executing program 6: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000003e00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000500)={0xa, 0x4e21, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000001740)=[@tclass={{0x14, 0x29, 0x43, 0x8f76}}], 0x18}}], 0x2, 0x0) write$binfmt_elf64(r1, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0xd8, 0x8, 0x4, 0xa09, 0x3, 0x3, 0x1, 0x2a8, 0x40, 0x1a2, 0x1, 0x100, 0x38, 0x1, 0x0, 0x0, 0x8}, [{0x5, 0xfffffd4b, 0x5, 0x0, 0x9, 0x6}, {0x4, 0xfffffff7, 0x8, 0x80000001, 0x5, 0x385, 0xfff, 0x1}], "37cacaa561", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x5b5) fallocate(r0, 0x0, 0x0, 0x7) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) 08:18:40 executing program 5: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:18:40 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) 08:18:40 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000000300)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000000080)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='mode=0x00000000000000ff,nojoliet,overriderockperm']) readv(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) [ 1232.288791] hpet: Lost 1 RTC interrupts 08:18:41 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r0, 0x800) write$cgroup_netprio_ifpriomap(r0, &(0x7f00000003c0)={'bond_slave_1', 0x32, 0xf}, 0xf) 08:18:41 executing program 6: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000003e00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000500)={0xa, 0x4e21, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000001740)=[@tclass={{0x14, 0x29, 0x43, 0x8f76}}], 0x18}}], 0x2, 0x0) write$binfmt_elf64(r1, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0xd8, 0x8, 0x4, 0xa09, 0x3, 0x3, 0x1, 0x2a8, 0x40, 0x1a2, 0x1, 0x100, 0x38, 0x1, 0x0, 0x0, 0x8}, [{0x5, 0xfffffd4b, 0x5, 0x0, 0x9, 0x6}, {0x4, 0xfffffff7, 0x8, 0x80000001, 0x5, 0x385, 0xfff, 0x1}], "37cacaa561", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x5b5) fallocate(r0, 0x0, 0x0, 0x7) socket$inet6_udp(0xa, 0x2, 0x0) 08:18:41 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000000300)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000000080)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='mode=0x00000000000000ff,nojoliet,overriderockperm']) readv(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) [ 1233.744962] hpet: Lost 1 RTC interrupts [ 1237.104999] hpet: Lost 1 RTC interrupts [ 1240.769030] hpet: Lost 1 RTC interrupts [ 1240.957024] hpet: Lost 1 RTC interrupts 08:18:58 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) 08:18:58 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r0, 0x800) write$cgroup_netprio_ifpriomap(r0, &(0x7f00000003c0)={'bond_slave_1', 0x32, 0x10}, 0xf) 08:18:58 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) 08:18:58 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000000300)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000000080)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='mode=0x00000000000000ff,nojoliet,overriderockperm']) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) 08:18:58 executing program 5: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x0, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:18:58 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000000300)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000000080)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='mode=0x00000000000000ff,nojoliet,overriderockperm']) readv(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) 08:18:58 executing program 6: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000003e00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000500)={0xa, 0x4e21, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000001740)=[@tclass={{0x14, 0x29, 0x43, 0x8f76}}], 0x18}}], 0x2, 0x0) write$binfmt_elf64(r1, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0xd8, 0x8, 0x4, 0xa09, 0x3, 0x3, 0x1, 0x2a8, 0x40, 0x1a2, 0x1, 0x100, 0x38, 0x1, 0x0, 0x0, 0x8}, [{0x5, 0xfffffd4b, 0x5, 0x0, 0x9, 0x6}, {0x4, 0xfffffff7, 0x8, 0x80000001, 0x5, 0x385, 0xfff, 0x1}], "37cacaa561", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x5b5) fallocate(r0, 0x0, 0x0, 0x7) 08:18:58 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x2}, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003e00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000500)={0xa, 0x4e21, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000001740)=[@tclass={{0x14, 0x29, 0x43, 0x8f76}}], 0x18}}], 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) io_submit(0x0, 0x2, &(0x7f0000000200)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0xf, 0x9, r0, &(0x7f00000002c0)="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", 0x1000, 0x5, 0x0, 0x1}, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000140)="c8f22281afc3e564f74a903b5200b881183024a05bf7e18a595792434026396ff1319908aac9eb0fe36f023dbda4d67b4b20354d915beee95895f2356fd974563d4300b0e3121364282594dafb12977aa487536b34901ebca6f641f679344ed6f421c5a2bc0beab0ea2d9088f33e8926640b5860e90a9648178ec7b3e68282f6cacd8a17a30ad5eae7ab9e9c1729b919776f", 0x92, 0x8001, 0x0, 0x1}]) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmmsg$inet6(r2, &(0x7f0000006dc0)=[{{&(0x7f0000000240)={0xa, 0x4e22, 0x80, @empty, 0x80000000}, 0x1c, &(0x7f0000001600)=[{&(0x7f00000012c0)="276ff5d99bc89c8e036c936cd8e429dc10cb085f47179b787a04af05ff223c5195b93c868a4e9dcf000fcd173d77fe1550326c013f52cb3f659102ca925ee1b7920d0a5c6b2ef9b5ba5fb98c7bd82f6e4285c626fcff40a10ce5acb59cc1e0ba278694d1eda51e0d6315e109e2b19392c0c237e83e4aca0bd2eb21940c927ac20abab170cb1527978220332dddacb51b2aab798cbcb2be20861c983e4d3454e9050361349ca8b9ddfbf851fa2539cd294727c749b2d9ff71fd7d7f72d2", 0xbd}, {&(0x7f0000001380)="2de6b9d9d1c0c35724a6cfebb0befa10720d7ef9a7be5c5f036da5483e836f1ef737b1b812ac063361a3f00cf8c7f488eae3d035f78b72fefcd4a51b58d17e9ebbc55ac5d97cdc6d", 0x48}, {&(0x7f0000001400)="c5aa8033a3bf9aa54dfce378e723b85f6768f90ecc41ea4d6a8404344fa2a26aeebd38e001af2162b4723088a0612ef5187338241194d1b1bcae7e536e1e9b30510b6f59", 0x44}, {&(0x7f0000001480)="3fc44749e128d8a9bd60d23d0566c75cc84273254c31910d7019241d98cff4916069df94e028a193229ab697f9f69095695e15e5865dd3c40ea343d078dfba544becc2cccea9afb245d389d58e3f75823ebd", 0x52}, {&(0x7f0000001500)="2e11b7b6a1e8162064cc75059ff1417f34291c2d9e8b8028b681dd19fdb98c4e56af407d2f56e495bd70527b93d5e4583dfbabf93b2041dcb6b7684e7472dc0c3353243347054a6d200824c739ac50352c986cfc51f6025e3c9f78aa831b790e68c8ca5fbcbf62a669866763f7dd0336f5e5470f710a150348141afda05018e57f336ffafafa1cd36ef46ad25aff90a1124b3d0918e1cc51ab2ce071ccac6054c91878a80f0ea26bbc29e2eeb54feddb37a2afdeeaf2e72c816dc02bda8ce3d8e5946c169544fc191631d0bb0f590f9ec73540136f3b606f2e893117ebb87c63e0386fab5f12b4ad4929fd97", 0xec}], 0x5}}, {{&(0x7f0000001680)={0xa, 0x4e24, 0x3ff, @ipv4={'\x00', '\xff\xff', @empty}, 0x8}, 0x1c, &(0x7f0000002c40)=[{&(0x7f0000001780)="3ba93abc0c84f814bd6d5262c9d147eb6046f344104fe3490b2510501f13e978b9c5584883972042d0d48ac2d1a7a07821c247a9fd7bda5e2ed9d7e7d55d076230f40a2631fc924fec62807b59337323695864e2662e3125e966228bc32ca66467c25d5c1beb0be6473d313e19aad4503f4035b7a05a5a9cb433c02f052675559214a55ead77e8ecd8b7387d693bcaa5a523e50606c302b63c4a02e0d5543c8efc1568571f5e519dbd9401e08c41278283a7c8322b5bb4d5e674896b268beb1c130e28be04", 0xc5}, {&(0x7f0000001880)="f4d37f8f53c85b007f3a40148d5e4069a02ed1a71b621e4febe58a1c401cc50f2e871e9736c6411bdbb94527044f43871f279a0f5b23525c2d88f800fce35a32c5c911fdb11f0b2c8d7d1c5f093e150684d6916ffb99c6d94bca25872439f0766ba5dba74915a47ee218da3ecee06ae55073185a3ab061f4c30e851377a62b8ca30263ac7515d289a0edc1ee13600e4a068d4b979cbe00e829084aa562", 0x9d}, {&(0x7f00000016c0)="5287f2a3b379ae837e647be9ab719a4c64779315d4d71a26cbd216190fde560596ef53010cbcdddea30686826ae0cb0d1f1fbc83eb8a43ef6ddfd0353b335b6fb28e40043e12f4b5397f31e165", 0x4d}, {&(0x7f0000001940)="fc7a536486f5c78fe67a85cb682140fce5587f9e6f6e9f0619b35f", 0x1b}, {&(0x7f0000001980)="fe6b97eecd9c62c1bdc5d3d93ad0b5a0aa7e72b8109ef9c68effc0b792ea700a343db83d96c003f3ef2309900933033bf1f365091a823bdd9113880815dbd9e178c6485a0d0d17c751dce89dd72bfdd074561af411f1de2922f7f13782a1ea05716021cbb79054933fa1158bc9bb63bace4175f1763ee1449e26a67a284195ffae94cb64", 0x84}, {&(0x7f0000001a40)="46da0e32dbaace720b74cbb758ef1568e3a9612f1c4d5bf545e4627362d711b69cf26749d6acff81cbb46b20ee3964bd754f3ce9127b1395e93d85df6dd7295f131e0ed3ae2db87ffd30b76fa09b16b75eadad48d1c236646c5844d5d5190431e4765b7897dc4ccd716f6d582eb96d0e5a4506cf1b312625c2bdf52fa58784c4e5c3321abf110db78c70d723d06b37d72d6663e8b8e04094b856e7c97599e6f336558a14280fb148c2a7f2d2ba1d22012b7572cbd2c2348fb811d768ee75410d27f9a522b0c61aa6d57f6c99c8ea61d672c8d11629b2658a3e391485eb9b2d54fd780edd7b53c3beb015a0e83f63ed56", 0xf0}, {&(0x7f0000001b40)="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", 0x1000}, {&(0x7f0000002b40)="0e74851b68a026ab79ac9e7b80232b848b4c9dc7c9aea22c6d3cb2ee5154e1c8fb14ef4a5ff573dcaf9d998205f46db78a9f7e145bca6868150cdef25bdd2052d7251c01f70a1a1a47fb19c0ffd261d1b68a250dd49e2008ff293cd6e19ceb33a98339b3da", 0x65}, {&(0x7f0000002bc0)="bc65cb637183518f698c9adf95ee088ab5c2a634fc5efb1d1cce4044bc32a912ea31299662d963ba4ddc19bc7737b101d462fdb4e6c074b8ab380597fa77acd37da01949ef7b0835b88f8e799853341f4e237e37a4ce50aef1b6", 0x5a}], 0x9, &(0x7f0000002d00)=[@hoplimit_2292={{0x14, 0x29, 0x8, 0x10000}}, @flowinfo={{0x14, 0x29, 0xb, 0x1}}, @rthdr_2292={{0x48, 0x29, 0x39, {0x0, 0x6, 0x0, 0x0, 0x0, [@loopback, @loopback, @mcast1]}}}, @hopopts={{0x130, 0x29, 0x36, {0xf4, 0x23, '\x00', [@hao={0xc9, 0x10, @dev={0xfe, 0x80, '\x00', 0x2b}}, @ra={0x5, 0x2, 0xb29}, @pad1, @generic={0x0, 0xa1, "b043ee383219050129816b1be90b20ab1f54c88881a46acd2bc5e3a6f3e202fb67850bd806c9948db5e3272828c49e40b7f4112952821ea39cecd79e07d5382b86c47e43cf3b2ae9321d30e4459a457e8df591f34ffac80d26bcb57e29a1bd64de8c7907b530250e5b9233d00eb6d134cd4787b9bbc1823ee0860de0bf254355a6ad21e0112c9fb05b3be1af437116b8d69c761d97f041e9373115fc8322c88d92"}, @calipso={0x7, 0x38, {0x3, 0xc, 0x80, 0x200, [0x2, 0x8, 0x5, 0x0, 0x0, 0x1]}}, @calipso={0x7, 0x20, {0x1, 0x6, 0x8, 0x0, [0x6, 0x1, 0x2]}}]}}}, @rthdrdstopts={{0xc8, 0x29, 0x37, {0x5e, 0x15, '\x00', [@calipso={0x7, 0x28, {0x0, 0x8, 0x98, 0x3, [0x80000001, 0x6c, 0x1, 0x86e]}}, @generic={0xff, 0x73, "566997d54aa1f8639afaecc5779aeae3c6c3f06a12ed467084d45fa9ae3eb60a1cf7d6161ba4737f3b8b1bac59022d27b94f35499e6f4d86d00af014f11c0876b51fd48615abee856420560efa17ccddcde87d2c39fda5f12843ea666ece504c7c27724b21bcf4e1d748273b50349809fe0064"}, @ra={0x5, 0x2, 0xa16}, @pad1, @pad1, @pad1]}}}, @hopopts_2292={{0x40, 0x29, 0x36, {0x16, 0x4, '\x00', [@hao={0xc9, 0x10, @private1={0xfc, 0x1, '\x00', 0x8}}, @hao={0xc9, 0x10, @loopback}]}}}], 0x2b0}}, {{0x0, 0x0, &(0x7f00000030c0)=[{&(0x7f0000002fc0)="8901b2f9ad23e04afbe0c94f8f34f2d6eb0b5ddc8f442c781e57b753f79f6deeebdd96bc67a0d65b16706cd9bd602954ed80133b16b54c57cf2fa98d99a0c1de5b054c71ebf760073a0114f3523b4c3c8e0afcb08b9568c4d77e3da2ef32f5d69431fb636cf32ee4fc1e026c612ac30ae43932c910289c40e3a46bdd167898824e1b45cbc94b573b0d91e5e221e502c448354f86c916a8a8836f6c60207cbd5d9df06659d35436731fda696fdc2b9b3446e591f85989a1b1db8e9579472351768022a4e4967d0ae21d25cd", 0xcb}], 0x1, &(0x7f0000003100)=[@dontfrag={{0x14, 0x29, 0x3e, 0x6}}, @tclass={{0x14, 0x29, 0x43, 0x1ff}}], 0x30}}, {{0x0, 0x0, &(0x7f00000036c0)=[{&(0x7f0000003140)="14b2dcd93a2a4e36e2fe4178860fdc46076389eb434775cd87c4c22f55dbf1ff7e4270d4ed0baca71be17ca74d98a9311211bb6dba2f62c1d008c08874d38a99840dec6e082ff487b4ff07fbc50d57438a62fa2daca8890d8d2c6deffb86edbb920d7a7fde1b2943150e0ac334005e5f1fd261e0e8aa57613b9a88be2f6780229d0c9e24c036737bbff8ccca25acf43b097735e1ecebf1e2d89d2a60c1531b8f375fda2f6a2ff134eff891392154bb53df44ff077341f8dfb7acb001e03af5d51d2b", 0xc2}, {&(0x7f0000003240)="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", 0xfd}, {&(0x7f0000003340)="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", 0xff}, {&(0x7f0000003440)="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", 0xfa}, {&(0x7f0000003540)="35baa32466154bb08ee664caebdfebe9a4b1e6ea4b75409454f721a325b4ca10688aaa788ab7817ef2a82b7d0f7aada78ae2d0b4d18e7725e40d78729470ca754950f4139cfefac879c7fcf38b54e107a503d5c4f636a52a21c7dbab99e4f2ae773ede", 0x63}, {&(0x7f00000035c0)="3e4d7d7d023092e10e2656394371659cc4dd36ef8f81e0461559225857f54416d172bcb049f7828566fd310ebc8c3c9317e9ea0a8bcde4e8c78b43e303e03463434618e90dc8cacb1af692606cda14dd7304629edca0b70a1bb9bbc2ca77b4193aebcfda2b0df41a163e353356da2d90f5fe217692a05792aec435ce13433cf1bbcea479dbb0493b1325177bf0398b13c894417f46adfbb8cb1f5e4129df81adec8f015516761360de4e6e56b7ff39294bb11daadd5d5e729757b37771a056a069aa751fd61abf653a0977f350057a17156cfbad6ba498796c0b05ff46618e43a048e6ba33bc85625110", 0xea}], 0x6, &(0x7f0000003740)}}, {{&(0x7f0000003780)={0xa, 0x4e23, 0x80000000, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7}, 0x1c, &(0x7f0000003840)=[{&(0x7f00000037c0)="cd9193b0d17e416537938426", 0xc}, {&(0x7f0000003800)="7590e4caafd3cc1f45e2b0df084ba4f1659ff103e7a474e212916c6c068cd1abad3c78bad4938bbc3750d74d1b44b448c4696112da25", 0x36}], 0x2, &(0x7f0000003880)=[@dstopts_2292={{0x78, 0x29, 0x4, {0x3c, 0xb, '\x00', [@enc_lim, @calipso={0x7, 0x48, {0x1, 0x10, 0x33, 0x8, [0x10000, 0x4, 0x3, 0x7, 0xba, 0x8, 0x5, 0xff]}}, @hao={0xc9, 0x10, @ipv4={'\x00', '\xff\xff', @empty}}]}}}, @dstopts_2292={{0x38, 0x29, 0x4, {0x3b, 0x3, '\x00', [@hao={0xc9, 0x10, @private1}, @ra={0x5, 0x2, 0x7}, @enc_lim={0x4, 0x1, 0x9}]}}}, @hoplimit={{0x14, 0x29, 0x34, 0x2}}, @rthdrdstopts={{0x68, 0x29, 0x37, {0x2f, 0x9, '\x00', [@ra, @pad1, @enc_lim={0x4, 0x1, 0x20}, @calipso={0x7, 0x38, {0x1, 0xc, 0x4, 0x8cbd, [0x1, 0x2, 0x1, 0x1, 0x2, 0x4]}}, @enc_lim={0x4, 0x1, 0x9}, @padn]}}}, @rthdrdstopts={{0x38, 0x29, 0x37, {0x32, 0x3, '\x00', [@ra={0x5, 0x2, 0x7}, @hao={0xc9, 0x10, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @enc_lim={0x4, 0x1, 0xff}, @ra={0x5, 0x2, 0x6}]}}}, @pktinfo={{0x24, 0x29, 0x32, {@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}, @hoplimit={{0x14, 0x29, 0x34, 0x7}}, @rthdrdstopts={{0xc8, 0x29, 0x37, {0x5c, 0x15, '\x00', [@padn={0x1, 0x1, [0x0]}, @calipso={0x7, 0x48, {0x0, 0x10, 0x2, 0x400, [0xa680, 0x2, 0x7726024f, 0x9, 0x6, 0x5, 0x0, 0xf9a]}}, @enc_lim={0x4, 0x1, 0x4}, @enc_lim={0x4, 0x1, 0x1}, @padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}, @calipso={0x7, 0x48, {0x3, 0x10, 0x3, 0x81, [0x1, 0x29, 0x6, 0xfffffffffffffffc, 0x4, 0x9, 0x80000001, 0x0]}}, @ra={0x5, 0x2, 0x6}, @padn={0x1, 0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}]}}}], 0x270}}, {{&(0x7f0000003b00)={0xa, 0x4e24, 0x5, @private0={0xfc, 0x0, '\x00', 0x1}, 0x8}, 0x1c, &(0x7f0000003cc0)=[{&(0x7f0000003b40)="f67eb64fb4e39e418a36c0dc081997a3c0e49574f6bf14ac8604dc40c9cb11864e467de0896133dc822378b38ad19faa2d37476089c1f4e9129ee08d841d5d659e9fc5a5b4392dde63b59f657945c559bbdce31a7a697d0769977aa9b3e62e8d77aa87db8c8ac9319363ca1d4e6c8a3dba7310d326b8c2ba878d89b7947c1b568d4c4cb8204f48b0bdc295", 0x8b}, {&(0x7f0000003c00)="9f", 0x1}, {&(0x7f0000003e80)="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", 0x1000}, {&(0x7f0000003c40)="fa26a8a6f45e3c7b698bac17ab3f5c0c1b71ed7bd6a69a8c459decad3ecf692b6f21c4b313ffdd2bbff4d7193644a8018a8c9496cea13cce5383d11ec2dca5979f89ac90b256d50dacb5a3cd8ac4b462d0ed7716fd9df82ea8b62ede206142bb0ed15b429bde84eb8d7104e2a1d0", 0x6e}], 0x4, &(0x7f0000004e80)=[@tclass={{0x14}}, @dontfrag={{0x14, 0x29, 0x3e, 0xd0ab}}, @rthdr_2292={{0x38, 0x29, 0x39, {0x4, 0x4, 0x0, 0x6, 0x0, [@dev={0xfe, 0x80, '\x00', 0x26}, @rand_addr=' \x01\x00']}}}, @hopopts={{0x20, 0x29, 0x36, {0x2f, 0x0, '\x00', [@pad1]}}}, @dstopts_2292={{0x50, 0x29, 0x4, {0x62, 0x7, '\x00', [@enc_lim, @padn={0x1, 0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, @calipso={0x7, 0x28, {0x1, 0x8, 0x9, 0x0, [0xffff, 0x3, 0x1, 0x800]}}, @ra={0x5, 0x2, 0x2}]}}}, @dstopts={{0x140, 0x29, 0x37, {0x71, 0x25, '\x00', [@hao={0xc9, 0x10, @ipv4={'\x00', '\xff\xff', @loopback}}, @pad1, @pad1, @jumbo, @calipso={0x7, 0x28, {0x0, 0x8, 0x2, 0x5, [0x7, 0x7fff, 0x1, 0x5]}}, @generic={0x18, 0xc8, "1509f47deed6326bbfb8db835253791a8490f5d7f0ff062fc0e79bc269babcad529fe6698c12b0cd5f09f937ca4999364b651fb2b0cd91537512992b88c2cd724b424abe99a76d0f56ec2302fab4b76dba856e60a7a5e5cf2d5ab3b04d547d56f2259583b07cf9fd9ee7cdecdeb93254cfaa74a7d0d3f0dbd599130526a7b2fe32592469a8ea596f09067f1bd32aff59ef5413bb6c3892242c6ff7a1ea9ba0dedd71d6abcf7425f599a9f9fbf80e0a97c5216c744d40b9fa31d78a2d64dca066fb7a8d53c05a3834"}, @calipso={0x7, 0x10, {0x1, 0x2, 0x0, 0x6, [0x3f]}}, @ra={0x5, 0x2, 0x5}]}}}], 0x218}}, {{&(0x7f0000003d00)={0xa, 0x0, 0x1, @mcast1, 0x8000}, 0x1c, &(0x7f0000003dc0)=[{&(0x7f00000050c0)="86f705156a8ee41c1be9dd24b61d28a74dd316ef31386b82fe0c22bbee308851c9f1b5f155a663551f45f1731c545790b7f9dec54a804856a477f45d72ef8e9588e0893d5de43c93d21fb59d763da418e6ce8f5b8554abdebf189224bf67cb6d97b02d547ebe1b14d55c3e3de2eb4cf82ef4e806829bbbda447f6d758b4ae5aba5b7215d74a17aa089fbe4f29ebdb09c2a88cd20d7c87ad14cc28ded2e6c9a377340a12c711a34f48f0305d7d6696b63f5a8ce8de7c845e53b50d731edecbd7caa52dacdea5e7ddecf488d8b81c86b65110e0204e188f7599838c217453520268f1ada1c", 0xe4}, {&(0x7f0000003d40)="deede5b3898243a8426ba4d721bcab5b7bb5c0f4e5dc4b82bd8757f3560da25f9b5ae72ef787d8328cab8c4c2720d99ecf0dfa9312d14ec7c4ae370a60dde58997", 0x41}, {&(0x7f00000051c0)="1bd56d7271a632a0291bd3f2fb4af0d9e611bcda9f9cc054c086fd008baaee31df857c272108f3152ccdbd7868ed81cbb0693f53ad0d63bd668df11463ba436be69ed9ec5b626fa02d5aad7f03b098c6f8fa903debde9880fbb74ffac4d47c49b60fc2964acb5867eeeec8178d3ab583a6c01009f2e6e821758de71e67f44ebc42a49b261fa5d3e7461241478fa840515a552c", 0x93}], 0x3, &(0x7f0000005280)=[@hopopts_2292={{0x140, 0x29, 0x36, {0x2f, 0x24, '\x00', [@ra={0x5, 0x2, 0x3}, @padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}, @enc_lim={0x4, 0x1, 0x7}, @hao={0xc9, 0x10, @dev={0xfe, 0x80, '\x00', 0x1c}}, @generic={0x9, 0xec, "5d5191fdd9b40bec179e24753a4b8712af1ebab1d68ed04f2a60201a1816734b46b1450575b1b802ef7310a32afba5340f07d33725874b0b97eed4ad19fe4ca65f54a6752c3120dc03d320a25a4ed72e13e8e7fb4de0d03a7a024cb5be0209e6d794a71d831cdcd7a8a2f7ca2d82cfb5d7c8b8bc4eab336e653960ad190e097fbab1da9452cba582cd91e6a0802453ee9ef9741270ddfe5916262ab64c1760f6d4be039f49a10be24c5220f5e5bc5ecb7b00a59f3cc9d9bca59d571e2b5496c4d32b5be9acf052fae46429f0c17643a6ca38c6de8087737caa6f08bdd0d32866052d561cebe67d3345a1248b"}, @calipso={0x7, 0x10, {0x2, 0x2, 0x7, 0x3c, [0x8d5f]}}, @padn={0x1, 0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}]}}}, @dstopts={{0x1048, 0x29, 0x37, {0x3c, 0x206, '\x00', [@generic={0x0, 0x1000, "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"}, @hao={0xc9, 0x10, @dev={0xfe, 0x80, '\x00', 0x10}}, @ra={0x5, 0x2, 0x7}, @hao={0xc9, 0x10, @private1}, @jumbo={0xc2, 0x4, 0x2}]}}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0xac}}, @rthdrdstopts={{0x148, 0x29, 0x37, {0x87, 0x25, '\x00', [@calipso={0x7, 0x20, {0x0, 0x6, 0x8, 0x6, [0x0, 0xca, 0x60]}}, @generic={0x9, 0xc3, "b0f595f167e427d6cd026f3450d4588513c24f866534f7fdb5f42a24b7a26633627da28a080a3c7f0d804c32bab2d092946c6a79e3c4ee59b6b86f107577e64b37e98845a9506475164a1f2aed84d7ba1988fd5a33137a2d2239de99294409175494ae88b37bf69d97d50e087fc1de36d5016e13811f086c0a4a51d68abfc7893b7fc0c97d53108f12bac92dc0624bbd2686bc0ecd8a0f423798ba1e52f88d6b7808b42101e60cda824e6161961b1c73235831b1abadda82c7ff9562c23b1be244a7b4"}, @padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}, @hao={0xc9, 0x10, @private0={0xfc, 0x0, '\x00', 0x1}}, @ra={0x5, 0x2, 0x8001}, @enc_lim={0x4, 0x1, 0x4}, @hao={0xc9, 0x10, @private0}, @hao={0xc9, 0x10, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xf}}}]}}}], 0x12e8}}, {{&(0x7f0000006580)={0xa, 0x4e20, 0xffffffff, @dev={0xfe, 0x80, '\x00', 0x24}, 0x2}, 0x1c, &(0x7f0000006c80)=[{&(0x7f00000065c0)="53cfd216b14d1b7c6e34b33414180956c789d549be4722e68e94c1bc95416fcb525641af5561017fed969786ae74332d809e3fd98f029616b66115db4e3045d1220f32a60ae472375a9192831906aade", 0x50}, {&(0x7f0000006640)="ee8c8996c5be0b47dc1d05057655f30f8bb505b3a5eb4e174114329217f9846ef01338d792f8f018b233916be8a7584b0922574483925b440123ced1de811880994d139e0932e006442a7c69dfacbfec080ac5a0c5d18f96398566beb55a067c6a918b6451210279e3fb3223efcf73c5b5b8783b24e40de1d3aa3fc3393e1932978e64bcbffb5ea6c26aaa1c15422a63361607388ff3f48ca9325bd2f1a4f7dc58689ccf90fc4fc53a7e2a1299887c0f8df3a5923b84b4d9d047fdd64fadb47b26da9ba927fd7d49a19157c0406c857430322b15e99e5001", 0xd8}, {&(0x7f0000006740)="3b68e39b40762977c25371959ee16f1fa032e6ba270b72920dfd710b25c5d0e421acb649e6ffa87a19c30cb217a646688d1013e2cc8de2b7ad4d68253faa59bf8f0d8091731c0b01386e58bce1acad7fab76dbe8de25a882484c09df3b509bbbd615390bce6154428231086a165d89202905f1fb46a3d32cadc84e3cf75ad8d9051c5aa25c83dd19ce2087afc66b3bf3793fd4637287b4e262ef10e88bb462bbfca143df03d77081a6fc8730ca085a674e90c44e5c692f48820fb888ca1fca1ecc1dfb4e05e6857868cfaa0f67af01640d7e9e7e79a357fdff91cc17310ae23394861836", 0xe4}, {&(0x7f0000006840)="66031836f021f45854c8c6f2dd8b14a252b9584b7d0df11706b41ce6c50b91fe0978fb5145e3112f98fc0251358fb5db3ab299666d85ab19ab7c0088f481c02f8671731e638d482eed34757b8860974cc4f687f7c0e72bbf4fbf5499e82b8bd4049d3ce229e1d4ebc88ae264c240c87e0d812604f0428f20e0ac2b151ac16e283f99ffae1fba8980e18df9246bb1d945c679dcc39bed306434ff14d4caead22c69f16bd395181560de4f5a10692e128990bf", 0xb2}, {&(0x7f0000006900)="f0db9dcd0a73c4435385c08b755be0299abe45cea3a3fa8fe9252fb5053958cb31edd62c45cfa944e8aa7dce52b5efbeccf59c34fe78dde85610ab263e3a5f4149ed15c01967841be90a2fbc4e209345fb2d3c052363f9ddec6de1ee8be82618c4cb341b8d06e0247419785e12b4b6f23f779c331cf6474afc229937986befddee166d0289a0f92d8df752aacbaee82ba704d52c44057d97817565c2c2f527", 0x9f}, {&(0x7f00000069c0)="46043ce229f7ae3a33f6ebf3054161788380902cda0e195eb6e9ed3c8ce3809db926316e7da539693f4060f3bca3d1b2afc11393e63c263401353d0b0ad3e58a6da28d43430b6a5a535f8a868fdb413399f24413f6a157cc89dab65a90133f71d4f0ebd0eb83863914c2ff1876504b9e5a4843e65ba368fc0808d87f3a1b7a357a1ce3dcaec8f03d67b1e60da36e29bb0eff3136caefe8bbd62b96a0f2e719a5cea151591a396b34297a47c5e925ac84e08fffeecaf6a29eed91ab5f081ef95de838a76643fcb55cee88eb1218f1201e3282ac51", 0xd4}, {&(0x7f0000006ac0)="a362fb6eca3d81110a96685118454d30819a0106437b578cf07a7a80271f72d1e5f4513b97c61a3689376ab25c3b310034db68dbf8e648ec8b280eca2fbfb50b518dec4e36711232787e379d76f1e59f17672fe53f8170f4b036b52982a30c5b14a4f2d9c660424fea5e2bc19b8867fc56ba72a85b6f971c1378a21709cba3a3b71e4ae68146760601825947ddfc", 0x8e}, {&(0x7f0000006b80)="d12717988372e72b3a5fd250932c4c044795e80308b9df6c7f067458011d11903ca208869ef4a5fa17071508", 0x2c}, {&(0x7f0000006bc0)="3604e18daaa8919f8def0e130501b4c11524c8966a350afc79831efc61c2484cf5c4e835b665da004a52eb03c4311e7c622a62ed8c88a3dd3f2c8cdba1f62c22e412f3c143dd4adef64a785255963de70c72b5b15d890a77ae3f95e02e009b5ddca8d83c6685c544a2b093e10543097d00a24371cfdcc148728f5acdac3a279fe22366500210ab1420a7b615ab5433cf84b0a0a00528b18aceac9b2ee4c0ed07384f", 0xa2}], 0x9, &(0x7f0000006d40)=[@dstopts_2292={{0x38, 0x29, 0x4, {0x1e, 0x3, '\x00', [@padn={0x1, 0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @enc_lim={0x4, 0x1, 0x19}, @padn={0x1, 0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, @padn={0x1, 0x3, [0x0, 0x0, 0x0]}, @jumbo={0xc2, 0x4, 0x3}]}}}, @rthdr_2292={{0x28, 0x29, 0x39, {0x1, 0x2, 0x2, 0x6, 0x0, [@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}]}}}], 0x60}}], 0x8, 0x84) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x104e034, &(0x7f0000000080)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x400000081}}]}) 08:18:59 executing program 7: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000000300)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000000080)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='mode=0x00000000000000ff,nojoliet,overriderockperm']) readv(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) 08:18:59 executing program 6: creat(&(0x7f0000000040)='./file0\x00', 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003e00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000500)={0xa, 0x4e21, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000001740)=[@tclass={{0x14, 0x29, 0x43, 0x8f76}}], 0x18}}], 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0xd8, 0x8, 0x4, 0xa09, 0x3, 0x3, 0x1, 0x2a8, 0x40, 0x1a2, 0x1, 0x100, 0x38, 0x1, 0x0, 0x0, 0x8}, [{0x5, 0xfffffd4b, 0x5, 0x0, 0x9, 0x6}, {0x4, 0xfffffff7, 0x8, 0x80000001, 0x5, 0x385, 0xfff, 0x1}], "37cacaa561", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x5b5) 08:18:59 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, 0x0) readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) 08:18:59 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r0, 0x800) write$cgroup_netprio_ifpriomap(r0, &(0x7f00000003c0)={'bond_slave_1', 0x32, 0x12}, 0xf) 08:18:59 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r0, 0x800) write$cgroup_netprio_ifpriomap(r0, &(0x7f00000003c0)={'bond_slave_1'}, 0xf) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendfile(r1, r0, 0x0, 0x8000) creat(&(0x7f0000000340)='./file1\x00', 0x2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xa, 0x12, r0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000240), 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000180)='./file1\x00', 0x687c, 0x1, &(0x7f0000000280)=[{&(0x7f00000001c0)="9cd4071cc90a7a1bac91ab921eeeea7ffe09cc74e72f6493610f34424315810907dcbbd4e3721488bfa76ac7633ccbe6d681846bdf9bd8c2704f80a6549bfe304d209a94921559bbe863f7e8bb371b9307940eba215bcb27315fe7e6642bb2acaa00c1f1b6ce77a75d5f3d69d721cc", 0x6f}], 0x200000, &(0x7f00000002c0)={[{@utf8}, {@numtail}, {@fat=@errors_continue}], [{@permit_directio}, {@uid_gt={'uid>', 0xffffffffffffffff}}]}) sendmsg$ETHTOOL_MSG_STRSET_GET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000080)={0xcc, r3, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0x4}, @ETHTOOL_A_STRSET_STRINGSETS={0xb4, 0x2, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0xfffffffffffffd73}]}, {0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8}, @ETHTOOL_A_STRINGSET_ID={0x8}]}]}]}, 0xcc}}, 0x0) 08:18:59 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, 0x0, 0x0) [ 1250.967832] FAT-fs (loop4): Unrecognized mount option "permit_directio" or missing value [ 1251.002777] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1251.051217] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1251.977186] hpet: Lost 1 RTC interrupts [ 1253.020990] hpet: Lost 1 RTC interrupts [ 1255.029102] hpet: Lost 2 RTC interrupts 08:19:15 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000000300)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000000080)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='mode=0x00000000000000ff,nojoliet,overriderockperm']) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) 08:19:15 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, 0x0, 0x0) 08:19:15 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f00000011c0)={0x53, 0xfffffffffffffffd, 0x0, 0x0, @buffer={0x0, 0x100c, &(0x7f0000001240)=""/4108}, 0x0, 0x0, 0x8000, 0x10014, 0x2, 0x0}) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x100) 08:19:15 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) 08:19:15 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, 0x0) readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) 08:19:15 executing program 6: creat(&(0x7f0000000040)='./file0\x00', 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0xd8, 0x8, 0x4, 0xa09, 0x3, 0x3, 0x1, 0x2a8, 0x40, 0x1a2, 0x1, 0x100, 0x38, 0x1, 0x0, 0x0, 0x8}, [{0x5, 0xfffffd4b, 0x5, 0x0, 0x9, 0x6}, {0x4, 0xfffffff7, 0x8, 0x80000001, 0x5, 0x385, 0xfff, 0x1}], "37cacaa561", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x5b5) 08:19:15 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r0, 0x800) write$cgroup_netprio_ifpriomap(r0, &(0x7f00000003c0)={'bond_slave_1', 0x32, 0x64}, 0xf) 08:19:15 executing program 5: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x0, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:19:15 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, 0x0, 0x0) 08:19:15 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, 0x0) readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) 08:19:15 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, 0x0) readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) [ 1281.693734] hpet: Lost 1 RTC interrupts 08:19:32 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, 0x0) readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) 08:19:32 executing program 3: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) 08:19:32 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000000300)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000000080)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='mode=0x00000000000000ff,nojoliet,overriderockperm']) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) 08:19:32 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r0, 0x800) write$cgroup_netprio_ifpriomap(r0, &(0x7f00000003c0)={'bond_slave_1', 0x32, 0xff}, 0xf) 08:19:32 executing program 5: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x0, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:19:32 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='fd/3\x00') stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r1, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r2, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x9c5, 0x3, &(0x7f0000000280)=[{&(0x7f00000000c0)='ZE', 0x2, 0x80000000}, {&(0x7f0000000100)="d35fecc6a3c1b3c63186b257b35f7f6997a9897ce213d509aa87b4b2a4467d316b5cb979696999432b1d8559277664d0e2ff00cbcad6b80174c115ecfab0f742a80d07c4b2f1d78d19645bf2fc54986c78e7b2a4b68ea1564b2ad41b3a4843df0102d0bebb6bae90ec60bab2d01eaeb8df8f0df8342884ab3bfc13ed8da28617aad080f37e91dc035a4599540f1566395a76cf14", 0x94, 0x100000000}, {&(0x7f00000001c0)="436ccc764890f5e96bd14da27b39050d77770c78fef240a85ad13641ea586244d5988ff2f93bbcb4a6505aad1b3fa730c5dca062ccabbcb618d68b32eb219fd61d782cababf5034c24d56bbcc73380790a9b7122c0ec399324316d4f8bd65c244e1f59aa6d253655e803df815f52ae4e80ed068dc6f7f53e2c801bb54a2976bf23e9", 0x82, 0x9}], 0x1000000, &(0x7f0000000300)={[{@dots}, {@nodots}, {@nodots}, {@dots}, {@dots}], [{@dont_measure}, {@uid_gt={'uid>', r1}}, {@uid_gt={'uid>', r2}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@fowner_lt={'fowner<', r0}}, {@dont_hash}]}) 08:19:32 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280), 0x0) 08:19:32 executing program 6: creat(&(0x7f0000000040)='./file0\x00', 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0xd8, 0x8, 0x4, 0xa09, 0x3, 0x3, 0x1, 0x2a8, 0x40, 0x1a2, 0x1, 0x100, 0x38, 0x1, 0x0, 0x0, 0x8}, [{0x5, 0xfffffd4b, 0x5, 0x0, 0x9, 0x6}, {0x4, 0xfffffff7, 0x8, 0x80000001, 0x5, 0x385, 0xfff, 0x1}], "37cacaa561", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x5b5) 08:19:32 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, 0x0) readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) 08:19:32 executing program 3: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) 08:19:32 executing program 4: r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$NL802154_CMD_GET_WPAN_PHY(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x28, r0, 0x4, 0x70b527, 0x25dfdbfb, {}, [@NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0x8000) clone(0x12001180, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000040)='0') clone(0x64800, &(0x7f0000000080)="716211ef3d6e96881cbd4a626375a07103cc04fe0181bf32cb022b8636f6a5e1d35a37bd0815a805fe4bf56a90d82a733494130e24a75d32618edadaf723d700f443fe1d84e5bee0682949c6913844c7876ffb69612ac6723a4cef29cd335919f30eb47c567d4e0432bda7b0137435db9f62", &(0x7f0000000240), &(0x7f0000000140), &(0x7f0000000180)="efd19588626478bb1b60905e2ec524afcd3fe851a2bfb01c83382a43109a466177f69d0e87d88dcc0385549f7a37087fc0a2f9d2a5011659bb0769522374ab89927045d7c1d8dab6adfe5514630c9e563c2ef0f83f646fa0d894031a67e8738179586ba5f4de74c9a532b6b1dfee9954b7e2d979a434d4034e31d7ab80f98c3c3f8e7cc98f76e3b8e30b47a595dda090b5a9f61d0112f5aefe13f4df75aa30727b53bf1aa50bd8b3dfc8ae2f5b90aff5dd3516") 08:19:32 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280), 0x0) 08:19:32 executing program 6: creat(&(0x7f0000000040)='./file0\x00', 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0xd8, 0x8, 0x4, 0xa09, 0x3, 0x3, 0x1, 0x2a8, 0x40, 0x1a2, 0x1, 0x100, 0x38, 0x1, 0x0, 0x0, 0x8}, [{0x5, 0xfffffd4b, 0x5, 0x0, 0x9, 0x6}, {0x4, 0xfffffff7, 0x8, 0x80000001, 0x5, 0x385, 0xfff, 0x1}], "37cacaa561", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x5b5) 08:19:32 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r0, 0x800) write$cgroup_netprio_ifpriomap(r0, &(0x7f00000003c0)={'bond_slave_1'}, 0x2) 08:19:32 executing program 5: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:19:33 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000000300)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000000080)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='mode=0x00000000000000ff,nojoliet,overriderockperm']) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) 08:19:33 executing program 3: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) 08:19:33 executing program 7: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) [ 1288.633791] hpet: Lost 1 RTC interrupts 08:19:50 executing program 7: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) 08:19:50 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, 0x0, 0x0) 08:19:50 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280), 0x0) 08:19:50 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x4206) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) sendmsg$NL80211_CMD_GET_REG(r1, 0x0, 0x0) ioctl$SG_GET_SCSI_ID(r0, 0x2276, &(0x7f00000002c0)) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x7ff}, {0x5}]}, 0x14, 0x1) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x582, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_DEV_STATS(r2, 0xc4089434, &(0x7f0000000480)={0x0, 0x7e, 0x1, [0x10001, 0x8, 0x401, 0x7ff, 0x6], [0x8, 0x3, 0x7fffffff, 0xfffffffffffffffc, 0x4, 0x0, 0x80000001, 0x7ee, 0x5, 0xffff, 0x1, 0x40, 0x8000, 0x7, 0x7, 0x5, 0x9, 0x4, 0x0, 0x3f, 0x5, 0x8001, 0x0, 0x5, 0xfffffffffffffffb, 0x0, 0x8, 0x8fbc, 0x0, 0x4, 0x9, 0x80000000, 0xd5a, 0x3, 0xfffffffffffffffd, 0x1, 0x4, 0x7fff, 0x9, 0x3, 0x1, 0x3, 0xffff, 0x8516, 0x2, 0x7, 0x4, 0x6, 0x20, 0x8, 0xfffffffffffffffb, 0x20, 0x7fffffff, 0x1, 0x6, 0x3, 0x6, 0x1, 0x30f9, 0x8000, 0x10000, 0x2, 0xffffffffffff3968, 0x3, 0x7c5f, 0x4, 0x2, 0xfffffffffffffff7, 0x7, 0x40, 0x1a3, 0x4, 0x2, 0x18f, 0x2, 0x6, 0x9, 0x3, 0x7, 0x1c00, 0xfffffffffffff800, 0x5, 0x8, 0xfffffffffffffff7, 0x2, 0x1, 0x9, 0x10000000000, 0x7, 0x4, 0x7f, 0x1, 0x8, 0x1, 0xffff, 0xfffffffffffffff9, 0xe1d5, 0x1ff, 0xfffffffffffffff8, 0x3ff, 0xffffffffe5689f34, 0x75, 0x7, 0xfffffffffffffc00, 0x0, 0x7486, 0x74b, 0x50, 0x80000000, 0x8, 0x7, 0x7, 0xf1, 0x3, 0x4a41, 0x40, 0xffffffff, 0x9, 0x1, 0x94]}) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) ioctl$AUTOFS_IOC_CATATONIC(r2, 0x9362, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000380)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0xc0182101, &(0x7f0000000440)={r3}) 08:19:50 executing program 6: creat(&(0x7f0000000040)='./file0\x00', 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0xd8, 0x8, 0x4, 0xa09, 0x3, 0x3, 0x1, 0x2a8, 0x40, 0x1a2, 0x1, 0x100, 0x38, 0x1, 0x0, 0x0, 0x8}, [{0x5, 0xfffffd4b, 0x5, 0x0, 0x9, 0x6}, {0x4, 0xfffffff7, 0x8, 0x80000001, 0x5, 0x385, 0xfff, 0x1}], "37cacaa561", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x5b5) 08:19:50 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r0, 0x800) write$cgroup_netprio_ifpriomap(r0, &(0x7f00000003c0)={'bond_slave_1'}, 0x3) 08:19:50 executing program 5: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:19:50 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000000300)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000000080)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='mode=0x00000000000000ff,nojoliet,overriderockperm']) readv(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) 08:19:50 executing program 7: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) 08:19:50 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, 0x0, 0x0) 08:19:50 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{0x0}], 0x1) 08:19:50 executing program 6: creat(&(0x7f0000000040)='./file0\x00', 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0xd8, 0x8, 0x4, 0xa09, 0x3, 0x3, 0x1, 0x2a8, 0x40, 0x1a2, 0x1, 0x100, 0x38, 0x1, 0x0, 0x0, 0x8}, [{0x5, 0xfffffd4b, 0x5, 0x0, 0x9, 0x6}, {0x4, 0xfffffff7, 0x8, 0x80000001, 0x5, 0x385, 0xfff, 0x1}], "37cacaa561", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x5b5) 08:19:50 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r0, 0x800) write$cgroup_netprio_ifpriomap(r0, &(0x7f00000003c0)={'bond_slave_1'}, 0x4) 08:19:50 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000000300)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000000080)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='mode=0x00000000000000ff,nojoliet,overriderockperm']) readv(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) [ 1307.977900] hpet: Lost 1 RTC interrupts 08:20:15 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, 0x0, 0x0) 08:20:15 executing program 5: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:20:15 executing program 4: syz_mount_image$msdos(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000002c0)) 08:20:15 executing program 6: creat(&(0x7f0000000040)='./file0\x00', 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0xd8, 0x8, 0x4, 0xa09, 0x3, 0x3, 0x1, 0x2a8, 0x40, 0x1a2, 0x1, 0x100, 0x38, 0x1, 0x0, 0x0, 0x8}, [{0x5, 0xfffffd4b, 0x5, 0x0, 0x9, 0x6}, {0x4, 0xfffffff7, 0x8, 0x80000001, 0x5, 0x385, 0xfff, 0x1}], "37cacaa561", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x5b5) 08:20:15 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, 0x0, 0x0) 08:20:15 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{0x0}], 0x1) 08:20:15 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r0, 0x800) write$cgroup_netprio_ifpriomap(r0, &(0x7f00000003c0)={'bond_slave_1'}, 0x5) 08:20:15 executing program 2: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000000300)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d202020202020202020202020202020202020202020202020202020000000000000000022000000000000220000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000000080)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='mode=0x00000000000000ff,nojoliet,overriderockperm']) readv(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) 08:20:15 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, 0x0, 0x0) [ 1327.154893] FAT-fs (loop4): bogus number of reserved sectors [ 1327.155947] FAT-fs (loop4): Can't find a valid FAT filesystem 08:20:15 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{0x0}], 0x1) 08:20:16 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280), 0x0) 08:20:16 executing program 6: creat(&(0x7f0000000040)='./file0\x00', 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0xd8, 0x8, 0x4, 0xa09, 0x3, 0x3, 0x1, 0x2a8, 0x40, 0x1a2, 0x1, 0x100, 0x38, 0x1, 0x0, 0x0, 0x8}, [{0x5, 0xfffffd4b, 0x5, 0x0, 0x9, 0x6}, {0x4, 0xfffffff7, 0x8, 0x80000001, 0x5, 0x385, 0xfff, 0x1}], "37cacaa561", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x5b5) [ 1327.233931] FAT-fs (loop4): bogus number of reserved sectors [ 1327.234882] FAT-fs (loop4): Can't find a valid FAT filesystem 08:20:16 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r0, 0x800) write$cgroup_netprio_ifpriomap(r0, &(0x7f00000003c0)={'bond_slave_1'}, 0x6) 08:20:16 executing program 5: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x74, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x74}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:20:16 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) 08:20:16 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x757d706b, 0x17}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003e00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000500)={0xa, 0x4e21, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000001740)=[@tclass={{0x14, 0x29, 0x43, 0x8f76}}], 0x18}}], 0x2, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x4e21, 0x100000ff, @empty, 0x80000002}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) accept4$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000200)=0x1c, 0x800) sendmmsg$inet6(r1, &(0x7f0000003e00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000500)={0xa, 0x4e21, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000001740)=ANY=[@ANYBLOB="14008adee434fc34a823140043000000768f000000000000"], 0x18}}], 0x2, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) sendmmsg$inet6(r2, &(0x7f0000003e00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000500)={0xa, 0x4e21, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000001740)=ANY=[@ANYBLOB="00fc0000000000000000000063"], 0x18}}], 0x2, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) sendmmsg$inet6(r3, &(0x7f0000003e00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000500)={0xa, 0x4e21, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000001740)=[@tclass={{0x14, 0x29, 0x43, 0x8f76}}], 0x18}}], 0x2, 0x0) mount$9p_unix(&(0x7f00000001c0)='./file1\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="7472616e7302006e69782c6163636573733d757365722c76657273693030302e75", @ANYRESDEC, @ANYRES16=r3, @ANYRESDEC=r1, @ANYRES16=r2]) openat(0xffffffffffffff9c, 0x0, 0x644e2, 0x0) 08:20:16 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, 0x0, 0x0) [ 1327.747793] 9pnet_virtio: no channels available for device ./file1 [ 1328.046756] 9pnet_virtio: no channels available for device ./file1 [ 1335.897958] hpet: Lost 1 RTC interrupts 08:20:32 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280), 0x0) 08:20:32 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r0, 0x800) write$cgroup_netprio_ifpriomap(r0, &(0x7f00000003c0)={'bond_slave_1'}, 0x7) 08:20:32 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffe, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)={[{@shortname_winnt}, {@uni_xlate}, {@utf8no}, {@numtail}, {@shortname_winnt}]}) getdents64(0xffffffffffffffff, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f00000000c0)=ANY=[@ANYBLOB="0200003da8bee2fd6f9752e672fbea9ed70a00", @ANYRES32, @ANYBLOB='?\x00\x00\x00\x00+\f\x00\x00/file0\x00']) getdents64(0xffffffffffffffff, &(0x7f0000001840)=""/58, 0x3a) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000040)=ANY=[@ANYBLOB="6858010000000006ffff00000000000000d8", @ANYRES16=0x0, @ANYBLOB="00012cbd7000ffdbdf2503000000"], 0x14}, 0x1, 0x0, 0x0, 0x4000081}, 0x0) write$binfmt_aout(r0, &(0x7f00000005c0)={{0x107, 0x3, 0x8, 0x2c1, 0x22e, 0x10000, 0x240, 0xee8}, "75380dc583d9a29605ab26e4e74ed87c22835f5244a45194cc70b36201fbddf98705b99eb303f21b2780e579f576c0eeba736ee1e8e61e7d494c6b7d2e6cd183b396450c70480cd913a1fc4383779a1d23c385032d04a21c5ae520bfa9cc450156a22e56069f1c1ae018d4893802310f90545507e6b5e57d37bfe57e1b03c55124ea0d9fa3070c4fbce1e872154875563e42130bd739beb7a29872299d260f7bb984bc65a2cfe411f2184b8e2f1c2c3f45d547fd31fd04", ['\x00', '\x00', '\x00', '\x00']}, 0x4d7) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000180)={{0x2, 0x4e23, @multicast1}, {0x7, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x20, {0x2, 0x4e20, @multicast1}, 'veth0_to_hsr\x00'}) 08:20:32 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280), 0x0) 08:20:32 executing program 6: creat(&(0x7f0000000040)='./file0\x00', 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0xd8, 0x8, 0x4, 0xa09, 0x3, 0x3, 0x1, 0x2a8, 0x40, 0x1a2, 0x1, 0x100, 0x38, 0x1, 0x0, 0x0, 0x8}, [{0x5, 0xfffffd4b, 0x5, 0x0, 0x9, 0x6}, {0x4, 0xfffffff7, 0x8, 0x80000001, 0x5, 0x385, 0xfff, 0x1}], "37cacaa561", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x5b5) 08:20:32 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, 0x0) readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) 08:20:32 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) (fail_nth: 1) 08:20:32 executing program 5: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x74, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x74}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) [ 1343.545272] FAULT_INJECTION: forcing a failure. [ 1343.545272] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 1343.548615] CPU: 1 PID: 8273 Comm: syz-executor.0 Not tainted 5.10.155 #1 [ 1343.549662] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1343.550933] Call Trace: [ 1343.551366] dump_stack+0x107/0x167 [ 1343.558848] should_fail.cold+0x5/0xa [ 1343.559466] _copy_from_user+0x2e/0x1b0 [ 1343.560099] iovec_from_user+0x141/0x400 [ 1343.560749] ? lock_acquire+0x197/0x490 [ 1343.561376] __import_iovec+0x67/0x590 [ 1343.562004] ? lock_release+0x6b0/0x6b0 [ 1343.562656] import_iovec+0x83/0xb0 [ 1343.563239] vfs_readv+0xbb/0x160 [ 1343.563790] ? vfs_iter_read+0xa0/0xa0 [ 1343.564401] ? __fdget_pos+0xed/0x110 [ 1343.565003] ? find_held_lock+0x2c/0x110 [ 1343.565657] ? mutex_lock_io_nested+0x1110/0x1110 [ 1343.566417] ? __fget_files+0x296/0x480 [ 1343.567070] do_readv+0x139/0x300 [ 1343.574546] ? vfs_readv+0x160/0x160 [ 1343.575156] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1343.575964] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1343.576768] do_syscall_64+0x33/0x40 [ 1343.577364] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1343.578162] RIP: 0033:0x7f1c8b7aab19 [ 1343.582746] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1343.587160] RSP: 002b:00007f1c88d20188 EFLAGS: 00000246 ORIG_RAX: 0000000000000013 [ 1343.588293] RAX: ffffffffffffffda RBX: 00007f1c8b8bdf60 RCX: 00007f1c8b7aab19 [ 1343.589375] RDX: 0000000000000001 RSI: 0000000020000280 RDI: 0000000000000003 [ 1343.590478] RBP: 00007f1c88d201d0 R08: 0000000000000000 R09: 0000000000000000 [ 1343.591559] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1343.592646] R13: 00007ffe599dca8f R14: 00007f1c88d20300 R15: 0000000000022000 08:20:32 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, 0x0) readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) 08:20:32 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280), 0x0) 08:20:32 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280), 0x0) 08:20:32 executing program 6: creat(&(0x7f0000000040)='./file0\x00', 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0xd8, 0x8, 0x4, 0xa09, 0x3, 0x3, 0x1, 0x2a8, 0x40, 0x1a2, 0x1, 0x100, 0x38, 0x1, 0x0, 0x0, 0x8}, [{0x5, 0xfffffd4b, 0x5, 0x0, 0x9, 0x6}, {0x4, 0xfffffff7, 0x8, 0x80000001, 0x5, 0x385, 0xfff, 0x1}], "37cacaa561", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x5b5) 08:20:32 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r0, 0x800) write$cgroup_netprio_ifpriomap(r0, &(0x7f00000003c0)={'bond_slave_1'}, 0x8) 08:20:32 executing program 5: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x74, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x74}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:20:32 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) (fail_nth: 2) [ 1344.201567] FAULT_INJECTION: forcing a failure. [ 1344.201567] name failslab, interval 1, probability 0, space 0, times 0 [ 1344.203530] CPU: 1 PID: 8294 Comm: syz-executor.0 Not tainted 5.10.155 #1 [ 1344.204427] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1344.205516] Call Trace: [ 1344.205879] dump_stack+0x107/0x167 [ 1344.206508] should_fail.cold+0x5/0xa [ 1344.207018] ? kvmalloc_node+0x119/0x170 [ 1344.207564] should_failslab+0x5/0x20 [ 1344.208223] __kmalloc_node+0x76/0x4b0 [ 1344.208732] kvmalloc_node+0x119/0x170 [ 1344.209241] seq_read_iter+0x81c/0x12b0 [ 1344.209754] ? __might_fault+0xd3/0x180 [ 1344.210302] do_iter_readv_writev+0x57c/0x750 [ 1344.210881] ? new_sync_write+0x660/0x660 [ 1344.211410] ? selinux_file_permission+0x36/0x510 [ 1344.212030] ? lock_acquire+0x197/0x490 [ 1344.212546] do_iter_read+0x28f/0x6d0 [ 1344.213044] ? import_iovec+0x83/0xb0 [ 1344.213539] vfs_readv+0xe5/0x160 [ 1344.213983] ? vfs_iter_read+0xa0/0xa0 [ 1344.214615] ? __fdget_pos+0xed/0x110 [ 1344.215441] ? find_held_lock+0x2c/0x110 [ 1344.215991] ? __fget_files+0x296/0x480 [ 1344.216544] do_readv+0x139/0x300 [ 1344.216999] ? vfs_readv+0x160/0x160 [ 1344.217499] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1344.218194] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1344.218880] do_syscall_64+0x33/0x40 [ 1344.219357] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1344.220005] RIP: 0033:0x7f1c8b7aab19 [ 1344.220491] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1344.223046] RSP: 002b:00007f1c88d20188 EFLAGS: 00000246 ORIG_RAX: 0000000000000013 [ 1344.224207] RAX: ffffffffffffffda RBX: 00007f1c8b8bdf60 RCX: 00007f1c8b7aab19 [ 1344.225102] RDX: 0000000000000001 RSI: 0000000020000280 RDI: 0000000000000003 [ 1344.225999] RBP: 00007f1c88d201d0 R08: 0000000000000000 R09: 0000000000000000 [ 1344.227058] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1344.228010] R13: 00007ffe599dca8f R14: 00007f1c88d20300 R15: 0000000000022000 [ 1345.398390] hpet: Lost 1 RTC interrupts [ 1345.438389] hpet: Lost 1 RTC interrupts [ 1345.742378] hpet: Lost 1 RTC interrupts [ 1345.834316] hpet: Lost 2 RTC interrupts 08:20:49 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280), 0x0) 08:20:49 executing program 5: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x80, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x80}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:20:49 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r0, 0x800) write$cgroup_netprio_ifpriomap(r0, &(0x7f00000003c0)={'bond_slave_1'}, 0x9) 08:20:49 executing program 6: creat(&(0x7f0000000040)='./file0\x00', 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0xd8, 0x8, 0x4, 0xa09, 0x3, 0x3, 0x1, 0x2a8, 0x40, 0x1a2, 0x1, 0x100, 0x38, 0x1, 0x0, 0x0, 0x8}, [{0x5, 0xfffffd4b, 0x5, 0x0, 0x9, 0x6}, {0x4, 0xfffffff7, 0x8, 0x80000001, 0x5, 0x385, 0xfff, 0x1}], "37cacaa561", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x5b5) 08:20:49 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, 0x0) readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) 08:20:49 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{0x0}], 0x1) 08:20:49 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) (fail_nth: 3) 08:20:49 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r1, 0x800) write$cgroup_netprio_ifpriomap(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB='bopd_slave_12\x00\x00'], 0xf) r2 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendfile(r2, r1, 0x0, 0x8000) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xa, 0x12, r1, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000440)) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x43) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000080)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB='0\x00']) setsockopt$SO_TIMESTAMPING(r4, 0x1, 0x25, &(0x7f00000000c0)=0x100, 0x4) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x5, 0x0, 0xfffffffffffffe57) execve(&(0x7f0000000100)='./file0\x00', &(0x7f00000002c0)=[&(0x7f0000000140)='\x00', &(0x7f0000000180)='\x00', &(0x7f00000001c0)='\\!\'@#:\x00', &(0x7f0000000200)='\x00', &(0x7f0000000240)='\x00', &(0x7f0000000280)='\\\x00'], &(0x7f0000000400)=[&(0x7f0000000300)='\x00', &(0x7f0000000480)='*-\x1eg\x13s\xea\xe3\x90\xd3lf>', &(0x7f0000000380)='-(#\x00', &(0x7f00000003c0)='\x00']) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x8000, @remote, 0x9}, 0x1c) [ 1360.512575] FAULT_INJECTION: forcing a failure. [ 1360.512575] name failslab, interval 1, probability 0, space 0, times 0 [ 1360.514290] CPU: 1 PID: 8322 Comm: syz-executor.0 Not tainted 5.10.155 #1 [ 1360.515250] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1360.516282] Call Trace: [ 1360.516627] dump_stack+0x107/0x167 [ 1360.517101] should_fail.cold+0x5/0xa [ 1360.517591] ? create_object.isra.0+0x3a/0xa20 [ 1360.518174] should_failslab+0x5/0x20 [ 1360.518982] kmem_cache_alloc+0x5b/0x360 [ 1360.519508] create_object.isra.0+0x3a/0xa20 [ 1360.520072] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1360.522499] __kmalloc_node+0x1ae/0x4b0 [ 1360.526968] kvmalloc_node+0x119/0x170 [ 1360.527471] seq_read_iter+0x81c/0x12b0 [ 1360.527980] ? __might_fault+0xd3/0x180 [ 1360.528496] do_iter_readv_writev+0x57c/0x750 [ 1360.529060] ? new_sync_write+0x660/0x660 [ 1360.529595] ? selinux_file_permission+0x36/0x510 [ 1360.530220] ? lock_acquire+0x197/0x490 [ 1360.530780] do_iter_read+0x28f/0x6d0 [ 1360.531284] ? import_iovec+0x83/0xb0 [ 1360.531784] vfs_readv+0xe5/0x160 [ 1360.532234] ? vfs_iter_read+0xa0/0xa0 [ 1360.532771] ? __fdget_pos+0xed/0x110 [ 1360.533256] ? find_held_lock+0x2c/0x110 [ 1360.533797] ? __fget_files+0x296/0x480 [ 1360.534332] do_readv+0x139/0x300 [ 1360.534801] ? vfs_readv+0x160/0x160 [ 1360.535288] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1360.535957] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1360.538730] do_syscall_64+0x33/0x40 [ 1360.539213] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1360.539868] RIP: 0033:0x7f1c8b7aab19 [ 1360.540350] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1360.542712] RSP: 002b:00007f1c88d20188 EFLAGS: 00000246 ORIG_RAX: 0000000000000013 [ 1360.543692] RAX: ffffffffffffffda RBX: 00007f1c8b8bdf60 RCX: 00007f1c8b7aab19 [ 1360.544599] RDX: 0000000000000001 RSI: 0000000020000280 RDI: 0000000000000003 [ 1360.545499] RBP: 00007f1c88d201d0 R08: 0000000000000000 R09: 0000000000000000 [ 1360.546392] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1360.547327] R13: 00007ffe599dca8f R14: 00007f1c88d20300 R15: 0000000000022000 08:20:49 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{0x0}], 0x1) 08:20:49 executing program 2: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) 08:20:49 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{0x0}], 0x1) 08:20:49 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r0, 0x800) write$cgroup_netprio_ifpriomap(r0, &(0x7f00000003c0)={'bond_slave_1'}, 0xa) 08:20:49 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0xd8, 0x8, 0x4, 0xa09, 0x3, 0x3, 0x1, 0x2a8, 0x40, 0x1a2, 0x1, 0x100, 0x38, 0x1, 0x0, 0x0, 0x8}, [{0x5, 0xfffffd4b, 0x5, 0x0, 0x9, 0x6}, {0x4, 0xfffffff7, 0x8, 0x80000001, 0x5, 0x385, 0xfff, 0x1}], "37cacaa561", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x5b5) 08:20:49 executing program 4: setregid(0xee01, 0x0) r0 = getgid() setregid(0x0, r0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee00, 0xee01}}, './file0\x00'}) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r1) 08:20:49 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) (fail_nth: 4) 08:20:49 executing program 2: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) [ 1360.971723] FAULT_INJECTION: forcing a failure. [ 1360.971723] name failslab, interval 1, probability 0, space 0, times 0 [ 1360.974165] CPU: 1 PID: 8342 Comm: syz-executor.0 Not tainted 5.10.155 #1 [ 1360.975079] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1360.976172] Call Trace: [ 1360.976531] dump_stack+0x107/0x167 [ 1360.977010] should_fail.cold+0x5/0xa [ 1360.977513] ? cgroup_show_path+0xc4/0x5d0 [ 1360.978065] should_failslab+0x5/0x20 [ 1360.978682] kmem_cache_alloc_trace+0x55/0x360 [ 1360.979287] cgroup_show_path+0xc4/0x5d0 [ 1360.979813] ? task_cgroup_path+0x3e0/0x3e0 [ 1360.980377] kernfs_sop_show_path+0x122/0x190 [ 1360.980960] ? kernfs_test_super+0x140/0x140 [ 1360.981527] show_mountinfo+0x23b/0xb80 [ 1360.982035] ? rwlock_bug.part.0+0x90/0x90 [ 1360.982930] ? mounts_release+0x100/0x100 [ 1360.983483] ? do_raw_spin_unlock+0x4f/0x220 [ 1360.984056] ? _raw_spin_unlock+0x1a/0x30 [ 1360.984596] seq_read_iter+0xbf0/0x12b0 [ 1360.985135] do_iter_readv_writev+0x57c/0x750 [ 1360.985722] ? new_sync_write+0x660/0x660 [ 1360.986263] ? selinux_file_permission+0x36/0x510 [ 1360.987097] ? lock_acquire+0x197/0x490 [ 1360.987677] do_iter_read+0x28f/0x6d0 [ 1360.988678] ? import_iovec+0x83/0xb0 [ 1360.989176] vfs_readv+0xe5/0x160 [ 1360.989713] ? vfs_iter_read+0xa0/0xa0 [ 1360.990221] ? __fdget_pos+0xed/0x110 [ 1360.990891] ? find_held_lock+0x2c/0x110 [ 1360.991518] ? __fget_files+0x296/0x480 [ 1360.992065] do_readv+0x139/0x300 [ 1360.992571] ? vfs_readv+0x160/0x160 [ 1360.993063] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1360.993793] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1360.994614] do_syscall_64+0x33/0x40 [ 1360.995096] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1360.995806] RIP: 0033:0x7f1c8b7aab19 [ 1360.996293] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1360.998977] RSP: 002b:00007f1c88d20188 EFLAGS: 00000246 ORIG_RAX: 0000000000000013 [ 1361.000012] RAX: ffffffffffffffda RBX: 00007f1c8b8bdf60 RCX: 00007f1c8b7aab19 [ 1361.000973] RDX: 0000000000000001 RSI: 0000000020000280 RDI: 0000000000000003 [ 1361.002001] RBP: 00007f1c88d201d0 R08: 0000000000000000 R09: 0000000000000000 [ 1361.007966] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1361.008993] R13: 00007ffe599dca8f R14: 00007f1c88d20300 R15: 0000000000022000 [ 1362.670648] hpet: Lost 1 RTC interrupts 08:21:05 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{0x0}], 0x1) 08:21:05 executing program 2: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) 08:21:05 executing program 5: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x80, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x80}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:21:05 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r0, 0x800) write$cgroup_netprio_ifpriomap(r0, &(0x7f00000003c0)={'bond_slave_1'}, 0xb) 08:21:05 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{0x0}], 0x1) 08:21:05 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0xd8, 0x8, 0x4, 0xa09, 0x3, 0x3, 0x1, 0x2a8, 0x40, 0x1a2, 0x1, 0x100, 0x38, 0x1, 0x0, 0x0, 0x8}, [{0x5, 0xfffffd4b, 0x5, 0x0, 0x9, 0x6}, {0x4, 0xfffffff7, 0x8, 0x80000001, 0x5, 0x385, 0xfff, 0x1}], "37cacaa561", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x5b5) 08:21:05 executing program 4: perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_io_uring_setup(0x2a0c, &(0x7f00000000c0)={0x0, 0x1ceb, 0x2, 0x0, 0x3b1, 0x0, r1}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000280), &(0x7f00000002c0)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r4, &(0x7f00000001c0)={&(0x7f0000000400)=@abs={0x0, 0x0, 0x4e20}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x24000085) fcntl$setstatus(r4, 0x4, 0x40000) write$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000003c0)={'bond_slave_1', 0x32, 0x34}, 0xf) r5 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r5, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendfile(r5, 0xffffffffffffffff, 0x0, 0x8000) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1000004, 0x1e012, 0xffffffffffffffff, 0x0) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(0xffffffffffffffff, 0x80083313, &(0x7f0000000180)) dup2(r2, r3) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f0000000300)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="02000000000000002e2f66696c653100dcbd031eb302c6f7262d49cd8aed4d21036e6ac943f9f6cea57a1d945cfeb59a0b9f6ab279ba7b97843483cefa9190be408f3db693cd20782d8db22ddd1ae5993b710abbabef0294ad00b2fd113b8e5167dc766731766a15d744fe4b3ddbc467a342b1b930b13ae34bf1364f269d187a16f5aaf3962a57745c0de7"]) r6 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x50d942, 0x120) openat$nvram(0xffffffffffffff9c, &(0x7f0000000200), 0x121800, 0x0) r7 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xc0641, 0x0) copy_file_range(r7, 0x0, r6, 0x0, 0x10001, 0x0) 08:21:05 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) (fail_nth: 5) [ 1376.735140] FAULT_INJECTION: forcing a failure. [ 1376.735140] name failslab, interval 1, probability 0, space 0, times 0 [ 1376.737767] CPU: 0 PID: 8363 Comm: syz-executor.0 Not tainted 5.10.155 #1 [ 1376.738719] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1376.740084] Call Trace: [ 1376.740507] dump_stack+0x107/0x167 [ 1376.740991] should_fail.cold+0x5/0xa [ 1376.741552] ? create_object.isra.0+0x3a/0xa20 [ 1376.742153] should_failslab+0x5/0x20 [ 1376.742720] kmem_cache_alloc+0x5b/0x360 [ 1376.743268] create_object.isra.0+0x3a/0xa20 [ 1376.743896] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1376.744656] kmem_cache_alloc_trace+0x151/0x360 [ 1376.745275] cgroup_show_path+0xc4/0x5d0 [ 1376.745873] ? task_cgroup_path+0x3e0/0x3e0 [ 1376.746497] kernfs_sop_show_path+0x122/0x190 [ 1376.747115] ? kernfs_test_super+0x140/0x140 [ 1376.747742] show_mountinfo+0x23b/0xb80 [ 1376.748273] ? rwlock_bug.part.0+0x90/0x90 [ 1376.748889] ? mounts_release+0x100/0x100 [ 1376.749520] ? do_raw_spin_unlock+0x4f/0x220 [ 1376.750099] ? _raw_spin_unlock+0x1a/0x30 [ 1376.750721] seq_read_iter+0xbf0/0x12b0 [ 1376.751276] do_iter_readv_writev+0x57c/0x750 [ 1376.751925] ? new_sync_write+0x660/0x660 [ 1376.752526] ? selinux_file_permission+0x36/0x510 [ 1376.753164] ? lock_acquire+0x197/0x490 [ 1376.753756] do_iter_read+0x28f/0x6d0 [ 1376.754277] ? import_iovec+0x83/0xb0 [ 1376.754905] vfs_readv+0xe5/0x160 [ 1376.755370] ? vfs_iter_read+0xa0/0xa0 [ 1376.755941] ? __fdget_pos+0xed/0x110 [ 1376.756495] ? find_held_lock+0x2c/0x110 [ 1376.757048] ? __fget_files+0x296/0x480 [ 1376.757654] do_readv+0x139/0x300 [ 1376.758118] ? vfs_readv+0x160/0x160 [ 1376.758690] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1376.759386] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1376.760136] do_syscall_64+0x33/0x40 [ 1376.760686] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1376.761396] RIP: 0033:0x7f1c8b7aab19 [ 1376.761949] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1376.764549] RSP: 002b:00007f1c88d20188 EFLAGS: 00000246 ORIG_RAX: 0000000000000013 [ 1376.765589] RAX: ffffffffffffffda RBX: 00007f1c8b8bdf60 RCX: 00007f1c8b7aab19 [ 1376.766559] RDX: 0000000000000001 RSI: 0000000020000280 RDI: 0000000000000003 [ 1376.767563] RBP: 00007f1c88d201d0 R08: 0000000000000000 R09: 0000000000000000 [ 1376.768567] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1376.769581] R13: 00007ffe599dca8f R14: 00007f1c88d20300 R15: 0000000000022000 [ 1376.770764] hpet: Lost 1 RTC interrupts 08:21:05 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, 0x0, 0x0) 08:21:05 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{0x0}], 0x1) 08:21:05 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) (fail_nth: 6) 08:21:05 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r0, 0x800) write$cgroup_netprio_ifpriomap(r0, &(0x7f00000003c0)={'bond_slave_1'}, 0xc) 08:21:05 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0xd8, 0x8, 0x4, 0xa09, 0x3, 0x3, 0x1, 0x2a8, 0x40, 0x1a2, 0x1, 0x100, 0x38, 0x1, 0x0, 0x0, 0x8}, [{0x5, 0xfffffd4b, 0x5, 0x0, 0x9, 0x6}, {0x4, 0xfffffff7, 0x8, 0x80000001, 0x5, 0x385, 0xfff, 0x1}], "37cacaa561", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x5b5) 08:21:05 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) (fail_nth: 1) [ 1377.141147] FAULT_INJECTION: forcing a failure. [ 1377.141147] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1377.142643] CPU: 0 PID: 8379 Comm: syz-executor.3 Not tainted 5.10.155 #1 [ 1377.143533] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1377.144544] Call Trace: [ 1377.144886] dump_stack+0x107/0x167 [ 1377.145348] should_fail.cold+0x5/0xa [ 1377.145842] _copy_from_user+0x2e/0x1b0 [ 1377.146377] iovec_from_user+0x141/0x400 [ 1377.146924] ? lock_acquire+0x197/0x490 [ 1377.147435] __import_iovec+0x67/0x590 [ 1377.147932] ? lock_release+0x6b0/0x6b0 [ 1377.148448] import_iovec+0x83/0xb0 [ 1377.148922] vfs_readv+0xbb/0x160 [ 1377.149355] ? vfs_iter_read+0xa0/0xa0 [ 1377.149851] ? __fdget_pos+0xed/0x110 [ 1377.150325] ? find_held_lock+0x2c/0x110 [ 1377.150879] ? mutex_lock_io_nested+0x1110/0x1110 [ 1377.151506] ? __fget_files+0x296/0x480 [ 1377.152034] do_readv+0x139/0x300 [ 1377.152484] ? vfs_readv+0x160/0x160 [ 1377.152953] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1377.153632] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1377.154285] do_syscall_64+0x33/0x40 [ 1377.154793] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1377.155453] RIP: 0033:0x7fc80987cb19 [ 1377.155929] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1377.158214] RSP: 002b:00007fc806df2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000013 [ 1377.159226] RAX: ffffffffffffffda RBX: 00007fc80998ff60 RCX: 00007fc80987cb19 [ 1377.160123] RDX: 0000000000000001 RSI: 0000000020000280 RDI: 0000000000000003 [ 1377.161018] RBP: 00007fc806df21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1377.161914] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1377.162830] R13: 00007ffd739614af R14: 00007fc806df2300 R15: 0000000000022000 [ 1377.163970] hpet: Lost 1 RTC interrupts [ 1377.215094] FAULT_INJECTION: forcing a failure. [ 1377.215094] name failslab, interval 1, probability 0, space 0, times 0 [ 1377.216596] CPU: 1 PID: 8393 Comm: syz-executor.0 Not tainted 5.10.155 #1 [ 1377.217446] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1377.218494] Call Trace: [ 1377.218875] dump_stack+0x107/0x167 [ 1377.219353] should_fail.cold+0x5/0xa [ 1377.219861] ? cgroup_show_path+0xc4/0x5d0 [ 1377.220408] should_failslab+0x5/0x20 [ 1377.220911] kmem_cache_alloc_trace+0x55/0x360 [ 1377.221495] cgroup_show_path+0xc4/0x5d0 [ 1377.222022] ? task_cgroup_path+0x3e0/0x3e0 [ 1377.222573] kernfs_sop_show_path+0x122/0x190 [ 1377.223181] ? kernfs_test_super+0x140/0x140 [ 1377.223738] show_mountinfo+0x23b/0xb80 [ 1377.224256] ? rwlock_bug.part.0+0x90/0x90 [ 1377.224796] ? mounts_release+0x100/0x100 [ 1377.225340] ? do_raw_spin_unlock+0x4f/0x220 [ 1377.225898] ? _raw_spin_unlock+0x1a/0x30 [ 1377.226451] seq_read_iter+0xbf0/0x12b0 [ 1377.227031] do_iter_readv_writev+0x57c/0x750 [ 1377.227663] ? new_sync_write+0x660/0x660 [ 1377.228087] ? selinux_file_permission+0x36/0x510 [ 1377.228780] ? lock_acquire+0x197/0x490 [ 1377.229296] do_iter_read+0x28f/0x6d0 [ 1377.229801] ? import_iovec+0x83/0xb0 [ 1377.230294] vfs_readv+0xe5/0x160 [ 1377.230764] ? vfs_iter_read+0xa0/0xa0 [ 1377.231262] ? __fdget_pos+0xed/0x110 [ 1377.231758] ? find_held_lock+0x2c/0x110 [ 1377.232291] ? __fget_files+0x296/0x480 [ 1377.232827] do_readv+0x139/0x300 [ 1377.233278] ? vfs_readv+0x160/0x160 [ 1377.233766] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1377.234432] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1377.235791] do_syscall_64+0x33/0x40 [ 1377.236680] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1377.237874] RIP: 0033:0x7f1c8b7aab19 [ 1377.238803] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1377.243011] RSP: 002b:00007f1c88d20188 EFLAGS: 00000246 ORIG_RAX: 0000000000000013 [ 1377.243992] RAX: ffffffffffffffda RBX: 00007f1c8b8bdf60 RCX: 00007f1c8b7aab19 [ 1377.244929] RDX: 0000000000000001 RSI: 0000000020000280 RDI: 0000000000000003 [ 1377.245842] RBP: 00007f1c88d201d0 R08: 0000000000000000 R09: 0000000000000000 [ 1377.246780] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1377.247717] R13: 00007ffe599dca8f R14: 00007f1c88d20300 R15: 0000000000022000 08:21:06 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0xd8, 0x8, 0x4, 0xa09, 0x3, 0x3, 0x1, 0x2a8, 0x40, 0x1a2, 0x1, 0x100, 0x38, 0x1, 0x0, 0x0, 0x8}, [{0x5, 0xfffffd4b, 0x5, 0x0, 0x9, 0x6}, {0x4, 0xfffffff7, 0x8, 0x80000001, 0x5, 0x385, 0xfff, 0x1}], "37cacaa561", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x5b5) 08:21:06 executing program 4: sendmsg$NFQNL_MSG_VERDICT(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000240)={&(0x7f0000000040)={0x1fc, 0x1, 0x3, 0x5, 0x0, 0x0, {0xc, 0x0, 0x7}, [@NFQA_CT={0x80, 0xb, 0x0, 0x1, [@CTA_SEQ_ADJ_REPLY={0x24, 0x10, 0x0, 0x1, [@CTA_SEQADJ_OFFSET_AFTER={0x8, 0x3, 0x1, 0x0, 0x401}, @CTA_SEQADJ_CORRECTION_POS={0x8, 0x1, 0x1, 0x0, 0x7}, @CTA_SEQADJ_OFFSET_AFTER={0x8, 0x3, 0x1, 0x0, 0x4}, @CTA_SEQADJ_OFFSET_AFTER={0x8, 0x3, 0x1, 0x0, 0x2}]}, @CTA_SEQ_ADJ_ORIG={0x34, 0xf, 0x0, 0x1, [@CTA_SEQADJ_OFFSET_AFTER={0x8, 0x3, 0x1, 0x0, 0x8001}, @CTA_SEQADJ_CORRECTION_POS={0x8, 0x1, 0x1, 0x0, 0x401}, @CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0x854c}, @CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0x81}, @CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0xffff8000}, @CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0x5}]}, @CTA_HELP={0xc, 0x5, 0x0, 0x1, {0x5, 0x1, '\x00'}}, @CTA_LABELS_MASK={0x18, 0x17, [0x1f, 0x6, 0x0, 0xb1, 0x935]}]}, @NFQA_CT={0x6c, 0xb, 0x0, 0x1, [@CTA_SEQ_ADJ_REPLY={0xc, 0x10, 0x0, 0x1, [@CTA_SEQADJ_OFFSET_AFTER={0x8, 0x3, 0x1, 0x0, 0x5}]}, @CTA_ZONE={0x6, 0x12, 0x1, 0x0, 0x1}, @CTA_NAT_SRC={0x20, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MINIP={0x8, 0x1, @multicast1}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast2}]}, @CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0x1}, @CTA_ZONE={0x6, 0x12, 0x1, 0x0, 0x3}, @CTA_HELP={0x14, 0x5, 0x0, 0x1, {0xe, 0x1, 'irc-20000\x00'}}, @CTA_HELP={0x10, 0x5, 0x0, 0x1, {0x9, 0x1, 'syz0\x00'}}]}, @NFQA_PAYLOAD={0xfb, 0xa, "a4928b87624874bd4d8f69db6ce02903178b40d62789de012d00aae1435f2e32b4813360a1b202f54e50c9cfe7a39c2ec8a28dc26936fb3be02fc42eae55191c32cb945d1c5c94562710d2834df275ce3d74f8a673aa0ed3ad9ba3021ee472763e51518e580eff261dd24b76c7039bd86a67e03a495b2f58a28c44502ff3627b46950a2924cccd8ec2410edcad164b027286cdc446118645d8065450dacf4787c9ca88c7773f4eb10c82fa17bd771a7e9a0971fb80cb7e5c2593980aa4e52eb495e42e76fffe325b0c508b90378e78bb6d1265256cebb1661d6ed5e808bcf15507fdfb3af62ed0466dc0dc2f8d2786b98d9ce716855bc4"}]}, 0x1fc}, 0x1, 0x0, 0x0, 0x48000}, 0x20000000) sendmsg$SMC_PNETID_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0xa0, 0x0, 0x100, 0x70bd28, 0x25dfdbfd, {}, [@SMC_PNETID_ETHNAME={0x14, 0x2, 'veth0_macvtap\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'veth0_to_bridge\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'team0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'wg1\x00'}]}, 0xa0}, 0x1, 0x0, 0x0, 0x20040010}, 0x40000) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_REKEY_OFFLOAD(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x58, 0x0, 0x20, 0x70bd2c, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r0}, @void}}, [@NL80211_ATTR_REKEY_DATA={0x3c, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_KEK={0x24, 0x1, @kek_ext="aaa0bd6514366051999371818f390d6ff46cec06584bebba17525018060cbd0c"}, @NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="56be9e0843200eb4a63a4c3ff69f0d83"}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x4800}, 0x4000810) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000006c0)={'ip_vti0\x00', &(0x7f0000000600)={'gre0\x00', 0x0, 0x0, 0x80, 0xfff, 0x8000, {{0x24, 0x4, 0x1, 0x9, 0x90, 0x68, 0x0, 0x20, 0x4, 0x0, @local, @private=0xa010102, {[@rr={0x7, 0x17, 0x30, [@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, @empty, @dev={0xac, 0x14, 0x14, 0x9d}, @broadcast]}, @timestamp={0x44, 0x20, 0xd, 0x0, 0x6, [0x7, 0x2, 0x6, 0x3, 0xffff, 0xdc, 0x7]}, @generic={0x93, 0x3, '='}, @noop, @timestamp_prespec={0x44, 0x2c, 0xb4, 0x3, 0x3, [{@rand_addr=0x64010102, 0x3}, {@rand_addr=0x64010100, 0x5}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0xfffffffa}, {@local, 0x7ff}, {@local, 0x6}]}, @timestamp={0x44, 0x10, 0xcf, 0x0, 0x4, [0x7, 0x8, 0x5]}, @noop, @generic={0x3494840c29524c69, 0x3, "c4"}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000940)={'wg2\x00', 0x0}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000980)={{{@in6=@dev, @in6=@ipv4={""/10, ""/2, @loopback}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private1}, 0x0, @in6=@mcast2}}, &(0x7f0000000a80)=0xe8) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000c80)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x10040020}, 0xc, &(0x7f0000000c40)={&(0x7f0000000ac0)={0x148, 0x0, 0x100, 0x70bd26, 0x0, {}, [@HEADER={0x68, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vxcan1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}]}, 0x148}, 0x1, 0x0, 0x0, 0x80}, 0x10) sendmsg$NFT_MSG_GETGEN(0xffffffffffffffff, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000d40)={&(0x7f0000000d00)={0x14, 0x10, 0xa, 0x101, 0x0, 0x0, {0x1, 0x0, 0xa}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4840}, 0x840) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f0000000e80)={&(0x7f0000000dc0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000e40)={&(0x7f0000000e00)={0x3c, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'team0\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x2}]}, 0x3c}, 0x1, 0x0, 0x0, 0x11}, 0xc000) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000f80)={&(0x7f0000000ec0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000f40)={&(0x7f0000000f00)={0x14, 0x0, 0x100, 0x70bd2c, 0x25dfdbfd, {{}, {@void, @void, @void}}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x20008804}, 0x840) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000fc0)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) r5 = syz_genetlink_get_family_id$devlink(&(0x7f0000001040), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_POOL_SET(r4, &(0x7f0000001140)={&(0x7f0000001000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000001100)={&(0x7f0000001080)={0x50, r5, 0x2, 0x70bd2b, 0x25dfdbfd, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x8}, {0x6, 0x11, 0x3ff}, {0x8, 0x13, 0x61}, {0x5, 0x14, 0x1}}]}, 0x50}, 0x1, 0x0, 0x0, 0x24000000}, 0x20004000) sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f00000013c0)={&(0x7f0000001180)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001380)={&(0x7f00000011c0)={0x18c, 0x0, 0x300, 0x70bd2d, 0x25dfdbfb, {}, [{{0x8, 0x1, r1}, {0x170, 0x2, 0x0, 0x1, [{0x40, 0x1, @name={{0x24}, {0x5}, {0xf, 0x4, 'roundrobin\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r2}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x598}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r1}}}]}}]}, 0x18c}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000001400)={'team0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000001480)={'tunl0\x00', &(0x7f0000001440)={'tunl0\x00', r6, 0x40, 0x20, 0x2, 0x2, {{0x6, 0x4, 0x3, 0x32, 0x18, 0x68, 0x0, 0xf8, 0x4, 0x0, @remote, @multicast2, {[@noop, @end, @end, @noop]}}}}}) r7 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000001500), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000001540)={'wpan1\x00', 0x0}) sendmsg$IEEE802154_LLSEC_ADD_SECLEVEL(0xffffffffffffffff, &(0x7f0000001640)={&(0x7f00000014c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001600)={&(0x7f00000015c0)={0x40, r7, 0x4, 0x70bd2d, 0x25dfdbfc, {}, [@IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r8}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_LLSEC_FRAME_TYPE={0x5, 0x33, 0x62}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan4\x00'}, @IEEE802154_ATTR_LLSEC_CMD_FRAME_ID={0x5, 0x34, 0x40}]}, 0x40}, 0x1, 0x0, 0x0, 0x800}, 0x20000081) 08:21:06 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, 0x0, 0x0) 08:21:06 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) (fail_nth: 2) 08:21:06 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r0, 0x800) write$cgroup_netprio_ifpriomap(r0, &(0x7f00000003c0)={'bond_slave_1'}, 0xd) 08:21:06 executing program 5: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x80, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x80}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) [ 1377.483584] FAULT_INJECTION: forcing a failure. [ 1377.483584] name failslab, interval 1, probability 0, space 0, times 0 [ 1377.485248] CPU: 1 PID: 8405 Comm: syz-executor.3 Not tainted 5.10.155 #1 [ 1377.486315] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1377.487434] Call Trace: [ 1377.487782] dump_stack+0x107/0x167 [ 1377.488255] should_fail.cold+0x5/0xa [ 1377.488747] ? kvmalloc_node+0x119/0x170 [ 1377.489268] should_failslab+0x5/0x20 [ 1377.489892] __kmalloc_node+0x76/0x4b0 [ 1377.490397] kvmalloc_node+0x119/0x170 [ 1377.490915] seq_read_iter+0x81c/0x12b0 [ 1377.491392] ? __might_fault+0xd3/0x180 [ 1377.491919] do_iter_readv_writev+0x57c/0x750 [ 1377.492498] ? new_sync_write+0x660/0x660 [ 1377.493035] ? selinux_file_permission+0x36/0x510 [ 1377.493662] ? lock_acquire+0x197/0x490 [ 1377.494182] do_iter_read+0x28f/0x6d0 [ 1377.494705] ? import_iovec+0x83/0xb0 [ 1377.495207] vfs_readv+0xe5/0x160 [ 1377.495686] ? vfs_iter_read+0xa0/0xa0 [ 1377.496182] ? __fdget_pos+0xed/0x110 [ 1377.496715] ? find_held_lock+0x2c/0x110 [ 1377.497250] ? __fget_files+0x296/0x480 [ 1377.497782] do_readv+0x139/0x300 [ 1377.498232] ? vfs_readv+0x160/0x160 [ 1377.498725] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1377.499402] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1377.500066] do_syscall_64+0x33/0x40 [ 1377.500546] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1377.501204] RIP: 0033:0x7fc80987cb19 [ 1377.501686] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1377.504022] RSP: 002b:00007fc806df2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000013 [ 1377.504969] RAX: ffffffffffffffda RBX: 00007fc80998ff60 RCX: 00007fc80987cb19 [ 1377.505967] RDX: 0000000000000001 RSI: 0000000020000280 RDI: 0000000000000003 [ 1377.506896] RBP: 00007fc806df21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1377.507803] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1377.508707] R13: 00007ffd739614af R14: 00007fc806df2300 R15: 0000000000022000 [ 1380.202884] hpet: Lost 2 RTC interrupts 08:21:22 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) (fail_nth: 7) 08:21:22 executing program 5: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:21:22 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) (fail_nth: 3) 08:21:22 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) (fail_nth: 1) 08:21:22 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, 0x0, 0x0) 08:21:22 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0xd8, 0x8, 0x4, 0xa09, 0x3, 0x3, 0x1, 0x2a8, 0x40, 0x1a2, 0x1, 0x100, 0x38, 0x1, 0x0, 0x0, 0x8}, [{0x5, 0xfffffd4b, 0x5, 0x0, 0x9, 0x6}, {0x4, 0xfffffff7, 0x8, 0x80000001, 0x5, 0x385, 0xfff, 0x1}], "37cacaa561", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x5b5) 08:21:22 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r0, 0x800) write$cgroup_netprio_ifpriomap(r0, &(0x7f00000003c0)={'bond_slave_1'}, 0xe) 08:21:22 executing program 4: r0 = open(&(0x7f0000000040)='./file0\x00', 0x1a18c1, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000440)=[{&(0x7f0000000080)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000d5f4655fd6f4655f0100ffff53ef010001000000d5f4655f000000000000000001005df35c9bb4b8e9940000000000000b00000000019ad74a4a26985c31416fe43469e9205a5e392e646893faef6c57451141f8", 0x80, 0x400}, {&(0x7f0000000180)="020000000300000004", 0x9, 0x804}, {&(0x7f00000001c0)="ed41000000080000d5f4655fd5f4655fd5f4655f000000000000040004802fed6f6433c082711c5bcc84afba85823b87f0095e2b760812d2aac488cb1f9f8958c3a67d6edcc62861bea4801e25f7f776b021f13a66f869b6c82a26767d301916d29bfb5d09aeeb8ee5440751c8ecc74297eba817afd1fd13b58686ab73a67806bbf4c9759f17aef2c233e3fa65ddad16c00ac3a9aa6ad6bb33b3727a5d93", 0x9e, 0x2100}], 0x800, &(0x7f0000000140)=ANY=[@ANYRES64=r0]) [ 1393.683072] FAULT_INJECTION: forcing a failure. [ 1393.683072] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1393.685668] CPU: 1 PID: 8429 Comm: syz-executor.7 Not tainted 5.10.155 #1 [ 1393.686518] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1393.691726] Call Trace: [ 1393.692074] dump_stack+0x107/0x167 [ 1393.692541] should_fail.cold+0x5/0xa [ 1393.693027] _copy_from_user+0x2e/0x1b0 [ 1393.699425] iovec_from_user+0x141/0x400 [ 1393.699944] ? lock_acquire+0x197/0x490 [ 1393.700488] __import_iovec+0x67/0x590 [ 1393.700976] ? lock_release+0x6b0/0x6b0 [ 1393.701531] import_iovec+0x83/0xb0 [ 1393.702001] vfs_readv+0xbb/0x160 [ 1393.702442] ? vfs_iter_read+0xa0/0xa0 [ 1393.702955] ? __fdget_pos+0xed/0x110 [ 1393.703432] ? find_held_lock+0x2c/0x110 [ 1393.703955] ? mutex_lock_io_nested+0x1110/0x1110 [ 1393.704585] ? __fget_files+0x296/0x480 [ 1393.705127] do_readv+0x139/0x300 [ 1393.705591] ? vfs_readv+0x160/0x160 [ 1393.706086] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1393.706763] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1393.707453] do_syscall_64+0x33/0x40 [ 1393.707928] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1393.708571] RIP: 0033:0x7fc5b62b8b19 [ 1393.715380] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1393.717717] RSP: 002b:00007fc5b382e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000013 [ 1393.718688] RAX: ffffffffffffffda RBX: 00007fc5b63cbf60 RCX: 00007fc5b62b8b19 [ 1393.719641] RDX: 0000000000000001 RSI: 0000000020000280 RDI: 0000000000000003 [ 1393.720590] RBP: 00007fc5b382e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1393.721490] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1393.722396] R13: 00007fffa936dbcf R14: 00007fc5b382e300 R15: 0000000000022000 [ 1393.734275] FAULT_INJECTION: forcing a failure. [ 1393.734275] name failslab, interval 1, probability 0, space 0, times 0 [ 1393.735728] CPU: 0 PID: 8432 Comm: syz-executor.3 Not tainted 5.10.155 #1 [ 1393.736581] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1393.737614] Call Trace: [ 1393.737956] dump_stack+0x107/0x167 [ 1393.738419] should_fail.cold+0x5/0xa [ 1393.738923] ? create_object.isra.0+0x3a/0xa20 [ 1393.739516] should_failslab+0x5/0x20 [ 1393.740051] kmem_cache_alloc+0x5b/0x360 [ 1393.740590] create_object.isra.0+0x3a/0xa20 [ 1393.741167] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1393.741836] __kmalloc_node+0x1ae/0x4b0 [ 1393.742382] kvmalloc_node+0x119/0x170 [ 1393.742933] seq_read_iter+0x81c/0x12b0 [ 1393.743432] ? __might_fault+0xd3/0x180 [ 1393.743957] do_iter_readv_writev+0x57c/0x750 [ 1393.744509] ? new_sync_write+0x660/0x660 [ 1393.745017] ? selinux_file_permission+0x36/0x510 [ 1393.745625] ? lock_acquire+0x197/0x490 [ 1393.746145] do_iter_read+0x28f/0x6d0 [ 1393.746643] ? import_iovec+0x83/0xb0 [ 1393.747158] vfs_readv+0xe5/0x160 [ 1393.747605] ? vfs_iter_read+0xa0/0xa0 [ 1393.748100] ? __fdget_pos+0xed/0x110 [ 1393.748588] ? find_held_lock+0x2c/0x110 [ 1393.749123] ? __fget_files+0x296/0x480 [ 1393.749654] do_readv+0x139/0x300 [ 1393.750102] ? vfs_readv+0x160/0x160 [ 1393.750582] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1393.750648] FAULT_INJECTION: forcing a failure. [ 1393.750648] name failslab, interval 1, probability 0, space 0, times 0 [ 1393.751252] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1393.751290] do_syscall_64+0x33/0x40 [ 1393.753785] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1393.754438] RIP: 0033:0x7fc80987cb19 [ 1393.754929] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1393.757204] RSP: 002b:00007fc806df2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000013 [ 1393.758162] RAX: ffffffffffffffda RBX: 00007fc80998ff60 RCX: 00007fc80987cb19 [ 1393.759079] RDX: 0000000000000001 RSI: 0000000020000280 RDI: 0000000000000003 [ 1393.759981] RBP: 00007fc806df21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1393.760879] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1393.761783] R13: 00007ffd739614af R14: 00007fc806df2300 R15: 0000000000022000 [ 1393.762715] CPU: 1 PID: 8431 Comm: syz-executor.0 Not tainted 5.10.155 #1 [ 1393.762843] hpet: Lost 1 RTC interrupts [ 1393.775509] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1393.783820] Call Trace: [ 1393.784175] dump_stack+0x107/0x167 [ 1393.784648] should_fail.cold+0x5/0xa [ 1393.785144] ? create_object.isra.0+0x3a/0xa20 [ 1393.785734] should_failslab+0x5/0x20 [ 1393.786223] kmem_cache_alloc+0x5b/0x360 [ 1393.786752] create_object.isra.0+0x3a/0xa20 [ 1393.787509] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1393.791442] kmem_cache_alloc_trace+0x151/0x360 [ 1393.792061] cgroup_show_path+0xc4/0x5d0 [ 1393.792595] ? task_cgroup_path+0x3e0/0x3e0 [ 1393.793156] kernfs_sop_show_path+0x122/0x190 [ 1393.793730] ? kernfs_test_super+0x140/0x140 [ 1393.794297] show_mountinfo+0x23b/0xb80 [ 1393.794818] ? rwlock_bug.part.0+0x90/0x90 [ 1393.795389] ? mounts_release+0x100/0x100 [ 1393.795923] ? do_raw_spin_unlock+0x4f/0x220 [ 1393.796489] ? _raw_spin_unlock+0x1a/0x30 [ 1393.797027] seq_read_iter+0xbf0/0x12b0 [ 1393.797562] do_iter_readv_writev+0x57c/0x750 [ 1393.798132] ? new_sync_write+0x660/0x660 [ 1393.798666] ? selinux_file_permission+0x36/0x510 [ 1393.799322] ? lock_acquire+0x197/0x490 [ 1393.799840] do_iter_read+0x28f/0x6d0 [ 1393.800363] ? import_iovec+0x83/0xb0 [ 1393.800845] vfs_readv+0xe5/0x160 [ 1393.801304] ? vfs_iter_read+0xa0/0xa0 [ 1393.801834] ? __fdget_pos+0xed/0x110 [ 1393.802318] ? find_held_lock+0x2c/0x110 [ 1393.802913] ? __fget_files+0x296/0x480 [ 1393.815373] do_readv+0x139/0x300 [ 1393.815826] ? vfs_readv+0x160/0x160 [ 1393.816309] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1393.816975] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1393.817627] do_syscall_64+0x33/0x40 [ 1393.818106] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1393.818752] RIP: 0033:0x7f1c8b7aab19 [ 1393.827289] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1393.829565] RSP: 002b:00007f1c88d20188 EFLAGS: 00000246 ORIG_RAX: 0000000000000013 [ 1393.830524] RAX: ffffffffffffffda RBX: 00007f1c8b8bdf60 RCX: 00007f1c8b7aab19 [ 1393.831447] RDX: 0000000000000001 RSI: 0000000020000280 RDI: 0000000000000003 [ 1393.832342] RBP: 00007f1c88d201d0 R08: 0000000000000000 R09: 0000000000000000 [ 1393.833229] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1393.834125] R13: 00007ffe599dca8f R14: 00007f1c88d20300 R15: 0000000000022000 08:21:22 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) (fail_nth: 2) [ 1393.851107] hpet: Lost 1 RTC interrupts [ 1393.933542] EXT4-fs (loop4): unsupported inode size: 0 [ 1393.934288] EXT4-fs (loop4): blocksize: 2048 08:21:22 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280), 0x0) 08:21:22 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0xd8, 0x8, 0x4, 0xa09, 0x3, 0x3, 0x1, 0x2a8, 0x40, 0x1a2, 0x1, 0x100, 0x38, 0x1, 0x0, 0x0, 0x8}, [{0x5, 0xfffffd4b, 0x5, 0x0, 0x9, 0x6}, {0x4, 0xfffffff7, 0x8, 0x80000001, 0x5, 0x385, 0xfff, 0x1}], "37cacaa561", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x5b5) 08:21:22 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) (fail_nth: 8) [ 1394.302960] hpet: Lost 1 RTC interrupts [ 1394.389772] FAULT_INJECTION: forcing a failure. [ 1394.389772] name failslab, interval 1, probability 0, space 0, times 0 [ 1394.391286] CPU: 1 PID: 8438 Comm: syz-executor.7 Not tainted 5.10.155 #1 [ 1394.392142] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1394.393170] Call Trace: [ 1394.393503] dump_stack+0x107/0x167 [ 1394.393949] should_fail.cold+0x5/0xa [ 1394.394427] ? kvmalloc_node+0x119/0x170 [ 1394.394966] should_failslab+0x5/0x20 [ 1394.395466] __kmalloc_node+0x76/0x4b0 [ 1394.395978] kvmalloc_node+0x119/0x170 [ 1394.403273] seq_read_iter+0x81c/0x12b0 [ 1394.403791] ? __might_fault+0xd3/0x180 [ 1394.404320] do_iter_readv_writev+0x57c/0x750 [ 1394.404895] ? new_sync_write+0x660/0x660 [ 1394.405424] ? selinux_file_permission+0x36/0x510 [ 1394.406052] ? lock_acquire+0x197/0x490 [ 1394.406570] do_iter_read+0x28f/0x6d0 [ 1394.407117] ? import_iovec+0x83/0xb0 [ 1394.407613] vfs_readv+0xe5/0x160 [ 1394.408060] ? vfs_iter_read+0xa0/0xa0 [ 1394.408565] ? __fdget_pos+0xed/0x110 [ 1394.409051] ? find_held_lock+0x2c/0x110 [ 1394.409582] ? __fget_files+0x296/0x480 [ 1394.410115] do_readv+0x139/0x300 [ 1394.410563] ? vfs_readv+0x160/0x160 [ 1394.411075] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1394.411754] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1394.415560] do_syscall_64+0x33/0x40 [ 1394.416037] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1394.416690] RIP: 0033:0x7fc5b62b8b19 [ 1394.417166] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1394.419489] RSP: 002b:00007fc5b382e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000013 [ 1394.420446] RAX: ffffffffffffffda RBX: 00007fc5b63cbf60 RCX: 00007fc5b62b8b19 [ 1394.421349] RDX: 0000000000000001 RSI: 0000000020000280 RDI: 0000000000000003 [ 1394.422247] RBP: 00007fc5b382e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1394.423173] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1394.424073] R13: 00007fffa936dbcf R14: 00007fc5b382e300 R15: 0000000000022000 [ 1394.485103] FAULT_INJECTION: forcing a failure. [ 1394.485103] name failslab, interval 1, probability 0, space 0, times 0 [ 1394.486646] CPU: 1 PID: 8443 Comm: syz-executor.0 Not tainted 5.10.155 #1 [ 1394.487541] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1394.488582] Call Trace: [ 1394.488931] dump_stack+0x107/0x167 [ 1394.499119] should_fail.cold+0x5/0xa [ 1394.499618] ? cgroup_show_path+0xc4/0x5d0 [ 1394.500160] should_failslab+0x5/0x20 [ 1394.500657] kmem_cache_alloc_trace+0x55/0x360 [ 1394.501250] cgroup_show_path+0xc4/0x5d0 [ 1394.501774] ? task_cgroup_path+0x3e0/0x3e0 [ 1394.502328] kernfs_sop_show_path+0x122/0x190 [ 1394.502915] ? kernfs_test_super+0x140/0x140 [ 1394.503484] show_mountinfo+0x23b/0xb80 [ 1394.504002] ? rwlock_bug.part.0+0x90/0x90 [ 1394.504549] ? mounts_release+0x100/0x100 [ 1394.505080] ? do_raw_spin_unlock+0x4f/0x220 [ 1394.505649] ? _raw_spin_unlock+0x1a/0x30 [ 1394.506186] seq_read_iter+0xbf0/0x12b0 [ 1394.506722] do_iter_readv_writev+0x57c/0x750 [ 1394.511341] ? new_sync_write+0x660/0x660 [ 1394.511874] ? selinux_file_permission+0x36/0x510 [ 1394.512499] ? lock_acquire+0x197/0x490 [ 1394.519025] do_iter_read+0x28f/0x6d0 [ 1394.519530] ? import_iovec+0x83/0xb0 [ 1394.520026] vfs_readv+0xe5/0x160 [ 1394.520474] ? vfs_iter_read+0xa0/0xa0 [ 1394.520984] ? __fdget_pos+0xed/0x110 [ 1394.521480] ? find_held_lock+0x2c/0x110 [ 1394.522018] ? __fget_files+0x296/0x480 [ 1394.522553] do_readv+0x139/0x300 [ 1394.527038] ? vfs_readv+0x160/0x160 [ 1394.527523] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1394.528197] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1394.528861] do_syscall_64+0x33/0x40 [ 1394.529346] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1394.530006] RIP: 0033:0x7f1c8b7aab19 [ 1394.530485] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1394.538976] RSP: 002b:00007f1c88d20188 EFLAGS: 00000246 ORIG_RAX: 0000000000000013 [ 1394.543745] RAX: ffffffffffffffda RBX: 00007f1c8b8bdf60 RCX: 00007f1c8b7aab19 [ 1394.544648] RDX: 0000000000000001 RSI: 0000000020000280 RDI: 0000000000000003 [ 1394.545544] RBP: 00007f1c88d201d0 R08: 0000000000000000 R09: 0000000000000000 [ 1394.546454] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1394.551377] R13: 00007ffe599dca8f R14: 00007f1c88d20300 R15: 0000000000022000 [ 1397.695065] hpet: Lost 1 RTC interrupts [ 1399.947167] hpet: Lost 3 RTC interrupts 08:21:38 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r0, 0x800) write$cgroup_netprio_ifpriomap(r0, &(0x7f00000003c0)={'bond_slave_1'}, 0x10) 08:21:38 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) (fail_nth: 9) 08:21:38 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280), 0x0) 08:21:38 executing program 5: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:21:38 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$DCCPDIAG_GETSOCK(r1, &(0x7f0000001700)={0x0, 0x0, &(0x7f00000018c0)={&(0x7f0000002dc0)={0x4c, 0x11, 0x100, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {0x0, 0x0, [], [], 0x0, [0x0, 0xfffffffd]}}}, 0x4c}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, 0x0, 0x2000000200f5ef, 0x0) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000000)) 08:21:38 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) (fail_nth: 4) 08:21:38 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) (fail_nth: 3) 08:21:38 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0xd8, 0x8, 0x4, 0xa09, 0x3, 0x3, 0x1, 0x2a8, 0x40, 0x1a2, 0x1, 0x100, 0x38, 0x1, 0x0, 0x0, 0x8}, [{0x5, 0xfffffd4b, 0x5, 0x0, 0x9, 0x6}, {0x4, 0xfffffff7, 0x8, 0x80000001, 0x5, 0x385, 0xfff, 0x1}], "37cacaa561", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x5b5) [ 1410.296254] FAULT_INJECTION: forcing a failure. [ 1410.296254] name failslab, interval 1, probability 0, space 0, times 0 [ 1410.297876] CPU: 1 PID: 8458 Comm: syz-executor.0 Not tainted 5.10.155 #1 [ 1410.298760] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1410.299878] Call Trace: [ 1410.300233] dump_stack+0x107/0x167 [ 1410.300710] should_fail.cold+0x5/0xa [ 1410.301206] ? create_object.isra.0+0x3a/0xa20 [ 1410.301795] should_failslab+0x5/0x20 [ 1410.302286] kmem_cache_alloc+0x5b/0x360 [ 1410.302817] create_object.isra.0+0x3a/0xa20 [ 1410.307420] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1410.308071] kmem_cache_alloc_trace+0x151/0x360 [ 1410.308680] cgroup_show_path+0xc4/0x5d0 [ 1410.309207] ? task_cgroup_path+0x3e0/0x3e0 [ 1410.309765] kernfs_sop_show_path+0x122/0x190 [ 1410.310366] ? kernfs_test_super+0x140/0x140 [ 1410.310937] show_mountinfo+0x23b/0xb80 [ 1410.319434] ? rwlock_bug.part.0+0x90/0x90 [ 1410.319976] ? mounts_release+0x100/0x100 [ 1410.320507] ? do_raw_spin_unlock+0x4f/0x220 [ 1410.321076] ? _raw_spin_unlock+0x1a/0x30 [ 1410.321600] seq_read_iter+0xbf0/0x12b0 [ 1410.322120] do_iter_readv_writev+0x57c/0x750 [ 1410.322731] ? new_sync_write+0x660/0x660 [ 1410.327303] ? selinux_file_permission+0x36/0x510 [ 1410.327930] ? lock_acquire+0x197/0x490 [ 1410.328450] do_iter_read+0x28f/0x6d0 [ 1410.328951] ? import_iovec+0x83/0xb0 [ 1410.329482] vfs_readv+0xe5/0x160 [ 1410.329930] ? vfs_iter_read+0xa0/0xa0 [ 1410.330440] ? __fdget_pos+0xed/0x110 [ 1410.330964] ? find_held_lock+0x2c/0x110 [ 1410.331542] ? __fget_files+0x296/0x480 [ 1410.332080] do_readv+0x139/0x300 [ 1410.332530] ? vfs_readv+0x160/0x160 [ 1410.333013] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1410.333688] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1410.334351] do_syscall_64+0x33/0x40 [ 1410.334834] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1410.343535] RIP: 0033:0x7f1c8b7aab19 [ 1410.344019] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1410.355293] RSP: 002b:00007f1c88d20188 EFLAGS: 00000246 ORIG_RAX: 0000000000000013 [ 1410.356267] RAX: ffffffffffffffda RBX: 00007f1c8b8bdf60 RCX: 00007f1c8b7aab19 [ 1410.357180] RDX: 0000000000000001 RSI: 0000000020000280 RDI: 0000000000000003 [ 1410.358084] RBP: 00007f1c88d201d0 R08: 0000000000000000 R09: 0000000000000000 [ 1410.358995] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1410.371971] R13: 00007ffe599dca8f R14: 00007f1c88d20300 R15: 0000000000022000 08:21:39 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280), 0x0) [ 1410.382063] FAULT_INJECTION: forcing a failure. [ 1410.382063] name failslab, interval 1, probability 0, space 0, times 0 [ 1410.382095] CPU: 1 PID: 8462 Comm: syz-executor.7 Not tainted 5.10.155 #1 [ 1410.382119] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1410.382128] Call Trace: [ 1410.382164] dump_stack+0x107/0x167 [ 1410.382200] should_fail.cold+0x5/0xa [ 1410.382233] ? create_object.isra.0+0x3a/0xa20 [ 1410.382263] should_failslab+0x5/0x20 [ 1410.382277] kmem_cache_alloc+0x5b/0x360 [ 1410.382298] create_object.isra.0+0x3a/0xa20 08:21:39 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0xd8, 0x8, 0x4, 0xa09, 0x3, 0x3, 0x1, 0x2a8, 0x40, 0x1a2, 0x1, 0x100, 0x38, 0x1, 0x0, 0x0, 0x8}, [{0x5, 0xfffffd4b, 0x5, 0x0, 0x9, 0x6}, {0x4, 0xfffffff7, 0x8, 0x80000001, 0x5, 0x385, 0xfff, 0x1}], "37cacaa561", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x5b5) 08:21:39 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) (fail_nth: 4) 08:21:39 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) (fail_nth: 5) 08:21:39 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r0, 0x800) write$cgroup_netprio_ifpriomap(r0, &(0x7f00000003c0)={'bond_slave_1'}, 0xfdef) [ 1410.382312] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1410.382331] __kmalloc_node+0x1ae/0x4b0 [ 1410.382356] kvmalloc_node+0x119/0x170 [ 1410.382372] seq_read_iter+0x81c/0x12b0 [ 1410.382387] ? __might_fault+0xd3/0x180 [ 1410.382418] do_iter_readv_writev+0x57c/0x750 08:21:39 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) (fail_nth: 10) [ 1410.382436] ? new_sync_write+0x660/0x660 [ 1410.382451] ? selinux_file_permission+0x36/0x510 [ 1410.382474] ? lock_acquire+0x197/0x490 [ 1410.382498] do_iter_read+0x28f/0x6d0 [ 1410.382521] ? import_iovec+0x83/0xb0 [ 1410.382541] vfs_readv+0xe5/0x160 [ 1410.382555] ? vfs_iter_read+0xa0/0xa0 [ 1410.382570] ? __fdget_pos+0xed/0x110 [ 1410.382585] ? find_held_lock+0x2c/0x110 [ 1410.382612] ? __fget_files+0x296/0x480 [ 1410.382647] do_readv+0x139/0x300 [ 1410.382662] ? vfs_readv+0x160/0x160 [ 1410.382681] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1410.382709] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1410.382729] do_syscall_64+0x33/0x40 [ 1410.382743] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1410.382753] RIP: 0033:0x7fc5b62b8b19 [ 1410.382767] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1410.382776] RSP: 002b:00007fc5b382e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000013 [ 1410.382791] RAX: ffffffffffffffda RBX: 00007fc5b63cbf60 RCX: 00007fc5b62b8b19 [ 1410.382800] RDX: 0000000000000001 RSI: 0000000020000280 RDI: 0000000000000003 [ 1410.382809] RBP: 00007fc5b382e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1410.382823] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1410.382832] R13: 00007fffa936dbcf R14: 00007fc5b382e300 R15: 0000000000022000 [ 1410.387635] FAULT_INJECTION: forcing a failure. [ 1410.387635] name failslab, interval 1, probability 0, space 0, times 0 [ 1410.387649] CPU: 1 PID: 8464 Comm: syz-executor.3 Not tainted 5.10.155 #1 [ 1410.387657] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1410.387661] Call Trace: [ 1410.387678] dump_stack+0x107/0x167 [ 1410.387697] should_fail.cold+0x5/0xa [ 1410.387713] ? cgroup_show_path+0xc4/0x5d0 [ 1410.387727] ? cgroup_show_path+0xc4/0x5d0 [ 1410.387742] should_failslab+0x5/0x20 [ 1410.387754] kmem_cache_alloc_trace+0x55/0x360 [ 1410.387773] cgroup_show_path+0xc4/0x5d0 [ 1410.387788] ? task_cgroup_path+0x3e0/0x3e0 [ 1410.387808] kernfs_sop_show_path+0x122/0x190 [ 1410.387829] ? kernfs_test_super+0x140/0x140 [ 1410.387843] show_mountinfo+0x23b/0xb80 [ 1410.387859] ? rwlock_bug.part.0+0x90/0x90 [ 1410.387875] ? mounts_release+0x100/0x100 [ 1410.387892] ? do_raw_spin_unlock+0x4f/0x220 [ 1410.387908] ? _raw_spin_unlock+0x1a/0x30 [ 1410.387926] seq_read_iter+0xbf0/0x12b0 [ 1410.387962] do_iter_readv_writev+0x57c/0x750 [ 1410.387981] ? new_sync_write+0x660/0x660 [ 1410.387996] ? selinux_file_permission+0x36/0x510 08:21:39 executing program 5: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) [ 1410.388017] ? lock_acquire+0x197/0x490 [ 1410.388044] do_iter_read+0x28f/0x6d0 [ 1410.388067] ? import_iovec+0x83/0xb0 [ 1410.388087] vfs_readv+0xe5/0x160 [ 1410.388101] ? vfs_iter_read+0xa0/0xa0 [ 1410.388115] ? __fdget_pos+0xed/0x110 [ 1410.388130] ? find_held_lock+0x2c/0x110 [ 1410.388158] ? __fget_files+0x296/0x480 [ 1410.388194] do_readv+0x139/0x300 [ 1410.388209] ? vfs_readv+0x160/0x160 [ 1410.388227] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1410.388243] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1410.388262] do_syscall_64+0x33/0x40 [ 1410.388276] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1410.388286] RIP: 0033:0x7fc80987cb19 [ 1410.388300] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1410.388308] RSP: 002b:00007fc806df2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000013 [ 1410.388324] RAX: ffffffffffffffda RBX: 00007fc80998ff60 RCX: 00007fc80987cb19 [ 1410.388332] RDX: 0000000000000001 RSI: 0000000020000280 RDI: 0000000000000003 [ 1410.388341] RBP: 00007fc806df21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1410.388349] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1410.388358] R13: 00007ffd739614af R14: 00007fc806df2300 R15: 0000000000022000 08:21:39 executing program 4: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)={0x28, 0x24, 0xc21, 0x0, 0x0, {}, [@typed={0x4}, @typed={0x4}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x28}}, 0x0) 08:21:40 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{0x0}], 0x1) [ 1411.249658] FAULT_INJECTION: forcing a failure. [ 1411.249658] name failslab, interval 1, probability 0, space 0, times 0 [ 1411.251308] CPU: 0 PID: 8481 Comm: syz-executor.7 Not tainted 5.10.155 #1 [ 1411.252212] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1411.253285] Call Trace: [ 1411.253635] dump_stack+0x107/0x167 [ 1411.254099] should_fail.cold+0x5/0xa [ 1411.254576] ? cgroup_show_path+0xc4/0x5d0 [ 1411.255220] should_failslab+0x5/0x20 [ 1411.255721] kmem_cache_alloc_trace+0x55/0x360 [ 1411.256317] cgroup_show_path+0xc4/0x5d0 [ 1411.256834] ? task_cgroup_path+0x3e0/0x3e0 [ 1411.257388] kernfs_sop_show_path+0x122/0x190 [ 1411.257959] ? kernfs_test_super+0x140/0x140 [ 1411.258550] show_mountinfo+0x23b/0xb80 [ 1411.259061] ? rwlock_bug.part.0+0x90/0x90 [ 1411.259756] ? mounts_release+0x100/0x100 [ 1411.260348] ? do_raw_spin_unlock+0x4f/0x220 [ 1411.260913] ? _raw_spin_unlock+0x1a/0x30 [ 1411.261454] seq_read_iter+0xbf0/0x12b0 [ 1411.261983] do_iter_readv_writev+0x57c/0x750 [ 1411.262561] ? new_sync_write+0x660/0x660 [ 1411.263093] ? selinux_file_permission+0x36/0x510 [ 1411.263734] ? lock_acquire+0x197/0x490 [ 1411.264289] do_iter_read+0x28f/0x6d0 [ 1411.264785] ? import_iovec+0x83/0xb0 [ 1411.265279] vfs_readv+0xe5/0x160 [ 1411.265733] ? vfs_iter_read+0xa0/0xa0 [ 1411.266227] ? __fdget_pos+0xed/0x110 [ 1411.266717] ? find_held_lock+0x2c/0x110 [ 1411.267369] ? __fget_files+0x296/0x480 [ 1411.267899] do_readv+0x139/0x300 [ 1411.268409] ? vfs_readv+0x160/0x160 [ 1411.268891] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1411.269563] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1411.270221] do_syscall_64+0x33/0x40 [ 1411.270702] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1411.271376] RIP: 0033:0x7fc5b62b8b19 [ 1411.271856] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1411.274208] RSP: 002b:00007fc5b382e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000013 [ 1411.275192] RAX: ffffffffffffffda RBX: 00007fc5b63cbf60 RCX: 00007fc5b62b8b19 [ 1411.276105] RDX: 0000000000000001 RSI: 0000000020000280 RDI: 0000000000000003 [ 1411.277006] RBP: 00007fc5b382e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1411.278102] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1411.279000] R13: 00007fffa936dbcf R14: 00007fc5b382e300 R15: 0000000000022000 [ 1411.280105] hpet: Lost 1 RTC interrupts [ 1411.298085] FAULT_INJECTION: forcing a failure. [ 1411.298085] name failslab, interval 1, probability 0, space 0, times 0 [ 1411.299758] CPU: 0 PID: 8482 Comm: syz-executor.3 Not tainted 5.10.155 #1 [ 1411.300647] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1411.301747] Call Trace: [ 1411.302095] dump_stack+0x107/0x167 [ 1411.302574] should_fail.cold+0x5/0xa [ 1411.303072] ? memcg_alloc_page_obj_cgroups+0x73/0x100 [ 1411.303814] should_failslab+0x5/0x20 [ 1411.304302] __kmalloc_node+0x76/0x4b0 [ 1411.304810] memcg_alloc_page_obj_cgroups+0x73/0x100 [ 1411.305461] memcg_slab_post_alloc_hook+0x1f9/0x3f0 [ 1411.306104] __kmalloc_node+0x1c6/0x4b0 [ 1411.306632] kvmalloc_node+0x119/0x170 [ 1411.307146] seq_read_iter+0x81c/0x12b0 [ 1411.307683] ? __might_fault+0xd3/0x180 [ 1411.308206] do_iter_readv_writev+0x57c/0x750 [ 1411.308832] ? new_sync_write+0x660/0x660 [ 1411.309364] ? selinux_file_permission+0x36/0x510 [ 1411.309986] ? lock_acquire+0x197/0x490 [ 1411.310288] FAULT_INJECTION: forcing a failure. [ 1411.310288] name failslab, interval 1, probability 0, space 0, times 0 [ 1411.310487] do_iter_read+0x28f/0x6d0 [ 1411.312376] ? import_iovec+0x83/0xb0 [ 1411.312869] vfs_readv+0xe5/0x160 [ 1411.313316] ? vfs_iter_read+0xa0/0xa0 [ 1411.313817] ? __fdget_pos+0xed/0x110 [ 1411.314343] ? find_held_lock+0x2c/0x110 [ 1411.314873] ? __fget_files+0x296/0x480 [ 1411.315462] do_readv+0x139/0x300 [ 1411.315913] ? vfs_readv+0x160/0x160 [ 1411.316396] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1411.317064] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1411.317726] do_syscall_64+0x33/0x40 [ 1411.318210] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1411.318865] RIP: 0033:0x7fc80987cb19 [ 1411.319363] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1411.321669] RSP: 002b:00007fc806df2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000013 [ 1411.322681] RAX: ffffffffffffffda RBX: 00007fc80998ff60 RCX: 00007fc80987cb19 [ 1411.323618] RDX: 0000000000000001 RSI: 0000000020000280 RDI: 0000000000000003 [ 1411.324514] RBP: 00007fc806df21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1411.325419] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1411.326325] R13: 00007ffd739614af R14: 00007fc806df2300 R15: 0000000000022000 [ 1411.327279] CPU: 1 PID: 8484 Comm: syz-executor.0 Not tainted 5.10.155 #1 [ 1411.327432] hpet: Lost 1 RTC interrupts [ 1411.328203] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1411.328212] Call Trace: [ 1411.330131] dump_stack+0x107/0x167 [ 1411.330606] should_fail.cold+0x5/0xa [ 1411.331109] ? create_object.isra.0+0x3a/0xa20 [ 1411.331746] should_failslab+0x5/0x20 [ 1411.332234] kmem_cache_alloc+0x5b/0x360 [ 1411.332760] create_object.isra.0+0x3a/0xa20 [ 1411.333323] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1411.333974] kmem_cache_alloc_trace+0x151/0x360 [ 1411.334578] cgroup_show_path+0xc4/0x5d0 [ 1411.335112] ? task_cgroup_path+0x3e0/0x3e0 [ 1411.335764] kernfs_sop_show_path+0x122/0x190 [ 1411.336349] ? kernfs_test_super+0x140/0x140 [ 1411.336936] show_mountinfo+0x23b/0xb80 [ 1411.337445] ? rwlock_bug.part.0+0x90/0x90 [ 1411.337988] ? mounts_release+0x100/0x100 [ 1411.338516] ? do_raw_spin_unlock+0x4f/0x220 [ 1411.339079] ? _raw_spin_unlock+0x1a/0x30 [ 1411.339671] seq_read_iter+0xbf0/0x12b0 [ 1411.340204] do_iter_readv_writev+0x57c/0x750 [ 1411.340781] ? new_sync_write+0x660/0x660 [ 1411.341309] ? selinux_file_permission+0x36/0x510 [ 1411.341921] ? lock_acquire+0x197/0x490 [ 1411.342476] do_iter_read+0x28f/0x6d0 [ 1411.342973] ? import_iovec+0x83/0xb0 [ 1411.343533] vfs_readv+0xe5/0x160 [ 1411.343984] ? vfs_iter_read+0xa0/0xa0 [ 1411.344486] ? __fdget_pos+0xed/0x110 [ 1411.344972] ? find_held_lock+0x2c/0x110 [ 1411.345505] ? __fget_files+0x296/0x480 [ 1411.346036] do_readv+0x139/0x300 [ 1411.346482] ? vfs_readv+0x160/0x160 [ 1411.346960] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1411.347662] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1411.348318] do_syscall_64+0x33/0x40 [ 1411.348790] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1411.349440] RIP: 0033:0x7f1c8b7aab19 [ 1411.349998] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1411.352310] RSP: 002b:00007f1c88d20188 EFLAGS: 00000246 ORIG_RAX: 0000000000000013 [ 1411.353266] RAX: ffffffffffffffda RBX: 00007f1c8b8bdf60 RCX: 00007f1c8b7aab19 [ 1411.354159] RDX: 0000000000000001 RSI: 0000000020000280 RDI: 0000000000000003 [ 1411.355048] RBP: 00007f1c88d201d0 R08: 0000000000000000 R09: 0000000000000000 [ 1411.356013] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1411.356948] R13: 00007ffe599dca8f R14: 00007f1c88d20300 R15: 0000000000022000 08:21:40 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) (fail_nth: 6) 08:21:40 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0xd8, 0x8, 0x4, 0xa09, 0x3, 0x3, 0x1, 0x2a8, 0x40, 0x1a2, 0x1, 0x100, 0x38, 0x1, 0x0, 0x0, 0x8}, [{0x5, 0xfffffd4b, 0x5, 0x0, 0x9, 0x6}, {0x4, 0xfffffff7, 0x8, 0x80000001, 0x5, 0x385, 0xfff, 0x1}], "37cacaa561", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x5b5) 08:21:40 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) (fail_nth: 11) [ 1411.647262] hpet: Lost 1 RTC interrupts [ 1412.271318] FAULT_INJECTION: forcing a failure. [ 1412.271318] name failslab, interval 1, probability 0, space 0, times 0 [ 1412.274115] CPU: 1 PID: 8496 Comm: syz-executor.3 Not tainted 5.10.155 #1 [ 1412.274950] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1412.276026] Call Trace: [ 1412.276381] dump_stack+0x107/0x167 [ 1412.276858] should_fail.cold+0x5/0xa [ 1412.277359] ? cgroup_show_path+0xc4/0x5d0 [ 1412.277909] should_failslab+0x5/0x20 [ 1412.278433] kmem_cache_alloc_trace+0x55/0x360 [ 1412.278947] FAULT_INJECTION: forcing a failure. [ 1412.278947] name failslab, interval 1, probability 0, space 0, times 0 [ 1412.279022] cgroup_show_path+0xc4/0x5d0 [ 1412.281114] ? task_cgroup_path+0x3e0/0x3e0 [ 1412.281678] kernfs_sop_show_path+0x122/0x190 [ 1412.282265] ? kernfs_test_super+0x140/0x140 [ 1412.282834] show_mountinfo+0x23b/0xb80 [ 1412.283385] ? rwlock_bug.part.0+0x90/0x90 [ 1412.283927] ? mounts_release+0x100/0x100 [ 1412.284501] ? do_raw_spin_unlock+0x4f/0x220 [ 1412.285072] ? _raw_spin_unlock+0x1a/0x30 [ 1412.285615] seq_read_iter+0xbf0/0x12b0 [ 1412.286151] do_iter_readv_writev+0x57c/0x750 [ 1412.286728] ? new_sync_write+0x660/0x660 [ 1412.291424] ? selinux_file_permission+0x36/0x510 [ 1412.292052] ? lock_acquire+0x197/0x490 [ 1412.292578] do_iter_read+0x28f/0x6d0 [ 1412.293084] ? import_iovec+0x83/0xb0 [ 1412.293584] vfs_readv+0xe5/0x160 [ 1412.294034] ? vfs_iter_read+0xa0/0xa0 [ 1412.294534] ? __fdget_pos+0xed/0x110 [ 1412.295034] ? find_held_lock+0x2c/0x110 [ 1412.295681] ? __fget_files+0x296/0x480 [ 1412.296327] do_readv+0x139/0x300 [ 1412.296845] ? vfs_readv+0x160/0x160 [ 1412.297406] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1412.298176] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1412.298932] do_syscall_64+0x33/0x40 [ 1412.299507] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1412.300164] RIP: 0033:0x7fc80987cb19 [ 1412.300644] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1412.307417] RSP: 002b:00007fc806df2188 EFLAGS: 00000246 ORIG_RAX: 0000000000000013 [ 1412.308424] RAX: ffffffffffffffda RBX: 00007fc80998ff60 RCX: 00007fc80987cb19 [ 1412.309366] RDX: 0000000000000001 RSI: 0000000020000280 RDI: 0000000000000003 [ 1412.310266] RBP: 00007fc806df21d0 R08: 0000000000000000 R09: 0000000000000000 [ 1412.311179] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1412.312087] R13: 00007ffd739614af R14: 00007fc806df2300 R15: 0000000000022000 [ 1412.313025] CPU: 0 PID: 8498 Comm: syz-executor.0 Not tainted 5.10.155 #1 [ 1412.313957] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1412.315050] Call Trace: [ 1412.320703] dump_stack+0x107/0x167 [ 1412.321187] should_fail.cold+0x5/0xa [ 1412.321679] ? create_object.isra.0+0x3a/0xa20 [ 1412.322355] should_failslab+0x5/0x20 [ 1412.322844] kmem_cache_alloc+0x5b/0x360 [ 1412.323386] create_object.isra.0+0x3a/0xa20 [ 1412.323948] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1412.324594] kmem_cache_alloc_trace+0x151/0x360 [ 1412.325193] cgroup_show_path+0xc4/0x5d0 [ 1412.325708] ? task_cgroup_path+0x3e0/0x3e0 [ 1412.326260] kernfs_sop_show_path+0x122/0x190 [ 1412.326840] ? kernfs_test_super+0x140/0x140 [ 1412.327498] show_mountinfo+0x23b/0xb80 [ 1412.328012] ? rwlock_bug.part.0+0x90/0x90 [ 1412.328560] ? mounts_release+0x100/0x100 [ 1412.329090] ? do_raw_spin_unlock+0x4f/0x220 [ 1412.329651] ? _raw_spin_unlock+0x1a/0x30 [ 1412.330185] seq_read_iter+0xbf0/0x12b0 [ 1412.330682] do_iter_readv_writev+0x57c/0x750 [ 1412.331533] ? new_sync_write+0x660/0x660 [ 1412.332061] ? selinux_file_permission+0x36/0x510 [ 1412.332727] ? lock_acquire+0x197/0x490 [ 1412.333247] do_iter_read+0x28f/0x6d0 [ 1412.333747] ? import_iovec+0x83/0xb0 [ 1412.334238] vfs_readv+0xe5/0x160 [ 1412.334687] ? vfs_iter_read+0xa0/0xa0 [ 1412.335323] ? __fdget_pos+0xed/0x110 [ 1412.335812] ? find_held_lock+0x2c/0x110 [ 1412.336390] ? __fget_files+0x296/0x480 [ 1412.336917] do_readv+0x139/0x300 [ 1412.337413] ? vfs_readv+0x160/0x160 [ 1412.337896] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1412.338567] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1412.339338] do_syscall_64+0x33/0x40 [ 1412.339821] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1412.340481] RIP: 0033:0x7f1c8b7aab19 [ 1412.340969] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1412.343423] RSP: 002b:00007f1c88d20188 EFLAGS: 00000246 ORIG_RAX: 0000000000000013 [ 1412.344390] RAX: ffffffffffffffda RBX: 00007f1c8b8bdf60 RCX: 00007f1c8b7aab19 [ 1412.345288] RDX: 0000000000000001 RSI: 0000000020000280 RDI: 0000000000000003 [ 1412.346189] RBP: 00007f1c88d201d0 R08: 0000000000000000 R09: 0000000000000000 [ 1412.347072] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1412.348078] R13: 00007ffe599dca8f R14: 00007f1c88d20300 R15: 0000000000022000 [ 1412.349322] hpet: Lost 1 RTC interrupts [ 1416.687353] hpet: Lost 1 RTC interrupts [ 1421.215513] hpet: Lost 1 RTC interrupts [ 1425.327999] hpet: Lost 2 RTC interrupts 08:21:56 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) (fail_nth: 5) 08:21:56 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) (fail_nth: 12) 08:21:56 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) (fail_nth: 7) 08:21:56 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x11f0c0, 0x11a) openat(r1, &(0x7f0000000080)='./file0\x00', 0x843, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5f0, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) truncate(&(0x7f0000001580)='./file0\x00', 0x80) writev(r2, &(0x7f00000007c0)=[{&(0x7f00000000c0)="965d02d6e0576276d9b0a75688bf717d5f9280f21f8c584920f14fdf72b2057b2f9d82ce3e90882367dfc325030f15de8fa91fe16ccbe7cfe9457cb74dae149565909970a81524767fca669b807f5ff4d2b33c81044c0332d1e4bca986367726dbf1f6325d305bc9b3548ceea0557d92", 0x70}, {&(0x7f0000000180)="2e4b0beb0a540e937160106a9649763e267f4fa520e02a5b7ebc115f4178710210085464d4d85e5ee5133c828414eafa885e387ec64b2d221865fb4fdfd0a73de10c88eea5d7ecbdce1c", 0x4a}, {&(0x7f0000000200)="9570fce858aef0296d53bfff4266cab3dec12731ec061d8b27cca0d6ab3ef252b26577c3d61d1536cf7d874c20153f9c21ed9ac1e094aa5e7601a48289629413b11e5e552850451760e6cda75711427e05aa230f82ccc11a4544bd27a0ef349feb3f4e13c8b539773c5a3c3c94a09ea993e57d1b408c05", 0x77}, {&(0x7f0000000280)}, {&(0x7f00000002c0)="30815f80a9145487fdc38e44a9b135e1e6dda1948b56824a8235dff330a83eea7d14438eaafe86a79ca8347440c9f0127056d18415205b9af02b4a350b999e309859e099944f3e8ae7c0a4f4e8a5b7e601d808f49d0624a2e87ff41bce27dbada981c37439f4742d6421e98393e4e0209a2d8be23f61039a31e2434f164cc1a2bebef65d3f8304096d479326f511b5c693c5da68cfd6f4510e761a50e3d1ef19593965ae3ccad51d7bec629379948c9dedd6defaca1448c0ead29cbd7bf12dc426d13365978db170d256dd4171678130a0229ed75bc9c92be384f98adb4360264216a37f4616adfc438c892fd06c56cd01", 0xf1}, {&(0x7f00000003c0)="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", 0xfb}, {&(0x7f00000004c0)="f464a67703b419cfb456cfa71795c05472ff739e03ebb75367f4e9beb772de29600236abb24ad9a7f8def003bfb9943f0250f320f791644c9dd40c44238b86c35b1f21a6e4039cc73e534dc2272031fbe7b4232366d24c7822236300b4db41c27e6bec2324ebf10b9ac45a0022ce2fa5f7929f0dfeb9cd00fb539ca682d9449c2ac9ee1058316fa7522f67c0532670502dfe7537629569650b3397304fdb6d69451e9e340caf5f4030a1317936857000eb3938e6f8b6cf9a6c8446714d739d381fab57cb993ec3eb4a256d860f37833b0febcb257a374b6bd358a4d37f42f6ac53292af9eda56282003316a13615e70a64e15fa881", 0xf5}, {&(0x7f00000005c0)="9e24dbb406175bc38087e5c79430ee365dd51e38f3df0056a4312e7c957ea07c632deb5c44046b9e4e3c14bb5fedbd5410e3e61682dd43128ef790e81c84a1b6e96a4572345fdb33165e19bd4cdb155ed678186d6b66a12a42a235cfa3289026f70fbfa49029e0cbf7c2e0f2c5836ac3da95babf9f4119555e693da3526e6dcf571af9b0014e1f613ac361e02c33f6bb3f981f15eac72fb89ac22a25eb052b7e37eeb598bdaf22e4253d9b924b627b328bcf53d2d368c6f3d84c02fd202fc3f26b29d2cf277cfc598ba4aff4ef6a6d7984de2539d74809dbd1adb90605619dc2aacb8e16e21cd6d7b3c0a5c3e6aace3d3913", 0xf2}, {&(0x7f00000006c0)="1802ff2a2c9be92ce39ff81adb3903b856668cf20c502eb7777f1e94588b4d7a36426913267e3a0b8b5f457c0837ac396b7ab22d557d02a617ce663c558c932565755667448f883c9f9dda1ef0763d3f97e4e5ed326f29237bfdd080e8aac9081d769342e9a13b3568e807ab1f539f355b5b968ee91a3883bdf8457cc7b6d739507d52cb6a61e4dd7cd6d2b8c35471317e6a7a579514efee2c1666ad471eb969958e22b12de45972917f94904cdd43a0718a8bd7bc680f2988cd69d184b1ddb9efaa09994960016597da9e56eecf07ae142a445ec56f27e8113b5db6c52af59d5721f4eb2ab2aeaebd", 0xe9}], 0x9) 08:21:56 executing program 5: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x80, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x80}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:21:57 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r0, 0x800) write$cgroup_netprio_ifpriomap(r0, &(0x7f00000003c0)={'bond_slave_1'}, 0x200003cf) 08:21:57 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{0x0}], 0x1) 08:21:57 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0xd8, 0x8, 0x4, 0xa09, 0x3, 0x3, 0x1, 0x2a8, 0x40, 0x1a2, 0x1, 0x100, 0x38, 0x1, 0x0, 0x0, 0x8}, [{0x5, 0xfffffd4b, 0x5, 0x0, 0x9, 0x6}, {0x4, 0xfffffff7, 0x8, 0x80000001, 0x5, 0x385, 0xfff, 0x1}], "37cacaa561", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x5b5) [ 1428.358060] FAULT_INJECTION: forcing a failure. [ 1428.358060] name failslab, interval 1, probability 0, space 0, times 0 [ 1428.359587] CPU: 1 PID: 8513 Comm: syz-executor.7 Not tainted 5.10.155 #1 [ 1428.368139] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1428.369230] Call Trace: [ 1428.369592] dump_stack+0x107/0x167 [ 1428.370067] should_fail.cold+0x5/0xa [ 1428.370557] ? create_object.isra.0+0x3a/0xa20 [ 1428.371147] should_failslab+0x5/0x20 [ 1428.376015] kmem_cache_alloc+0x5b/0x360 [ 1428.376549] create_object.isra.0+0x3a/0xa20 [ 1428.377106] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1428.377761] kmem_cache_alloc_trace+0x151/0x360 [ 1428.378347] cgroup_show_path+0xc4/0x5d0 [ 1428.378857] ? task_cgroup_path+0x3e0/0x3e0 [ 1428.384603] kernfs_sop_show_path+0x122/0x190 [ 1428.385191] ? kernfs_test_super+0x140/0x140 [ 1428.385913] show_mountinfo+0x23b/0xb80 [ 1428.386429] ? rwlock_bug.part.0+0x90/0x90 [ 1428.386976] ? mounts_release+0x100/0x100 [ 1428.387604] ? do_raw_spin_unlock+0x4f/0x220 [ 1428.388178] ? _raw_spin_unlock+0x1a/0x30 [ 1428.388719] seq_read_iter+0xbf0/0x12b0 [ 1428.389255] do_iter_readv_writev+0x57c/0x750 [ 1428.389837] ? new_sync_write+0x660/0x660 [ 1428.390373] ? selinux_file_permission+0x36/0x510 [ 1428.390963] ? lock_acquire+0x197/0x490 [ 1428.391596] do_iter_read+0x28f/0x6d0 [ 1428.392597] ? import_iovec+0x83/0xb0 [ 1428.393137] vfs_readv+0xe5/0x160 [ 1428.393562] ? vfs_iter_read+0xa0/0xa0 [ 1428.395699] ? __fdget_pos+0xed/0x110 [ 1428.396204] ? find_held_lock+0x2c/0x110 [ 1428.396841] ? __fget_files+0x296/0x480 [ 1428.397381] do_readv+0x139/0x300 [ 1428.397915] ? vfs_readv+0x160/0x160 [ 1428.398402] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1428.399211] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1428.400022] do_syscall_64+0x33/0x40 [ 1428.400542] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1428.401256] RIP: 0033:0x7fc5b62b8b19 [ 1428.401894] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1428.417947] RSP: 002b:00007fc5b382e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000013 [ 1428.418974] RAX: ffffffffffffffda RBX: 00007fc5b63cbf60 RCX: 00007fc5b62b8b19 [ 1428.420073] RDX: 0000000000000001 RSI: 0000000020000280 RDI: 0000000000000003 [ 1428.420987] RBP: 00007fc5b382e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1428.421931] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1428.423917] R13: 00007fffa936dbcf R14: 00007fc5b382e300 R15: 0000000000022000 08:21:57 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0xd8, 0x8, 0x4, 0xa09, 0x3, 0x3, 0x1, 0x2a8, 0x40, 0x1a2, 0x1, 0x100, 0x38, 0x1, 0x0, 0x0, 0x8}, [{0x5, 0xfffffd4b, 0x5, 0x0, 0x9, 0x6}, {0x4, 0xfffffff7, 0x8, 0x80000001, 0x5, 0x385, 0xfff, 0x1}], "37cacaa561", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x5b5) 08:21:57 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r0, 0x800) write$cgroup_netprio_ifpriomap(r0, &(0x7f00000003c0)={'bond_slave_1'}, 0xfffffdef) 08:21:57 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) 08:21:57 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) 08:21:57 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) (fail_nth: 6) [ 1429.014058] hpet: Lost 2 RTC interrupts [ 1429.055604] hpet: Lost 1 RTC interrupts [ 1429.374126] FAULT_INJECTION: forcing a failure. [ 1429.374126] name failslab, interval 1, probability 0, space 0, times 0 [ 1429.376246] CPU: 1 PID: 8532 Comm: syz-executor.7 Not tainted 5.10.155 #1 [ 1429.377241] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1429.378281] Call Trace: [ 1429.378632] dump_stack+0x107/0x167 [ 1429.379106] should_fail.cold+0x5/0xa [ 1429.379895] ? cgroup_show_path+0xc4/0x5d0 [ 1429.380432] should_failslab+0x5/0x20 [ 1429.380925] kmem_cache_alloc_trace+0x55/0x360 [ 1429.381642] cgroup_show_path+0xc4/0x5d0 [ 1429.382164] ? task_cgroup_path+0x3e0/0x3e0 [ 1429.382722] kernfs_sop_show_path+0x122/0x190 [ 1429.383298] ? kernfs_test_super+0x140/0x140 [ 1429.383888] show_mountinfo+0x23b/0xb80 [ 1429.384407] ? rwlock_bug.part.0+0x90/0x90 [ 1429.384954] ? mounts_release+0x100/0x100 [ 1429.385491] ? do_raw_spin_unlock+0x4f/0x220 [ 1429.386056] ? _raw_spin_unlock+0x1a/0x30 [ 1429.386599] seq_read_iter+0xbf0/0x12b0 [ 1429.387135] do_iter_readv_writev+0x57c/0x750 [ 1429.388436] ? new_sync_write+0x660/0x660 [ 1429.389530] ? selinux_file_permission+0x36/0x510 [ 1429.390191] ? lock_acquire+0x197/0x490 [ 1429.390764] do_iter_read+0x28f/0x6d0 [ 1429.391272] ? import_iovec+0x83/0xb0 [ 1429.391891] vfs_readv+0xe5/0x160 [ 1429.392337] ? vfs_iter_read+0xa0/0xa0 [ 1429.392904] ? __fdget_pos+0xed/0x110 [ 1429.393397] ? find_held_lock+0x2c/0x110 [ 1429.394055] ? __fget_files+0x296/0x480 [ 1429.394587] do_readv+0x139/0x300 [ 1429.395901] ? vfs_readv+0x160/0x160 [ 1429.396387] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1429.397121] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1429.397881] do_syscall_64+0x33/0x40 [ 1429.399096] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1429.399966] RIP: 0033:0x7fc5b62b8b19 [ 1429.400863] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1429.407051] RSP: 002b:00007fc5b382e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000013 [ 1429.410151] RAX: ffffffffffffffda RBX: 00007fc5b63cbf60 RCX: 00007fc5b62b8b19 [ 1429.412728] RDX: 0000000000000001 RSI: 0000000020000280 RDI: 0000000000000003 [ 1429.415084] RBP: 00007fc5b382e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1429.424685] hpet: Lost 1 RTC interrupts [ 1429.427925] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1429.429738] R13: 00007fffa936dbcf R14: 00007fc5b382e300 R15: 0000000000022000 [ 1430.863400] hpet: Lost 1 RTC interrupts [ 1431.003398] hpet: Lost 1 RTC interrupts 08:22:14 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{0x0}], 0x1) 08:22:14 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r0, 0x800) write$cgroup_netprio_ifpriomap(r0, &(0x7f00000003c0)={'bond_slave_1'}, 0xfffffffffffffdef) 08:22:14 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) (fail_nth: 7) 08:22:14 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0xd8, 0x8, 0x4, 0xa09, 0x3, 0x3, 0x1, 0x2a8, 0x40, 0x1a2, 0x1, 0x100, 0x38, 0x1, 0x0, 0x0, 0x8}, [{0x5, 0xfffffd4b, 0x5, 0x0, 0x9, 0x6}, {0x4, 0xfffffff7, 0x8, 0x80000001, 0x5, 0x385, 0xfff, 0x1}], "37cacaa561", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x5b5) 08:22:14 executing program 5: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x80, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x80}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:22:14 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000300), 0xd}, 0xe081, 0x80, 0x0, 0x5, 0x0, 0x0, 0x400, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$802154_raw(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000180)={0x24, @none={0x0, 0x2}}, 0x14, &(0x7f00000001c0)={&(0x7f00000002c0)="18ff151661f4c0fe55f2902ed49bb276b1a89cfe95478915cb567ce0667ee26b81cdfa7fcdf61cca43e743cb085fe0ffa4ae901b3afb69bc4c4e18dedb", 0x3d}, 0x1, 0x0, 0x0, 0x4}, 0x11) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fallocate(r0, 0x50, 0xffffffff00000001, 0x6) move_pages(0x0, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x1000)=nil], 0x0, &(0x7f0000000040), 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) r2 = socket$nl_audit(0x10, 0x3, 0x9) sendfile(r2, r1, &(0x7f0000000040)=0x4389, 0x80000001) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) 08:22:14 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0x62}], 0x1) 08:22:14 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0x62}], 0x1) 08:22:14 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0xd8, 0x8, 0x4, 0xa09, 0x3, 0x3, 0x1, 0x2a8, 0x40, 0x1a2, 0x1, 0x100, 0x38, 0x1, 0x0, 0x0, 0x8}, [{0x5, 0xfffffd4b, 0x5, 0x0, 0x9, 0x6}, {0x4, 0xfffffff7, 0x8, 0x80000001, 0x5, 0x385, 0xfff, 0x1}], "37cacaa561", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x5b5) [ 1446.066957] FAULT_INJECTION: forcing a failure. [ 1446.066957] name failslab, interval 1, probability 0, space 0, times 0 [ 1446.068514] CPU: 0 PID: 8551 Comm: syz-executor.7 Not tainted 5.10.155 #1 [ 1446.069408] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1446.070488] Call Trace: [ 1446.070847] dump_stack+0x107/0x167 [ 1446.071336] should_fail.cold+0x5/0xa [ 1446.075889] ? create_object.isra.0+0x3a/0xa20 [ 1446.076487] should_failslab+0x5/0x20 [ 1446.076980] kmem_cache_alloc+0x5b/0x360 [ 1446.077514] create_object.isra.0+0x3a/0xa20 [ 1446.078081] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1446.078739] kmem_cache_alloc_trace+0x151/0x360 [ 1446.079349] cgroup_show_path+0xc4/0x5d0 [ 1446.079899] ? task_cgroup_path+0x3e0/0x3e0 [ 1446.080464] kernfs_sop_show_path+0x122/0x190 [ 1446.081050] ? kernfs_test_super+0x140/0x140 [ 1446.081616] show_mountinfo+0x23b/0xb80 [ 1446.082132] ? rwlock_bug.part.0+0x90/0x90 [ 1446.082681] ? mounts_release+0x100/0x100 [ 1446.083219] ? do_raw_spin_unlock+0x4f/0x220 [ 1446.083810] ? _raw_spin_unlock+0x1a/0x30 [ 1446.084350] seq_read_iter+0xbf0/0x12b0 [ 1446.084888] do_iter_readv_writev+0x57c/0x750 [ 1446.085471] ? new_sync_write+0x660/0x660 [ 1446.086007] ? selinux_file_permission+0x36/0x510 [ 1446.086634] ? lock_acquire+0x197/0x490 [ 1446.087162] do_iter_read+0x28f/0x6d0 [ 1446.087697] ? import_iovec+0x83/0xb0 [ 1446.088207] vfs_readv+0xe5/0x160 [ 1446.088670] ? vfs_iter_read+0xa0/0xa0 [ 1446.089186] ? __fdget_pos+0xed/0x110 [ 1446.089690] ? find_held_lock+0x2c/0x110 [ 1446.090251] ? __fget_files+0x296/0x480 [ 1446.090804] do_readv+0x139/0x300 [ 1446.091267] ? vfs_readv+0x160/0x160 [ 1446.091781] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1446.092457] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1446.093123] do_syscall_64+0x33/0x40 [ 1446.093606] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1446.094265] RIP: 0033:0x7fc5b62b8b19 [ 1446.094748] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1446.097138] RSP: 002b:00007fc5b382e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000013 [ 1446.098111] RAX: ffffffffffffffda RBX: 00007fc5b63cbf60 RCX: 00007fc5b62b8b19 [ 1446.099020] RDX: 0000000000000001 RSI: 0000000020000280 RDI: 0000000000000003 [ 1446.099955] RBP: 00007fc5b382e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1446.100876] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1446.101785] R13: 00007fffa936dbcf R14: 00007fc5b382e300 R15: 0000000000022000 [ 1446.102856] hpet: Lost 2 RTC interrupts 08:22:14 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xc8}], 0x1) 08:22:14 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xc8}], 0x1) 08:22:14 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r0, 0x800) write$cgroup_netprio_ifpriomap(r0, &(0x7f0000000040)={'veth1_to_batadv', 0x32, 0x30}, 0x12) 08:22:14 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) (fail_nth: 1) 08:22:15 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) (fail_nth: 8) 08:22:15 executing program 5: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x80, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x80}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) [ 1446.273414] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 1446.282150] ext4 filesystem being mounted at /syzkaller-testdir252498052/syzkaller.ozvMQC/88/file0 supports timestamps until 2038 (0x7fffffff) 08:22:15 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0xe0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x4, 0x80, 0x6, 0xff, 0x1, 0xfa, 0x0, 0x2, 0x2, 0x2, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f0000000000), 0x4}, 0x10, 0xf1c, 0x1, 0x0, 0xe5, 0x5, 0x9, 0x0, 0x10000, 0x0, 0x4}, 0x0, 0x3, r0, 0x8) dup3(r0, r0, 0x80000) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) [ 1446.684313] FAULT_INJECTION: forcing a failure. [ 1446.684313] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1446.687430] CPU: 0 PID: 8573 Comm: syz-executor.2 Not tainted 5.10.155 #1 [ 1446.688514] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1446.689767] Call Trace: [ 1446.690212] dump_stack+0x107/0x167 [ 1446.690794] should_fail.cold+0x5/0xa [ 1446.691445] _copy_from_user+0x2e/0x1b0 [ 1446.692118] iovec_from_user+0x141/0x400 [ 1446.692761] ? lock_acquire+0x197/0x490 [ 1446.693411] __import_iovec+0x67/0x590 [ 1446.699945] ? lock_release+0x6b0/0x6b0 [ 1446.700563] import_iovec+0x83/0xb0 [ 1446.701152] vfs_readv+0xbb/0x160 [ 1446.701711] ? vfs_iter_read+0xa0/0xa0 [ 1446.702329] ? __fdget_pos+0xed/0x110 [ 1446.702939] ? find_held_lock+0x2c/0x110 [ 1446.703597] ? mutex_lock_io_nested+0x1110/0x1110 [ 1446.704351] ? __fget_files+0x296/0x480 [ 1446.704989] do_readv+0x139/0x300 [ 1446.705537] ? vfs_readv+0x160/0x160 [ 1446.706125] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1446.706912] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1446.707728] do_syscall_64+0x33/0x40 [ 1446.708861] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1446.710380] RIP: 0033:0x7f2daa4c6b19 [ 1446.711490] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1446.717026] RSP: 002b:00007f2da7a3c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000013 [ 1446.719307] RAX: ffffffffffffffda RBX: 00007f2daa5d9f60 RCX: 00007f2daa4c6b19 [ 1446.721550] RDX: 0000000000000001 RSI: 0000000020000280 RDI: 0000000000000003 [ 1446.723687] RBP: 00007f2da7a3c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1446.725896] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1446.728140] R13: 00007ffc5d7bee0f R14: 00007f2da7a3c300 R15: 0000000000022000 [ 1446.730699] hpet: Lost 2 RTC interrupts [ 1446.748455] FAULT_INJECTION: forcing a failure. [ 1446.748455] name failslab, interval 1, probability 0, space 0, times 0 [ 1446.751826] CPU: 0 PID: 8578 Comm: syz-executor.7 Not tainted 5.10.155 #1 [ 1446.753826] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1446.756274] Call Trace: [ 1446.757049] dump_stack+0x107/0x167 [ 1446.758158] should_fail.cold+0x5/0xa [ 1446.759312] ? cgroup_show_path+0xc4/0x5d0 08:22:15 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0xd8, 0x8, 0x4, 0xa09, 0x3, 0x3, 0x1, 0x2a8, 0x40, 0x1a2, 0x1, 0x100, 0x38, 0x1, 0x0, 0x0, 0x8}, [{0x5, 0xfffffd4b, 0x5, 0x0, 0x9, 0x6}, {0x4, 0xfffffff7, 0x8, 0x80000001, 0x5, 0x385, 0xfff, 0x1}], "37cacaa561", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x5b5) [ 1446.760627] should_failslab+0x5/0x20 [ 1446.762383] kmem_cache_alloc_trace+0x55/0x360 [ 1446.763861] cgroup_show_path+0xc4/0x5d0 [ 1446.764384] ? task_cgroup_path+0x3e0/0x3e0 [ 1446.764908] kernfs_sop_show_path+0x122/0x190 [ 1446.765467] ? kernfs_test_super+0x140/0x140 [ 1446.766029] show_mountinfo+0x23b/0xb80 [ 1446.766545] ? rwlock_bug.part.0+0x90/0x90 [ 1446.767089] ? mounts_release+0x100/0x100 [ 1446.767931] ? do_raw_spin_unlock+0x4f/0x220 [ 1446.768497] ? _raw_spin_unlock+0x1a/0x30 [ 1446.769249] seq_read_iter+0xbf0/0x12b0 [ 1446.769783] do_iter_readv_writev+0x57c/0x750 [ 1446.770613] ? new_sync_write+0x660/0x660 [ 1446.771427] ? selinux_file_permission+0x36/0x510 [ 1446.772316] ? lock_acquire+0x197/0x490 [ 1446.772903] do_iter_read+0x28f/0x6d0 [ 1446.773597] ? import_iovec+0x83/0xb0 [ 1446.774170] vfs_readv+0xe5/0x160 [ 1446.774803] ? vfs_iter_read+0xa0/0xa0 [ 1446.775418] ? __fdget_pos+0xed/0x110 [ 1446.776182] ? find_held_lock+0x2c/0x110 [ 1446.776988] ? __fget_files+0x296/0x480 [ 1446.777517] do_readv+0x139/0x300 [ 1446.778196] ? vfs_readv+0x160/0x160 [ 1446.778680] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1446.779597] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1446.780525] do_syscall_64+0x33/0x40 [ 1446.781311] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1446.782010] RIP: 0033:0x7fc5b62b8b19 [ 1446.782710] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1446.797241] RSP: 002b:00007fc5b382e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000013 [ 1446.798215] RAX: ffffffffffffffda RBX: 00007fc5b63cbf60 RCX: 00007fc5b62b8b19 [ 1446.799085] RDX: 0000000000000001 RSI: 0000000020000280 RDI: 0000000000000003 [ 1446.799976] RBP: 00007fc5b382e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1446.800916] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1446.801871] R13: 00007fffa936dbcf R14: 00007fc5b382e300 R15: 0000000000022000 08:22:15 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0x10a}], 0x1) [ 1446.811629] hpet: Lost 3 RTC interrupts [ 1450.995799] hpet: Lost 1 RTC interrupts [ 1458.210106] hpet: Lost 2 RTC interrupts [ 1462.571949] hpet: Lost 1 RTC interrupts 08:22:32 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0x10a}], 0x1) 08:22:32 executing program 5: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:22:32 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0x174}], 0x1) 08:22:32 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x4, @perf_config_ext={0x3ff, 0x7fff}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r0, 0x800) write$cgroup_netprio_ifpriomap(r0, &(0x7f00000003c0)={'bond_slave_1'}, 0xf) 08:22:32 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) (fail_nth: 2) 08:22:32 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) (fail_nth: 9) 08:22:32 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0xd8, 0x8, 0x4, 0xa09, 0x3, 0x3, 0x1, 0x2a8, 0x40, 0x1a2, 0x1, 0x100, 0x38, 0x1, 0x0, 0x0, 0x8}, [{0x5, 0xfffffd4b, 0x5, 0x0, 0x9, 0x6}, {0x4, 0xfffffff7, 0x8, 0x80000001, 0x5, 0x385, 0xfff, 0x1}], "37cacaa561", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x5b5) 08:22:32 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create(0x6) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000001040)=[{{&(0x7f0000000180)=@abs, 0x6e, &(0x7f0000000300)=[{&(0x7f0000000240)=""/119, 0x77}, {&(0x7f00000002c0)=""/32, 0x20}], 0x2, &(0x7f0000000340)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xe8}}, {{&(0x7f0000000440)=@abs, 0x6e, &(0x7f0000000780)=[{&(0x7f00000004c0)=""/183, 0xb7}, {&(0x7f0000000580)=""/40, 0x28}, {&(0x7f00000005c0)}, {&(0x7f0000000600)=""/204, 0xcc}, {&(0x7f0000000700)=""/107, 0x6b}], 0x5, &(0x7f0000000800)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x128}}, {{&(0x7f0000000940), 0x6e, &(0x7f0000000a00)=[{&(0x7f00000009c0)=""/57, 0x39}], 0x1, &(0x7f0000000a40)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x178}}, {{&(0x7f0000000bc0), 0x6e, &(0x7f0000000f00)=[{&(0x7f0000000c40)=""/189, 0xbd}, {&(0x7f0000000d00)=""/48, 0x30}, {&(0x7f0000000d40)=""/227, 0xe3}, {&(0x7f0000000e40)=""/178, 0xb2}], 0x4, &(0x7f0000000f40)=ANY=[@ANYBLOB="1c0000000200"/16, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="14000000000000000100000001000000", @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0xd8}}], 0x4, 0x10000, &(0x7f0000001140)={0x77359400}) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x8, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000000c0), 0xe}, 0x0, 0x0, 0xb}, r3, 0x0, 0xffffffffffffffff, 0x3) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000200)={0x20000001}) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000001280), 0x90000, 0x0) r6 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r6, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r6, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) sendmmsg$inet6(r6, &(0x7f0000003e00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000500)={0xa, 0x4e21, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000001740)=[@tclass={{0x14, 0x29, 0x43, 0x8f76}}], 0x18}}], 0x2, 0x0) mount$9p_fd(0x0, &(0x7f0000001200)='./file0\x00', &(0x7f0000001240), 0x8028, &(0x7f00000012c0)={'trans=fd,', {'rfdno', 0x3d, r5}, 0x2c, {'wfdno', 0x3d, r6}, 0x2c, {[{@afid={'afid', 0x3d, 0x6a}}, {@access_client}, {@cache_none}, {@version_L}, {@privport}, {@noextend}, {@loose}, {@cachetag}], [{@permit_directio}, {@appraise_type}, {@smackfshat={'smackfshat', 0x3d, '\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@seclabel}, {@measure}, {@dont_hash}]}}) mq_timedsend(r2, &(0x7f0000001180)="7eacb3aa9bf300e7d1ac8d8295ea82248a765f3475ccdc0460b645b2b228d91a7cc6fbb9c66b15cae0a94555ecd18bfff3dd354a18c7f9f135f8a8ea37e8131a9601a34489c6de0474a533e5ca4fa6758c6931bc", 0x54, 0x7f, &(0x7f00000005c0)={0x77359400}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r8, &(0x7f0000000140)={0x20000002}) openat$incfs(r7, 0x0, 0x0, 0x20) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000000)={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @private0, 0x0, 0x2, 0x4}) dup2(r4, r0) [ 1463.288127] FAULT_INJECTION: forcing a failure. [ 1463.288127] name failslab, interval 1, probability 0, space 0, times 0 [ 1463.293545] CPU: 1 PID: 8602 Comm: syz-executor.7 Not tainted 5.10.155 #1 [ 1463.295109] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1463.296389] Call Trace: [ 1463.296810] dump_stack+0x107/0x167 [ 1463.297937] should_fail.cold+0x5/0xa [ 1463.298544] ? create_object.isra.0+0x3a/0xa20 [ 1463.299248] should_failslab+0x5/0x20 [ 1463.299801] kmem_cache_alloc+0x5b/0x360 [ 1463.300440] create_object.isra.0+0x3a/0xa20 [ 1463.301088] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1463.301882] kmem_cache_alloc_trace+0x151/0x360 [ 1463.302666] cgroup_show_path+0xc4/0x5d0 [ 1463.303315] ? task_cgroup_path+0x3e0/0x3e0 [ 1463.304137] kernfs_sop_show_path+0x122/0x190 [ 1463.304991] ? kernfs_test_super+0x140/0x140 [ 1463.305574] show_mountinfo+0x23b/0xb80 [ 1463.306277] ? rwlock_bug.part.0+0x90/0x90 [ 1463.307190] ? mounts_release+0x100/0x100 [ 1463.307747] ? do_raw_spin_unlock+0x4f/0x220 [ 1463.308456] ? _raw_spin_unlock+0x1a/0x30 [ 1463.309132] seq_read_iter+0xbf0/0x12b0 [ 1463.309791] do_iter_readv_writev+0x57c/0x750 [ 1463.310507] ? new_sync_write+0x660/0x660 [ 1463.311146] ? selinux_file_permission+0x36/0x510 [ 1463.311907] ? lock_acquire+0x197/0x490 [ 1463.312554] do_iter_read+0x28f/0x6d0 [ 1463.313134] ? import_iovec+0x83/0xb0 [ 1463.313713] vfs_readv+0xe5/0x160 [ 1463.314214] ? vfs_iter_read+0xa0/0xa0 [ 1463.314791] ? __fdget_pos+0xed/0x110 [ 1463.315368] ? find_held_lock+0x2c/0x110 [ 1463.316030] ? __fget_files+0x296/0x480 [ 1463.316644] do_readv+0x139/0x300 [ 1463.317173] ? vfs_readv+0x160/0x160 [ 1463.317741] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1463.318530] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1463.319485] do_syscall_64+0x33/0x40 [ 1463.320080] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1463.320887] RIP: 0033:0x7fc5b62b8b19 [ 1463.321884] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1463.324718] RSP: 002b:00007fc5b382e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000013 [ 1463.325902] RAX: ffffffffffffffda RBX: 00007fc5b63cbf60 RCX: 00007fc5b62b8b19 [ 1463.326991] RDX: 0000000000000001 RSI: 0000000020000280 RDI: 0000000000000003 [ 1463.328063] RBP: 00007fc5b382e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1463.329177] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1463.330298] R13: 00007fffa936dbcf R14: 00007fc5b382e300 R15: 0000000000022000 08:22:32 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) (fail_nth: 10) [ 1463.397770] FAULT_INJECTION: forcing a failure. [ 1463.397770] name failslab, interval 1, probability 0, space 0, times 0 [ 1463.399696] CPU: 1 PID: 8609 Comm: syz-executor.2 Not tainted 5.10.155 #1 [ 1463.400666] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1463.401824] Call Trace: [ 1463.402256] dump_stack+0x107/0x167 [ 1463.402767] should_fail.cold+0x5/0xa [ 1463.403320] ? kvmalloc_node+0x119/0x170 [ 1463.403971] should_failslab+0x5/0x20 [ 1463.404547] __kmalloc_node+0x76/0x4b0 [ 1463.405112] kvmalloc_node+0x119/0x170 [ 1463.405703] seq_read_iter+0x81c/0x12b0 [ 1463.406248] ? __might_fault+0xd3/0x180 [ 1463.406819] do_iter_readv_writev+0x57c/0x750 [ 1463.407492] ? new_sync_write+0x660/0x660 [ 1463.408120] ? selinux_file_permission+0x36/0x510 [ 1463.408994] ? lock_acquire+0x197/0x490 [ 1463.409552] do_iter_read+0x28f/0x6d0 [ 1463.410205] ? import_iovec+0x83/0xb0 [ 1463.410785] vfs_readv+0xe5/0x160 [ 1463.411274] ? vfs_iter_read+0xa0/0xa0 [ 1463.411867] ? __fdget_pos+0xed/0x110 [ 1463.412393] ? find_held_lock+0x2c/0x110 [ 1463.412997] ? __fget_files+0x296/0x480 [ 1463.413597] do_readv+0x139/0x300 [ 1463.414090] ? vfs_readv+0x160/0x160 [ 1463.414645] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1463.415649] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1463.416508] do_syscall_64+0x33/0x40 [ 1463.417032] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1463.417817] RIP: 0033:0x7f2daa4c6b19 [ 1463.418383] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1463.421212] RSP: 002b:00007f2da7a3c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000013 [ 1463.422337] RAX: ffffffffffffffda RBX: 00007f2daa5d9f60 RCX: 00007f2daa4c6b19 [ 1463.423371] RDX: 0000000000000001 RSI: 0000000020000280 RDI: 0000000000000003 [ 1463.424459] RBP: 00007f2da7a3c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1463.425522] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1463.426793] R13: 00007ffc5d7bee0f R14: 00007f2da7a3c300 R15: 0000000000022000 08:22:32 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0x1cc}], 0x1) [ 1463.497224] FAULT_INJECTION: forcing a failure. [ 1463.497224] name failslab, interval 1, probability 0, space 0, times 0 [ 1463.499001] CPU: 1 PID: 8614 Comm: syz-executor.7 Not tainted 5.10.155 #1 [ 1463.500008] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1463.501019] Call Trace: [ 1463.501368] dump_stack+0x107/0x167 [ 1463.501840] should_fail.cold+0x5/0xa [ 1463.502326] ? cgroup_show_path+0xc4/0x5d0 [ 1463.502870] ? cgroup_show_path+0xc4/0x5d0 [ 1463.503414] should_failslab+0x5/0x20 [ 1463.504022] kmem_cache_alloc_trace+0x55/0x360 [ 1463.504672] cgroup_show_path+0xc4/0x5d0 [ 1463.505208] ? task_cgroup_path+0x3e0/0x3e0 [ 1463.505864] kernfs_sop_show_path+0x122/0x190 [ 1463.507321] ? kernfs_test_super+0x140/0x140 [ 1463.508021] show_mountinfo+0x23b/0xb80 [ 1463.508551] ? rwlock_bug.part.0+0x90/0x90 [ 1463.509088] ? mounts_release+0x100/0x100 [ 1463.509618] ? do_raw_spin_unlock+0x4f/0x220 [ 1463.510187] ? _raw_spin_unlock+0x1a/0x30 [ 1463.510722] seq_read_iter+0xbf0/0x12b0 [ 1463.511251] do_iter_readv_writev+0x57c/0x750 [ 1463.511835] ? new_sync_write+0x660/0x660 [ 1463.512433] ? selinux_file_permission+0x36/0x510 [ 1463.513050] ? lock_acquire+0x197/0x490 [ 1463.513569] do_iter_read+0x28f/0x6d0 [ 1463.514063] ? import_iovec+0x83/0xb0 [ 1463.514552] vfs_readv+0xe5/0x160 [ 1463.515000] ? vfs_iter_read+0xa0/0xa0 [ 1463.515494] ? __fdget_pos+0xed/0x110 [ 1463.516230] ? find_held_lock+0x2c/0x110 [ 1463.517211] ? __fget_files+0x296/0x480 [ 1463.518200] do_readv+0x139/0x300 [ 1463.519172] ? vfs_readv+0x160/0x160 [ 1463.520290] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1463.521776] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1463.522537] do_syscall_64+0x33/0x40 [ 1463.523500] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1463.525054] RIP: 0033:0x7fc5b62b8b19 [ 1463.526147] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1463.535566] RSP: 002b:00007fc5b382e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000013 [ 1463.537850] RAX: ffffffffffffffda RBX: 00007fc5b63cbf60 RCX: 00007fc5b62b8b19 [ 1463.539934] RDX: 0000000000000001 RSI: 0000000020000280 RDI: 0000000000000003 [ 1463.541971] RBP: 00007fc5b382e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1463.543979] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1463.545897] R13: 00007fffa936dbcf R14: 00007fc5b382e300 R15: 0000000000022000 08:22:32 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0x174}], 0x1) 08:22:32 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0xd8, 0x8, 0x4, 0xa09, 0x3, 0x3, 0x1, 0x2a8, 0x40, 0x1a2, 0x1, 0x100, 0x38, 0x1, 0x0, 0x0, 0x8}, [{0x5, 0xfffffd4b, 0x5, 0x0, 0x9, 0x6}, {0x4, 0xfffffff7, 0x8, 0x80000001, 0x5, 0x385, 0xfff, 0x1}], "37cacaa561", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x5b5) 08:22:32 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000040)=0x9, 0x3) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000080)=0x6) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r1, 0x800) r2 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file1\x00', 0x153200, 0x6) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$BTRFS_IOC_SET_FEATURES(r3, 0x40309439, &(0x7f0000000140)={0x3, 0x1, 0x2}) write$cgroup_netprio_ifpriomap(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB], 0xf) r4 = dup(r2) pidfd_getfd(0xffffffffffffffff, r4, 0x0) 08:22:32 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) (fail_nth: 3) [ 1463.823176] FAULT_INJECTION: forcing a failure. [ 1463.823176] name failslab, interval 1, probability 0, space 0, times 0 [ 1463.824886] CPU: 0 PID: 8630 Comm: syz-executor.2 Not tainted 5.10.155 #1 [ 1463.825827] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1463.826866] Call Trace: [ 1463.827214] dump_stack+0x107/0x167 [ 1463.827693] should_fail.cold+0x5/0xa [ 1463.828242] ? create_object.isra.0+0x3a/0xa20 [ 1463.828846] should_failslab+0x5/0x20 [ 1463.829351] kmem_cache_alloc+0x5b/0x360 [ 1463.829887] create_object.isra.0+0x3a/0xa20 [ 1463.830463] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1463.831117] __kmalloc_node+0x1ae/0x4b0 [ 1463.831643] kvmalloc_node+0x119/0x170 [ 1463.832175] seq_read_iter+0x81c/0x12b0 [ 1463.832670] ? __might_fault+0xd3/0x180 [ 1463.833181] do_iter_readv_writev+0x57c/0x750 [ 1463.833773] ? new_sync_write+0x660/0x660 [ 1463.834315] ? selinux_file_permission+0x36/0x510 [ 1463.834982] ? lock_acquire+0x197/0x490 [ 1463.835509] do_iter_read+0x28f/0x6d0 [ 1463.836048] ? import_iovec+0x83/0xb0 [ 1463.836600] vfs_readv+0xe5/0x160 [ 1463.837107] ? vfs_iter_read+0xa0/0xa0 [ 1463.837676] ? __fdget_pos+0xed/0x110 [ 1463.838177] ? find_held_lock+0x2c/0x110 [ 1463.838780] ? __fget_files+0x296/0x480 [ 1463.839326] do_readv+0x139/0x300 [ 1463.839852] ? vfs_readv+0x160/0x160 [ 1463.840406] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1463.841151] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1463.841897] do_syscall_64+0x33/0x40 [ 1463.842455] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1463.843189] RIP: 0033:0x7f2daa4c6b19 [ 1463.843737] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1463.846333] RSP: 002b:00007f2da7a3c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000013 [ 1463.847341] RAX: ffffffffffffffda RBX: 00007f2daa5d9f60 RCX: 00007f2daa4c6b19 [ 1463.848321] RDX: 0000000000000001 RSI: 0000000020000280 RDI: 0000000000000003 [ 1463.849278] RBP: 00007f2da7a3c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1463.850233] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1463.851273] R13: 00007ffc5d7bee0f R14: 00007f2da7a3c300 R15: 0000000000022000 [ 1463.852475] hpet: Lost 1 RTC interrupts [ 1466.407864] hpet: Lost 1 RTC interrupts 08:22:45 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r0, 0x800) r1 = dup(r0) write$binfmt_elf64(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0xff, 0x0, 0x1f, 0x6, 0x2, 0x3, 0x8, 0xbe, 0x40, 0x117, 0x4, 0x5, 0x38, 0x2, 0x7, 0x2, 0x7}, [{0x6, 0x6, 0x3ff, 0x1f, 0x401, 0x1f, 0x4, 0x5}], "c733efa93d72c79d2289aada0aec56130cfc7360bc6d13801ae11db4053cdfad6bd31338c39c6919727607fdc7bf63dc71cd84dcd8f0b0578729db9628d21751d4a0ceb79567", ['\x00']}, 0x1be) write$cgroup_netprio_ifpriomap(r0, &(0x7f00000003c0)={'bond_slave_1'}, 0xf) 08:22:45 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0xd8, 0x8, 0x4, 0xa09, 0x3, 0x3, 0x1, 0x2a8, 0x40, 0x1a2, 0x1, 0x100, 0x38, 0x1, 0x0, 0x0, 0x8}, [{0x5, 0xfffffd4b, 0x5, 0x0, 0x9, 0x6}, {0x4, 0xfffffff7, 0x8, 0x80000001, 0x5, 0x385, 0xfff, 0x1}], "37cacaa561", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x5b5) 08:22:45 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) (fail_nth: 4) 08:22:45 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0x223}], 0x1) 08:22:45 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0x1cc}], 0x1) 08:22:45 executing program 5: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:22:45 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0xd8, 0x8, 0x4, 0xa09, 0x3, 0x3, 0x1, 0x2a8, 0x40, 0x1a2, 0x1, 0x100, 0x38, 0x1, 0x0, 0x0, 0x8}, [{0x5, 0xfffffd4b, 0x5, 0x0, 0x9, 0x6}, {0x4, 0xfffffff7, 0x8, 0x80000001, 0x5, 0x385, 0xfff, 0x1}], "37cacaa561", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x5b5) 08:22:45 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) (fail_nth: 11) [ 1477.123789] FAULT_INJECTION: forcing a failure. 08:22:45 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0x267}], 0x1) [ 1477.123789] name failslab, interval 1, probability 0, space 0, times 0 [ 1477.127346] CPU: 0 PID: 8646 Comm: syz-executor.7 Not tainted 5.10.155 #1 [ 1477.128465] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1477.129671] Call Trace: [ 1477.130061] dump_stack+0x107/0x167 [ 1477.130608] should_fail.cold+0x5/0xa [ 1477.131164] ? create_object.isra.0+0x3a/0xa20 [ 1477.131856] should_failslab+0x5/0x20 [ 1477.132432] kmem_cache_alloc+0x5b/0x360 [ 1477.133031] create_object.isra.0+0x3a/0xa20 [ 1477.133701] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1477.134481] kmem_cache_alloc_trace+0x151/0x360 [ 1477.135182] cgroup_show_path+0xc4/0x5d0 [ 1477.135782] ? task_cgroup_path+0x3e0/0x3e0 [ 1477.136441] kernfs_sop_show_path+0x122/0x190 [ 1477.137126] ? kernfs_test_super+0x140/0x140 [ 1477.137790] show_mountinfo+0x23b/0xb80 [ 1477.138385] ? rwlock_bug.part.0+0x90/0x90 [ 1477.139027] ? mounts_release+0x100/0x100 08:22:45 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0xd8, 0x8, 0x4, 0xa09, 0x3, 0x3, 0x1, 0x2a8, 0x40, 0x1a2, 0x1, 0x100, 0x38, 0x1, 0x0, 0x0, 0x8}, [{0x5, 0xfffffd4b, 0x5, 0x0, 0x9, 0x6}, {0x4, 0xfffffff7, 0x8, 0x80000001, 0x5, 0x385, 0xfff, 0x1}], "37cacaa561", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x5b5) [ 1477.139635] ? do_raw_spin_unlock+0x4f/0x220 [ 1477.140359] ? _raw_spin_unlock+0x1a/0x30 [ 1477.140994] seq_read_iter+0xbf0/0x12b0 [ 1477.141621] do_iter_readv_writev+0x57c/0x750 [ 1477.142294] ? new_sync_write+0x660/0x660 [ 1477.142914] ? selinux_file_permission+0x36/0x510 [ 1477.143642] ? lock_acquire+0x197/0x490 [ 1477.144260] do_iter_read+0x28f/0x6d0 [ 1477.144841] ? import_iovec+0x83/0xb0 [ 1477.145410] vfs_readv+0xe5/0x160 [ 1477.145933] ? vfs_iter_read+0xa0/0xa0 [ 1477.146523] ? __fdget_pos+0xed/0x110 [ 1477.147096] ? find_held_lock+0x2c/0x110 [ 1477.147716] ? __fget_files+0x296/0x480 [ 1477.148337] do_readv+0x139/0x300 [ 1477.148861] ? vfs_readv+0x160/0x160 [ 1477.149414] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1477.150194] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1477.150973] do_syscall_64+0x33/0x40 [ 1477.151530] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1477.152320] RIP: 0033:0x7fc5b62b8b19 [ 1477.152873] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1477.155639] RSP: 002b:00007fc5b382e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000013 [ 1477.156793] RAX: ffffffffffffffda RBX: 00007fc5b63cbf60 RCX: 00007fc5b62b8b19 [ 1477.157862] RDX: 0000000000000001 RSI: 0000000020000280 RDI: 0000000000000003 [ 1477.158911] RBP: 00007fc5b382e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1477.159963] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1477.161013] R13: 00007fffa936dbcf R14: 00007fc5b382e300 R15: 0000000000022000 [ 1477.162251] hpet: Lost 1 RTC interrupts 08:22:45 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0x223}], 0x1) [ 1477.211476] FAULT_INJECTION: forcing a failure. 08:22:46 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r0, 0x800) write$cgroup_netprio_ifpriomap(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB='bond_slavey12\x00\x00'], 0xf) [ 1477.211476] name failslab, interval 1, probability 0, space 0, times 0 [ 1477.213732] CPU: 0 PID: 8650 Comm: syz-executor.2 Not tainted 5.10.155 #1 [ 1477.214742] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1477.215944] Call Trace: [ 1477.216362] dump_stack+0x107/0x167 [ 1477.216910] should_fail.cold+0x5/0xa [ 1477.217470] ? cgroup_show_path+0xc4/0x5d0 [ 1477.218111] ? cgroup_show_path+0xc4/0x5d0 [ 1477.218735] should_failslab+0x5/0x20 [ 1477.219301] kmem_cache_alloc_trace+0x55/0x360 [ 1477.219988] cgroup_show_path+0xc4/0x5d0 [ 1477.220590] ? task_cgroup_path+0x3e0/0x3e0 [ 1477.221271] kernfs_sop_show_path+0x122/0x190 [ 1477.221954] ? kernfs_test_super+0x140/0x140 [ 1477.222643] show_mountinfo+0x23b/0xb80 [ 1477.223254] ? rwlock_bug.part.0+0x90/0x90 [ 1477.223909] ? mounts_release+0x100/0x100 [ 1477.224561] ? do_raw_spin_unlock+0x4f/0x220 [ 1477.225280] ? _raw_spin_unlock+0x1a/0x30 [ 1477.225941] seq_read_iter+0xbf0/0x12b0 [ 1477.226564] do_iter_readv_writev+0x57c/0x750 [ 1477.227234] ? new_sync_write+0x660/0x660 [ 1477.227857] ? selinux_file_permission+0x36/0x510 [ 1477.228600] ? lock_acquire+0x197/0x490 [ 1477.229242] do_iter_read+0x28f/0x6d0 [ 1477.229842] ? import_iovec+0x83/0xb0 [ 1477.230410] vfs_readv+0xe5/0x160 [ 1477.230926] ? vfs_iter_read+0xa0/0xa0 [ 1477.231520] ? __fdget_pos+0xed/0x110 [ 1477.232130] ? find_held_lock+0x2c/0x110 [ 1477.232758] ? __fget_files+0x296/0x480 [ 1477.233385] do_readv+0x139/0x300 [ 1477.233919] ? vfs_readv+0x160/0x160 [ 1477.234491] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1477.235307] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1477.236109] do_syscall_64+0x33/0x40 [ 1477.236657] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1477.237441] RIP: 0033:0x7f2daa4c6b19 [ 1477.237996] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1477.240813] RSP: 002b:00007f2da7a3c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000013 [ 1477.241965] RAX: ffffffffffffffda RBX: 00007f2daa5d9f60 RCX: 00007f2daa4c6b19 [ 1477.243030] RDX: 0000000000000001 RSI: 0000000020000280 RDI: 0000000000000003 [ 1477.244100] RBP: 00007f2da7a3c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1477.245151] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1477.246238] R13: 00007ffc5d7bee0f R14: 00007f2da7a3c300 R15: 0000000000022000 [ 1477.247556] hpet: Lost 1 RTC interrupts 08:22:46 executing program 4: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x80, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x80}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:22:59 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0x2e5}], 0x1) 08:22:59 executing program 5: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:22:59 executing program 4: clone3(&(0x7f0000000140)={0x11060900, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)={0x0}) r1 = memfd_create(&(0x7f0000000000)='\x00', 0x6) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={r0, 0x2, r1, 0xf5f, 0x80000}) r2 = fsopen(&(0x7f0000000040)='autofs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r2, 0x6, 0x0, 0x0, 0x0) 08:22:59 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0x267}], 0x1) 08:22:59 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) (fail_nth: 5) 08:22:59 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) (fail_nth: 12) 08:22:59 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r0, 0x800) write$cgroup_netprio_ifpriomap(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="626fc0fb5e736c6176655f31323000d1"], 0xf) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000003e00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000500)={0xa, 0x4e21, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000001740)=[@tclass={{0x14, 0x29, 0x43, 0x8f76}}], 0x18}}], 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000080)={0x7ff000, 0x56a, 0x6, 0x0, 0xfffffffe}) 08:22:59 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0xd8, 0x8, 0x4, 0xa09, 0x3, 0x3, 0x1, 0x2a8, 0x40, 0x1a2, 0x1, 0x100, 0x38, 0x1, 0x0, 0x0, 0x8}, [{0x5, 0xfffffd4b, 0x5, 0x0, 0x9, 0x6}, {0x4, 0xfffffff7, 0x8, 0x80000001, 0x5, 0x385, 0xfff, 0x1}], "37cacaa561", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x5b5) [ 1490.421662] FAULT_INJECTION: forcing a failure. [ 1490.421662] name failslab, interval 1, probability 0, space 0, times 0 [ 1490.423156] CPU: 0 PID: 8679 Comm: syz-executor.2 Not tainted 5.10.155 #1 [ 1490.424101] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1490.425383] Call Trace: [ 1490.425781] dump_stack+0x107/0x167 [ 1490.426324] should_fail.cold+0x5/0xa [ 1490.426897] ? create_object.isra.0+0x3a/0xa20 [ 1490.427590] should_failslab+0x5/0x20 [ 1490.428206] kmem_cache_alloc+0x5b/0x360 [ 1490.428912] create_object.isra.0+0x3a/0xa20 [ 1490.429600] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1490.430377] kmem_cache_alloc_trace+0x151/0x360 [ 1490.431073] cgroup_show_path+0xc4/0x5d0 [ 1490.431650] ? task_cgroup_path+0x3e0/0x3e0 [ 1490.432270] kernfs_sop_show_path+0x122/0x190 [ 1490.432892] ? kernfs_test_super+0x140/0x140 [ 1490.433512] show_mountinfo+0x23b/0xb80 [ 1490.434075] ? rwlock_bug.part.0+0x90/0x90 [ 1490.434676] ? mounts_release+0x100/0x100 [ 1490.435253] ? do_raw_spin_unlock+0x4f/0x220 [ 1490.435930] ? _raw_spin_unlock+0x1a/0x30 [ 1490.436553] seq_read_iter+0xbf0/0x12b0 [ 1490.437185] do_iter_readv_writev+0x57c/0x750 [ 1490.437871] ? new_sync_write+0x660/0x660 [ 1490.438517] ? selinux_file_permission+0x36/0x510 [ 1490.439240] ? lock_acquire+0x197/0x490 [ 1490.439854] do_iter_read+0x28f/0x6d0 [ 1490.440425] ? import_iovec+0x83/0xb0 [ 1490.441058] vfs_readv+0xe5/0x160 [ 1490.441579] ? vfs_iter_read+0xa0/0xa0 [ 1490.442178] ? __fdget_pos+0xed/0x110 [ 1490.442802] ? find_held_lock+0x2c/0x110 [ 1490.443466] ? __fget_files+0x296/0x480 [ 1490.444096] do_readv+0x139/0x300 [ 1490.444655] ? vfs_readv+0x160/0x160 [ 1490.445234] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1490.446029] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1490.446820] do_syscall_64+0x33/0x40 [ 1490.447394] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1490.448219] RIP: 0033:0x7f2daa4c6b19 [ 1490.448781] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1490.451655] RSP: 002b:00007f2da7a3c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000013 [ 1490.452811] RAX: ffffffffffffffda RBX: 00007f2daa5d9f60 RCX: 00007f2daa4c6b19 [ 1490.453902] RDX: 0000000000000001 RSI: 0000000020000280 RDI: 0000000000000003 [ 1490.454991] RBP: 00007f2da7a3c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1490.456064] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1490.457139] R13: 00007ffc5d7bee0f R14: 00007f2da7a3c300 R15: 0000000000022000 [ 1490.458375] hpet: Lost 1 RTC interrupts 08:22:59 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0x336}], 0x1) [ 1490.479188] FAULT_INJECTION: forcing a failure. [ 1490.479188] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1490.481003] CPU: 0 PID: 8681 Comm: syz-executor.7 Not tainted 5.10.155 #1 [ 1490.482040] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1490.483296] Call Trace: [ 1490.483697] dump_stack+0x107/0x167 [ 1490.484326] should_fail.cold+0x5/0xa [ 1490.484935] _copy_to_iter+0x258/0x1080 [ 1490.485565] ? __up_read+0x19f/0x7a0 [ 1490.486153] ? _copy_from_iter_nocache+0xc20/0xc20 [ 1490.486940] ? __virt_addr_valid+0x128/0x350 [ 1490.487610] ? __check_object_size+0x319/0x440 [ 1490.488324] seq_read_iter+0xdcb/0x12b0 [ 1490.488941] do_iter_readv_writev+0x57c/0x750 [ 1490.489606] ? new_sync_write+0x660/0x660 [ 1490.490221] ? selinux_file_permission+0x36/0x510 [ 1490.490949] ? lock_acquire+0x197/0x490 [ 1490.491599] do_iter_read+0x28f/0x6d0 [ 1490.492207] ? import_iovec+0x83/0xb0 [ 1490.492816] vfs_readv+0xe5/0x160 [ 1490.493347] ? vfs_iter_read+0xa0/0xa0 [ 1490.493962] ? __fdget_pos+0xed/0x110 [ 1490.494546] ? find_held_lock+0x2c/0x110 [ 1490.495164] ? __fget_files+0x296/0x480 [ 1490.495789] do_readv+0x139/0x300 [ 1490.496338] ? vfs_readv+0x160/0x160 [ 1490.496898] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1490.497687] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1490.498484] do_syscall_64+0x33/0x40 [ 1490.499036] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1490.499833] RIP: 0033:0x7fc5b62b8b19 [ 1490.500417] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1490.503247] RSP: 002b:00007fc5b382e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000013 [ 1490.504415] RAX: ffffffffffffffda RBX: 00007fc5b63cbf60 RCX: 00007fc5b62b8b19 [ 1490.505489] RDX: 0000000000000001 RSI: 0000000020000280 RDI: 0000000000000003 [ 1490.506544] RBP: 00007fc5b382e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1490.507614] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1490.508756] R13: 00007fffa936dbcf R14: 00007fc5b382e300 R15: 0000000000022000 [ 1490.509979] hpet: Lost 1 RTC interrupts 08:22:59 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) (fail_nth: 6) 08:22:59 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0x2e5}], 0x1) [ 1490.572560] autofs4:pid:8683:autofs_fill_super: called with bogus options 08:22:59 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0xd8, 0x8, 0x4, 0xa09, 0x3, 0x3, 0x1, 0x2a8, 0x40, 0x1a2, 0x1, 0x100, 0x38, 0x1, 0x0, 0x0, 0x8}, [{0x5, 0xfffffd4b, 0x5, 0x0, 0x9, 0x6}, {0x4, 0xfffffff7, 0x8, 0x80000001, 0x5, 0x385, 0xfff, 0x1}], "37cacaa561", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x5b5) [ 1490.591949] FAULT_INJECTION: forcing a failure. [ 1490.591949] name failslab, interval 1, probability 0, space 0, times 0 [ 1490.593772] CPU: 0 PID: 8691 Comm: syz-executor.2 Not tainted 5.10.155 #1 [ 1490.594595] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1490.595572] Call Trace: [ 1490.595889] dump_stack+0x107/0x167 [ 1490.596508] should_fail.cold+0x5/0xa [ 1490.596964] ? cgroup_show_path+0xc4/0x5d0 [ 1490.597503] should_failslab+0x5/0x20 [ 1490.598004] kmem_cache_alloc_trace+0x55/0x360 [ 1490.598539] cgroup_show_path+0xc4/0x5d0 [ 1490.599028] ? task_cgroup_path+0x3e0/0x3e0 [ 1490.599530] kernfs_sop_show_path+0x122/0x190 [ 1490.600054] ? kernfs_test_super+0x140/0x140 [ 1490.600599] show_mountinfo+0x23b/0xb80 [ 1490.601060] ? rwlock_bug.part.0+0x90/0x90 [ 1490.601551] ? mounts_release+0x100/0x100 [ 1490.602036] ? do_raw_spin_unlock+0x4f/0x220 [ 1490.602543] ? _raw_spin_unlock+0x1a/0x30 [ 1490.603027] seq_read_iter+0xbf0/0x12b0 [ 1490.603494] do_iter_readv_writev+0x57c/0x750 [ 1490.603984] ? new_sync_write+0x660/0x660 [ 1490.604487] ? selinux_file_permission+0x36/0x510 [ 1490.605035] ? lock_acquire+0x197/0x490 [ 1490.605488] do_iter_read+0x28f/0x6d0 [ 1490.605924] ? import_iovec+0x83/0xb0 [ 1490.606363] vfs_readv+0xe5/0x160 [ 1490.606760] ? vfs_iter_read+0xa0/0xa0 [ 1490.607238] ? __fdget_pos+0xed/0x110 [ 1490.607686] ? find_held_lock+0x2c/0x110 [ 1490.608178] ? __fget_files+0x296/0x480 [ 1490.608659] do_readv+0x139/0x300 [ 1490.609041] ? vfs_readv+0x160/0x160 [ 1490.609475] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1490.610064] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1490.610639] do_syscall_64+0x33/0x40 [ 1490.611059] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1490.611632] RIP: 0033:0x7f2daa4c6b19 [ 1490.612058] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1490.614175] RSP: 002b:00007f2da7a3c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000013 [ 1490.615070] RAX: ffffffffffffffda RBX: 00007f2daa5d9f60 RCX: 00007f2daa4c6b19 [ 1490.615887] RDX: 0000000000000001 RSI: 0000000020000280 RDI: 0000000000000003 [ 1490.616727] RBP: 00007f2da7a3c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1490.617623] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1490.618699] R13: 00007ffc5d7bee0f R14: 00007f2da7a3c300 R15: 0000000000022000 [ 1490.619732] hpet: Lost 1 RTC interrupts 08:22:59 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0x384}], 0x1) 08:22:59 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r0, 0x800) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r0) write$cgroup_netprio_ifpriomap(r0, &(0x7f00000003c0)={'bond_slave_1'}, 0xf) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0xba, @dev={0xfe, 0x80, '\x00', 0x11}, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000003e00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000500)={0xa, 0x4e21, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000001740)=ANY=[@ANYBLOB="140000000000235d9150000043000000768f000005000000"], 0x18}}], 0x2, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f00000000c0)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000080)) ioctl$FS_IOC_READ_VERITY_METADATA(r0, 0xc0286687, &(0x7f0000000100)={0x3, 0x8, 0x4f, &(0x7f0000000140)=""/79}) 08:22:59 executing program 4: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:22:59 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0x336}], 0x1) 08:22:59 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) (fail_nth: 13) 08:22:59 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0xd8, 0x8, 0x4, 0xa09, 0x3, 0x3, 0x1, 0x2a8, 0x40, 0x1a2, 0x1, 0x100, 0x38, 0x1, 0x0, 0x0, 0x8}, [{0x5, 0xfffffd4b, 0x5, 0x0, 0x9, 0x6}, {0x4, 0xfffffff7, 0x8, 0x80000001, 0x5, 0x385, 0xfff, 0x1}], "37cacaa561", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x5b5) [ 1490.865830] FAULT_INJECTION: forcing a failure. [ 1490.865830] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1490.867525] CPU: 1 PID: 8713 Comm: syz-executor.7 Not tainted 5.10.155 #1 [ 1490.868536] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1490.869752] Call Trace: [ 1490.870141] dump_stack+0x107/0x167 [ 1490.870668] should_fail.cold+0x5/0xa [ 1490.871231] _copy_to_user+0x2e/0x180 [ 1490.871794] simple_read_from_buffer+0xcc/0x160 [ 1490.872487] proc_fail_nth_read+0x198/0x230 [ 1490.873119] ? proc_sessionid_read+0x230/0x230 [ 1490.873774] ? security_file_permission+0x24e/0x570 [ 1490.874505] ? perf_trace_initcall_start+0x101/0x380 [ 1490.875244] ? proc_sessionid_read+0x230/0x230 [ 1490.875912] vfs_read+0x228/0x580 [ 1490.876448] ksys_read+0x12d/0x260 [ 1490.876964] ? __ia32_sys_pwrite64+0x230/0x230 [ 1490.877626] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1490.878387] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1490.879117] do_syscall_64+0x33/0x40 [ 1490.879663] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1490.880428] RIP: 0033:0x7fc5b626b69c [ 1490.880964] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1490.883676] RSP: 002b:00007fc5b382e170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1490.884789] RAX: ffffffffffffffda RBX: 0000000000000730 RCX: 00007fc5b626b69c [ 1490.885830] RDX: 000000000000000f RSI: 00007fc5b382e1e0 RDI: 0000000000000004 [ 1490.886856] RBP: 00007fc5b382e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1490.887888] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1490.888936] R13: 00007fffa936dbcf R14: 00007fc5b382e300 R15: 0000000000022000 08:23:12 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0x3ce}], 0x1) 08:23:12 executing program 4: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:23:12 executing program 5: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x74, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x74}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:23:12 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) (fail_nth: 7) 08:23:12 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0xd8, 0x8, 0x4, 0xa09, 0x3, 0x3, 0x1, 0x2a8, 0x40, 0x1a2, 0x1, 0x100, 0x38, 0x1, 0x0, 0x0, 0x8}, [{0x5, 0xfffffd4b, 0x5, 0x0, 0x9, 0x6}, {0x4, 0xfffffff7, 0x8, 0x80000001, 0x5, 0x385, 0xfff, 0x1}], "37cacaa561", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x5b5) 08:23:12 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffff8, 0xfff}}, 0x0, 0x0, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r0, 0x800) write$cgroup_netprio_ifpriomap(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="626f000000006c6176655f31320000347bca141938e45edd7399a254bb3c8a6607106339b9615cc4a097f5af51b10cbe2fa2e15db2ea865920cde708f399"], 0xf) getdents64(r0, &(0x7f0000000100)=""/239, 0xef) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x76, 0x9, 0x7f, 0x1e, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80, 0x4, @perf_config_ext={0x7, 0x4}, 0x4000c, 0x3, 0x3, 0x2, 0x9, 0x4, 0x200, 0x0, 0xbd, 0x0, 0x472}, 0x0, 0x2, r0, 0x0) 08:23:12 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0x384}], 0x1) 08:23:12 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) [ 1504.208156] FAULT_INJECTION: forcing a failure. [ 1504.208156] name failslab, interval 1, probability 0, space 0, times 0 [ 1504.209849] CPU: 0 PID: 8733 Comm: syz-executor.2 Not tainted 5.10.155 #1 [ 1504.210890] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1504.212157] Call Trace: [ 1504.212597] dump_stack+0x107/0x167 [ 1504.213180] should_fail.cold+0x5/0xa [ 1504.213779] ? create_object.isra.0+0x3a/0xa20 [ 1504.214506] should_failslab+0x5/0x20 [ 1504.215099] kmem_cache_alloc+0x5b/0x360 [ 1504.215731] create_object.isra.0+0x3a/0xa20 [ 1504.216413] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1504.217014] kmem_cache_alloc_trace+0x151/0x360 [ 1504.217570] cgroup_show_path+0xc4/0x5d0 [ 1504.218051] ? task_cgroup_path+0x3e0/0x3e0 [ 1504.218548] kernfs_sop_show_path+0x122/0x190 [ 1504.219065] ? kernfs_test_super+0x140/0x140 [ 1504.219581] show_mountinfo+0x23b/0xb80 [ 1504.220054] ? rwlock_bug.part.0+0x90/0x90 [ 1504.220577] ? mounts_release+0x100/0x100 [ 1504.221062] ? do_raw_spin_unlock+0x4f/0x220 [ 1504.221581] ? _raw_spin_unlock+0x1a/0x30 [ 1504.222027] seq_read_iter+0xbf0/0x12b0 [ 1504.222504] do_iter_readv_writev+0x57c/0x750 [ 1504.223029] ? new_sync_write+0x660/0x660 [ 1504.223527] ? selinux_file_permission+0x36/0x510 [ 1504.224094] ? lock_acquire+0x197/0x490 [ 1504.224588] do_iter_read+0x28f/0x6d0 [ 1504.225040] ? import_iovec+0x83/0xb0 [ 1504.225459] vfs_readv+0xe5/0x160 [ 1504.225862] ? vfs_iter_read+0xa0/0xa0 [ 1504.226428] ? __fdget_pos+0xed/0x110 [ 1504.226879] ? find_held_lock+0x2c/0x110 [ 1504.227366] ? __fget_files+0x296/0x480 [ 1504.227827] do_readv+0x139/0x300 [ 1504.228235] ? vfs_readv+0x160/0x160 [ 1504.228681] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1504.229311] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1504.229911] do_syscall_64+0x33/0x40 [ 1504.230339] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1504.230941] RIP: 0033:0x7f2daa4c6b19 [ 1504.231380] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1504.233555] RSP: 002b:00007f2da7a3c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000013 [ 1504.234451] RAX: ffffffffffffffda RBX: 00007f2daa5d9f60 RCX: 00007f2daa4c6b19 [ 1504.235302] RDX: 0000000000000001 RSI: 0000000020000280 RDI: 0000000000000003 [ 1504.236162] RBP: 00007f2da7a3c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1504.237004] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1504.237856] R13: 00007ffc5d7bee0f R14: 00007f2da7a3c300 R15: 0000000000022000 [ 1504.238850] hpet: Lost 1 RTC interrupts 08:23:13 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0x420}], 0x1) 08:23:13 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0x3ce}], 0x1) 08:23:13 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) write$binfmt_elf64(r0, 0x0, 0x0) 08:23:13 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r0, 0x800) write$cgroup_netprio_ifpriomap(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="ef36ff56ec54b6ae6a6f6e645f0700"], 0xf) 08:23:13 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0x62}], 0x1) 08:23:13 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) (fail_nth: 8) 08:23:13 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0x420}], 0x1) 08:23:13 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0x481}], 0x1) 08:23:13 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xc8}], 0x1) [ 1504.478292] FAULT_INJECTION: forcing a failure. [ 1504.478292] name failslab, interval 1, probability 0, space 0, times 0 [ 1504.479868] CPU: 1 PID: 8755 Comm: syz-executor.2 Not tainted 5.10.155 #1 [ 1504.480792] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1504.481884] Call Trace: [ 1504.482223] dump_stack+0x107/0x167 [ 1504.482640] should_fail.cold+0x5/0xa [ 1504.483165] ? cgroup_show_path+0xc4/0x5d0 [ 1504.483720] should_failslab+0x5/0x20 [ 1504.484154] kmem_cache_alloc_trace+0x55/0x360 [ 1504.484729] cgroup_show_path+0xc4/0x5d0 [ 1504.485187] ? task_cgroup_path+0x3e0/0x3e0 [ 1504.485830] kernfs_sop_show_path+0x122/0x190 [ 1504.486415] ? kernfs_test_super+0x140/0x140 [ 1504.487114] show_mountinfo+0x23b/0xb80 [ 1504.487567] ? rwlock_bug.part.0+0x90/0x90 [ 1504.488150] ? mounts_release+0x100/0x100 [ 1504.488644] ? do_raw_spin_unlock+0x4f/0x220 [ 1504.489207] ? _raw_spin_unlock+0x1a/0x30 [ 1504.489742] seq_read_iter+0xbf0/0x12b0 [ 1504.490306] do_iter_readv_writev+0x57c/0x750 [ 1504.490910] ? new_sync_write+0x660/0x660 [ 1504.491421] ? selinux_file_permission+0x36/0x510 [ 1504.491981] ? lock_acquire+0x197/0x490 [ 1504.492530] do_iter_read+0x28f/0x6d0 [ 1504.493064] ? import_iovec+0x83/0xb0 [ 1504.493508] vfs_readv+0xe5/0x160 [ 1504.493987] ? vfs_iter_read+0xa0/0xa0 [ 1504.494455] ? __fdget_pos+0xed/0x110 [ 1504.495024] ? find_held_lock+0x2c/0x110 [ 1504.495552] ? __fget_files+0x296/0x480 [ 1504.496109] do_readv+0x139/0x300 [ 1504.496531] ? vfs_readv+0x160/0x160 [ 1504.496983] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1504.497599] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1504.497618] do_syscall_64+0x33/0x40 [ 1504.497629] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1504.499586] RIP: 0033:0x7f2daa4c6b19 [ 1504.500008] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1504.502360] RSP: 002b:00007f2da7a3c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000013 [ 1504.503392] RAX: ffffffffffffffda RBX: 00007f2daa5d9f60 RCX: 00007f2daa4c6b19 [ 1504.504336] RDX: 0000000000000001 RSI: 0000000020000280 RDI: 0000000000000003 [ 1504.505156] RBP: 00007f2da7a3c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1504.506018] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1504.506820] R13: 00007ffc5d7bee0f R14: 00007f2da7a3c300 R15: 0000000000022000 08:23:25 executing program 4: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:23:25 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) write$binfmt_elf64(r0, 0x0, 0x0) 08:23:25 executing program 5: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x74, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x74}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:23:25 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0x481}], 0x1) 08:23:25 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r0, 0x800) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, &(0x7f0000000140)="b03aef1a3cfedad6bd76dee971703efb388cdd31f5734956971b79872ba21b47bf695bb65caaefdc93b5aa4a0e1804137ca8b8993295c90dcd7e925d3db882c8ec169b1737fc30169672ee7f875e0347a0e14782c2276d47bd43388260f6b08d7dcacd41c3cecd83523bad5f47e076030496f229e7dfa1d8082c10f4e5fa5fb407837615152dbd94cd601eb3be50593e67f7bab964235363c90b842c9a7c64f58529450ed6279a7259ea5b095443a6d209ee159f578571e785642634a779d09f68579975566c5ed61385ddeed18e36f98a61441064520a814f65b59c19e5331322b1ddc9d5a4555e384d75dc1b62fb1ab5", 0xf1, 0x4040000, &(0x7f0000000240)=@abs={0x0, 0x0, 0x4e24}, 0x6e) write$cgroup_netprio_ifpriomap(r0, &(0x7f00000003c0)={'bond_slave_1'}, 0xf) 08:23:25 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0x10a}], 0x1) 08:23:25 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) (fail_nth: 9) 08:23:25 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0x4c6}], 0x1) 08:23:25 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0x4c6}], 0x1) [ 1517.072988] FAULT_INJECTION: forcing a failure. [ 1517.072988] name failslab, interval 1, probability 0, space 0, times 0 [ 1517.074285] CPU: 1 PID: 8781 Comm: syz-executor.2 Not tainted 5.10.155 #1 [ 1517.075066] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1517.076025] Call Trace: [ 1517.076338] dump_stack+0x107/0x167 [ 1517.076785] should_fail.cold+0x5/0xa [ 1517.077225] ? create_object.isra.0+0x3a/0xa20 [ 1517.077753] should_failslab+0x5/0x20 [ 1517.078199] kmem_cache_alloc+0x5b/0x360 [ 1517.078655] create_object.isra.0+0x3a/0xa20 [ 1517.079157] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1517.079742] kmem_cache_alloc_trace+0x151/0x360 [ 1517.080247] cgroup_show_path+0xc4/0x5d0 [ 1517.080713] ? task_cgroup_path+0x3e0/0x3e0 [ 1517.081181] kernfs_sop_show_path+0x122/0x190 [ 1517.081684] ? kernfs_test_super+0x140/0x140 [ 1517.082180] show_mountinfo+0x23b/0xb80 [ 1517.082644] ? rwlock_bug.part.0+0x90/0x90 [ 1517.083131] ? mounts_release+0x100/0x100 [ 1517.083609] ? do_raw_spin_unlock+0x4f/0x220 [ 1517.084109] ? _raw_spin_unlock+0x1a/0x30 [ 1517.084596] seq_read_iter+0xbf0/0x12b0 [ 1517.085068] do_iter_readv_writev+0x57c/0x750 [ 1517.085623] ? new_sync_write+0x660/0x660 [ 1517.086205] ? selinux_file_permission+0x36/0x510 [ 1517.086759] ? lock_acquire+0x197/0x490 [ 1517.087214] do_iter_read+0x28f/0x6d0 [ 1517.087653] ? import_iovec+0x83/0xb0 [ 1517.088093] vfs_readv+0xe5/0x160 [ 1517.088496] ? vfs_iter_read+0xa0/0xa0 [ 1517.088944] ? __fdget_pos+0xed/0x110 [ 1517.089387] ? find_held_lock+0x2c/0x110 [ 1517.089859] ? __fget_files+0x296/0x480 [ 1517.090335] do_readv+0x139/0x300 [ 1517.090733] ? vfs_readv+0x160/0x160 [ 1517.091157] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1517.091755] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1517.092347] do_syscall_64+0x33/0x40 [ 1517.092776] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1517.093513] RIP: 0033:0x7f2daa4c6b19 [ 1517.094005] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1517.096018] RSP: 002b:00007f2da7a3c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000013 [ 1517.097054] RAX: ffffffffffffffda RBX: 00007f2daa5d9f60 RCX: 00007f2daa4c6b19 [ 1517.098008] RDX: 0000000000000001 RSI: 0000000020000280 RDI: 0000000000000003 [ 1517.098867] RBP: 00007f2da7a3c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1517.099791] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1517.100818] R13: 00007ffc5d7bee0f R14: 00007f2da7a3c300 R15: 0000000000022000 08:23:25 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) write$binfmt_elf64(r0, 0x0, 0x0) 08:23:25 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) (fail_nth: 10) 08:23:25 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r0, 0x800) r1 = getpid() capget(&(0x7f00000000c0)={0x20071026, r1}, &(0x7f0000000100)) perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0x40, 0x4, 0x65, 0x7, 0x0, 0x1, 0x0, 0x4, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000040), 0x8}, 0x4100, 0x35a2, 0x367157b1, 0x7, 0x1, 0x8, 0x2, 0x0, 0x4, 0x0, 0xae9c}, r1, 0xb, r0, 0xb) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) sendmmsg$inet6(r2, &(0x7f0000003e00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000500)={0xa, 0x4e21, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000001740)=[@tclass={{0x14, 0x29, 0x43, 0x8f76}}], 0x18}}], 0x2, 0x0) r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000001c0), 0x400, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000580)={{{@in, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000440)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000dc0)={{{@in=@loopback, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@multicast1}}, &(0x7f0000000ec0)=0xe8) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000001600)={'ip6tnl0\x00', &(0x7f0000001580)={'syztnl1\x00', 0x0, 0x2f, 0x3, 0x4, 0x17f2, 0x8, @private1={0xfc, 0x1, '\x00', 0x1}, @empty, 0x8, 0x80, 0x7, 0x1}}) sendmmsg$inet6(r3, &(0x7f0000001e80)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000200)="6b2b70bdd6f8adb96325baeaf0f5ef748f6f447dc3ea2fb0b16ffc4d5af8e344d6284f007b782ac8fb4597f6117a94af3560665f33169b4c206732229151c1e5946c5b81ea383de161c80a76edab173881d3b4d596d501e0c0d1100d4e981fc34e8c09def28f387138aa79ad4a5944858112e50c5413a48c3086936305c423405c6b6e2297651e80f7037403015b31dce72363ae5c0de350889b6f4533dfec99c603214a61", 0xa5}, {&(0x7f00000002c0)="ba05faf27fc88988afdcff2247740b4a72b5", 0x12}, {&(0x7f0000000300)="df9dc095d8ac10104e6624da34aadac0e275df6724862dd5710ed52187f89c2bebd8a3fa70aea6f5d7b698aaf31dd1ce01e55da499e840dbf4e0eca57609fc9f7bc53f2fc6fb72f83e82003313351f58bcd3ae1f1e2a3f7a4197b759a3b48e7b1a200031d81839a322866a2cffa2d783078f3e03b0304002e1919ba27c863c1ce1c4bd220f3424d44d8a07a06420905507a255c91ab48c", 0x97}], 0x3, &(0x7f0000000680)=[@rthdr={{0x48, 0x29, 0x39, {0x3b, 0x6, 0x2, 0x9, 0x0, [@private2={0xfc, 0x2, '\x00', 0x1}, @private1={0xfc, 0x1, '\x00', 0x1}, @remote]}}}, @pktinfo={{0x24, 0x29, 0x32, {@loopback, r4}}}, @hopopts={{0x80, 0x29, 0x36, {0x3c, 0xc, '\x00', [@ra={0x5, 0x2, 0x1}, @calipso={0x7, 0x30, {0x1, 0xa, 0x8, 0x4, [0x1f, 0x1, 0x101, 0xffffffffffffffff, 0xb6]}}, @calipso={0x7, 0x18, {0x0, 0x4, 0x7f, 0x4, [0x2, 0x80]}}, @hao={0xc9, 0x10, @rand_addr=' \x01\x00'}]}}}, @flowinfo={{0x14, 0x29, 0xb, 0x7fff}}, @dontfrag={{0x14, 0x29, 0x3e, 0x7fffffff}}, @rthdrdstopts={{0x40, 0x29, 0x37, {0x87, 0x4, '\x00', [@calipso={0x7, 0x18, {0x2, 0x4, 0x7f, 0x69c, [0x9, 0x6]}}, @padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}, @pad1, @pad1]}}}, @rthdr={{0xa8, 0x29, 0x39, {0x33, 0x12, 0x1, 0x5, 0x0, [@private1, @private2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @mcast2, @private1, @private0={0xfc, 0x0, '\x00', 0x1}, @remote, @rand_addr=' \x01\x00', @private2]}}}], 0x208}}, {{&(0x7f0000000480)={0xa, 0x4e23, 0xffff, @loopback, 0xfa4}, 0x1c, &(0x7f0000000bc0)=[{&(0x7f00000008c0)="6d4dae9bf24622a375f8eecdab948afcaffa118a00ff4e50e7e138b5c5e34b9c64556ed1a5e480b59d2434db65ebe522541180072d1ec1e6f337be40330f3e870042c7edb0fc8b8d612df368d190fa656cc2a22fd735e3c82e4cb16c1c76e349fd24babf27d44d82c249bfdaf4b6b6e3f700acf976553ce17c9285a15e25f5f0a4", 0x81}, {&(0x7f0000000980)="f8cb595e2b4647e6f97b6f59803bcece5d089741b09eae24925d57070c790bc4c5aa7230e408d13b96247cd8042ec29be6876aab86a9406c997fcbc31abf6005407c53471358871b936d75eda6fab1a9e7e63d8b6424dcec9565f426d583d003823d88fafbea1e1a6708fe0d0b1141cc2bac7951cd1c168055bb183302492e5730d22b8e43b332dd8b805d1088fc8bb24b238624840693914a31d0a7dd74b733993423229d72e8d919e573a1a406aa38eb5a713223eb0603a95d1f23d31c5b2e748b5f5ae7cfa548815a84a8f1c50cbe0ed8fa59", 0xd4}, {&(0x7f0000000a80)="f0fbbbc660c6c1633b1ff30629b4c2ab6295278977d33a5e43bdf23834d53ce5a049295fb02b7c5a16e6c57473bffcf484d2988d18f443173482929d4de05b6d5e33138eee762e001ea6d0233f66ec3392a5d79658826f3572eeb0079d6fc6f913ed78c04aa81680b4296cf619e09f6cf61b5745d16a29b40a133c60657c3f4b09986d252734c57bbb1ee223cff01602ea7706", 0x93}, {&(0x7f0000000b40)="0370ce65a1d32aa85c4b98bb7f2ab7ef3ed3420901c014bc182e9daeedeafef00d19fd05810ece7db5528282ab2572658d4a89affb93cb13cb25ef89d08b8f37b130f9499cf18b4083c6bbb8ce34b13351132c72c2e6f591499d0d8c62464852fa7415205fac8c22985c83cf0edcf1f5a0", 0x71}, {&(0x7f00000004c0)}], 0x5, &(0x7f0000000c40)=[@hopopts_2292={{0x40, 0x29, 0x36, {0x3c, 0x4, '\x00', [@hao={0xc9, 0x10, @private2}, @padn={0x1, 0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @enc_lim={0x4, 0x1, 0x7e}, @ra={0x5, 0x2, 0x4}]}}}], 0x40}}, {{&(0x7f0000000c80)={0xa, 0x4e22, 0x2, @initdev={0xfe, 0x88, '\x00', 0x7f, 0x0}, 0x5}, 0x1c, &(0x7f0000000cc0), 0x0, &(0x7f0000000f00)=[@rthdr_2292={{0x58, 0x29, 0x39, {0x84, 0x8, 0x1, 0xfa, 0x0, [@dev={0xfe, 0x80, '\x00', 0x14}, @rand_addr=' \x01\x00', @mcast2, @mcast1]}}}, @pktinfo={{0x24, 0x29, 0x32, {@private2, r5}}}, @tclass={{0x14, 0x29, 0x43, 0x3}}, @dontfrag={{0x14, 0x29, 0x3e, 0x3}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x8001}}, @tclass={{0x14}}, @rthdr={{0x38, 0x29, 0x39, {0x6c, 0x4, 0x0, 0x74, 0x0, [@mcast1, @loopback]}}}, @flowinfo={{0x14, 0x29, 0xb, 0x9}}], 0x130}}, {{&(0x7f0000001040)={0xa, 0x4e23, 0x6, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x3}, 0x1c, &(0x7f0000001180)=[{&(0x7f0000001080)="b4b236d196ed75", 0x7}, {&(0x7f00000010c0)="c4b6db3fc2751d3fd8ec14b412a7c9f3c8a49549928051a4e84beef03f5576e8032d1f64ed8052ac228b550075", 0x2d}, {&(0x7f0000001100)="71552d95ea120ae5985e91e060f3c79155b98268f3777af65e9970cbc15f0dc2a9ab521fd01dd9f8139402933751c6be8217b91152677b3fa02b66d3330fc4bffab58e3fbc14537dcb5ab34d", 0x4c}], 0x3, &(0x7f00000011c0)=[@flowinfo={{0x14, 0x29, 0xb, 0x9}}], 0x18}}, {{&(0x7f0000001200)={0xa, 0x4e24, 0x0, @private0, 0xce}, 0x1c, &(0x7f0000001540)=[{&(0x7f0000001240)="803f74bb7ce71921585813f63dd564203aa8e8f68ac0a231e16cdf28900e80efb6e58175417e2c8d865a7c82004566660226c18d8ee62af39f20624b1b2d725b2696dabe4562720e69541520cd92e7d3551493bc780ef1da30c1e64e686482d619530afc3e4ac1f759adef6ecb7d95b727419900d0cc414578e0b3a38656ac7d5726f6196ca691d7f893289f85f2380a02a8b55769cc9bd4bc1cfde564461a0b53818aead26326af7f5f8a6bb6b907a3edb9458f01155f6c9a24eff3a4194433f957c020242b93d496cc5e08aeb2b36680701c9ab875354f4944b22be91608", 0xdf}, {&(0x7f0000001340)="0f48be3a8ca8c1cf3b7fcd36d9dfa82af954c8121f185a1862dd1532b82d9f9d68e6848bacc87d23823782f95da4108d5f733650aa571086d00ea755333c74c4403982a218f2396a8d73a5cc3cdd36f1174b5c6f1e19582ab534cd55555e7068743439f427f510af684c0fc62b1f329331666a0987b693711bbc83cf26bf970b38672a17498623ffd08599e62cb750f226c12fb9e2a3b491051f537d5650819aefe0becc510a62f191b861d76905f7b0f01940717677c7f12cf50b9c296a7aee30ad46598556293a125ef76cfbcc422518785f31015373363ac92d2bd7477cdacdf9a1a9de52353fba3986", 0xeb}, {&(0x7f0000001440)="1b4545b15f79a27bd8c3ecc3f62f0460890cc51d109da981c09f724715fb21ee11ed7cefa8b1021dfe7b52a47345b1d03e429ac416271fe2c1056a81ad330bb041339ffc1dd6526a4b94dd9489ea759d453bf433a745156a51c5150fcabca9b107ce778d4eba1e0769cb6b8142814d292eb5611f52283e082f817e3c6872c04b1bee4181a3dadf3a58b9d8a57aeca5ac5fa64ead4d832be00fa6685891e8f060687f02c227cc482af30228609419d6e39dd16767405b4669fd31140664bae3597642287dc7e8c0f12ac53dace6d433909cd16e357bb280dfcbdd11f987f36f7f7f0daaa8bb3834b518", 0xe9}], 0x3, &(0x7f0000001640)=[@rthdr={{0x18, 0x29, 0x39, {0x4, 0x0, 0x1, 0xf4}}}, @pktinfo={{0x24, 0x29, 0x32, {@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, r6}}}, @dstopts_2292={{0x98, 0x29, 0x4, {0x2c, 0x10, '\x00', [@ra={0x5, 0x2, 0xdbf}, @generic={0x1, 0x26, "d334389c171736c8da62dfd6a54a39b71b61f653270a293272409920925f946e20a05fe984d5"}, @hao={0xc9, 0x10, @private2}, @pad1, @calipso={0x7, 0x10, {0x1, 0x2, 0x4, 0x1, [0xe9]}}, @jumbo={0xc2, 0x4, 0x8001}, @hao={0xc9, 0x10, @dev={0xfe, 0x80, '\x00', 0x31}}, @jumbo={0xc2, 0x4, 0x6}, @jumbo, @padn={0x1, 0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x6da}}], 0xf0}}, {{&(0x7f0000001780)={0xa, 0x4e20, 0x2, @remote, 0x7}, 0x1c, &(0x7f0000001880)=[{&(0x7f00000017c0)="b774d5c005bf57b5e8952261f0319307460e5010a5c4ddec0682f8839e13649978f5996a17ed5149c4a14517f9389a72002ba023ce68198c3cf66f0ee099b3f539ecaa886e019ba1b01c7c4389fc4a9a891437805522d4b7b852143534c26579577c7345b9c8cafac1ea803407db814b4eb3b23eca2d82ac236d94ba4b9eda03d37fe64a515e55ff214b06", 0x8b}], 0x1, &(0x7f00000018c0)=[@tclass={{0x14, 0x29, 0x43, 0xef}}, @rthdrdstopts={{0x48, 0x29, 0x37, {0x73, 0x5, '\x00', [@generic={0x7, 0x20, "515154029f8b130cc77ad1e1928980f29c5fbaeef13b6f7a451575d6f12ef2c1"}, @padn={0x1, 0x2, [0x0, 0x0]}, @padn={0x1, 0x1, [0x0]}]}}}, @rthdr_2292={{0x38, 0x29, 0x39, {0x5c, 0x4, 0x2, 0x8, 0x0, [@mcast2, @remote]}}}, @hopopts_2292={{0x78, 0x29, 0x36, {0x62, 0xb, '\x00', [@enc_lim={0x4, 0x1, 0x9}, @enc_lim={0x4, 0x1, 0x40}, @ra={0x5, 0x2, 0x5}, @jumbo={0xc2, 0x4, 0x2}, @calipso={0x7, 0x48, {0x0, 0x10, 0xe0, 0x47b3, [0x5, 0x3, 0xff, 0x4, 0x2d3237b7, 0xff, 0xfff, 0x1]}}]}}}, @dstopts={{0x48, 0x29, 0x37, {0x2c, 0x5, '\x00', [@pad1, @jumbo={0xc2, 0x4, 0x5cde}, @enc_lim={0x4, 0x1, 0xff}, @generic={0xef, 0x19, "ab2a2ce0f6879e1c96bce0d658a9b022375cbe99d818334b7a"}, @jumbo={0xc2, 0x4, 0x9}]}}}, @rthdrdstopts={{0xd0, 0x29, 0x37, {0xff, 0x16, '\x00', [@enc_lim={0x4, 0x1, 0x80}, @ra={0x5, 0x2, 0x5}, @generic={0x1, 0xa7, "1966026991bdb8fc1384f8d93601bc32e1fd685a8e484c75e94133a738670777230a8ac696e60c5bb3999aafff2d80d9e3e54da7a44748f1988fc6b5b8970b8239c7da9a9e5e721130f27a1653019013434bd2ffe1a2631ece9839b8d4b1704e4ccb6007e12daf88367fa75eeef47befb718ca796adead86107ad4d964cacef71226f87a7e38a64b586fc9eff1a21e31c44012dedc608ac633d0ab75fa3444a983813385ad20f6"}, @padn={0x1, 0x1, [0x0]}]}}}, @dstopts_2292={{0x70, 0x29, 0x4, {0x4, 0xa, '\x00', [@calipso={0x7, 0x38, {0x3, 0xc, 0x8, 0x4, [0xc84, 0x4, 0xc972, 0x10000, 0xffffffff, 0x3f]}}, @pad1, @jumbo={0xc2, 0x4, 0x412f}, @jumbo={0xc2, 0x4, 0x401}, @ra={0x5, 0x2, 0x3}, @jumbo={0xc2, 0x4, 0xe67}, @enc_lim={0x4, 0x1, 0x3}]}}}], 0x298}}, {{&(0x7f0000001b80)={0xa, 0x4e22, 0x585b, @remote, 0xfffffffc}, 0x1c, &(0x7f0000001e00)=[{&(0x7f0000001bc0)="b0b01c042d3b5568dcfacc80cf9f7ecf7f5eb0061c9e19ceb6daafcb2796988c72d1caf5150623810156720f56b8ad25ecfcb471337bf9755d1646b62d4a0ab9cad903bd481756b821c150a93c38ecb258352f4f144a8c6fd9bfd50d78370b67d924cd9fc180f51aeed9a0bf2604e8c28de165a8c748ef964767ce52cdfb4751622489d8c73589fbf0f55a05e058f01f9c15c416b565413784a7feffbde1375eb8d3948523e5b50cfc5761bc211e2a18df8e3572b95cbdb0b838310b7848d117abdf566eb74a6a8ac5a4f6801412f3b8488adf949d36a006a92f76248eb82c6e8b645d9ddf31db3d", 0xe8}, {&(0x7f0000001cc0)="de1e21669ec78841a18faef7e321647467e8c3aff547fcad0383d910f7c3014fe2139ccc8d9160d35460ebd52d810f4546d4c4e3d5048f5a63e41d18cba580c6437627a23b1cd70d4e05ab2ae67453fd8c7558223ee2a4f8c7f62b552f771a4928b395a59802164eecfe7bbf8e1f283873b3c6ff83996590e3e8aef98b9d5998b8f3c6dfafae2116652f8836adb1fa5cda87019f862100f3959b425f4397d77b129d9ffa28f3c542577101ee5eac6143a6d1415fd14d4c9dfb965dc42f2b", 0xbe}], 0x2, &(0x7f0000001e40)=[@dstopts_2292={{0x40, 0x29, 0x4, {0x2c, 0x4, '\x00', [@calipso={0x7, 0x20, {0x1, 0x6, 0x2, 0x20, [0x7, 0x7, 0xfffffffffffffff8]}}]}}}], 0x40}}], 0x7, 0x20000851) copy_file_range(r0, &(0x7f0000000140)=0xc00000, r2, &(0x7f0000000180)=0x7fff, 0x1, 0x0) write$cgroup_netprio_ifpriomap(r0, &(0x7f00000003c0)={'bond_slave_1'}, 0xf) 08:23:25 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0x174}], 0x1) 08:23:25 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0x510}], 0x1) 08:23:26 executing program 4: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:23:26 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0x510}], 0x1) [ 1517.359141] FAULT_INJECTION: forcing a failure. [ 1517.359141] name failslab, interval 1, probability 0, space 0, times 0 [ 1517.362025] CPU: 0 PID: 8798 Comm: syz-executor.2 Not tainted 5.10.155 #1 [ 1517.363721] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1517.365734] Call Trace: [ 1517.366372] dump_stack+0x107/0x167 [ 1517.367264] should_fail.cold+0x5/0xa [ 1517.368180] ? cgroup_show_path+0xc4/0x5d0 [ 1517.369206] should_failslab+0x5/0x20 [ 1517.370113] kmem_cache_alloc_trace+0x55/0x360 [ 1517.371219] cgroup_show_path+0xc4/0x5d0 [ 1517.372192] ? task_cgroup_path+0x3e0/0x3e0 [ 1517.373252] kernfs_sop_show_path+0x122/0x190 [ 1517.374320] ? kernfs_test_super+0x140/0x140 [ 1517.375367] show_mountinfo+0x23b/0xb80 [ 1517.376311] ? rwlock_bug.part.0+0x90/0x90 [ 1517.377342] ? mounts_release+0x100/0x100 [ 1517.378334] ? do_raw_spin_unlock+0x4f/0x220 [ 1517.379389] ? _raw_spin_unlock+0x1a/0x30 [ 1517.380379] seq_read_iter+0xbf0/0x12b0 [ 1517.381384] do_iter_readv_writev+0x57c/0x750 [ 1517.382464] ? new_sync_write+0x660/0x660 [ 1517.383445] ? selinux_file_permission+0x36/0x510 [ 1517.384623] ? lock_acquire+0x197/0x490 [ 1517.385589] do_iter_read+0x28f/0x6d0 [ 1517.386517] ? import_iovec+0x83/0xb0 [ 1517.387434] vfs_readv+0xe5/0x160 [ 1517.388276] ? vfs_iter_read+0xa0/0xa0 [ 1517.389224] ? __fdget_pos+0xed/0x110 [ 1517.390133] ? find_held_lock+0x2c/0x110 [ 1517.391124] ? __fget_files+0x296/0x480 [ 1517.392101] do_readv+0x139/0x300 [ 1517.392949] ? vfs_readv+0x160/0x160 [ 1517.393849] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1517.395101] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1517.396336] do_syscall_64+0x33/0x40 [ 1517.397236] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1517.398447] RIP: 0033:0x7f2daa4c6b19 [ 1517.399342] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1517.403729] RSP: 002b:00007f2da7a3c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000013 [ 1517.405685] RAX: ffffffffffffffda RBX: 00007f2daa5d9f60 RCX: 00007f2daa4c6b19 [ 1517.407372] RDX: 0000000000000001 RSI: 0000000020000280 RDI: 0000000000000003 [ 1517.409318] RBP: 00007f2da7a3c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1517.411010] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1517.412930] R13: 00007ffc5d7bee0f R14: 00007f2da7a3c300 R15: 0000000000022000 [ 1517.415041] hpet: Lost 3 RTC interrupts 08:23:42 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000040), 0x3}, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r0, 0x800) write$cgroup_netprio_ifpriomap(r0, &(0x7f00000003c0)={'bond_slave_1'}, 0xf) 08:23:42 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xd8, 0x8, 0x4, 0xa09, 0x3, 0x3, 0x1, 0x2a8, 0x40, 0x1a2, 0x1, 0x100, 0x38, 0x1, 0x0, 0x0, 0x8}, [{0x5, 0xfffffd4b, 0x5, 0x0, 0x9, 0x6}, {0x4, 0xfffffff7, 0x8, 0x80000001, 0x5, 0x385, 0xfff, 0x1}], "37cacaa561", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x5b5) 08:23:42 executing program 5: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x74, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x74}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:23:42 executing program 4: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:23:42 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0x571}], 0x1) 08:23:42 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0x571}], 0x1) 08:23:42 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) (fail_nth: 11) 08:23:42 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0x1cc}], 0x1) [ 1533.272406] FAULT_INJECTION: forcing a failure. [ 1533.272406] name failslab, interval 1, probability 0, space 0, times 0 [ 1533.275125] CPU: 0 PID: 8826 Comm: syz-executor.2 Not tainted 5.10.155 #1 08:23:42 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0x5d6}], 0x1) [ 1533.276629] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1533.278678] Call Trace: [ 1533.279349] dump_stack+0x107/0x167 [ 1533.280166] should_fail.cold+0x5/0xa [ 1533.281013] ? create_object.isra.0+0x3a/0xa20 [ 1533.282038] should_failslab+0x5/0x20 [ 1533.282892] kmem_cache_alloc+0x5b/0x360 [ 1533.283841] create_object.isra.0+0x3a/0xa20 [ 1533.284849] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1533.285996] kmem_cache_alloc_trace+0x151/0x360 [ 1533.287024] cgroup_show_path+0xc4/0x5d0 [ 1533.287931] ? task_cgroup_path+0x3e0/0x3e0 [ 1533.288922] kernfs_sop_show_path+0x122/0x190 [ 1533.289929] ? kernfs_test_super+0x140/0x140 [ 1533.290897] show_mountinfo+0x23b/0xb80 [ 1533.291780] ? rwlock_bug.part.0+0x90/0x90 [ 1533.292723] ? mounts_release+0x100/0x100 [ 1533.293660] ? do_raw_spin_unlock+0x4f/0x220 [ 1533.294642] ? _raw_spin_unlock+0x1a/0x30 [ 1533.295620] seq_read_iter+0xbf0/0x12b0 [ 1533.296526] do_iter_readv_writev+0x57c/0x750 [ 1533.297525] ? new_sync_write+0x660/0x660 [ 1533.298430] ? selinux_file_permission+0x36/0x510 [ 1533.299476] ? lock_acquire+0x197/0x490 08:23:42 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0x5d6}], 0x1) 08:23:42 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x8, 0x4, 0xa09, 0x3, 0x3, 0x1, 0x2a8, 0x40, 0x1a2, 0x1, 0x100, 0x38, 0x1, 0x0, 0x0, 0x8}, [{0x5, 0xfffffd4b, 0x5, 0x0, 0x9, 0x6}, {0x4, 0xfffffff7, 0x8, 0x80000001, 0x5, 0x385, 0xfff, 0x1}], "37cacaa561", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x5b5) [ 1533.300355] do_iter_read+0x28f/0x6d0 [ 1533.301243] ? import_iovec+0x83/0xb0 [ 1533.302079] vfs_readv+0xe5/0x160 [ 1533.302836] ? vfs_iter_read+0xa0/0xa0 [ 1533.303676] ? __fdget_pos+0xed/0x110 [ 1533.304495] ? find_held_lock+0x2c/0x110 [ 1533.305400] ? __fget_files+0x296/0x480 [ 1533.306287] do_readv+0x139/0x300 [ 1533.307039] ? vfs_readv+0x160/0x160 [ 1533.307849] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1533.308999] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1533.310115] do_syscall_64+0x33/0x40 [ 1533.310922] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1533.312026] RIP: 0033:0x7f2daa4c6b19 [ 1533.312840] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1533.316848] RSP: 002b:00007f2da7a3c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000013 [ 1533.318492] RAX: ffffffffffffffda RBX: 00007f2daa5d9f60 RCX: 00007f2daa4c6b19 [ 1533.320034] RDX: 0000000000000001 RSI: 0000000020000280 RDI: 0000000000000003 [ 1533.321578] RBP: 00007f2da7a3c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1533.323113] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1533.324649] R13: 00007ffc5d7bee0f R14: 00007f2da7a3c300 R15: 0000000000022000 [ 1533.326552] hpet: Lost 2 RTC interrupts 08:23:42 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0x223}], 0x1) 08:23:42 executing program 4: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:23:42 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) (fail_nth: 12) 08:23:42 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = fork() r1 = open_tree(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x801) perf_event_open(&(0x7f0000000040)={0x4, 0x80, 0xe, 0x0, 0x5, 0x5, 0x0, 0x6, 0x20020, 0x7, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xc1a, 0x4, @perf_config_ext={0x4, 0x81}, 0x0, 0x3, 0x7, 0x0, 0x1, 0x8, 0x81, 0x0, 0x200, 0x0, 0x7fffffff}, r0, 0xe, r1, 0x8) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) sendmmsg$inet6(r3, &(0x7f0000003e00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000500)={0xa, 0x4e21, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000001740)=[@tclass={{0x14, 0x29, 0x43, 0x8f76}}], 0x18}}], 0x2, 0x0) ftruncate(r3, 0x800) write$cgroup_netprio_ifpriomap(r2, &(0x7f00000003c0)={'bond_slave_1'}, 0xf) [ 1533.564469] FAULT_INJECTION: forcing a failure. [ 1533.564469] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1533.566102] CPU: 0 PID: 8845 Comm: syz-executor.2 Not tainted 5.10.155 #1 [ 1533.566949] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1533.567844] Call Trace: [ 1533.568151] dump_stack+0x107/0x167 [ 1533.568570] should_fail.cold+0x5/0xa [ 1533.569035] _copy_to_iter+0x258/0x1080 [ 1533.569488] ? __up_read+0x19f/0x7a0 [ 1533.569925] ? _copy_from_iter_nocache+0xc20/0xc20 [ 1533.570487] ? __virt_addr_valid+0x128/0x350 [ 1533.570991] ? __check_object_size+0x319/0x440 [ 1533.571516] seq_read_iter+0xdcb/0x12b0 [ 1533.571988] do_iter_readv_writev+0x57c/0x750 [ 1533.572498] ? new_sync_write+0x660/0x660 [ 1533.572982] ? selinux_file_permission+0x36/0x510 [ 1533.573542] ? lock_acquire+0x197/0x490 [ 1533.574009] do_iter_read+0x28f/0x6d0 [ 1533.574442] ? import_iovec+0x83/0xb0 [ 1533.574879] vfs_readv+0xe5/0x160 [ 1533.575275] ? vfs_iter_read+0xa0/0xa0 [ 1533.575714] ? __fdget_pos+0xed/0x110 [ 1533.576146] ? find_held_lock+0x2c/0x110 [ 1533.576619] ? __fget_files+0x296/0x480 [ 1533.577080] do_readv+0x139/0x300 [ 1533.577481] ? vfs_readv+0x160/0x160 [ 1533.577911] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1533.578503] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1533.579095] do_syscall_64+0x33/0x40 [ 1533.579525] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1533.580111] RIP: 0033:0x7f2daa4c6b19 [ 1533.580545] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1533.582518] RSP: 002b:00007f2da7a3c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000013 [ 1533.583402] RAX: ffffffffffffffda RBX: 00007f2daa5d9f60 RCX: 00007f2daa4c6b19 [ 1533.584215] RDX: 0000000000000001 RSI: 0000000020000280 RDI: 0000000000000003 [ 1533.585044] RBP: 00007f2da7a3c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1533.585856] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1533.586666] R13: 00007ffc5d7bee0f R14: 00007f2da7a3c300 R15: 0000000000022000 [ 1533.587615] hpet: Lost 1 RTC interrupts 08:23:54 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x4, 0xa09, 0x3, 0x3, 0x1, 0x2a8, 0x40, 0x1a2, 0x1, 0x100, 0x38, 0x1, 0x0, 0x0, 0x8}, [{0x5, 0xfffffd4b, 0x5, 0x0, 0x9, 0x6}, {0x4, 0xfffffff7, 0x8, 0x80000001, 0x5, 0x385, 0xfff, 0x1}], "37cacaa561", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x5b5) 08:23:54 executing program 5: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x80, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x80}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:23:54 executing program 4: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:23:54 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0x267}], 0x1) 08:23:54 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) (fail_nth: 13) 08:23:54 executing program 1: ioctl$SNDRV_TIMER_IOCTL_STATUS64(0xffffffffffffffff, 0x80605414, &(0x7f0000000040)) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x20, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r1, 0x800) write$cgroup_netprio_ifpriomap(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="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"/332], 0xf) sendfile(r0, r1, &(0x7f0000000380)=0x9, 0xffffffffffffffd9) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x34, r3, 0x5, 0x0, 0x0, {{0x2}, {@val={0x8, 0x3, r4}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x96c}]]}, 0x34}}, 0x0) sendmsg$NL80211_CMD_DEL_INTERFACE(r1, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x28, 0x0, 0x8, 0x70bd2d, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r4}, @val={0xc, 0x99, {0x3, 0x6f}}}}, ["", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x20000040}, 0x4008000) ioctl$AUTOFS_IOC_EXPIRE(r1, 0x810c9365, &(0x7f00000000c0)={{0x9, 0xd9}, 0x100, './file1\x00'}) 08:23:54 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0x634}], 0x1) 08:23:54 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0x634}], 0x1) [ 1546.196060] FAULT_INJECTION: forcing a failure. [ 1546.196060] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1546.198906] CPU: 0 PID: 8860 Comm: syz-executor.2 Not tainted 5.10.155 #1 [ 1546.200455] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1546.202322] Call Trace: [ 1546.202920] dump_stack+0x107/0x167 [ 1546.203734] should_fail.cold+0x5/0xa [ 1546.204578] _copy_to_user+0x2e/0x180 [ 1546.205462] simple_read_from_buffer+0xcc/0x160 [ 1546.206493] proc_fail_nth_read+0x198/0x230 08:23:55 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0xa09, 0x3, 0x3, 0x1, 0x2a8, 0x40, 0x1a2, 0x1, 0x100, 0x38, 0x1, 0x0, 0x0, 0x8}, [{0x5, 0xfffffd4b, 0x5, 0x0, 0x9, 0x6}, {0x4, 0xfffffff7, 0x8, 0x80000001, 0x5, 0x385, 0xfff, 0x1}], "37cacaa561", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x5b5) [ 1546.207452] ? proc_sessionid_read+0x230/0x230 [ 1546.208564] ? security_file_permission+0x24e/0x570 [ 1546.209750] ? perf_trace_initcall_start+0x101/0x380 [ 1546.210900] ? proc_sessionid_read+0x230/0x230 [ 1546.211886] vfs_read+0x228/0x580 [ 1546.212677] ksys_read+0x12d/0x260 [ 1546.213487] ? __ia32_sys_pwrite64+0x230/0x230 [ 1546.214516] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1546.215687] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1546.216843] do_syscall_64+0x33/0x40 [ 1546.217695] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1546.218825] RIP: 0033:0x7f2daa47969c [ 1546.219645] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1546.223700] RSP: 002b:00007f2da7a3c170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1546.225435] RAX: ffffffffffffffda RBX: 0000000000000730 RCX: 00007f2daa47969c [ 1546.227012] RDX: 000000000000000f RSI: 00007f2da7a3c1e0 RDI: 0000000000000004 [ 1546.228582] RBP: 00007f2da7a3c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1546.230196] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1546.231754] R13: 00007ffc5d7bee0f R14: 00007f2da7a3c300 R15: 0000000000022000 [ 1546.233592] hpet: Lost 1 RTC interrupts 08:23:55 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0x2e5}], 0x1) 08:23:55 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0x682}], 0x1) 08:23:55 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) 08:23:55 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0x682}], 0x1) 08:23:55 executing program 4: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:23:55 executing program 5: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x80, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x80}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:23:55 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2000000, 0x10, r1, 0x87c1c000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0xad, 0x1f, 0x4, 0x8}) ftruncate(r2, 0x800) write$cgroup_netprio_ifpriomap(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="626f6e645f736c6104005f31320000c0b4b2f8f532b7c66e7bb49bdc24e7b1a64f5e4e03de27a0802eb29f86b135e9c879d1c6df6421565366bd24"], 0xf) r3 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) sendmmsg$inet6(r3, &(0x7f0000003e00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000500)={0xa, 0x4e21, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000001740)=[@tclass={{0x14, 0x29, 0x43, 0x8f76}}], 0x18}}], 0x2, 0x0) fcntl$getown(r3, 0x9) 08:23:55 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0x336}], 0x1) 08:23:55 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, 0x1, 0x2a8, 0x40, 0x1a2, 0x1, 0x100, 0x38, 0x1, 0x0, 0x0, 0x8}, [{0x5, 0xfffffd4b, 0x5, 0x0, 0x9, 0x6}, {0x4, 0xfffffff7, 0x8, 0x80000001, 0x5, 0x385, 0xfff, 0x1}], "37cacaa561", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x5b5) 08:24:07 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0x62}], 0x1) 08:24:07 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0x6ce}], 0x1) 08:24:07 executing program 5: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x80, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x80}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:24:07 executing program 4: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:24:07 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x2a8, 0x40, 0x1a2, 0x1, 0x100, 0x38, 0x1, 0x0, 0x0, 0x8}, [{0x5, 0xfffffd4b, 0x5, 0x0, 0x9, 0x6}, {0x4, 0xfffffff7, 0x8, 0x80000001, 0x5, 0x385, 0xfff, 0x1}], "37cacaa561", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x5b5) 08:24:07 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0x384}], 0x1) 08:24:07 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000040)='./file1\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000340)='./file1/file0\x00', &(0x7f0000000380), 0xc10, &(0x7f0000000dc0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_uid}, {@privport}, {@uname={'uname', 0x3d, ')!*'}}, {@dfltuid}, {@aname={'aname', 0x3d, 'bond_slave_1'}}, {@msize={'msize', 0x3d, 0x8}}, {@uname={'uname', 0x3d, 'macsec0\x00'}}, {@version_9p2000}, {@posixacl}], [{@obj_user={'obj_user', 0x3d, 'syz_tun\x00'}}, {@uid_gt={'uid>', 0xee01}}, {@fsname}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@subj_user={'subj_user', 0x3d, 'ip6gre0\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}}) r2 = fcntl$dupfd(r1, 0x406, r1) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000300)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="95390000000000000000050000000c00018008000100", @ANYRES32=r6, @ANYBLOB="0c000380"], 0x2c}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000140)={'ip6gre0\x00', &(0x7f00000000c0)={'ip6gre0\x00', 0x0, 0x2f, 0x8, 0xeb, 0x8, 0x2, @local, @mcast2, 0x8, 0x8000, 0xfffffff7, 0x2}}) sendmsg$ETHTOOL_MSG_RINGS_SET(r2, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000180)={0xf0, r4, 0x20, 0x70bd26, 0x25dfdbfb, {}, [@ETHTOOL_A_RINGS_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_hsr\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @ETHTOOL_A_RINGS_HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}]}, @ETHTOOL_A_RINGS_HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @ETHTOOL_A_RINGS_RX_JUMBO={0x8, 0x8, 0x9}, @ETHTOOL_A_RINGS_RX_MINI={0x8, 0x7, 0x40}, @ETHTOOL_A_RINGS_RX_MINI={0x8, 0x7, 0x6}]}, 0xf0}, 0x1, 0x0, 0x0, 0x4000010}, 0x20004040) r8 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r8, 0x800) write$cgroup_netprio_ifpriomap(r8, &(0x7f00000003c0)={'bond_slave_1'}, 0xf) write$binfmt_elf64(r0, &(0x7f0000000400)={{0x7f, 0x45, 0x4c, 0x46, 0xc, 0x7, 0xbd, 0x0, 0x1000, 0x3, 0x3e, 0xfffffffd, 0xa6, 0x40, 0x2f0, 0x0, 0x0, 0x38, 0x2, 0x812, 0x3, 0x587}, [{0x6, 0x55, 0x0, 0x9, 0x8a3, 0x7, 0x5, 0xd33e}, {0x70000000, 0x3, 0x7c6, 0x8, 0x64, 0xa7, 0x80000000, 0x7}], "", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x9b0) 08:24:07 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0x6ce}], 0x1) 08:24:07 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0x3ce}], 0x1) [ 1558.528378] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 08:24:07 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0x730}], 0x1) [ 1558.610732] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 08:24:22 executing program 4: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:24:22 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0x420}], 0x1) 08:24:22 executing program 5: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:24:22 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xc8}], 0x1) 08:24:22 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0x200014b9}], 0x1) 08:24:22 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2a8, 0x40, 0x1a2, 0x1, 0x100, 0x38, 0x1, 0x0, 0x0, 0x8}, [{0x5, 0xfffffd4b, 0x5, 0x0, 0x9, 0x6}, {0x4, 0xfffffff7, 0x8, 0x80000001, 0x5, 0x385, 0xfff, 0x1}], "37cacaa561", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x5b5) 08:24:22 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0x730}], 0x1) 08:24:22 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r0, 0x800) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000003e00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000500)={0xa, 0x4e21, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000001740)=[@tclass={{0x14, 0x29, 0x43, 0x8f76}}], 0x18}}], 0x2, 0x0) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x4, 0x0, '\x00', [{0x9, 0x9, 0x9, 0x20, 0x0, 0x7}, {0xecb6, 0x2, 0x2, 0xfc, 0xfff, 0xcda}], ['\x00', '\x00', '\x00', '\x00']}) write$cgroup_netprio_ifpriomap(r0, &(0x7f00000003c0)={'bond_slave_1'}, 0xf) 08:24:22 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0x10a}], 0x1) 08:24:22 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0x481}], 0x1) 08:24:22 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r1, 0x800) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000140)=@updsa={0x104, 0x1a, 0x9, 0x0, 0x0, {{@in=@remote, @in=@local, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0xee00}, {@in, 0x0, 0x3c}, @in6=@private1, {}, {}, {0x0, 0x2}, 0x0, 0x0, 0x2, 0x2, 0x3, 0x3f}, [@coaddr={0x14, 0xe, @in=@empty}]}, 0x104}}, 0x0) ioctl$F2FS_IOC_PRECACHE_EXTENTS(r0, 0xf50f, 0x0) sendmmsg$inet6(r2, &(0x7f0000003e00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000500)={0xa, 0x4e21, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000001740)=[@tclass={{0x14, 0x29, 0x43, 0x8f76}}], 0x18}}], 0x2, 0x0) ioctl$BTRFS_IOC_QGROUP_CREATE(r2, 0x4010942a, &(0x7f0000000040)={0x0, 0x89}) write$cgroup_netprio_ifpriomap(r1, &(0x7f00000003c0)={'bond_slave_1'}, 0xf) 08:24:22 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a8, 0x40, 0x1a2, 0x1, 0x100, 0x38, 0x1, 0x0, 0x0, 0x8}, [{0x5, 0xfffffd4b, 0x5, 0x0, 0x9, 0x6}, {0x4, 0xfffffff7, 0x8, 0x80000001, 0x5, 0x385, 0xfff, 0x1}], "37cacaa561", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x5b5) 08:24:22 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0x7ffff000}], 0x1) 08:24:22 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0x200014b9}], 0x1) 08:24:22 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0x174}], 0x1) 08:24:22 executing program 4: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:24:22 executing program 5: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:24:22 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0x4c6}], 0x1) 08:24:23 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0x7ffff000}], 0x1) 08:24:35 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x1a2, 0x1, 0x100, 0x38, 0x1, 0x0, 0x0, 0x8}, [{0x5, 0xfffffd4b, 0x5, 0x0, 0x9, 0x6}, {0x4, 0xfffffff7, 0x8, 0x80000001, 0x5, 0x385, 0xfff, 0x1}], "37cacaa561", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x5b5) 08:24:35 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0x1cc}], 0x1) 08:24:35 executing program 5: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:24:35 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x2) 08:24:35 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x2) 08:24:35 executing program 4: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:24:35 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0x510}], 0x1) 08:24:35 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x4, 0x20, 0x5, 0x4, 0x0, 0x3, 0x2001, 0xe, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x80000001, 0x2, @perf_config_ext={0xa3, 0xffff}, 0x1, 0x3, 0xd624, 0x8, 0x83f3, 0xffffffc1, 0x9, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xf, r0, 0x8) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r1, 0x800) write$cgroup_netprio_ifpriomap(r1, &(0x7f00000003c0)={'bond_slave_1'}, 0xf) 08:24:35 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x5) 08:24:35 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x1, 0x100, 0x38, 0x1, 0x0, 0x0, 0x8}, [{0x5, 0xfffffd4b, 0x5, 0x0, 0x9, 0x6}, {0x4, 0xfffffff7, 0x8, 0x80000001, 0x5, 0x385, 0xfff, 0x1}], "37cacaa561", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x5b5) 08:24:35 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0x223}], 0x1) 08:24:35 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x5) 08:24:35 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0x571}], 0x1) 08:24:35 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x6) 08:24:35 executing program 5: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x80, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x80}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:24:35 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10000, 0x62c}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r2 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={0x341802, 0x78, 0x15}, 0x18) move_mount(r1, &(0x7f0000000040)='./file1\x00', r2, &(0x7f0000000100)='./file1\x00', 0x75) ftruncate(r1, 0x800) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) signalfd4(r3, &(0x7f0000000000)={[0x1]}, 0x8, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r3) write$cgroup_netprio_ifpriomap(r1, &(0x7f00000003c0)={'bond_slave_1'}, 0xf) 08:24:35 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x100, 0x38, 0x1, 0x0, 0x0, 0x8}, [{0x5, 0xfffffd4b, 0x5, 0x0, 0x9, 0x6}, {0x4, 0xfffffff7, 0x8, 0x80000001, 0x5, 0x385, 0xfff, 0x1}], "37cacaa561", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x5b5) 08:24:35 executing program 4: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:24:35 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0x267}], 0x1) 08:24:50 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x8) 08:24:50 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x6) 08:24:50 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0x5d6}], 0x1) 08:24:50 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0x2e5}], 0x1) 08:24:50 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x1, 0x0, 0x0, 0x8}, [{0x5, 0xfffffd4b, 0x5, 0x0, 0x9, 0x6}, {0x4, 0xfffffff7, 0x8, 0x80000001, 0x5, 0x385, 0xfff, 0x1}], "37cacaa561", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x5b5) 08:24:50 executing program 5: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x80, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x80}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:24:50 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x10) 08:24:50 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x8) 08:24:50 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000003e00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000500)={0xa, 0x4e21, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000001740)=[@tclass={{0x14, 0x29, 0x43, 0x8f76}}], 0x18}}], 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r0, 0xc018937c, &(0x7f0000000040)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) ftruncate(r0, 0x800) write$cgroup_netprio_ifpriomap(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="fafd11fb78bf8ddd3c471172dd1dc7"], 0xf) 08:24:50 executing program 4: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:24:50 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0x634}], 0x1) 08:24:50 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0x336}], 0x1) 08:24:50 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x8}, [{0x5, 0xfffffd4b, 0x5, 0x0, 0x9, 0x6}, {0x4, 0xfffffff7, 0x8, 0x80000001, 0x5, 0x385, 0xfff, 0x1}], "37cacaa561", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x5b5) 08:25:06 executing program 5: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x80, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x80}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:25:06 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x12) 08:25:06 executing program 4: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:25:06 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x9) 08:25:06 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)=0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0xe8, 0x6, 0x20, 0x2, 0x0, 0x2, 0x10000, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7f, 0x4, @perf_bp={&(0x7f0000000040)}, 0xc4, 0x8, 0x1, 0x2, 0x101, 0x9, 0x7, 0x0, 0x5, 0x0, 0x6}, r0, 0x8, 0xffffffffffffffff, 0xb) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r1, 0x800) recvmmsg(0xffffffffffffffff, &(0x7f0000004ac0)=[{{&(0x7f0000000140)=@l2tp6={0xa, 0x0, 0x0, @initdev}, 0x80, &(0x7f0000000680)=[{&(0x7f00000001c0)=""/49, 0x31}, {&(0x7f0000000200)=""/140, 0x8c}, {&(0x7f00000002c0)=""/175, 0xaf}, {&(0x7f0000000400)=""/237, 0xed}, {&(0x7f0000000380)=""/31, 0x1f}, {&(0x7f0000000500)=""/239, 0xef}, {&(0x7f0000000600)=""/121, 0x79}], 0x7, &(0x7f0000000700)=""/4096, 0x1000}, 0x81}, {{&(0x7f0000001700)=@hci, 0x80, &(0x7f0000001fc0)=[{&(0x7f0000001780)=""/172, 0xac}, {&(0x7f0000001840)=""/104, 0x68}, {&(0x7f00000018c0)=""/215, 0xd7}, {&(0x7f00000019c0)=""/171, 0xab}, {&(0x7f0000001a80)=""/170, 0xaa}, {&(0x7f0000001b40)}, {&(0x7f0000001b80)=""/172, 0xac}, {&(0x7f0000001c40)=""/165, 0xa5}, {&(0x7f0000001e00)=""/215, 0xd7}, {&(0x7f0000001f00)=""/152, 0x98}], 0xa, &(0x7f0000001d00)=""/111, 0x6f}}, {{&(0x7f0000002080)=@phonet, 0x80, &(0x7f0000003400)=[{&(0x7f0000002100)=""/102, 0x66}, {&(0x7f0000002180)=""/15, 0xf}, {&(0x7f00000021c0)=""/4096, 0x1000}, {&(0x7f00000031c0)=""/90, 0x5a}, {&(0x7f0000003240)=""/207, 0xcf}, {&(0x7f0000003340)=""/192, 0xc0}], 0x6, &(0x7f0000003480)=""/15, 0xf}, 0x6}, {{&(0x7f00000034c0)=@caif, 0x80, &(0x7f0000003a40)=[{&(0x7f0000003540)=""/119, 0x77}, {&(0x7f00000035c0)=""/193, 0xc1}, {&(0x7f00000036c0)=""/12, 0xc}, {&(0x7f0000003700)=""/19, 0x13}, {&(0x7f0000003740)=""/236, 0xec}, {&(0x7f0000003840)=""/236, 0xec}, {&(0x7f0000003940)=""/217, 0xd9}], 0x7, &(0x7f0000003ac0)=""/4096, 0x1000}, 0x9}], 0x4, 0x1a000, &(0x7f0000004bc0)) write$cgroup_netprio_ifpriomap(r1, &(0x7f00000003c0)={'bond_slave_1'}, 0xf) 08:25:06 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0x682}], 0x1) 08:25:06 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0x384}], 0x1) 08:25:06 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x5, 0xfffffd4b, 0x5, 0x0, 0x9, 0x6}, {0x4, 0xfffffff7, 0x8, 0x80000001, 0x5, 0x385, 0xfff, 0x1}], "37cacaa561", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x5b5) 08:25:06 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x5, 0xfffffd4b, 0x5, 0x0, 0x9, 0x6}], "37cacaa561", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x57d) 08:25:06 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x300) 08:25:06 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0x6ce}], 0x1) 08:25:06 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x10) 08:25:06 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0x3ce}], 0x1) 08:25:06 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000040)={0x3, 0x80, 0x9, 0x2, 0x4, 0x3d, 0x0, 0x9, 0x880, 0xd, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_config_ext={0x7, 0x20}, 0x2000, 0x2, 0x3, 0x3, 0x400, 0x7fffffff, 0x93, 0x0, 0x9, 0x0, 0x1f}) r1 = getpgrp(0x0) r2 = getpid() capget(&(0x7f00000000c0)={0x20071026, r2}, &(0x7f0000000100)) rt_tgsigqueueinfo(r1, r2, 0x2a, &(0x7f0000000200)={0x18, 0x8, 0x9}) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x3, 0x5, 0x3, 0x3, 0x0, 0x4, 0x10, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3f, 0x4, @perf_bp={&(0x7f00000000c0), 0x3}, 0x804, 0xf3, 0x1f, 0x0, 0xef, 0x81, 0x6, 0x0, 0x1}, r1, 0x2, 0xffffffffffffffff, 0x9) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r3, 0x800) write$cgroup_netprio_ifpriomap(r3, &(0x7f0000000180)=ANY=[@ANYBLOB="626f6e645f736c6176655f31320000131a5403428ec66b4395deda846119c23ca192546c59886030dc39d7adb208957a1557de69ebb6fbf86396cc21d8f44d21a66863d1f8e507d79c5f1d5416609fb2b5"], 0xf) 08:25:06 executing program 4: sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:25:06 executing program 5: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:25:07 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0x730}], 0x1) 08:25:07 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x925) 08:25:07 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x5, 0xfffffd4b, 0x5, 0x0, 0x9, 0x6}], "37cacaa561", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x57d) 08:25:07 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0x420}], 0x1) 08:25:22 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0x200014b9}], 0x1) 08:25:22 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) signalfd4(r2, &(0x7f0000000000)={[0x1]}, 0x8, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r0) ftruncate(r1, 0x800) 08:25:23 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x12) 08:25:23 executing program 4: sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:25:23 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0x481}], 0x1) 08:25:23 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x926) 08:25:23 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x5, 0xfffffd4b, 0x5, 0x0, 0x9, 0x6}], "37cacaa561", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x57d) 08:25:23 executing program 5: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:25:23 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x5, 0xfffffd4b, 0x5, 0x0, 0x9, 0x6}, {0x0, 0xfffffff7, 0x8, 0x80000001, 0x5, 0x385, 0xfff, 0x1}], "37cacaa561", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x5b5) 08:25:23 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0x7ffff000}], 0x1) 08:25:23 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0x4c6}], 0x1) 08:25:23 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x63) 08:25:23 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x929) 08:25:23 executing program 4: sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:25:36 executing program 4: syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:25:36 executing program 5: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:25:36 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x2) 08:25:36 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x300) 08:25:36 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r0, 0x800) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x41c700, 0x0) setsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, &(0x7f0000000080)=0x8, 0x2) write$cgroup_netprio_ifpriomap(r0, &(0x7f00000003c0)={'bond_slave_1'}, 0xf) 08:25:36 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x5, 0xfffffd4b, 0x5, 0x0, 0x9, 0x6}, {0x0, 0x0, 0x8, 0x80000001, 0x5, 0x385, 0xfff, 0x1}], "37cacaa561", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x5b5) 08:25:36 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0x510}], 0x1) 08:25:36 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x92b) 08:25:36 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x925) 08:25:36 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0x571}], 0x1) 08:25:36 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x5, 0xfffffd4b, 0x5, 0x0, 0x9, 0x6}, {0x0, 0x0, 0x0, 0x80000001, 0x5, 0x385, 0xfff, 0x1}], "37cacaa561", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x5b5) 08:25:36 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x5) 08:25:36 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7f, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r1, 0x800) ftruncate(r0, 0x2) write$cgroup_netprio_ifpriomap(r1, &(0x7f00000003c0)={'bond_slave_1'}, 0xf) 08:25:36 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x92f) 08:25:36 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x5, 0xfffffd4b, 0x5, 0x0, 0x9, 0x6}, {0x0, 0x0, 0x0, 0x0, 0x5, 0x385, 0xfff, 0x1}], "37cacaa561", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x5b5) 08:25:36 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x926) 08:25:52 executing program 5: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x74, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x74}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:25:52 executing program 4: syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:25:52 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x2802c2, 0x0) ftruncate(r0, 0x800) write$cgroup_netprio_ifpriomap(r0, &(0x7f00000003c0)={'tunl0'}, 0x8) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000003e00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000500)={0xa, 0x4e21, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000001740)=[@tclass={{0x14, 0x29, 0x43, 0x8f76}}], 0x18}}], 0x2, 0x0) ioctl$F2FS_IOC_GET_FEATURES(r1, 0x8004f50c, &(0x7f0000000040)) 08:25:52 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x929) 08:25:52 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x5, 0xfffffd4b, 0x5, 0x0, 0x9, 0x6}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x385, 0xfff, 0x1}], "37cacaa561", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x5b5) 08:25:52 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x971) 08:25:52 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x6) 08:25:52 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0x5d6}], 0x1) 08:25:52 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x92b) 08:25:52 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0x634}], 0x1) 08:25:52 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x5, 0xfffffd4b, 0x5, 0x0, 0x9, 0x6}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x1}], "37cacaa561", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x5b5) 08:25:52 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x972) 08:25:52 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r0, 0x800) write$cgroup_netprio_ifpriomap(r0, &(0x7f00000003c0)={'bond_slave_1'}, 0xf) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000040)=0x6, 0x4) 08:25:52 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x8) 08:25:52 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x92f) 08:26:07 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x5, 0xfffffd4b, 0x5, 0x0, 0x9, 0x6}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}], "37cacaa561", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x5b5) 08:26:07 executing program 4: syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:26:07 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x975) 08:26:07 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x10) 08:26:07 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r0, 0x800) write$cgroup_netprio_ifpriomap(r0, &(0x7f00000003c0)={'bond_slave_1'}, 0xf) perf_event_open(&(0x7f0000000080)={0x4, 0x80, 0x3, 0x80, 0x16, 0x3f, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xff, 0x0, @perf_bp={&(0x7f0000000040), 0x8}, 0x208, 0x81, 0x82, 0x8, 0x4, 0x9, 0x3, 0x0, 0x8, 0x0, 0x100000001}, 0x0, 0xffffffffffffffff, r0, 0x9) 08:26:07 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x971) 08:26:07 executing program 5: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x74, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x74}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:26:07 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0x682}], 0x1) 08:26:07 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x12) 08:26:07 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x972) 08:26:07 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x5, 0xfffffd4b, 0x5, 0x0, 0x9, 0x6}, {}], "37cacaa561", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x5b5) 08:26:07 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x977) 08:26:07 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x6fe, 0x1f}, 0x0, 0x0, 0x0, 0x4, 0xfd8, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r0, 0x800) write$cgroup_netprio_ifpriomap(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="816f6e645f73050000000000000000"], 0xf) r1 = openat$incfs(r0, &(0x7f00000000c0)='.log\x00', 0x88a80, 0x62) fcntl$setflags(r1, 0x2, 0x0) 08:26:07 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0x6ce}], 0x1) 08:26:07 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x300) 08:26:07 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x975) 08:26:07 executing program 4: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:26:22 executing program 5: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x74, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x74}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:26:22 executing program 4: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:26:22 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x97b) 08:26:22 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x977) 08:26:22 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0x730}], 0x1) 08:26:22 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x925) 08:26:22 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r0, 0x800) write$cgroup_netprio_ifpriomap(r0, &(0x7f00000003c0)={'bond0'}, 0xffffffffffffffc1) r1 = mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1000000, 0x8010, r0, 0x10000000) syz_io_uring_submit(0x0, r1, &(0x7f0000000040)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x9) 08:26:22 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "37cacaa561", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x57d) 08:26:23 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r0, 0x800) write$cgroup_netprio_ifpriomap(r0, &(0x7f00000003c0)={'ipvlan0', 0x32, 0x30}, 0xa) 08:26:23 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x97b) 08:26:23 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x926) 08:26:23 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x9c0) 08:26:23 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "37cacaa561", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x57d) 08:26:23 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0x200014b9}], 0x1) 08:26:23 executing program 4: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:26:23 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) perf_event_open$cgroup(&(0x7f0000000140)={0x5, 0x80, 0x1f, 0x8, 0x42, 0xf0, 0x0, 0x100, 0x4b0, 0x4, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000100), 0x2}, 0x110, 0x7, 0x4, 0x1, 0x7, 0xa84, 0x7, 0x0, 0x5, 0x0, 0x101}, r0, 0x8, 0xffffffffffffffff, 0x1) ftruncate(r0, 0x800) write$cgroup_netprio_ifpriomap(r0, &(0x7f00000003c0)={'bond_slave_1'}, 0xf) 08:26:39 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x9c0) 08:26:39 executing program 4: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:26:39 executing program 5: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x80, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x80}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:26:39 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "37cacaa561", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x57d) 08:26:39 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0x7ffff000}], 0x1) 08:26:39 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r0, 0x800) write$cgroup_netprio_ifpriomap(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="626f6e015f736c4af07e4031330000"], 0xf) 08:26:39 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x9c3) 08:26:39 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x929) 08:26:39 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x9c5) 08:26:39 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x9c3) 08:26:39 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x2) 08:26:39 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0xfffffd4b, 0x5, 0x0, 0x9, 0x6}, {}], "37cacaa561", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x5b5) 08:26:39 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x92b) 08:26:39 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r0, 0x800) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000003e00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000500)={0xa, 0x4e21, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000001740)=[@tclass={{0x14, 0x29, 0x43, 0x8f76}}], 0x18}}], 0x2, 0x0) dup2(r0, r1) write$cgroup_netprio_ifpriomap(r0, &(0x7f00000003c0)={'bond_slave_1'}, 0xf) 08:26:39 executing program 4: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:26:39 executing program 5: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x80, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x80}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:26:39 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x9c9) 08:26:40 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x5) 08:26:40 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x9ce) 08:26:40 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x5, 0x0, 0x9, 0x6}, {}], "37cacaa561", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x5b5) 08:26:40 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x92f) 08:26:54 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x9c5) 08:26:54 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x971) 08:26:54 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x6) 08:26:54 executing program 5: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x80, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x80}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:26:54 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat2(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)={0x4000, 0x4, 0xa}, 0x18) openat(r0, &(0x7f0000000100)='./file1\x00', 0x181000, 0x122) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r1, 0x800) write$cgroup_netprio_ifpriomap(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="626f6e6c5f736c6176650731320000b0cf3af18ad49f164b39c6ac97e39307193aee"], 0xf) 08:26:54 executing program 4: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:26:54 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xa1e) 08:26:54 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x9, 0x6}, {}], "37cacaa561", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x5b5) 08:26:54 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x972) 08:27:08 executing program 5: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:27:08 executing program 4: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:27:08 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_EXTERNAL_AUTH(0xffffffffffffffff, &(0x7f0000000cc0)={0x0, 0x0, 0x0}, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendto(r0, &(0x7f0000000040)="5ea18a99", 0x4, 0x0, &(0x7f00000000c0)=@l2tp6={0xa, 0x0, 0x0, @mcast1}, 0x1b) recvmmsg(r0, &(0x7f0000000640)=[{{0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000140)=""/241, 0xf1}, {&(0x7f0000000240)=""/116, 0x74}, {&(0x7f00000002c0)=""/66, 0x42}, {&(0x7f0000000340)=""/156, 0x9c}, {&(0x7f0000000080)}, {&(0x7f0000000400)=""/130, 0x82}, {&(0x7f00000004c0)=""/71, 0x47}], 0x7, &(0x7f00000005c0)=""/115, 0x73}}], 0x4000301, 0x102, &(0x7f0000000680)={0x77359400}) ppoll(&(0x7f0000000e00)=[{r0}], 0x1, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) fstat(r1, &(0x7f0000000040)) ftruncate(r1, 0x800) write$cgroup_netprio_ifpriomap(r1, &(0x7f00000006c0)=ANY=[@ANYBLOB="fcd30cf342138c1b16ee02e15f236c1d09bbec10759b47120e9c17003c51ca54ed91a420"], 0xf) 08:27:08 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x9c9) 08:27:08 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, {}], "37cacaa561", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x5b5) 08:27:08 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xa21) 08:27:08 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x8) 08:27:08 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x975) 08:27:08 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x10) 08:27:08 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x977) 08:27:08 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xa23) 08:27:08 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}, {}], "37cacaa561", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x5b5) 08:27:08 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x9ce) 08:27:08 executing program 1: sendmsg$NL80211_CMD_ADD_TX_TS(0xffffffffffffffff, &(0x7f0000001c40)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000001c00)={&(0x7f0000001b00)={0x50, 0x0, 0x300, 0x70bd28, 0x25dfdbfb, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_ADMITTED_TIME={0x6, 0xd4, 0xf3}, @NL80211_ATTR_USER_PRIO={0x5, 0xd3, 0x7}, @NL80211_ATTR_ADMITTED_TIME={0x6, 0xd4, 0x1ff}, @NL80211_ATTR_ADMITTED_TIME={0x6, 0xd4, 0x9b27}, @NL80211_ATTR_ADMITTED_TIME={0x6, 0xd4, 0x28d8}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}]}, 0x50}, 0x1, 0x0, 0x0, 0x40000}, 0x1) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x10000, 0x0) sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f00000014c0)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000001480)={&(0x7f0000001440)=ANY=[@ANYBLOB="01010000", @ANYRES16=0x0, @ANYBLOB="000325bd7000fbdbdf2501000000"], 0x14}, 0x1, 0x0, 0x0, 0x40468d0}, 0x4000804) openat$null(0xffffffffffffff9c, &(0x7f0000000300), 0x4000, 0x0) write$P9_RXATTRCREATE(r0, &(0x7f0000000080)={0x7, 0x21, 0x1}, 0x7) r1 = perf_event_open(&(0x7f0000001d80)={0x5, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1070, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r2 = accept4(r0, &(0x7f00000000c0)=@can, &(0x7f0000000140)=0x80, 0x80800) r3 = fork() r4 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000380), 0x200580, 0x0) sendmsg$nl_generic(r2, &(0x7f0000001bc0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000001b80)={&(0x7f0000001e00)=ANY=[@ANYBLOB="d40600001e000010bd7000ffdbdf25010000000800b8c858b51747b8e52d631500a144dc59ed673ade9f0ae63072129e92d7b8bbc110b54d97f2ff999571f11e70", @ANYRES32=r3, @ANYBLOB="9550bc7b0ae66b3149c4a4fc11a6be4a1b27c09842899484b6212977366bdf6fcb7bad0ddf1a53d3467855af1b0143add9bd92a34190647d08bdffc800ae86bf7cb977a65c7c2a9ef01168b204620ce7a6d2602396bc007380b1ac9b221759b3691f8f0e7e8231bc631331317dad987d76813f1445569c3041101b8295989b659dcafcedaad7b524448d020dfa94d2456b66528260da1fed50e71b4dc3a16361746a95b92055b5b512ae86485ade0dd78733f6d4323324b1fbfef83d007f9da1dd35d9f9d9f027281c1414aa08006100", @ANYRES32=r1, @ANYBLOB="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", @ANYRES32=r4, @ANYBLOB="0c00850000000000010000001f34a8902a3f2435636b417b702c91f9402f8c5565ea44f116511417c3e840be66cba6ead34ce435a7d625e763f4e14949f61eb0de1d0210d413a7e88dcb3d95d507e3a1a2ddda947dc039d58729e3a9e9cf218badfc021c9d1532bdb89c86787b140c685ff5a063e40c81b00881d0758f84dad2fca56a6eb4b27d4c9f240aa30350572c31398bba6b92e5ad8a41211248f3923609dd8bad6386200f035f98ad87e7bbb4c3a4f8e7bf5f3533b300b53160a506e3cc7c40a609159da6e88ce857484cdd8b00b8f287ffd6ad689b3cd340a94766be8093bb8d10acaf3312aaa90a3fc89b86f24ce6d9c35c24ae436edda44fc0c64f8ff742c1c78b5fc860d0f6c6127a5ae42d77bf84f4f9b7683c458e7a0a6ef77d1b09318425ba34fb66538b6222986fe966ded186cc910542a69105a3445044211c5406b89fb85838eeba01567a6b78beef8c89c488496513119c9cd03c045f5fddd0da4e483d645072750347a8daf4447b2ccaee291e7b121d4160906656a73d05c60a963590aeba3336585d417b431983548a74ab9fabb4f31888d492c0007ee355b481814da85cb5681ecb8db28d71845b9c69560b36fb784c8689016c47ac7c97ec710e56512cf446bd3d3dd3f9b4035176364ab57c27593f113374462ed7e75df596e7863b0cd4eac07d2a548d15e0b0f59d5acb310f70bbbf9e62b5b04a996f9abcda7d5b1b3c676b931b9f32461f3e71708ee41966109559b29abbf42215865614d643aa51adfff3c1b8bafe4b3e8151bb9bac8861c3c76a18514540482562ea7766a5ad248501c0775e7849c13e979389cf4e5deaca4ad09117367e314a5a3345452dfaadd2d9a070a1da4dfc6c47896df0a6d8604839bf2c085b3f140bad90e921fcf08e44c50d2ccd2569bbece07f86cd5a6e168feb021120c80981a78f5696f562680f8139546a7f972a6a1dcae8626420e82ac8c02f3cf822e1d11f4263d74227ece579c95d8518bde79ddb2bfff1ec28acf1867701a27581da4d05d3538b789cede00c004700020000000000000007007f0025230000b2d5ed4457b13e958d664c35b0611a14e56dddc2f3da9a80dd47d68a1249fb9f53734c7633d9a61d77fd043a3167c86f5e0a2eb9c7d58ebb9040ecaa0dfbdd6f43ecf92a21415de33d84c367a87d93237f90671c4e4d95580f61574e2ea3f00b09cb8c1621208502f8ebdc5f0b5ded5ebb6839f22064528c2f3661aa55ffb9ff5f08c14d679982dd2b3a4abd6124cece000000"], 0x6d4}, 0x1, 0x0, 0x0, 0x4000}, 0x54881) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r6 = openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0), 0x1210c3, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r6, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x30, 0x0, 0x29, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x14, 0x18, {0x7, @bearer=@l2={'eth', 0x3a, 'vlan0\x00'}}}}, ["", "", "", ""]}, 0x30}}, 0x404c004) pread64(r5, &(0x7f0000000400)=""/4096, 0x1000, 0x20) ftruncate(r5, 0x800) write$cgroup_netprio_ifpriomap(r5, &(0x7f00000003c0)={'wlan0', 0x32, 0xff}, 0x8) 08:27:08 executing program 5: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:27:08 executing program 4: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:27:08 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x97b) 08:27:08 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x12) 08:27:24 executing program 4: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:27:24 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}, {}], "", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x5b0) 08:27:24 executing program 5: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:27:24 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x9c0) 08:27:24 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xa27) 08:27:24 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xa1e) 08:27:24 executing program 1: ioctl$VFAT_IOCTL_READDIR_BOTH(0xffffffffffffffff, 0x82307201, &(0x7f0000000580)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x50, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r0, 0x800) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000003e00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000500)={0xa, 0x4e21, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000001740)=[@tclass={{0x14, 0x29, 0x43, 0x8f76}}], 0x18}}], 0x2, 0x0) clone3(&(0x7f00000002c0)={0x100144000, &(0x7f0000000080)=0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100), {0x40}, &(0x7f0000000140)=""/100, 0x64, &(0x7f00000001c0)=""/181, &(0x7f0000000280)=[0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0], 0x7}, 0x58) dup2(r1, r2) write$cgroup_netprio_ifpriomap(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="d26f6e645f73c580c8996c617665000200200014f2db4d28d9082d29169ce3f8a4c783e00cb71a16725b43f79331165e66e10da01afaa3fab60588e6b4e2880d1b812623455cba7591ec76d3ac97c0c2e1c924c8cccca8113d0f16c1e359a29f1c5cb5850a80214aeb028a7a27f99ad1380f8d843e0062b08e973c767e971f3f45bf56601682c16e5ca727438ee21a00f64b116eb40ae3abbb9c7ee1cb1202f82778b40c56"], 0xf) 08:27:24 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x300) 08:27:24 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xa46) 08:27:24 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}, {}], "", ['\x00', '\x00', '\x00', '\x00']}, 0x4b0) 08:27:24 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xa21) 08:27:24 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x9c3) 08:27:24 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x925) 08:27:24 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xa83) 08:27:38 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xa23) 08:27:38 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}, {}], "", ['\x00', '\x00', '\x00', '\x00']}, 0x4b0) 08:27:38 executing program 4: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:27:38 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x926) 08:27:38 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r1, 0x800) r2 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000080)={0x0, r2, 0x3, 0x3, 0xf4, 0x7}) write$cgroup_netprio_ifpriomap(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="626f6e645fbf041f4553377037a7736c6156110210320000"], 0xf) r3 = openat$cgroup_netprio_ifpriomap(r1, &(0x7f0000000100), 0x2, 0x0) sendfile(r3, r0, 0x0, 0x536a) 08:27:38 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xa86) 08:27:38 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x9c5) 08:27:38 executing program 5: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x80, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x80}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:27:38 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}, {}], "", ['\x00', '\x00', '\x00', '\x00']}, 0x4b0) 08:27:38 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x929) 08:27:38 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xa27) 08:27:38 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xa88) 08:27:38 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x9c9) 08:27:38 executing program 1: ioctl$SNAPSHOT_FREE(0xffffffffffffffff, 0x3305) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x400002, 0x0) r1 = fsmount(0xffffffffffffffff, 0x1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x81, 0x40, 0x0, 0x3, 0x0, 0x38b6, 0x20000, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x4, @perf_config_ext={0x7, 0x48}, 0x1248, 0x6, 0xfff, 0x8, 0x6, 0x4, 0x8, 0x0, 0x80000000, 0x0, 0x2}, 0xffffffffffffffff, 0x8, r2, 0xa) ftruncate(r2, 0x800) write$cgroup_netprio_ifpriomap(r2, &(0x7f00000003c0)={'bond_slave_1'}, 0xf) 08:27:38 executing program 5: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x80, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x80}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:27:55 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xa46) 08:27:55 executing program 5: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x80, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x80}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:27:55 executing program 4: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:27:55 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x9ce) 08:27:55 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x92b) 08:27:55 executing program 1: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x10001}}, './file1\x00'}) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x140) signalfd4(r0, &(0x7f0000000000)={[0x1]}, 0x8, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x5, 0x0, 0x1}, 0x0, 0x0, r0, 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r1, 0x800) write$cgroup_netprio_ifpriomap(r1, &(0x7f00000003c0)={'bond_slave_1'}, 0xf) 08:27:55 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}, {}], "", ['\x00', '\x00', '\x00', '\x00']}, 0x4b0) 08:27:55 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xa8c) 08:27:55 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}, {}], "", ['\x00', '\x00', '\x00', '\x00']}, 0x4b0) 08:27:55 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}, {}], "", ['\x00', '\x00', '\x00', '\x00']}, 0x4b0) 08:27:55 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xae4) 08:27:55 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xa1e) 08:27:55 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xa83) 08:27:55 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x92f) 08:27:55 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}, {}], "", ['\x00', '\x00', '\x00', '\x00']}, 0x4b0) 08:27:55 executing program 5: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:27:55 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xae7) 08:28:10 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}, {}], "", ['\x00', '\x00', '\x00', '\x00']}, 0x4b0) 08:28:10 executing program 5: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:28:10 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xa86) 08:28:10 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x971) 08:28:10 executing program 4: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:28:10 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xa21) 08:28:10 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xae9) 08:28:10 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r0, 0x800) write$cgroup_netprio_ifpriomap(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="9200ece99e76"], 0xf) 08:28:11 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}, {}], "", ['\x00', '\x00', '\x00', '\x00']}, 0x4b0) 08:28:11 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xa23) 08:28:11 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xaed) 08:28:11 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xa88) 08:28:11 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x972) 08:28:11 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x3, 0x1}, 0x0, 0x5, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r0, 0x800) write$cgroup_netprio_ifpriomap(r0, &(0x7f00000003c0)={'bond_slave_1'}, 0xf) 08:28:11 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}, {}], "", ['\x00', '\x00', '\x00', '\x00']}, 0x4b0) 08:28:11 executing program 4: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:28:11 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xb2f) 08:28:11 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xa27) 08:28:26 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xa8c) 08:28:26 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}, {}], "", ['\x00', '\x00', '\x00', '\x00']}, 0x4b0) 08:28:26 executing program 5: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:28:26 executing program 4: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:28:26 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x975) 08:28:26 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xb31) 08:28:26 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xa46) 08:28:26 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x6}, 0x2000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r0, 0x800) write$cgroup_netprio_ifpriomap(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB='bo.d_sla12\x00\x00'], 0xf) 08:28:26 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xa83) 08:28:26 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}, {}], "", ['\x00', '\x00', '\x00', '\x00']}, 0x4b0) 08:28:26 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xae4) 08:28:26 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r0, 0x800) write$cgroup_netprio_ifpriomap(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="0400000000000053150000e101004929000000"], 0xf) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r0, &(0x7f0000000040)={0x8}) 08:28:26 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x977) 08:28:26 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xb33) 08:28:26 executing program 4: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:28:26 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xa86) 08:28:41 executing program 4: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x0, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:28:41 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}, {}], "", ['\x00', '\x00', '\x00', '\x00']}, 0x4b0) 08:28:41 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xa88) 08:28:41 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xae7) 08:28:41 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x97b) 08:28:41 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xb37) 08:28:41 executing program 5: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x80, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x80}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:28:41 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r0, 0x800) lseek(r0, 0xcbbe, 0x3) write$cgroup_netprio_ifpriomap(r0, &(0x7f00000003c0)={'bond_slave_1'}, 0xf) r1 = syz_open_dev$char_usb(0xc, 0xb4, 0x5f) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000040)={0x3, 0x2, 0x10000, 0x0, 0x6}) 08:28:41 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xa8c) 08:28:41 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xae9) 08:28:41 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x9c0) 08:28:41 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xb73) 08:28:41 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}, {}], "", ['\x00', '\x00', '\x00', '\x00']}, 0x4b0) 08:28:41 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xae4) 08:28:41 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r0, 0x800) write$cgroup_netprio_ifpriomap(r0, &(0x7f00000003c0)={'bond_slave_1'}, 0xf) 08:28:41 executing program 4: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x0, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:28:42 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) poll(&(0x7f0000000040)=[{r0, 0x6004}, {r0, 0x850b1eef5f05462}, {r0, 0x201}, {r1, 0x63d0}], 0x4, 0x1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r2, 0x7) write$cgroup_netprio_ifpriomap(r2, &(0x7f00000003c0)={'bond_slave_1'}, 0xf) 08:28:42 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xb76) 08:28:42 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x9c3) 08:28:58 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xae7) 08:28:58 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xaed) 08:28:58 executing program 4: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x0, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:28:58 executing program 5: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x80, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x80}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:28:58 executing program 1: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r0, 0x800) write$cgroup_netprio_ifpriomap(r0, &(0x7f00000003c0)={'bond_slave_1'}, 0xf) 08:28:58 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xb78) 08:28:58 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x9c5) 08:28:58 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}, {}], "", ['\x00', '\x00', '\x00', '\x00']}, 0x4b0) 08:28:58 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xae9) 08:28:58 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xb2f) 08:29:14 executing program 5: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x80, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x80}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:29:14 executing program 6: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:29:14 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x9c9) 08:29:14 executing program 4: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:29:14 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) write$cgroup_netprio_ifpriomap(r0, &(0x7f00000003c0)={'bond_slave_1'}, 0xf) 08:29:14 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xb7c) 08:29:14 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xaed) 08:29:14 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xb31) 08:29:14 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xb33) 08:29:14 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x9ce) 08:29:14 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xbd4) 08:29:14 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xb37) 08:29:14 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xb2f) 08:29:14 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() capget(&(0x7f00000000c0)={0x20071026, r0}, &(0x7f0000000100)) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x1, 0x0, 0x8, 0x2, 0x0, 0x8000, 0x10000, 0xd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf65, 0x2, @perf_config_ext={0x0, 0xfff}, 0x2010, 0x100000000, 0x0, 0x5, 0x6e174086, 0x8001, 0xfffb, 0x0, 0x3e6, 0x0, 0x20}, r0, 0x9, 0xffffffffffffffff, 0x3) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r1, 0x800) write$cgroup_netprio_ifpriomap(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="00320000001c000000000000000000"], 0xf) 08:29:14 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xa1e) 08:29:14 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xbd7) 08:29:27 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xb31) 08:29:27 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xa21) 08:29:27 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xb73) 08:29:28 executing program 4: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:29:28 executing program 6: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:29:28 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) signalfd4(r1, &(0x7f0000000000)={[0x1]}, 0x8, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r2, 0x800) write$cgroup_netprio_ifpriomap(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="626f6e7a760832decc645f736c8076655f31320000"], 0xf) 08:29:28 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xbd9) 08:29:28 executing program 5: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:29:28 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xb76) 08:29:28 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xb33) 08:29:28 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xa23) 08:29:28 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xbdd) 08:29:28 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xb78) 08:29:28 executing program 1: write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="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"/534], 0x216) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003e00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000500)={0xa, 0x4e21, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000001740)=[@tclass={{0x14, 0x29, 0x43, 0x8f76}}], 0x18}}], 0x2, 0x0) pwrite64(r0, &(0x7f00000002c0)="dffa7d19be9356275c97f0afb81dd518bd7253129fab224b6b50138213774830194eeb32f8171d29cb17c6de961beda584d2229781e528611f3b", 0x3a, 0xb1b6) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x40, 0x11) r2 = dup(r0) write$P9_RREADLINK(r2, &(0x7f0000000380)={0x10, 0x17, 0x2, {0x7, './file1'}}, 0x10) accept4$inet6(0xffffffffffffffff, &(0x7f0000000300)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000340)=0x1c, 0x0) ftruncate(r1, 0x800) write$cgroup_netprio_ifpriomap(r1, &(0x7f00000003c0)={'bond_slave_1'}, 0xf) 08:29:28 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xb37) 08:29:28 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xa27) 08:29:28 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xc26) 08:29:28 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xb73) 08:29:42 executing program 6: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:29:42 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xb7c) 08:29:42 executing program 5: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:29:42 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xc29) 08:29:42 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x1, 0x0, 0x0, 0x80001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r0, 0x800) write$cgroup_netprio_ifpriomap(r0, &(0x7f00000003c0)={'bond_slave_1'}, 0xf) 08:29:42 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xa46) 08:29:42 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xb76) 08:29:42 executing program 4: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:29:42 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xbd4) 08:29:42 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xa83) 08:29:42 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xc2b) 08:29:42 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r0, 0x800) write$sndseq(r0, &(0x7f00000010c0)=[{0x3, 0x7, 0x7f, 0xc1, @time={0x2, 0x80000001}, {0x43, 0xff}, {0x7, 0x96}, @raw32={[0x3ff, 0x6]}}, {0xfa, 0x1, 0x20, 0xf8, @time={0xffffffe7, 0x3}, {0x30, 0x3f}, {0x7, 0x81}, @queue={0x80, {0x4, 0x17}}}, {0x1, 0x2, 0x1, 0x3c, @tick=0x5, {0x2f, 0xe0}, {0x1f, 0x9}, @ext={0x1000, &(0x7f00000000c0)="32eb3695e16ee72eeb396a8e89854c4e8b1e2115088513e999374ff80aae55e580a5685ded2d8b736fb53120dfc6440831ad2ce5e3a42431bfc160932de555772b1a555871a3bc8fd4130976ec9da37bfbb59c956776a41a4cc2bce6988ebf1ee035e7eefa0073228ccefb6f018d88278c7184b10cdc83440abab1388e11bc59a6a7a2fac92ab19914f1c82bbadd6f4ffe7cbf27d7a2177b360db7983fcb771246b86c1b4a376166800c9b116c8ae53a39d3b3eeddde8c38d3c7e921a58f4ecc776dc5ca1e9674e0a9daef4f29dce21eb450e92d970f16318f72c5554ce21272f27415bfa7fe3e7fe7e1b5adee1f54b8dfa5e270d6ac3abd878454652e21a3b94892258b45c4d34d99e0c680037f481e0764548c455ba406e3cb04ed1e3e49cf7b54268ac35a14a9311f1a11b72c89329821afe3e120778a21835312ffa8d9afc4d0323acd076a04f558b0a35ef9a79fcdc46d88b95d246635e241011aa39f0b36cdce293a7b4eb046e78214e3f1f21e483cb34ab85a6b1f51d193af439881e1156953c2e8bb0155a1bfd32833fa51ed010e35ebe4b75bb1bc86d88870ebb3461746854d2cb3f5100d3b16c6975a41c4a48781b2f24b7127eb2b59e786be45e98e1ab86dc8b0a7ac98d65430fbc895bc8f77b9d6bd23543e4c3da41e075c05462068d479a46823d87dd79e0ebae7df9ac5c0d21a28f662204fe18761fb0d6c83e7fa602a7b2958a0876e802e71778b4d28e1d51e4201a19452105706ba8a9238b8191a5cdf998329e5b198c0f471613d4c3ffc3676df7cd034507f7d9bff68000ef24fd2b777e79b109bc3674482ecd8aa9893d18fffa4d1bc772564091a49d98b035a4ef6a18b0fa0a071ca8766f12b2a58e2d6ae4d64e7e895e08cc339d772c3b19aa07744cddbd483f2737687a1b28e414f37670dedc1170152010d89727d085667a68fa04630c4c5fcc4261466affcb3dcecc3d0cd42d3c922af54577922fa8b767bb3666efdf6e69a5a740fe5d25b12ccc44a4bf5b166490ee241b8223b63317182016ebc693015685ffb77ab03c3e090ac1cbbe35ae6346fdeda31f9265332dc1d518a5ce22ceaf2f4ece048a6569be93e0908622c67719025bec04403bbedabf3b4b6e14b6f426081e29ca84688a147b16cf6ca139caa07e5a207e454b161fea335b45f64b2eafe6d9defb748a5f062257ff1346e1f6500f289e73c346bd024d896624d3db183f729e45239513edf8fa0a99ba86fdaa48e8f08d1366d7f50e2a530c2f6960602a797b94c6b709473947cc1efceef5f2895f21b50366583c17c1c3ed111e319c7a4b0fab4283f4275de2104b3077c1306c71668c6209d7dcadc16671180142a55dd05a04775c25fadd62ed51f85bfcf8a96def3f5f0fb3caed5b4804ba196713a7242dc93a5234a991d553a5c2079ef089dd94aafbdc34a482dbc6011ccf096fcfa07381bf69eaed4e5cf69c2b2480e86d279b332cad6c00f08b1eeb0b4fa02bca28cee537cd37a75c4691609f52e89136067dde7e3c9af5d1beb1990ce47ea3ab9c1cd82a2a914847c269997d5ae45394bf97a0a729f42051ade4fd892bcdca09472691535641640ee66da38f6a04e0989b1b3768af16a583c6f392dc48d21736583016a0f83ac7c875884ad932be785804296224c7962e4464cf3a88adf8a228fda750828e1fe16930c1be3a3ce5a3f2caecb448eb3439cc3d5c390c3a71d84d14f7d59f14af55fa18b63ccf969aa0ae1a03f78b93873f94e4e73a2fa5a42c1fd0c6594a87e3d8be63dc26e0cb897c33b7fcb4f10ae79b240adf5808de53eebcdc4eeb15eba762635f08c2e549fbab8ab4f5eb23ef029244f9836d7c0a82fa8e14688980425e98cd453fce4621b43109ee344108fe005ebf8c5d7d3722643f1735cde89eaa6a93f0937a7fdeab47c5a1993f3c7a9f6dcf1a1cdb1f67a0299382e38dac3b0c93a2c4323e6b104fa2d6dc65232ad18f151c133a31dbc8366e2ae8b6b4e5cbd1393b20aa865044060382859088be5bec1e5aa1fbc0ce4114515e5f31e324e6af16ac40ac53d2717aa448b1419c2b13d94b222ef296f68215551526910000595cc93d23c6d706c009e4cab14da20b3c7719bd705d24e5a63006b51a29aecaae84eac08750f3d42915982d8b4185c9cfa2b40baa7250fd45126803c743634f38e522358d44560fdfda0eb0501358a0f4edc85533d9d020d427ef497be4c96d3749d9e005325b7bb979032c587d43c789440d4be41559e9e7bd455b6527b77ea33da7923403222f84c612ee1cbbd0b9c4c35efd6fc694974ee80b1766152aee96558cbc1c00b90633e88886bb1e16aa49a70d843dd32d49bab06b6d0f9b4a6af819366162a4aad12ea0c794316695232256c71ae9e2438334b2a9bf1e9268b2d8fd34561d1b954e292567f61df6d28a5edadf785a2599dd0e3f44ad9fe7e2ef81553d5a188ca6166096f5fda041c878bf60025cf41769a34fa2112b22f1544303773ed222f8a7fe1864a85ec9438bc39244a32f25469b8c8211c7c12b32920857ef842d3c6c308b2a2ac65aceb407ac2a7d1eee72e97d523a51b24bd547e8f7c59433c26dea06afb76ec89d638fdc4500ce897ec4ec7c8b216d9522fd1ed69e4f7d1ccbbfb03c3ab56129891351eca8798ad8cbad036b2afdd8b4dfca5b96e6a56c35c25c789989d13a8395dc6c004ecda8f7c1a5af6e2510c6d316ab2397a6eca83fdad96da1737b6ef1754b43dc4358f877e5edb021e1f382efeed9ff4f23dd9ceac7be5452223e8c885b484dcee35246bc4e72e83afcfe52c8fad99b931d86f27d93ba8890ba2ca1161102c302b47e967150844a587e5cceb1eea465279449f8ab23078a77ada95324a6bbbbafb03f11c1e0ddf3c6e90279c30780ac687272b8e0f3cb89290d07266a7912b75da5d19301b31fd362c2907f4fecebdec450f8f3ba42b549e03d5c2f2c63897753256edf51a41f92dfbcdfce23e2b7125a8ac9eb9f00dfb8b095a0c99b206482e89640f378b74e00ad815d1d64f0dc8691258d9bc0660ff3134b04fc9904f3130c9bc46dc1699c3ca96da1c0840f8a95d94798a788fd04012b279e13e33b83feeb20eaf9f413f023578920c0ca56ad02b27f80f09aabf90fdfa6b81670fc9aaaa913f73c9a5a9e52eba10a49a3ee60633c6538def2d85f2bfe6ee586d98408e035ecb49486bb76e7d24b6a880e25ac5d2e0acda4f7d4053f2b871f1462e345499859eb110385054b1dbc6053024339247e88bd6377defc7331e01e7a6fe0fe6336c74d42213b296556274c4bd3fa60f5a6df0b1eed1a3fc5f9c359867cf03eb45773c0fb50be6a2eed3fdf7d4a5f54edca569cadb174acb790f821781ced2642e5eccf7d1ab4576b3532b7689ab653069b3085d520b5237e8bd7ac137833a4d422cba2ac8a434f8d455d9cb7486e5cec1ac22ff8202f53a2dc60dc7a5df78f56daea1612264dd9708c4c953336e04a5a8d3a9df7b5a3d43c6e0cfa5a49edb889ab2c0a69cc37bf643acd8f7cf63b4831814e802cfee6c327dcccdb9def705a70b20a0e20a0a877cd510f25c89d84a7a0872294f47f5029185b5dba6bfd596988a086f3459ad58427212f19ff033ce2946d65e6d5e8b1e9676d5c38e8ae4a910807c0cf79b1fac727703032d775397c8180cdb9cad5ebc3ba1f82c8626ce6cd63ba25657c6f7164983446921b7511556658916c7c2e5838d1cc96830413f60b04adf9786e8e9f6863a09361e47fad999eb55895b070d63d70783c6911e1ad7db0ac7cd39788408886412c56fc00640279352bcf5cef4f8d2fbaa17cb92ad1d5b001799181ac3fc2336fac2f005d1509d9d1a4c5a522f6068a162d162053ab7322f0de3e16bf03a481bdbb2a5f5b166459af38c7dacfdc2ac2af3fca1881e95e44cd55bc41968b136c957e8d6fad6a0623c84aa1872db4a9a2f4ef2318f4217392c1622c89186f7370a18c2e84c29a5c1bf831878de193d563ddd9359afbadd78ba8649271307704d50877a5dcd71ebdcd6d40afb2421126b59665b71c6b8e19b27e455230764cc3a6058a0ac6881943eb6e87da5d5064a0801f536af50eba5aedb043b26ff12393568e3cf985475d2a798d5b6ce03d8b02aa53bf1dc1c57e10c055f29ac6eb9a3b9397c4883d1c42a3148fa78bb0a1c8067259aab2c3ec3f2869ed0617100b496e7a6f9a2eb7088fcf9006ae1752f648f7532b81244bfd7357efc6a121d0598a613bcccd95a0e6b6a20e6386a35ecbd282305969cea2930fea972541d5421e0f5970103bf70276dec56916fd5ddc70fa2dffdd61e8eb672cb0e10dde6cc7c4f72535ff9a226a094e8bf0cd6f69d22cecabd18d9bd668627b23f748029b43b5a0f810315d462bc633ef68da38819167f39ed191e415855d219f6fc77b61405ac9ee77c4cc2e44a1032ea0e50339d1809f652f03bfe5f82ff191e46261cd6532e49bd1af29526e21e14ec85397199b21da9b00a2c715a7dfd865224a4cc51edb04b272da9696830b420fa18e1fbd70a2bf544b165026f523d9b65d39f523fb3216504ac8ebb627e5419570fb59723568442b3b10e29e42bd13847d997f0c95e26eaca7f68d65a3f987121d386c5192b696fad97825df775e54675e8b371e3b9f5468c35ca055df06a5792fb2e4aec481ab3f04218cf511e45c8ec6e2b88efa1c332d8dabfc7245f061069295d3839fcdcb813b5305ca86057c717cdefb7628d5d16e598ca7fb217ed6d4c3200fdd5b1fe063974ffb65c8152488acce968a181c8b6024402f53b2ef635557aa78f28ef4f46ce366e7d512761495f013019c4241041016ab2244a8927c0d9a15f9efbf09184869aae4b44e0c097cf72cf6184a1226af938858a3fcc68d95c272f9ff173001ba48e881b2f20125047de6e04033cd765569c51126bf1e67c524e50452745fe2967f9e23d0b4d2402f45b4bdc973690baaa9681a77d59fd79d01c8f66f4a20f5190057045f3b120a57780fd3234d3ce22a829e0062fbca0168f70616f7cff395c6b26e0f74320e3f0f6635d9f4ba0df025aeae40440da1a3fc9574fa0b75431396491ec0386fc95850cd43c7b3dd1a2f074df8f8b6a13cb78ad503724a41fb5801c7b35b5a9e21696dfa150541eb6a695083d3470deca6da9d9faa1c630b124a7b3d96390abadfa04463261740c7862a2a5c7d9941de50f215635f8ce3b92eecd59db2818aa723b673459cb13da55ff12879c6f1108a81eb72573fbe87704da0f841879dddf12e55ed6d4dd43a49d11e797f1506d654053fc5e98110b1d0d332a56929bb1946a0a05c3786a2798558ebb445a8e08202a6211882ecde58eb4df41c5d608db257bdf509e75e9e154a4ed377e396fd975a7d11abd587cd43d5fc913d30e2c50596d5706ea2ec2a0229d653d09f9e2427598393b00abfa81f6d0e392b46913c82f11126118614819ffde3efbb8cc6747421e6db659939955a6a6404f88f73d87014f5a416061c11bdd996642b5e68092a6133aa8920deb3c9d386a97d8200d868e23935a1705839168f4e3fd8173a087f0b2be642ea46a9a71e9307658d62381f475ad27ee45ec5a5c99a9d366235bdb3098df88993456a0c5d95b39868753cc925bf0a9840edb9d6a3fbbdd54860db40cd5483ad97e630633f4e4df1e056ea294c68ab2fe8eb1d5302d4e349508b6e63bbc2be4a72217651729da1556f3a6d2e8e1c2318357905286b11fd9794a6048a78d553c77cd14db5454c092c507549ffa87f718f92c5c801015"}}, {0xff, 0x81, 0x8, 0x89, @tick=0x1, {0x81, 0x7f}, {0x2, 0x8}, @connect={{0x3b, 0x1c}, {0xf9, 0x1}}}, {0x7f, 0xff, 0x8, 0x2, @time={0xe39, 0x53}, {0xa0, 0xea}, {0x6, 0x2}, @result={0x40, 0xe1f}}], 0x8c) write$cgroup_netprio_ifpriomap(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="626f6e6457736c6176655f31320000c398ee43cacbc24a5599523260ec80aaa60d2ef8a3b60168bad158635e295c7d63ca606bab2e45c4b4d497f358eedce2"], 0xf) r1 = socket(0x22, 0x5, 0xffffffff) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000001180), r0) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r1, &(0x7f0000001240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000001200)={&(0x7f00000011c0)={0x1c, r2, 0x800, 0x70bd2b, 0x25dfdbfb, {}, ["", "", "", "", "", ""]}, 0x1c}}, 0x10010) 08:29:42 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xb78) 08:29:57 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xc2f) 08:29:57 executing program 5: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:29:57 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r0, 0x800) write$cgroup_netprio_ifpriomap(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="626f6e645f736c61766574badf4e5f31320000"], 0xf) 08:29:57 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xa86) 08:29:57 executing program 6: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:29:57 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xb7c) 08:29:57 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xbd7) 08:29:57 executing program 4: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x74, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x74}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:29:57 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xc71) 08:29:57 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xbd9) 08:29:57 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xa88) 08:29:57 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xbd4) 08:29:57 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r0, 0x800) write$cgroup_netprio_ifpriomap(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="626f6e647f736c30afed0027c5f35719f2aa235d6430174697c84f02320000000000000003891ce1a945ad8702c97e813cb32b032df3899cf7a6b957da9ba751177462f3da8155ffca4cd9535cecc404dc0671a307c00fef2d95855460730a7bbefa81a5192495e514f5b5b945f13b915ed2c0c74fac63629c946f63ddef014ebb3841482ae054cfaccf2e7f18f8efc1cc1526268ac1044784854185552a5a1bcf27b73d00318b68e2"], 0xf) 08:29:58 executing program 5: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:29:58 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xa8c) 08:29:58 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xc73) 08:29:58 executing program 4: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x74, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x74}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:29:58 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xbdd) 08:29:58 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xbd7) 08:29:58 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r0, 0x800) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0xa) ftruncate(r1, 0x800) write$cgroup_netprio_ifpriomap(r1, &(0x7f00000003c0)={'bond_slave_1'}, 0xf) r2 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$F2FS_IOC_GET_COMPRESS_BLOCKS(r3, 0x8008f511, &(0x7f0000000140)) sendfile(r2, r1, 0x0, 0x8000) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000005, 0x12, r1, 0x0) write$sndseq(r1, &(0x7f00000000c0)=[{0x2, 0xaa, 0xff, 0x76, @tick=0x7, {0x1, 0x5}, {0x5, 0x7}, @result={0x66, 0x6}}, {0x1d, 0x7, 0x3, 0x60, @time={0x46a44c11, 0x8}, {0x20, 0x2}, {0x9, 0x40}, @note={0xc, 0x40, 0x40, 0xfc, 0x1}}, {0x0, 0x1, 0xc, 0x7, @tick=0xfffffffe, {0x3, 0x5}, {0x6, 0x1}, @control={0x0, 0x6, 0x10}}, {0x6, 0xd0, 0xae, 0x80, @tick=0x7, {0x3}, {0x0, 0x3f}, @ext={0x48, &(0x7f0000000040)="ac2f8e3a7e29805c24aa9efbeaf9d408758f9ef167278ea1da417f3bacbbdd8078646788a40ab7126d71ccb322c3b8199a60b918631530ecec24a78d21551191dc304693d1f873b1"}}], 0x70) write$cgroup_netprio_ifpriomap(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="626f6e645f736c6176657f313200005348119786995175efc7410a106e76d9b477aae48edd9527eacfbb44af34f865c85f5d185946afb7c7a81bcc352abe5de4609f736ec95bd5ff81a10c4b8372d1106cef14dbcc45414a295524076fdce6004b5a67203ca8f2b1cc537deb8bd2eae609726d71b7e59c1652cc38cfa34c89aee0dad53190b9449c72d130e461e1d3c6741ddfcc864679f5d447080524b44e3144e05a0f0f558660d724208860c2fb67307e5ecdaa5d199b918e46474045025eedc6248b3bd9f6e7063c3bbe"], 0xf) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 08:29:58 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xae4) 08:29:58 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xc75) 08:29:58 executing program 6: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:29:58 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xae7) 08:29:58 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xc26) 08:29:58 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xc79) 08:29:58 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xbd9) 08:30:15 executing program 6: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:30:15 executing program 5: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:30:15 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xcbe) 08:30:15 executing program 4: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x74, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x74}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:30:15 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e21, 0x12f, @private0={0xfc, 0x0, '\x00', 0x1}, 0x9}, 0x1c) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r0, 0x800) write$cgroup_netprio_ifpriomap(r0, &(0x7f00000003c0)={'bond_slave_1'}, 0xf) 08:30:15 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xc29) 08:30:15 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xae9) 08:30:15 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xbdd) 08:30:15 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r0, 0x800) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='bond_slave_1') write$cgroup_netprio_ifpriomap(r0, &(0x7f00000003c0)={'bond_slave_1'}, 0xf) 08:30:15 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xaed) 08:30:39 executing program 4: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x80, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x80}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:30:39 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xcc1) 08:30:39 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xb2f) 08:30:39 executing program 5: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:30:39 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xc2b) 08:30:39 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xc26) 08:30:39 executing program 6: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:30:39 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r0, 0x800) pipe(&(0x7f0000000040)) write$cgroup_netprio_ifpriomap(r0, &(0x7f00000003c0)={'bond_slave_1'}, 0xf) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000080)) 08:30:39 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xcc3) 08:30:39 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xb31) 08:30:39 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xc2f) 08:30:39 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xc29) 08:30:39 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x261}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r0, 0x800) write$cgroup_netprio_ifpriomap(r0, &(0x7f00000003c0)={'bond_slave_1'}, 0xf) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r1, 0x800) write$cgroup_netprio_ifpriomap(r1, &(0x7f00000003c0)={'bond_slave_1'}, 0xf) r2 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendfile(r2, r1, 0x0, 0x8000) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xa, 0x12, r1, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000300)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="95390000000000000000050000000c00018008000100", @ANYRES32=r6, @ANYBLOB="0c000380"], 0x2c}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000080)={'vcan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_FEATURES_SET(r1, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000280)={&(0x7f00000000c0)={0x1a8, r4, 0x100, 0x70bd29, 0x20, {}, [@ETHTOOL_A_FEATURES_WANTED={0x15c, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0xffff7fff}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x10000}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_BITS={0x13c, 0x3, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x18, 0x2, '},[:\x95]/$,:}/{,\'[-\',\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}, @ETHTOOL_A_BITSET_BIT_NAME={0x10, 0x2, 'bond_slave_1'}]}, {0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x10, 0x2, 'bond_slave_1'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8cb}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x10, 0x2, 'bond_slave_1'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2063}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '%}}\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x816}, @ETHTOOL_A_BITSET_BIT_NAME={0x10, 0x2, 'bond_slave_1'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7ff}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}]}, {0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '\'\x15-\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '-]\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}]}, {0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}]}]}, @ETHTOOL_A_FEATURES_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}]}, @ETHTOOL_A_FEATURES_HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}]}, 0x1a8}, 0x1, 0x0, 0x0, 0x40010}, 0x50) 08:30:39 executing program 4: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x80, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x80}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) [ 1951.368445] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 08:30:55 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0xe1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffc, 0x3}, 0x0, 0x0, 0x0, 0x9a2ec9171d56af94}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r0, 0x800) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x1f, 0x5, 0x7f, 0x8, 0x0, 0x3, 0x10, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x3, @perf_bp={&(0x7f0000000040), 0x4}, 0x100, 0x64, 0x9, 0x5, 0x2, 0x1000, 0x1, 0x0, 0x5, 0x0, 0x7}, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat(r0, &(0x7f0000000100)='./file1\x00', 0x10000, 0x16) write$cgroup_netprio_ifpriomap(r0, &(0x7f00000003c0)={'bond_slave_1'}, 0xf) 08:30:55 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xcc7) 08:30:55 executing program 4: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x80, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x80}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:30:55 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xc2b) 08:30:55 executing program 6: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:30:55 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xc71) 08:30:55 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xb33) 08:30:55 executing program 5: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:30:55 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xc2f) 08:30:55 executing program 6: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:30:55 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xd0f) 08:30:55 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xb37) 08:30:55 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r0, 0x800) write$cgroup_netprio_ifpriomap(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="3200000000000000000000000000008001ed2f97d1c6d0f7954b9d53c10cb63e88564fe198715af0408c43fd78214b933791654505558960f764217abaabdc00d8f10b8e2d058cae5ae717945a48e0cd11f4eb3a957362caf96f8b1df92291c339fbefd6c39207a3b0ea9354d65057b326592e6fb0f797a35891869a971856295174d86df756018a75963d361799b2197081e048e4825a8800ef33a70c42d4f8455e917721341d1d47b4a49190da7d0a3420be78b14cbf91633e4c486a660e8a185d2fb5799ee66cb8b9437935e14d0466c2e6f56bc53b8c01b3"], 0xf) 08:30:55 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xc73) 08:30:55 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xc71) 08:30:55 executing program 6: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:30:55 executing program 5: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:31:11 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000000c0), 0x38000, 0x0) perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0xf8, 0x49, 0xed, 0x0, 0x0, 0xa8, 0x4c00, 0x4, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x1, @perf_config_ext={0x5, 0x8e}, 0x1801, 0x1, 0xd1a3, 0x9, 0x309, 0xffffffff, 0x2, 0x0, 0xffffffff, 0x0, 0xa1f}, 0x0, 0x10, r1, 0x8) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) sendmmsg$inet6(r3, &(0x7f0000003e00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000500)={0xa, 0x4e21, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000001740)=[@tclass={{0x14, 0x29, 0x43, 0x8f76}}], 0x18}}], 0x2, 0x0) close_range(r2, r3, 0x0) ftruncate(r2, 0x800) write$cgroup_netprio_ifpriomap(r2, &(0x7f00000003c0)={'bond_slave_1'}, 0xf) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x2000006, 0x100010, r0, 0x618d9000) 08:31:11 executing program 4: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:31:11 executing program 5: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:31:11 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xc73) 08:31:11 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xb73) 08:31:11 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xd12) 08:31:11 executing program 6: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:31:11 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xc75) 08:31:11 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xc75) 08:31:11 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xb76) 08:31:11 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xc79) 08:31:11 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r0, 0x800) write$cgroup_netprio_ifpriomap(r0, &(0x7f00000003c0)={'bond_slave_1'}, 0xf) accept4(r0, &(0x7f0000000040)=@can, &(0x7f00000000c0)=0x80, 0x800) 08:31:11 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xd14) 08:31:11 executing program 4: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:31:11 executing program 6: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:31:11 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xc79) 08:31:26 executing program 4: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:31:26 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xb78) 08:31:26 executing program 6: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:31:26 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x48203, 0x0) r1 = creat(&(0x7f0000000240)='./file1\x00', 0x20) write$binfmt_elf64(r1, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0xaf, 0x7, 0x8, 0x0, 0xff, 0x3, 0x6, 0xc4b, 0x72, 0x40, 0x34c, 0x4, 0x100, 0x38, 0x2, 0x101, 0x8000, 0x5}, [{0x6474e551, 0x3, 0xae6, 0x200, 0xff, 0x0, 0x2, 0x8}, {0x6, 0x3, 0x100, 0x7f, 0x9, 0x8, 0x0, 0x8}], "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"}, 0x10b0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6, 0x20, 0x1, 0x1f, 0x0, 0x0, 0x80000, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x7039, 0x3, @perf_config_ext={0x80000000, 0x269}, 0x21000, 0x8, 0x40, 0x9, 0x3, 0x7fc000, 0x3, 0x0, 0x50000, 0x0, 0x9}, 0xffffffffffffffff, 0x10, r0, 0xb) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r2, 0x800) write$cgroup_netprio_ifpriomap(r2, &(0x7f0000000100)=ANY=[@ANYBLOB="806f6e645f736c0876655f313200002f2407c2ba21af7b9c64d9b1e66400e521ac7c2150985d86d8b601aae61c99a151872c909c0b58d6093c1d56025eeed1a88d042f48d46410dfbb2e58eaf1c134ed36243588b15e08000000000000000000000095492694048813c58668a47c3ae293a03e10e28e2319dc20ef4b02b0cc59be2fd36931eeb5f6a6b7ba3d5141ffb76e8e7fa3f6eb6990b1f52ae661af539e965ec753d5d75963d86749c9ce3db97bbc12882e59a0618b6579da45af3e3bb74685594ff2b67cea8f96a8"], 0xf) 08:31:26 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xcbe) 08:31:26 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xd18) 08:31:26 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xcbe) 08:31:26 executing program 5: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:31:27 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xcc1) 08:31:27 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xcc3) 08:31:27 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xb7c) 08:31:27 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xd8d) 08:31:27 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xcc1) 08:31:27 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r1, 0x800) write$cgroup_netprio_ifpriomap(r1, &(0x7f00000003c0)={'bond_slave_1'}, 0xf) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x1}}, './file1\x00'}) 08:31:41 executing program 4: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x80, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x80}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:31:41 executing program 5: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:31:41 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xcc7) 08:31:41 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xd90) 08:31:41 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0xc) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x2, 0x5, 0x3f, 0x1, 0x0, 0x25fc, 0x8000, 0x9, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x7f, 0x0, @perf_bp={&(0x7f0000000040), 0x6}, 0x40203, 0x0, 0x4, 0x4, 0xfffffffffffffffa, 0x7, 0x8e3, 0x0, 0x4bd, 0x0, 0x2}, r1, 0xf, r0, 0x1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r2, 0x800) write$cgroup_netprio_ifpriomap(r2, &(0x7f00000003c0)={'bond_slave_1'}, 0xf) 08:31:41 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xbd4) 08:31:41 executing program 6: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:31:41 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xcc3) 08:31:41 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xd0f) 08:31:41 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xd92) 08:31:41 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xcc7) 08:31:41 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x7, 0x1010, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x802c2, 0x2) ftruncate(r1, 0x800) write$cgroup_netprio_ifpriomap(r1, &(0x7f00000003c0)={'bond_slave_1'}, 0xf) 08:31:41 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xbd7) 08:31:41 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xd96) 08:31:41 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xd12) 08:31:41 executing program 4: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x80, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x80}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:31:41 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xd0f) 08:31:41 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xbd9) 08:31:41 executing program 5: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:31:41 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xd12) 08:31:56 executing program 5: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:31:56 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xd14) 08:31:56 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xbdd) 08:31:56 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xdd1) 08:31:56 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xd14) 08:31:56 executing program 4: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x80, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x80}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:31:56 executing program 6: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:31:57 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xdd4) 08:31:57 executing program 4: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x74, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x74}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:31:57 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xc26) 08:31:57 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xd18) 08:31:57 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xd18) 08:31:57 executing program 6: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:32:13 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xdd6) 08:32:13 executing program 6: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:32:13 executing program 5: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:32:13 executing program 4: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x74, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x74}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:32:13 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xd8d) 08:32:13 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xd8d) 08:32:13 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xc29) 08:32:13 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r0, 0x800) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r1, 0x800) write$cgroup_netprio_ifpriomap(r1, &(0x7f00000003c0)={'bond_slave_1'}, 0xf) ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000140)={0x35, 0x3b, 0x12, 0x13, 0x1, 0x5, 0x1, 0x91}) r2 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendfile(r2, r1, 0x0, 0x8000) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xa, 0x12, r1, 0x0) sendmsg$SMC_PNETID_FLUSH(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x3c, 0x0, 0x10, 0x70bd27, 0x25dfdbfd, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'ip6tnl0\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20040010}, 0x1) write$cgroup_netprio_ifpriomap(r0, &(0x7f00000003c0)={'bond_slave_1'}, 0xf) 08:32:13 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xd90) 08:32:13 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xdda) 08:32:13 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xc2b) 08:32:13 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xd90) 08:32:13 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r0, 0x800) r1 = fcntl$getown(r0, 0x9) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000000c0), 0x40002, 0x0) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x5f, 0x7d, 0x7, 0x70, 0x0, 0x81, 0x4, 0xd, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5b6, 0x2, @perf_config_ext={0x2af4, 0x5}, 0x54824, 0x81, 0x8, 0x8, 0xbf2, 0x60000, 0xacda, 0x0, 0xffffffff, 0x0, 0x7}, r1, 0xf, r2, 0x2) write$cgroup_netprio_ifpriomap(r0, &(0x7f00000003c0)={'bond_slave_1'}, 0xf) 08:32:13 executing program 4: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x74, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x74}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:32:13 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xd92) 08:32:13 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xe28) 08:32:13 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xd92) 08:32:29 executing program 4: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x80, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x80}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:32:29 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xd96) 08:32:29 executing program 5: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:32:29 executing program 1: r0 = getpid() capget(&(0x7f00000000c0)={0x20071026, r0}, &(0x7f0000000100)) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000003e00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000500)={0xa, 0x4e21, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000001740)=[@tclass={{0x14, 0x29, 0x43, 0x8f76}}], 0x18}}], 0x2, 0x0) pread64(r1, &(0x7f0000000040)=""/67, 0x43, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x208) ftruncate(r2, 0x800) write$cgroup_netprio_ifpriomap(r2, &(0x7f0000000140)=ANY=[@ANYBLOB="626f6e765f000000000000000000002ba8d1c23da872a0d4180197ec2b1f127a2d362521061f19fcd6fa6d62438a713000ccbabbd6be9e622a5b4f0157eae071cd3f23e8fe73621d127c9b131971cf54b6fb02219a29a7fbac6217d79c78d772037ffc6bb868d85cad7b9be790b3d29396ff09368767ca87c4bc7c8f933c2ee32407e8e104f5199716066139bde73d1c9badcfad21d5563fa08e9f0ed8831f881c25a88b328414e8e9d4c4ffc2cd0a9964e89fe46431a28b14b0c5fdda40ef71a411f890852500"], 0xf) 08:32:29 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xd96) 08:32:29 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xe2b) 08:32:29 executing program 6: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:32:29 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xc2f) [ 2060.780007] hpet: Lost 2 RTC interrupts 08:32:29 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xc71) 08:32:29 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xdd1) 08:32:29 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xdd1) 08:32:29 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xe2d) 08:32:29 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r0, 0x800) r1 = socket$inet6_udp(0xa, 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000040)="a2dd1b31d09d23f572a2ae68fcaacb147ee3267dd434c26454e638f3b3ac4002658a16584535a8304ab2ee712f208916d6c28bdfed1ad455913e74384eb20f4a823f1552dea1c3e8765a29aeb12f8fc6278e9d73afdff1d11713afbba9db692eed51277f6a3338e02bd0c0e13c401ca859c5c4128a13eddaf8", 0x79}, {&(0x7f00000000c0)="248d4247096c4b6d9b45f3785de52a0af1aa9a1dd289af364a0cb024edb232c93ce77c3b", 0x24}, {&(0x7f0000000100)="b41aa01f732a4ee6a1c8f27745c129d91a6013503b4ed26004ba32f2e2c5c2b88a273aebfbfc1046013b3d115dcf98b59a4ba57b0703892654016a031a26339fbb0ebbf9228ac836d6474577645c86acc456d4a159b9f05347693f4f7784c4615f3e312774b878cc3c16a28905e7cdd8cc2b18467796a587b6f0356e4fb5a10c9565e0", 0x83}, {&(0x7f0000000400)="677a7a71ca360a2990825a04e1b305cad1d322df536b67dc662b69df3a1b8d9727da98fcfe045dd0d02550ba3585b7ebfd1eeb89f2c9ab9496910ba0fe6c226febe10cc128670c1ad756cc893521f15113cb4d10139b6d301f0255b0008138f31a93525099905dcc1a209b84ad00ceb6bb62ba78cffff7568bd2340883c0b45d92ccac97b8209f63d77cbfa5707bfe7d0cc19d36debad7aafacdf2ecb2365a4444a69cd046a054c81962057923eaaf56b4e1a85e0afc4b1a297b62bd26511a070ed2576d1519b33efe4f9b693a7a87fce4947b7f88378ce76fc83358f3a3f00b5b7996ecd06fc1404891a0fd2f36ee46a8fc530782f1adfc2307ce87d3462fce513d699c5c156107bb48682120f7c8329a2f5393db80ec5bbd3a7ed82a51f0810e8a1523e931b73448d0d78fbdf9d61e87cd49fb9778a73beb01f6eede2bf75a99651a965506488ebb1465406263c108a8df95b8012bcd96312f9c0231656ca34084fa6d9a29712fbcffef70845513766752e10460e4129de16dff3d47957729df6a13e907962786f4fe8214f954d8c80d4d768800e70ef08b57e7f3dd51a7ce3deefedd5386149c6e0d5806d98c2e467c69cb29138daac11386fd4b6c9c489480bfd253f827ced4c95fc66f6d4a3fcd3ad80f3fea50e6d8c2b2693b88ada4d6e3865d6df6cef8b5c1892946a82ff2c26c6034c8dfb33484f9d3b9dbe82b32ff8caa379018dfc146b2be537303da49b8f4a53fd49f773c94a67756241a428190697176980a40dc72088190537a830be1d555f3557260b57c96a80e08b631b24eeac3e3ec859c5f7413b72d0f3456c19de150564f04a4bcea9b517a467f1e3a288223505fef0c555d188b347db637303e7762634dd90206d85b25de298b11ec3a51004fe009beb4e3c2322835c2fe807447cbf406b3b22bbd18009f81811cc3c3a9190e9fef0c02e54758e11c15cfa2bb9a8bfe1279c1b7339fc4be5888127f49d9cfba64b97059c5e2af0aab4c3b5303f63b38a252f07e5aa7fe67493021a8d19ae76fc85f89b4be548158dab7862ab19881bd3b28ce78f383b375db7d0373376908317a69337c4de6ff4dddc69881e7e03508428c63faeac1147b79c51ee2588b4c1354ed52b53ae342e0909ea23f6625e4f0ffd097274b3b3cd984f66a8f675a6b42c4c434a1fe0e37a63e3ea5785a4a3dca65dd3398837ce13f0055632413db4aecb26465ac783203729a3e4751d557d6b72ce0db68129797645ecfa7b93ec88c854d7f91374fa832b49c23623074079bfce758b1f99fe4b9210660b9591ada6161490dfc41e6d17e4002e442246ba23fd210cbbca33315e35b13828173e33f94f8993cebf073328f3442ae9b89e79cbad41a48cc0d3b32e1ec5241c364326d0a253f38797773582a13619d08eab51f116f6faf6e7a40153c75362b5e55689f975f11c13c6be701dcba4f67ac49efa03431440713f590d4e44bb9790e2c02a7b388016a5b38c34a8884e9c405ec1c309b8bfda5d32b78ed4d7e693e437922ec8252e7cdc94de8d4648382b3e92dfcc78e332178f9b89bd1c7128f6a71a4040482cee3459e794b41cf5542db9f1c19b91b1e8c29a0f953ef89278cdcc0d8bb46ce6fc26cbc4e709428eadee2db888e94bce2f8ae340dcdf7b73b6bced5b01a38eb878183b8260d5612c8555c21573a6a30b066eec9e6dc384bc5bf211e6aa78ef39fc11c2019bcbe4961114ab2bfea46a3e2d29b42c34c9811b9bf549bd5dae8ec9aded9fcafd06e5b16ae51c138acfe6110d9f263368f73f8ac947d61cb93cf2eb15e7cb154c198f6588b05ce19f0f39ea9d8d2786f0aabbf344261e7f623be5a98ebb461d8d740de8f97f5cd12223ddf55daf1e8b5e0c2b2d1b40b6cd786039f63eb87599280fa452736f069f411a4aabd7ab545bcd09c4a3f008626209704f8089d55f4469e9a1ea4d927eb59853a0dc55b463f893b60bd481b60bdf8a865cc6f0cdfdfdadd95d01ac62e1c27fe9f36cd3f59930789ad6eace0497142e2f9d780a62c4f331b059df67a11462ffb57035165b51c3ba2ef95131eb98134328557e215cb9a4219e0aae6030772f4c27d451f7f9d8433b15323a730b903f18877ccf16163d2916c7e4daedc22840fdd76e4d3f28fd29b948a8f627768aadc120e60ab1dd5344a080db3fa90d7a2cc6ed3a23e7c1b1fe469a5f309da0d79b15984ec37e6c4c3eca29adf02e3ddebcf92dd9275e1b7c29d0bb92d30d05b5a007f2c631f8e54695c0e0ad5146ebdf522f698720f1259019aa7bc6f7c539446d293a903bb7fb6202dbeac5699a7add016c0cb363d10b14a851b82e6d81ee753ed0138c20e2fb67f03d4c3e4a60d204dda2943f0ca15e00a57c72a14395809a83e1480f11d9b08a67cdcee30f15fca776d0a712df9f9a0e5eb05e2172d60ecb54b347e26e696042e677d7145d8efbed69aee4ea4e30cb5c5ed31a20837c2c4e02d3a91ec078c3cebf5c7d93d018a0b4192864459c59f9670a08923bab97cb1d39f47c8fe6657abb5e0f2a652e5be98c0e54643bfc699e7bb118254d3731baf424a5b6173645b9c34dca3b30605548dcd64f8fd66bed328870f85b4539f577eb3c5b77e77704edd67930b67d0dc82929306fee13d3c12f28af8cf06b76a92d08889f22549d18cc4adc2339e15fb8122ae36c53153dc8df8262bd87de198fb8ea3f3d51b6422f2728a22c5f9117eceebf9752be18e9d00186c5fc6879499b17af7d3dec9a7db516f728a510d524a29c2fdb9e2be3e6cd3e1c57719262d317786ea0e720379cb4eeee683862386f0544b463b854143812dd68e6ac73aba6039acb67fffbabdb0c2eb90a28301bcce65deebdecd715f2c61204374a235851e4bfb4d248b5dc500f1efc98ba5271935cac3e1cff74a19641b73e757cf88ba719f40cdf36a9e26d4923329d4f22d3ad67a8ea304c7a181f301e0cfe52fc65a36be577e55dbc4eec821a6baf48ed26230c1dc8d903c9c526a002178fb1d9bc947442c6ea6145e8c5a11463d930682014741349cf65c9464c5ecaba9166727a7f008fbd407bbb26939a050e4c8c6b780c476e65d35d0689045d9b40f96dbf22ae2d928eb79a28e001df169747a6a9c9b0356a69cee6c51d8ba3552091947c189a5df70949163e679be22f40e83246fc0d4de479cabdaa9408a7c997302066cfca5d8a739477348507338acda632dace0c7808687e0c2f084d290cd4358cd973b15d80e1dff5fbf8efa34089c2062d326e5e9c2695895b956bea0d7dace6ebd547921800e154d1d30b0684adb64c91460a92f76dabb410e81328a58205b77fa64fd9a5bbcde95b4a90d2fedd597bf6dc8e54200ea049a35898d5e91464317488cdee2947bd4593a02a916b5016ba2708188e00511b5ead3252542cd57bfe8d9f51cf7837ff858d0f9bf6221884cca6d2cfb7dd55fcc0522703c62285f6a7c1956d74329ac15b448d9df2340481bfdaccfac746d2fe95bdfca120f7c62438021062ed3df2f8f13b523647ee2153cb75cbc0bc88da659c3b6c206b7491fe6010608bc63813a71c63ecb32fc06bc39fb18eacb90d21d652802e5508ba40ba0eac2459141785a66a969ccd642025894661fe265d7d5c800bd9e2b62dbf97fb54790049e6bd3d0dc5b0f84a5ad875a60f2f5aea8c567bb9457919e5d86f7b4a39f83759a56e6f5da76febf441e1bfaa35c33c9cadc863a894ff5e00b2d736277cc448c13e08f24756260367b7c281dec6a317d56a1c363721f729e1e1dfd0dd1f35ce221c8aef87c5310a8b7596ba249ec22b070ab9a88469ad9c3fa9f3207b81324a4eb53fc2b3a90f3ea92e31c1ced3cde4a18b3d0bae9b107b2d9009c3c65b6c6f313d9e3144348e73adc594c0f68c68169486270d58c24777b0f1027f97d635f4cc4069c95610c2cf062569c11e59e81cb7ea3c0b70bd95784a5e70b9c982c26fac4f37b4cbff3291fd6b9ff1e763c86c69c38de66c6b8822401284b1c9f56f0c5c1d56b672be6375d4e56e97da3250865e2e5087faa859b99003f208961ccef9a8750feaf2fdda704d60a615ae24f7f4af621dec7b8cbfbd14f126273c83b9848a1d8f9869a49ddef1513ca93c54af32a75d64ae8b92fb91fd75257f78ba9bfaa9fd6b0d8b1904f230769f962d6e654051297a36a398ad543320f7ac61944511f4bcc67781efb43e6f2e774c9c626db0ae6eb3d01c5701a8149242a5f3335c9bd2cad2fa51323b3b0c98e0207ded6384fd418ea99fe176e0d7ca9b00cf742bb9e60cce1692e5c1d36de319974c3eb905bca9a66689a837d69528ab6068efff5590ea750d66c53b236a7e52f279a44fbd36f312265a79fbe3c2f521b429f9743b49a7b686d797cdbe7a2e43e88d3fb12fb8d4e7bc52ae1a83d149776d07eaa2dc4c864207a46e950ce9607fc5a8579b7ba2b596d63d831c2f78f7b150145a495118c6e7b44702298d113526af6dae71dfd1f77a0fa4338743fcb0f9280da554f919549a62643c9b35fcc5eadb7ea8158677006924530432fada9fe1e9c015a5bee5cf98c7de1384a1a624d0a1e234d0d1bfbd106f1c813dc4f146549ec950ab2efeb760fb36326a695fe724216ca65b31f5fef11a2c486c2d2cec79cd3fa3bb85917821166ed0fc02667e84cfaf91af22c49fa542803072018d610385187e8907cafc6c5a1f98e6e0f4c6ea7a3436d490d0dde61398773068c36432295de61370fac534666ae8fd99a957c62840820008c170a51f492f1f8eaf8c9ddbcec3348d6022ae4ddd156d20b94b0a95b6e0075ab68891b2c549d6ef5b6a1a49486ac747baea6a52d57015199b18f998c3ecb6a324a6ad542fcf34699fa5f6e094ccaadded38bdecbe07a95c396b58d36a5e2bb32779ec951acdf62b49fece80e84d91bdfb76fb6c122d74706b70b5900ec81a4510f3ac04449dc0a992dc4c1d259bb95aff3f557a03aa603f262def90f37893428c5355ec9e21d457de75569cec0891052f60fc8c23214a9c93cc72973b94e41caf0baed4af1c252f236e1ae663f4a393ef9b173722447ee13004bd9fe7763f27667edc88b111310b73476cedbd90c2a75bb3c83755c3b24cf1b384a006c16b00c2897ec447e1d9d5644468859c7c4bf6058f8747f51b028d61b913da0a77c8e127069937f614fc024954ab6385b64598353b95f887f07d315dbe5c83ed8827fe3add10c4dcc153e80ebcdd13823827f04aeb2d84fbfd7dae87d39e741045fc53a2d4f5008ad89b8a95a0c850ce0d3a7849698180f3bfcadf8bb9b476e873b94463925d38ef2e5cfd781cd0c9ea5829330c08b7e3167e1ae1eec97bb9bba76b9b52693ef9bd9afe6ce01f45ed464861aca726c5ca292967c11dc950d534f18f180598855f80662c252c85a642bcd153d9dc37d38ce833cddb44041ffd2b34c65350fffa23b86019602794a376f092a52dded77a02cb1b8a90e2a768d99408c2b8a65ccdf48fb1e0df296b70c453c246fc78f39fed9533e43043e90418274b9f1095bac21788772c8fee754e3c58937f93dd9360a8c0dcf5f0d933cedf9a5a5716761b5f2e6fb86930a59fd7ba69f0f912c36f338bbdca6b0d3fd4d52da59240e960fffa66a40b8c2d3b25bf5d3754d35c864112c225f7f944c5a0468f40c567f100db2c46dada9f1649a5f2fce1afbb743edde522a8f447e81661a594b6910b5dd9a95ce7b24ad7ba97d5aa0086567558c41055fd0166e727c838e2b04b720b892693bbe0881f54a1bfec5a3912d6af8a8ef0f4978d04d", 0x1000}], 0x4) r2 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', &(0x7f0000000240)={0x2040, 0x4, 0x1}, 0x18) openat(r2, &(0x7f0000000280)='./file1\x00', 0x34480, 0x40) chdir(&(0x7f00000002c0)='./file1\x00') write$cgroup_netprio_ifpriomap(r0, &(0x7f00000003c0)={'bond_slave_1'}, 0xf) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r0, 0x3) 08:32:29 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xc73) 08:32:45 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xdd4) 08:32:45 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xdd4) 08:32:45 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xe31) 08:32:45 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xc75) 08:32:45 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r1, 0x800) ftruncate(r0, 0x4662) write$cgroup_netprio_ifpriomap(r1, &(0x7f00000003c0)={'bond_slave_1'}, 0xf) 08:32:45 executing program 6: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:32:45 executing program 5: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:32:45 executing program 4: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x80, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x80}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:32:45 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3, 0x208, 0x19, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x8a9, 0x1, @perf_bp={&(0x7f0000000040), 0x2}, 0x1010, 0x3, 0xfffffff7, 0x0, 0x7, 0x7d4d, 0x3, 0x0, 0x401, 0x0, 0x4ef0}, 0x0, 0x7, r0, 0x8) ftruncate(r1, 0x800) write$cgroup_netprio_ifpriomap(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="dec111e00297415381305c847a598bd8cbce73d44a2cb19139f9a6414da466d9d3c96d3a447480bfcd4fe93a7bf916abf4c2fc8cf51c7f49639e07509adf6414fa6c1f40cec44a4e38537dcde8f0e44cc1688ee3bf8e02a5672ba282db920d0d59ce18cc88099b0cd75fa44f2a814bf9052fee06b645332bcdc2b131cec29d3c5d9f25ea47d31ca227d856b5296259abc2a2349ccecf47ff23ed1b037a8cc757f5ed3f46be302671e7946614d039abef2695741ef7b0a41eebf7dbd117cacd3b88bb54"], 0xf) 08:32:45 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xdd6) 08:32:45 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xdd6) 08:32:45 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xe80) 08:32:45 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xc79) 08:33:01 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xe83) 08:33:01 executing program 6: sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:33:01 executing program 4: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x80, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x80}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:33:01 executing program 5: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:33:01 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xcbe) 08:33:01 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xdda) 08:33:01 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xdda) 08:33:01 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x34, r1, 0x5, 0x0, 0x0, {{0x2}, {@val={0x8, 0x3, r2}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x96c}]]}, 0x34}}, 0x0) sendmsg$NL80211_CMD_PEER_MEASUREMENT_START(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x5000800}, 0xc, &(0x7f00000000c0)={&(0x7f0000000400)={0x110c, r1, 0x2, 0x70bd26, 0x25dfdbfe, {{}, {@void, @void}}, [@NL80211_PMSR_ATTR_PEERS={0x864, 0x5, 0x0, 0x1, [{0x388, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_CHAN={0x44, 0x2, 0x0, 0x1, [@NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x7}, @NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x1}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x3}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0xfffffffe}, @NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x2}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x3}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x401}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x2}]}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @device_b}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @device_b}, @NL80211_PMSR_PEER_ATTR_REQ={0x10c, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x104, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x30, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x81}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xd}]}, @NL80211_PMSR_TYPE_FTM={0x30, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x5}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x1}]}, @NL80211_PMSR_TYPE_FTM={0x2c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x8}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x1e}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x1f}]}, @NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x8}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xf}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0xff}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x3c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xe}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x9}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xf}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x3f}]}]}]}, @NL80211_PMSR_PEER_ATTR_REQ={0x5c, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_DATA={0x58, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x1c}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x5}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x14}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x1}]}, @NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x14}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x9}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}]}]}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @device_b}, @NL80211_PMSR_PEER_ATTR_REQ={0x1a4, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0xc0, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x800}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x6}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xf}]}, @NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x9}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x28, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xf}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x5}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x4}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0xac, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x8e}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x6}]}, @NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xb}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x6}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xc}]}, @NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x4}, @NL80211_PMSR_TYPE_FTM={0x3c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x9}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xb}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0xb}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x28, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xc}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x8}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x9}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}]}]}, @NL80211_PMSR_PEER_ATTR_REQ={0x4}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa}]}, {0x25c, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_REQ={0x7c, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_DATA={0x70, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x16}]}, @NL80211_PMSR_TYPE_FTM={0x2c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x1a}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x6}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x74}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x14}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x16}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}]}, @NL80211_PMSR_PEER_ATTR_CHAN={0x3c, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x22}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x94}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x82c}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x30}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x2e}, @NL80211_ATTR_CENTER_FREQ2={0x8}]}, @NL80211_PMSR_PEER_ATTR_REQ={0xc, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}]}, @NL80211_PMSR_PEER_ATTR_REQ={0x194, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_DATA={0xb4, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x34, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x6}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x9}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x78}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x10}]}, @NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x40, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0xce}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x8}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xd}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x7f}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x80}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}]}, @NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x1b}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0xd4, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x8}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x11}]}, @NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x14}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x8}]}, @NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x34, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x9}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x8}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xb}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x8}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x17}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xf}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xf}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x2}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x1}]}, @NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xd}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x15}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x3}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}]}]}, {0x228, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_CHAN={0x2c, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0xe}, @NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x3}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x9}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x4}]}, @NL80211_PMSR_PEER_ATTR_REQ={0x1f8, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_DATA={0x7c, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x4}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x28, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x8}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0xe}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x800}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x7}]}, @NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x8}]}, @NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0x174, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x6}]}, @NL80211_PMSR_TYPE_FTM={0x44, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xc}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x8}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x9}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x1}]}, @NL80211_PMSR_TYPE_FTM={0x44, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x7f}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x7}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x10}]}, @NL80211_PMSR_TYPE_FTM={0x40, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xb}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x17}]}, @NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x8}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x6}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x14}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x9}]}, @NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x3}]}, @NL80211_PMSR_TYPE_FTM={0x2c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x1a}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}]}]}, {0x54, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_CHAN={0x1c, 0x2, 0x0, 0x1, [@NL80211_ATTR_CENTER_FREQ1={0x8}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x57}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x8}]}, @NL80211_PMSR_PEER_ATTR_CHAN={0x14, 0x2, 0x0, 0x1, [@NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x5}, @NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x6}]}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @broadcast}, @NL80211_PMSR_PEER_ATTR_CHAN={0x14, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x10}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x4d}]}]}]}, @NL80211_PMSR_ATTR_PEERS={0x894, 0x5, 0x0, 0x1, [{0x70, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_REQ={0x10, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_DATA={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x4}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}]}, @NL80211_PMSR_PEER_ATTR_CHAN={0x24, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0xc}, @NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x1}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x3}]}, @NL80211_PMSR_PEER_ATTR_CHAN={0xc, 0x2, 0x0, 0x1, [@NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x2}]}, @NL80211_PMSR_PEER_ATTR_CHAN={0x14, 0x2, 0x0, 0x1, [@NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x10000}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0xda}]}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @device_b}, @NL80211_PMSR_PEER_ATTR_CHAN={0xc, 0x2, 0x0, 0x1, [@NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x1000}]}]}, {0x10, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_CHAN={0xc, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x229}]}]}, {0x110, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_REQ={0xc8, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x80, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x7}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x100}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6}]}, @NL80211_PMSR_TYPE_FTM={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x18}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0xc}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x4}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x30, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x2c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}]}]}, @NL80211_PMSR_PEER_ATTR_CHAN={0x1c, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0xa}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x24}]}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @broadcast}, @NL80211_PMSR_PEER_ATTR_REQ={0x4}, @NL80211_PMSR_PEER_ATTR_CHAN={0xc, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}]}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @device_b}]}, {0x700, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_CHAN={0x54, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x3b}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x2}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x4}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0xffffff81}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x4}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x28}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0xd}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x1f7c}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0xe612}]}, @NL80211_PMSR_PEER_ATTR_CHAN={0x4c, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0xe}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x5}, @NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x2}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x6}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x1}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x16f3}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x7}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0x2d4}]}, @NL80211_PMSR_PEER_ATTR_REQ={0xf8, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x4c, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x7f}]}, @NL80211_PMSR_TYPE_FTM={0x38, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x6}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x8}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x98, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x40, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0xa}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xb}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x7fff}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x19}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x9}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xe}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xb}]}, @NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x34, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xc}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xc}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}]}]}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa}, @NL80211_PMSR_PEER_ATTR_CHAN={0x1c, 0x2, 0x0, 0x1, [@NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x200}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8, 0x27, 0x3}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x1d}]}, @NL80211_PMSR_PEER_ATTR_REQ={0x30c, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_DATA={0xf4, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x4}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x1}]}, @NL80211_PMSR_TYPE_FTM={0x28, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xd}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x7}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0xc}]}, @NL80211_PMSR_TYPE_FTM={0x40, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xf}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0xb}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x20}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x5}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xf}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x9}]}, @NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x8}]}, @NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x7f}]}, @NL80211_PMSR_TYPE_FTM={0x3c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x8}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x1d}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x1}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0x2c, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x9}]}, @NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x4}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x9c, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x3c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0xa}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xc}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xf}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x6}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}]}, @NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x14, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xe}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x34, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x11}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0xa}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x1f}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x9}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x6}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x4}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0x144, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x2c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xe}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x95}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x1}]}, @NL80211_PMSR_TYPE_FTM={0x34, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x7fff}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x6}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x200}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x1d}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0xff76}]}, @NL80211_PMSR_TYPE_FTM={0x40, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x8}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0xc}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x5}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x7f}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x40}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x8, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x30, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xd}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x3ff}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x1f}]}, @NL80211_PMSR_TYPE_FTM={0x28, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x1}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}]}, @NL80211_PMSR_PEER_ATTR_REQ={0x1ec, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x401}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x7f}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0xe0, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x34, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x6}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x17}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x34, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x6}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0x1f}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x7f}]}, @NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xb}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x4}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x7}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x10, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x3f}]}, @NL80211_PMSR_TYPE_FTM={0x3c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x3c}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x3}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0xf5}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x6}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0x78, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x81}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0xbf}]}, @NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x9}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0xf2d1}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0x38, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_CIVICLOC={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x6}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5, 0x3, 0x4}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x2}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0x40, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x30, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0xb7}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_FTMR_RETRIES={0x5, 0x7, 0x7}, @NL80211_PMSR_FTM_REQ_ATTR_FTMS_PER_BURST={0x5, 0x6, 0xb}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_PERIOD={0x6, 0x4, 0x1}, @NL80211_PMSR_FTM_REQ_ATTR_TRIGGER_BASED={0x4}]}, @NL80211_PMSR_TYPE_FTM={0xc, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5, 0x5, 0x3}]}]}, @NL80211_PMSR_REQ_ATTR_DATA={0x20, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x1c, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_REQUEST_LCI={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_PREAMBLE={0x8, 0x2, 0x2}, @NL80211_PMSR_FTM_REQ_ATTR_NON_TRIGGER_BASED={0x4}]}]}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}, @NL80211_PMSR_REQ_ATTR_GET_AP_TSF={0x4}]}, @NL80211_PMSR_PEER_ATTR_CHAN={0x44, 0x2, 0x0, 0x1, [@NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0xf}, @NL80211_ATTR_WIPHY_EDMG_BW_CONFIG={0x5, 0x119, 0x4}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x25}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x148c}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0xd4}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x1}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x2}, @NL80211_ATTR_CHANNEL_WIDTH={0x8, 0x9f, 0x5}]}]}]}]}, 0x110c}, 0x1, 0x0, 0x0, 0x8000}, 0xc800) r3 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r4, 0x800) r5 = memfd_create(&(0x7f0000000040)='bond_slave_1', 0x2) dup2(r3, r5) write$cgroup_netprio_ifpriomap(r4, &(0x7f00000003c0)={'bond_slave_1'}, 0xf) 08:33:01 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xcc1) 08:33:01 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xe85) 08:33:01 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xe28) 08:33:01 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xe28) 08:33:01 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xcc3) 08:33:01 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xe2b) 08:33:01 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xcc7) 08:33:01 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xe2b) 08:33:01 executing program 5: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:33:15 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xd0f) 08:33:15 executing program 5: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:33:15 executing program 6: sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:33:15 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xe89) 08:33:15 executing program 4: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:33:15 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xe2d) 08:33:15 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xe2d) 08:33:15 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000140)=0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) signalfd4(r2, &(0x7f0000000000)={[0x1]}, 0x8, 0x0) r3 = perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xc1, 0x6f, 0x8, 0x9, 0x0, 0x77, 0xc040, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x4, @perf_bp={&(0x7f0000000080), 0x5}, 0x4000, 0x0, 0x7ff, 0x3, 0x3, 0x1, 0xfff9, 0x0, 0xff, 0x0, 0xffffffffffffff80}, r1, 0x2, r2, 0x1) r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x802c2, 0x0) r5 = getpid() capget(&(0x7f00000000c0)={0x20071026, r5}, &(0x7f0000000100)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0xbb, 0x6, 0x8, 0x73, 0x0, 0xac, 0xa00, 0xb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x8001, 0xbea}, 0xa4, 0xbbc, 0xff, 0x6, 0x8001, 0xfffffffa, 0x1, 0x0, 0x3, 0x0, 0x800}, r5, 0xc, r3, 0xa) ftruncate(r4, 0x800) r6 = dup(r0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r6) write$cgroup_netprio_ifpriomap(r4, &(0x7f00000003c0)={'bond_slave_1'}, 0xf) r7 = fspick(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1) write$binfmt_elf64(r7, &(0x7f0000001e00)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x9f, 0x0, 0x7, 0x8, 0x2, 0x6, 0x86, 0x215, 0x40, 0x1f1, 0x8000, 0x1, 0x38, 0x2, 0x1f, 0xfffe, 0x389}, [{0x0, 0xfffffff7, 0x3d8, 0xb3, 0x2, 0x81, 0x7774bb6, 0x1e}, {0x5, 0x8, 0x9, 0x4, 0x5ba0531, 0x2, 0x3, 0x1}], "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", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x1ab0) 08:33:15 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xe31) 08:33:15 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xe31) 08:33:15 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xd12) 08:33:15 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xeea) 08:33:15 executing program 5: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:33:16 executing program 6: sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:33:16 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xe80) 08:33:16 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xe80) 08:33:16 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xd14) 08:33:16 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xeed) 08:33:16 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r0, 0x800) write$cgroup_netprio_ifpriomap(r0, &(0x7f00000003c0)={'bond_slave_1'}, 0xf) 08:33:16 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xe83) 08:33:16 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xeef) 08:33:16 executing program 4: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:33:16 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xe83) 08:33:16 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xd18) 08:33:16 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0}, 0x4002, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_uring_enter(0xffffffffffffffff, 0x4456, 0x5880, 0x2, &(0x7f0000000040), 0x8) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r1, 0x800) write$cgroup_netprio_ifpriomap(r1, &(0x7f00000003c0)={'bond_slave_1'}, 0xf) r2 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendfile(r2, r1, 0x0, 0x8000) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xa, 0x12, r1, 0x0) syz_io_uring_submit(r3, 0x0, 0x0, 0x0) r4 = syz_io_uring_setup(0x3167, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000340)=0x0) r7 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f00000019c0)={{0x1, 0x1, 0x18, r0, {0x4}}, './file1\x00'}) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f00000001c0)=@file={0x1, './file1\x00'}, 0x6e, &(0x7f00000018c0)=[{&(0x7f0000000240)="6bbe9bb1386934f922dfdf4110231225a34423daabe5701224d2bba58409924ee6b9483493cbda8dc024452bc1e8121fad7c90a9ce1758274bc8606b38beb1baac315217502ee5acfb9ce7a49c46c4f0dcc2e60b09f0ffda4e2e042dc5297de845b8169e81f77d09dbde3684a0fa1d114ce0b13c5d96b567e14cc7456ff8289f41a06bccf11e92a5", 0x88}, {&(0x7f0000000400)="4d41fb59bbe75ae855d1fba765cca9bdc95664426cecf548b43f46f355d5f2cf2d634960d33879cf12f0b025cfe319887a29a3a261364568eb7e91b8585ab6d5b1ba4bc5d15a4d2c642882c24d36e7eb17de067fa788d056c20702b8479a1c26e4fed5c88705", 0x66}, {&(0x7f0000000480)="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", 0x1000}, {&(0x7f0000001480)="3de37f15add6285161ff84e3ec9b02527d60ddbf1c5717545ebb691857dd5a88d20e32864b55a1123cd07b71a344120cea1478c7da67bf3cc7f6e4a0baf8d8e1a6935c7474177a7918fc5ea8cc7392145269c5397c97012bfeca03afb71ff84f4f7f9774345a9ae362a7836494410b86df6e20ed83c1a692f3bef747cb54b50d2beac2901136d6e92d6354103ddb78d2edf5cc582aeb9f9417034ca3f8ed0310dd8d72700b3c3bf9c4843c0b1e7b8e29be1ed8a915de580ea9bc6de878267f53083acf5416de50702146cdbe355fa60bb585e579003e61768341373e8652e66b6adf6d72ca3ada23282f09787afecf7a0638", 0xf2}, {&(0x7f0000000140)="fed6df72258344d675c1e0168ea09f558071471239fce2f71e44de91", 0x1c}, {&(0x7f0000001580)="6aee5a96391042e72aabb33c1d67ca07053f19ab762b4805b7c38824db7642253a665eb0bd9c2df96cef50012a5867d2d94da8df7e089056427a9829a1391e049dbe655256296218340a97ccea7259e04c6af053aa8d1a2a8718c2c0c4449510971651f433ed6da54f916a62bac523b82d6f15bf7d5ddec1ae43f8b942a5090b51cf6437edc612ae0f4c5f1d04c54fe905311fc5835f0b9cbb1bbe1a311e08ad49ac81e7a2f8864ac37b41bab55a25031c0f5a8c7306fb848e1dbc479641532f5a4af977", 0xc4}, {&(0x7f0000000380)="692a0fac9240b5cfca0fe2dc3e76c21b850bca5c3d344ee5d22a", 0x1a}, {&(0x7f0000001680)="16217d6eb59ea6f142626fb005be6b0c86c067b44a1b8fb329adea2634", 0x1d}, {&(0x7f00000016c0)="87f8a78e0676679933c3c2fe343f2c1e1b023279a7fe43f8b5c921477058fd4091b0a6b8759ceec0c1fea9f78248e8994ccb8962481a487f6c9036c95dde436efc428b227bde6dd60d214fcbdac60fc651da0c4fb3365d152cc731753863bf4e0e13a57108e1a095cff6cbe16539298dc4ae5e11ea629d5577338cfe1fedabdcb662fd98b987249f4d9e1a7d22cc487d344c6fdf22a261b287c9fecb80065d1e90860fc2bbb46b0d99c8933d07e390e38e265d1b8ccf012129d548a8c5c2a24e4a6a4ec7d8442ae73258d2646531", 0xce}, {&(0x7f00000017c0)="60555744a3e299870c0df9b5ae76f341c26613730eda39cba6bef00f666fb7a2522c9be943c865101b0c858e5dcc14c8f3a9e0dbc96e97eef902010585ba5c1554b7dcedac821d1f193dc23d95b5b0605240b8cc8e69aed8223ceb814b7c256f9b2921b64416f4f9a7f2c5f558285bbfd00f5fd80afa5e0d0d308c49cf2655a7f9248241bfbcfe405ae6b9ba355d48d793c237fb67727a7df7cf37b5510e357a56185c3591067c0b111c0548c3e9e62af2a8cb013a63c8adde06664bc8cd29e546b93f1252b0c6d96ba2b83c881e9fa69664a3e9b96e4b24e0aa", 0xda}], 0xa, &(0x7f0000001a00)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, 0xffffffffffffffff}}}, @rights={{0x24, 0x1, 0x1, [r4, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r8]}}], 0x48, 0x4000080}, 0x40) r9 = dup2(r7, r7) syz_io_uring_submit(r5, r6, &(0x7f0000000300)=@IORING_OP_ACCEPT={0xd, 0x0, 0x0, r9, 0x0}, 0x0) syz_io_uring_submit(r3, r6, &(0x7f0000000080)=@IORING_OP_FALLOCATE={0x11, 0x3, 0x0, @fd_index=0x7, 0x5, 0x0, 0x7}, 0x1fb) ftruncate(r0, 0x800) write$cgroup_netprio_ifpriomap(r0, &(0x7f00000003c0)={'bond_slave_1'}, 0xf) 08:33:16 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xe85) 08:33:16 executing program 5: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:33:16 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xe85) 08:33:17 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xef3) 08:33:33 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xd8d) 08:33:33 executing program 6: syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:33:33 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xe89) 08:33:33 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xe89) 08:33:33 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) syncfs(r0) ftruncate(r0, 0x800) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000003e00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000500)={0xa, 0x4e21, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000001740)=[@tclass={{0x14, 0x29, 0x43, 0x8f76}}], 0x18}}], 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000040)={0x80, 0x3, 0x80000001, 0xfffffff9, 0x8}) write$cgroup_netprio_ifpriomap(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB='bond_slave^12\x00\x00'], 0xf) 08:33:33 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xf2c) 08:33:33 executing program 4: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:33:33 executing program 5: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:33:48 executing program 5: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:33:48 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xd90) 08:33:48 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xeea) 08:33:48 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0xc0d}, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x208000, 0x100) r3 = openat(r2, &(0x7f00000000c0)='./file1\x00', 0x284200, 0x40) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000001c0)={'veth0_to_batadv\x00'}) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x800) dup2(r5, r0) write$binfmt_elf64(r3, &(0x7f0000000880)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0xa1, 0x3, 0x1, 0x4, 0x2, 0x3e, 0x1f, 0x261, 0x40, 0x8b, 0xb54, 0x1f, 0x38, 0x1, 0x5b15, 0x0, 0x8}, [{0x70000000, 0xe44, 0x4, 0x100000001, 0x3, 0x2, 0x4, 0x7}], "288655a48e1c76977f64ceb2d0e8482119a4145d00e031d75952ea5f91fa999d0cbb6b7fe21273dc01a2d327be47999ab23e4d7a6d897ff7a30b3a21de27ececcfe3ce8b", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x8bc) r6 = syz_open_dev$vcsn(&(0x7f0000000100), 0x7, 0x200) write$binfmt_elf64(r6, &(0x7f0000000400)={{0x7f, 0x45, 0x4c, 0x46, 0xa1, 0xd2, 0x6, 0x9, 0x7, 0x3, 0x3, 0x0, 0x2cd, 0x40, 0x2d2, 0x99, 0x4, 0x38, 0x2, 0xff, 0x200, 0x7}, [{0x60000000, 0x1000, 0x7fff, 0x1ff, 0x0, 0x6, 0x1f, 0x2}], "38dfd5281e208fc48035514c74b4e7a1d3ff7054138ecaafb10c1cb7cc41fa74ca182acf5964e45e03a6c343322e10ab8e2d5a8b7e5274caefa1d0d579ba3096a327a12d9296cbd0428cf2b33799faeaade465d6368bd049272e1e579333b3bbe2424ca775e1756cc44f596175debb5b2f7bf3bb88aa7fd52e7c0f495c840fd2e4788c2e2f0744cce65c1fa2fa6a8ce8c386f0c4f2b0dec3f79fb153a3617ee2d346edd250d1e551710d5de17ef7b6aa3f2b40429b476facafa4f333dc7159ce658f3946abd86a6adc1441318edf42f9a4880a2618af6714ddf1061dd6e202807de9", ['\x00', '\x00', '\x00']}, 0x45a) ftruncate(r1, 0x800) write$cgroup_netprio_ifpriomap(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="226f6e645fceee12c907a9eb3971a358555565736c6176655faf3200000cba643b35f33e4fc4e4f51f5b55daf8104afd31f149ef6362232c66828aeca42873f7a50331a6"], 0xf) 08:33:48 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xeea) 08:33:48 executing program 4: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x80, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x80}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:33:48 executing program 6: syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:33:48 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xf2f) 08:33:48 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xd92) 08:33:49 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xeed) 08:33:49 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xeed) 08:33:49 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xf31) 08:33:49 executing program 4: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x80, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x80}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:33:49 executing program 5: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:33:49 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r0, 0x800) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r1, 0x800) write$cgroup_netprio_ifpriomap(r1, &(0x7f00000003c0)={'bond_slave_1'}, 0xf) r2 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendfile(r2, r1, 0x0, 0x8000) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xa, 0x12, r1, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r3, 0x800) write$cgroup_netprio_ifpriomap(r3, &(0x7f00000003c0)={'bond_slave_1'}, 0xf) r4 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r4, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendfile(r4, r3, 0x0, 0x8000) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xa, 0x12, r3, 0x0) write$cgroup_netprio_ifpriomap(r3, &(0x7f0000000300)=ANY=[@ANYRESDEC, @ANYRESHEX, @ANYRES16, @ANYRESHEX=r5, @ANYRES32, @ANYRESOCT, @ANYRESDEC, @ANYRESDEC], 0x11) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) readv(r6, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/212, 0xd4}, {&(0x7f00000001c0)=""/172, 0xac}], 0x2) 08:34:05 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xeef) 08:34:05 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xd96) 08:34:05 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3f, 0x7}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r0, 0x800) write$cgroup_netprio_ifpriomap(r0, &(0x7f00000003c0)={'bond_slave_1'}, 0xf) 08:34:05 executing program 5: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:34:05 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xf35) 08:34:05 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xeef) 08:34:05 executing program 4: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x80, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x80}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:34:05 executing program 6: syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:34:05 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xef3) 08:34:05 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xdd1) 08:34:05 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xf54) 08:34:05 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xef3) 08:34:05 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r0, 0x800) write$cgroup_netprio_ifpriomap(r0, &(0x7f00000003c0)={'bond_slave_1'}, 0xf) 08:34:05 executing program 5: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:34:05 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xf2c) 08:34:19 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xf93) 08:34:19 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xdd4) 08:34:19 executing program 5: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:34:19 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xf2f) 08:34:19 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xf2c) 08:34:19 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60255, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xde76, 0x1}, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = getpid() capget(&(0x7f00000000c0)={0x20071026, r1}, &(0x7f0000000100)) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x20, 0x1, 0x20, 0x80, 0x0, 0x2, 0x10010, 0x9, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000140), 0x1}, 0x8000, 0x4, 0x9, 0x0, 0xe4, 0x7fff8000, 0xa2f, 0x0, 0x5, 0x0, 0x4}, r1, 0x8, 0xffffffffffffffff, 0x1) ftruncate(r0, 0x800) write$cgroup_netprio_ifpriomap(r0, &(0x7f00000003c0)={'bond_slave_1'}, 0xf) 08:34:19 executing program 6: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:34:19 executing program 4: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:34:19 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xdd6) 08:34:19 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xf95) 08:34:19 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xf31) 08:34:19 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xf2f) 08:34:19 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) signalfd4(r0, &(0x7f0000000000)={[0x1]}, 0x8, 0x0) mmap$perf(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x2000009, 0x110, r0, 0x7) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r1, 0x800) write$cgroup_netprio_ifpriomap(r1, &(0x7f00000003c0)={'bond_slave_1'}, 0xf) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) mmap$perf(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x126caa98bfead2f2, 0x110, r2, 0x100000001) 08:34:20 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xdda) 08:34:36 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xf97) 08:34:36 executing program 4: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:34:36 executing program 5: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x0, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:34:36 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xe28) 08:34:36 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r0, 0x800) write$cgroup_netprio_ifpriomap(r0, &(0x7f00000003c0)={'bond_slave_1'}, 0xf) 08:34:36 executing program 6: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:34:36 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xf35) 08:34:36 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xf31) 08:34:36 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xf9b) 08:34:36 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xe2b) 08:34:36 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xf54) 08:34:36 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xf35) 08:34:36 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e22, 0x7, @rand_addr=' \x01\x00', 0x4}, 0x1c) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r2, 0x800) write$cgroup_netprio_ifpriomap(r2, &(0x7f00000003c0)=ANY=[@ANYBLOB="626f6e642f9fe37e00c4e1c96e1afc"], 0xf) 08:34:37 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xff5) 08:34:37 executing program 4: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:34:37 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xf54) 08:34:37 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xf93) 08:34:37 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xe2d) 08:34:51 executing program 4: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x74, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x74}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:34:51 executing program 1: r0 = getpid() capget(&(0x7f00000000c0)={0x20071026, r0}, &(0x7f0000000100)) sched_setparam(r0, &(0x7f0000000380)=0x7fffffff) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r1, 0x800) write$cgroup_netprio_ifpriomap(r1, &(0x7f00000003c0)={'bond_slave_1'}, 0xf) r2 = syz_open_pts(r1, 0x82301) r3 = clone3(&(0x7f0000000400)={0x0, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140), {0x32}, &(0x7f0000000180)=""/156, 0x9c, &(0x7f0000000240)=""/211, &(0x7f0000000340)=[0x0, 0xffffffffffffffff, 0xffffffffffffffff], 0x3, {r1}}, 0x58) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) signalfd4(r4, &(0x7f0000000000)={[0x1]}, 0x8, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x3f, 0x1, 0x9, 0x20, 0x0, 0xbad, 0xa0, 0xa, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7da83b0f, 0x0, @perf_config_ext={0x6, 0xfe2}, 0x0, 0x1, 0x4, 0x7, 0xfff, 0x40, 0xfc01, 0x0, 0x2, 0x0, 0x80}, r3, 0x3, r4, 0xd) r5 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r5, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) sendmmsg$inet6(r5, &(0x7f0000003e00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000500)={0xa, 0x4e21, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000001740)=[@tclass={{0x14, 0x29, 0x43, 0x8f76}}], 0x18}}], 0x2, 0x0) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(r5, 0xf502, 0x0) ioctl$F2FS_IOC_WRITE_CHECKPOINT(r2, 0xf507, 0x0) 08:34:51 executing program 5: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x0, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:34:51 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xe31) 08:34:51 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xff7) 08:34:51 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xf93) 08:34:51 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xf95) 08:34:51 executing program 6: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:34:51 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xf95) 08:34:51 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xe80) 08:34:51 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xf97) 08:34:51 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xff9) 08:34:51 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xffd) 08:34:51 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xf97) 08:34:51 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xe83) 08:34:51 executing program 6: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:35:09 executing program 6: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:35:09 executing program 5: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x0, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:35:09 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r0, 0x800) write$cgroup_netprio_ifpriomap(r0, &(0x7f00000003c0)={'bond_slave_1'}, 0xf) write$P9_RGETLOCK(0xffffffffffffffff, &(0x7f0000000040)={0x22, 0x37, 0x1, {0x1, 0x1, 0x3, 0x0, 0x4, '&$${'}}, 0x22) write$P9_RREADLINK(r0, &(0x7f0000000080)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) 08:35:09 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xf9b) 08:35:09 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') r1 = epoll_create1(0x80000) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_ADDRFORM(r2, 0x29, 0x48, &(0x7f0000008c40), 0x4) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) pread64(r1, &(0x7f0000000080)=""/120, 0x78, 0x8) readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) 08:35:09 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xf9b) 08:35:09 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xe85) 08:35:09 executing program 4: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x74, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x74}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:35:09 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xff5) 08:35:09 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xff5) 08:35:09 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xe89) 08:35:09 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r0, 0x800) write$cgroup_netprio_ifpriomap(r0, &(0x7f00000003c0)={'bond_slave_1'}, 0xf) 08:35:09 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') r1 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x5) read(r1, &(0x7f0000000080)=""/186, 0xba) readv(r0, &(0x7f0000000200)=[{&(0x7f0000000140)=""/143, 0x8f}], 0x1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000280)=0x4) ftruncate(r2, 0x800) write$cgroup_netprio_ifpriomap(r2, &(0x7f00000003c0)={'bond_slave_1'}, 0xf) r3 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r3, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendfile(r3, r2, 0x0, 0x8000) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xa, 0x12, r2, 0x0) openat(r2, &(0x7f0000000240)='./file0\x00', 0x141000, 0x132) syz_open_procfs(0x0, &(0x7f0000000000)='net/protocols\x00') 08:35:09 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xff7) 08:35:09 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xff9) 08:35:10 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xff7) 08:35:28 executing program 5: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0x0, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:35:28 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xeea) 08:35:28 executing program 4: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x74, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x74}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:35:28 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xffd) 08:35:28 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x1, &(0x7f00000000c0)=0x5, 0x4) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000003e00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000080)={0xa, 0x4e23, 0x0, @private2, 0x9}, 0x1c, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYRESOCT=r0], 0x18}}], 0x2, 0x0) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r1, 0x40047211, &(0x7f0000000000)=0x10) 08:35:28 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2200, 0x11) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r0, 0x800) write$cgroup_netprio_ifpriomap(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="2a286e645f736c6176655f313200004c3c56c466d797114e25892505203520099b937fb8b4ca59d66c1996a67f4d295e3b76f90ee91ecf7c764b970631e20263a10e813e8521d9afea375311af67571fab959398bab11daa1785feb05b37abca885165d09c2a545a6ad37a79b0128f63baa4afb3bebe7aa6fc58e2ae73aeff920da730eafbffffffbbfb28"], 0xf) 08:35:28 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xff9) 08:35:28 executing program 6: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:35:28 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @local}, 0x1c) openat(r0, &(0x7f0000000040)='./file1\x00', 0x101200, 0x1) sendmmsg$inet6(r1, &(0x7f0000003e00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000500)={0xa, 0x4e21, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000001740)=[@tclass={{0x14, 0x29, 0x43, 0x8f76}}], 0x18}}], 0x2, 0x0) fallocate(r1, 0x10, 0x0, 0x6d) ftruncate(r0, 0x800) write$cgroup_netprio_ifpriomap(r0, &(0x7f00000003c0)={'bond_slave_1'}, 0xf) 08:35:28 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xffd) 08:35:28 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) 08:35:28 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xeed) 08:35:28 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000003e00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000500)={0xa, 0x4e21, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="140005cee90393da77a08eb783e7426500009c30c2df8ec73afb314621000000002910000043000000768f000000000000"], 0x18}}], 0x2, 0x0) ioctl$int_in(r1, 0x73, &(0x7f0000000000)=0x1) readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) 08:35:43 executing program 6: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:35:43 executing program 5: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0x0, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:35:43 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) readv(r1, &(0x7f0000000240)=[{&(0x7f0000000080)=""/178, 0xb2}, {&(0x7f0000000140)=""/58, 0x3a}, {&(0x7f0000000180)=""/189, 0xbd}, {&(0x7f00000002c0)=""/233, 0xe9}], 0x4) readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) 08:35:43 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x80ac2, 0xc0) ftruncate(r0, 0x800) write$cgroup_netprio_ifpriomap(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="626f6e645f736c617e655f31321200"], 0xf) 08:35:43 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xeef) 08:35:43 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x400000, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) sendmmsg$inet6(r2, &(0x7f0000003e00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000500)={0xa, 0x4e21, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000001740)=[@tclass={{0x14, 0x29, 0x43, 0x8f76}}], 0x18}}], 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r1, 0xc0189377, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0x29, 0x1}}, './file0\x00'}) io_submit(0x0, 0x1, &(0x7f00000003c0)=[&(0x7f0000000380)={0x0, 0x0, 0x0, 0x6, 0x0, r2, &(0x7f0000000300)="f74256cbecfb8738f61f65e33fb706b9a99e3bf160a3ff512f4f2b11d87fbc6267cfcf196f8e23d545b83c75488b12e923d704", 0x33, 0x1000, 0x0, 0x2, r3}]) sendmsg$BATADV_CMD_SET_HARDIF(r1, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x3c, 0x0, 0x100, 0x70bd2a, 0x25dfdbfd, {}, [@BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0xf25}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x8000034) r4 = openat(r1, &(0x7f0000000180)='./file0\x00', 0x1, 0x10) r5 = syz_genetlink_get_family_id$mptcp(&(0x7f00000011c0), 0xffffffffffffffff) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r6, &(0x7f0000001600)={&(0x7f0000001440)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000015c0)={&(0x7f0000001540)={0x54, r5, 0x0, 0x70bd2d, 0x0, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}, @MPTCP_PM_ATTR_ADDR={0xc, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}]}, @MPTCP_PM_ATTR_ADDR={0x1c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @broadcast}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x3}]}, 0x54}, 0x1, 0x0, 0x0, 0x8000}, 0x880) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r4, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x30, r5, 0x4, 0x70bd2c, 0x25dfdbfd, {}, [@MPTCP_PM_ATTR_ADDR={0x4}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x4}]}, 0x30}, 0x1, 0x0, 0x0, 0x20004050}, 0x80) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000400)='./file0/file0\x00', 0xc000, 0x180) openat(r7, &(0x7f0000000440)='./file0\x00', 0x101000, 0x20) 08:35:43 executing program 4: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x80, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x80}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:35:43 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r0, 0x800) write$cgroup_netprio_ifpriomap(r0, &(0x7f0000001a80)=ANY=[@ANYBLOB="626f415b0a1a1c877b39cbbdf2a46c75f44ced5164c3baac2238b26ba5773166202a034ab4c8eb16802b3406486907ed89f5c1b1860c88d8688fde9ee2386e77fc078a364375c5108f1ede0fb5609a147d41328afe4f86c890483c9bb309411b2d76f68f6a441783a49341a06b4af9560b9093ddd35917ce4ad6093d2c4367948226d1008ffbb1b19fa0fc9e96a72a4e2001328e0b1cd36298ace64719455afcb5bd499f7c8899ec516f087b0adfefc19ec370"], 0xf) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setresuid(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) sendmmsg$inet6(r2, &(0x7f0000003e00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000500)={0xa, 0x4e21, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f00000015c0)=ANY=[@ANYBLOB="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"], 0x18}}], 0x2, 0x0) stat(&(0x7f00000003c0)='./file1\x00', &(0x7f0000001540)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r3, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000014c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000380)={&(0x7f00000022c0)={0x5f4, 0x2c, 0x100, 0x70bd29, 0x25dfdbfe, {0x20}, [@typed={0xe, 0x72, 0x0, 0x0, @str='mountinfo\x00'}, @generic="69191213510282862ae61d3b33d2b78bed018b333c55d2074aa4fb6bbf77b5907d7f565250d8b87d02d6c078e65dc2823e1863649bcaafb7c86a9c0d7eca2e9d9e2aa79bc6aa16118363fa1949112c0b8030aab04fa106fdd0ef1985f8a1ebb4583380331b5cee16dbfed51b9f2d598541c992fe74dc858ab02544b58cfdf546812874f0f93099c43be946730a65d609530c01", @nested={0x151, 0x25, 0x0, 0x1, [@generic="2571ae1a6ff1e3b1f92bd5daf1af89a3d45289556bf0a7c4effd", @generic="fa2a4faae29b62dea6e10b006a589e31090eef25e648434977e8fac367aed2b413342c0a6259834cbdcf8d49b65db20c9b8cfb7a5dc4e75d7fa405aadbb6e171cd8b8a199ea5f6ae1a81f8766a80c3100c336960e5d48734c131807d60949e8bd06ec78c", @typed={0x8, 0x28, 0x0, 0x0, @uid}, @typed={0x8, 0x8, 0x0, 0x0, @fd=r2}, @typed={0x6b, 0x22, 0x0, 0x0, @binary="7d262660bbb3197d789a8fc0513f639963e4c9f71c718501612b1d67bf31f83486c38c79616c649b6b08e5e87ca929064fe991a24020c445ce1e8beb5111374af131e71c0743184fd2b9b4ec49da9575d3a14d058c6ad5b9a941f432f66ea6a67f458b7e5a0b4d"}, @generic="ad96f121e49cc33c2b7184827fcbb96be04caa7ba32b2a8a0970ec71ef481d99f1b84ef1d85452e9d12cc63e6c4cd96650bd6f5f68e65a859582a10efee19754766da1f22b74c2108debcd", @typed={0x8, 0x6b, 0x0, 0x0, @pid}]}, @nested={0xa7, 0x20, 0x0, 0x1, [@generic="0a427be406a02b1f1182929aadd81e48cf2a3d69b863f500f68422530731b19df98fdf0872eefa8b83f82ef00a6e94930d072360ce190f2f1d3da7f4b86879ed6f9572157d", @generic="48bf19d75ee8031f835f5be0e0084f88d18df9fbfa057c6091c232d665a0a8776e82e2dbf6022e3cdf75afe5063189681f3bf35cfd14a73953f7e8a10ffb4a757daa5cfed7b7", @typed={0xc, 0x62, 0x0, 0x0, @u64=0x7}, @typed={0x8, 0xd, 0x0, 0x0, @fd=r0}, @typed={0x4, 0x8f}]}, @typed={0x8, 0x34, 0x0, 0x0, @ipv4=@rand_addr=0x64010102}, @nested={0x15d, 0x1e, 0x0, 0x1, [@generic="70fd1e7553537b0aadc4fc870765cdd2a799ecfcda8ebd1f3e656e1b2328afd830bf7084615c5fb33ab9727e125bf382bd1ed6c210ad631d5a9ef281034ec567a91aeacc3c54c979a6e557fa2e0cfcfbe9", @typed={0xc, 0x86, 0x0, 0x0, @u64=0x5}, @generic="79133c0ff143f3cf112912c52db528ffd18211521b88e0341c8a1c75a2fc176f17bc6d4d183f186a21a6229b3aa940c2d086ff3e74be25e195d9e94be58493683fe3e5", @generic="ebbd22c1920855d679aebc131600b7f0db205c89e15a89961ac98efc6626760266c007d73f173c4197437dd1b5cb559425fd1f62439804d80b5acea8df6bf48898a22831846c5cfd2effce76f7d78cf1788c4fd0a71446e4ecdbaf09db0dfc9d308ee763c5e2080b0cf3153271e981a5fa33ab4485e0e5521e2cf25711455acf6f337f03c65be2969c0e37f5b9fd87d4cfa540fd4fa8ba7d12512e87b30a263553f8124510b8e10c93e7b6fc94", @typed={0xc, 0x82, 0x0, 0x0, @u64=0xa7f3}]}, @typed={0x14, 0x55, 0x0, 0x0, @ipv6=@empty}, @nested={0x1c2, 0x27, 0x0, 0x1, [@generic="591e2f1762f2de283a69a3b9e11fd630001d965242021fd9befbd1118bf8240b7a06473243124092ae68b52078c1234f6db4341663fd399a3933e8c95da919", @generic="dc6e75fed3f3b903d245949cd25a7654365573cd03a7e0fb5945c641b88109b4af11f45ca8d496842f9914955126e76f85f321016f23e94ea75e1213701cd852edf45bc2c58155c03d8b2e08f92c94696bdd303e44a1ab8d5f282c741eec76e0cc0e28623c4d1c25b589775a9bb5bc", @generic="9bdb7426ad41f4b79562f975b4d5f31d16b2af936863b60dd65760e663c0a959f7ec255fb33ac0c2a873392231e464f9900e0f9faaf882878e6cc538522984d06264e3763c4c6b07", @typed={0x8, 0x7a, 0x0, 0x0, @uid=0xee00}, @typed={0xbf, 0x8, 0x0, 0x0, @binary="9180d9bbdf393cb8407ede517a7f1e40f718e74173a4f055b80d8925b365b94cf1b429cbe03811df64ff2a0374c670ee1aa867e11a6fb5ef99c1d630db8180d035793bf0bb3f96f9ba9e21c1020d55bb04816307d003288f310453582e8ba7f42e807c6f20f659beb8fe8d3260fe4dd4adcf3f55e439e62effb26a007734a2105f853cd352a7ae55b4d329a8545490f87e7bc4df3f6728f7f0d78f0db67584badd7cce0a494114983bdd9e4e37bbc05884508bd3ef153ce8c982e6"}]}]}, 0x5f4}, 0x1, 0x0, 0x0, 0x20044000}, 0x20044841) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x7) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xa, 0x12, r0, 0x0) ioctl$SG_NEXT_CMD_LEN(r0, 0x2283, &(0x7f0000000000)=0xce) r4 = openat2(r0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x11da00, 0x2, 0x6}, 0x18) ioctl$SG_IO(r4, 0x2285, &(0x7f0000000400)={0x53, 0xfffffffffffffffb, 0x60, 0xf7, @buffer={0x0, 0x43, &(0x7f0000000100)=""/67}, &(0x7f0000000180)="8bbec00f4851c537e3c8068813955fc4e5b504ec3fe2df4c3a1a2d717abb39c2722feab0ed9f85a9c6f386fc791aed133b871b1eed9d56ac683d5cccbac22e6d5ff28716431f90dc21e7a166c9f5725ea969054097e96df0731ad9b865738ae8", &(0x7f00000002c0)=""/150, 0x1, 0x10, 0x1, &(0x7f0000000200)}) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r5, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) 08:35:43 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xef3) 08:35:43 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = openat$cgroup_procs(r0, &(0x7f0000000240)='tasks\x00', 0x2, 0x0) readv(r2, &(0x7f0000000340)=[{&(0x7f00000002c0)=""/94, 0x5e}], 0x1) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000003e00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000500)={0xa, 0x4e21, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000001740)=[@tclass={{0x14, 0x29, 0x43, 0x8f76}}], 0x18}}], 0x2, 0x0) r3 = dup2(r1, r0) r4 = perf_event_open$cgroup(&(0x7f00000000c0)={0x3, 0x80, 0x20, 0x6, 0x81, 0x3f, 0x0, 0xffff, 0x80004, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x7, 0x1, @perf_bp={&(0x7f0000000080), 0xa}, 0x8820, 0x3f, 0x7fff, 0x6, 0xfff, 0x8, 0x3, 0x0, 0x4, 0x0, 0x7f}, r3, 0xa, 0xffffffffffffffff, 0x2) ioctl$BTRFS_IOC_ADD_DEV(r4, 0x5000940a, &(0x7f0000001780)={{r3}, "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"}) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_CONNECT(r5, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, 0x0, 0x1, 0x70bd26, 0x25dfdbfc, {}, [@NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x120}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x6}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x9000}]}, 0x38}, 0x1, 0x0, 0x0, 0x4}, 0x4) 08:35:43 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x4) ftruncate(r0, 0x800) r1 = syz_open_dev$loop(&(0x7f0000000040), 0x401, 0x610802) ioctl$NS_GET_OWNER_UID(r0, 0xb704, &(0x7f00000000c0)=0x0) fsetxattr$security_capability(r1, &(0x7f0000000080), &(0x7f0000000100)=@v3={0x3000000, [{0x3f, 0x1f}, {0xffffffff, 0x9}], r2}, 0x18, 0x2) write$cgroup_netprio_ifpriomap(r0, &(0x7f00000003c0)={'bond_slave_1'}, 0xf) 08:35:43 executing program 3: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003e00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000500)={0xa, 0x4e21, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000001740)=[@tclass={{0x14, 0x29, 0x43, 0x8f76}}], 0x18}}], 0x2, 0x0) readv(r0, &(0x7f0000000280)=[{&(0x7f00000014c0)=""/4089, 0xff9}], 0x1) 08:35:43 executing program 6: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:35:43 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xf2c) 08:35:44 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') preadv(r0, &(0x7f0000002540)=[{&(0x7f0000000080)=""/107, 0x6b}, {&(0x7f0000000100)=""/107, 0x6b}, {&(0x7f00000014c0)=""/4096, 0x1000}, {&(0x7f0000000180)=""/254, 0xfe}, {&(0x7f00000002c0)=""/178, 0xb2}, {&(0x7f0000000380)=""/249, 0xf9}, {&(0x7f00000024c0)=""/73, 0x49}], 0x7, 0x433, 0x8f) readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$FICLONE(r0, 0x40049409, r1) 08:35:44 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r0, 0x800) write$cgroup_netprio_ifpriomap(r0, &(0x7f00000003c0)={'bond_slave_1'}, 0xf) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendfile(r1, r0, 0x0, 0x8000) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xa, 0x12, r0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) sendmmsg$inet6(r2, &(0x7f0000003e00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000500)={0xa, 0x4e21, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000001740)=[@tclass={{0x14, 0x29, 0x43, 0x8f76}}], 0x18}}], 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r2}}, './file1\x00'}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x74, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000ffff, 0x3b22}, 0x40}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r3, 0x800) write$cgroup_netprio_ifpriomap(r3, &(0x7f00000003c0)={'bond_slave_1'}, 0xf) 08:35:44 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) dup2(r0, r0) 08:36:01 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xf2f) 08:36:01 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r0, 0x800) write$cgroup_netprio_ifpriomap(r0, &(0x7f00000003c0)={'bond_slave_1'}, 0xf) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8000) r2 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xa, 0x12, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r2, 0x0, 0x0, 0x0) syz_io_uring_setup(0x5b8f, &(0x7f0000000080)={0x0, 0xb81a, 0x4, 0x3, 0x326, 0x0, r0}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000000140)=0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) sendmmsg$inet6(r4, &(0x7f0000003e00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000500)={0xa, 0x4e21, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="14000000850e9cfa35a036556c8d86000000002900836470d30000768f090000000000"], 0x18}}], 0x2, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_SENDMSG={0x9, 0x2, 0x0, r4, 0x0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)}, 0x0, 0x40000, 0x1}, 0x6) ioctl$AUTOFS_IOC_CATATONIC(r1, 0x9362, 0x0) sendmmsg$inet6(r1, &(0x7f0000003e00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000500)={0xa, 0x4e21, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000001740)=[@tclass={{0x14, 0x29, 0x43, 0x4008f76}}], 0x18}}], 0x2, 0x0) fcntl$setstatus(r1, 0x4, 0x2800) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0xe0000, 0x18) 08:36:01 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/rt6_stats\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) 08:36:01 executing program 6: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:36:01 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000003e00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000500)={0xa, 0x4e21, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000001740)=[@tclass={{0x14, 0x29, 0x43, 0x8f76}}], 0x18}}], 0x2, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(r1, 0x4018f50b, &(0x7f0000000000)={0x1, 0x5, 0xb0}) 08:36:01 executing program 5: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0x0, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:36:01 executing program 0: r0 = add_key$user(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000000c0), 0x0, 0xfffffffffffffff8) keyctl$negate(0xd, r0, 0x80000000, 0xfffffffffffffffa) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) 08:36:01 executing program 4: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x80, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x80}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:36:01 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xf31) 08:36:01 executing program 3: finit_module(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) 08:36:01 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/117, 0x75}, {&(0x7f00000014c0)=""/4096, 0x1000}, {&(0x7f0000000000)=""/51, 0x33}, {&(0x7f0000000100)=""/52, 0x34}, {&(0x7f0000000140)=""/207, 0xcf}], 0x5) readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) r1 = syz_open_dev$hiddev(&(0x7f0000000240), 0x100, 0x0) read(r1, &(0x7f0000000340)=""/207, 0xcf) 08:36:01 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') recvmsg(0xffffffffffffffff, &(0x7f0000001600)={&(0x7f0000000080)=@rc={0x1f, @none}, 0x80, &(0x7f0000001540)=[{&(0x7f0000001ac0)=""/165, 0xa5}, {&(0x7f00000002c0)=""/223, 0xdf}, {&(0x7f00000001c0)=""/140, 0x8c}, {&(0x7f0000000000)=""/55, 0x37}, {&(0x7f00000003c0)=""/249, 0xf9}, {&(0x7f00000014c0)=""/66, 0x42}], 0x6, &(0x7f00000015c0)=""/28, 0x1c}, 0x40000002) readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) pread64(r1, &(0x7f0000001640)=""/207, 0xcf, 0x5) r2 = syz_open_dev$tty20(0xc, 0x4, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r3, 0x800) write$cgroup_netprio_ifpriomap(r3, &(0x7f0000001a40)=ANY=[@ANYBLOB="620800000000000000655f313252eca26eb9b79d443000fc40000426b47b001e"], 0xf) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r5, 0x800) write$cgroup_netprio_ifpriomap(r5, &(0x7f00000003c0)={'bond_slave_1'}, 0xf) connect$inet(0xffffffffffffffff, &(0x7f0000001a80)={0x2, 0x4e24, @rand_addr=0x64010101}, 0x10) sendfile(r4, r3, 0x0, 0x8000) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xa, 0x12, r3, 0x0) getsockopt$EBT_SO_GET_ENTRIES(r3, 0x0, 0x81, &(0x7f00000017c0)={'broute\x00', 0x0, 0x4, 0x2f, [0xc78a, 0x5, 0x3, 0x967, 0x5], 0x1, &(0x7f0000001740)=[{}], &(0x7f0000001780)=""/47}, &(0x7f0000001840)=0x78) ioctl$FICLONE(r2, 0x40049409, r0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) write$binfmt_elf64(r6, &(0x7f0000001880)={{0x7f, 0x45, 0x4c, 0x46, 0x75, 0xff, 0x0, 0x20, 0x40, 0x3, 0x6, 0xd786, 0x136, 0x40, 0x284, 0x4, 0x1cd1, 0x38, 0x2, 0x61, 0x6}, [{0x60000000, 0x6, 0xc6, 0x5, 0x2, 0x5, 0x80000001, 0x139}, {0x0, 0x4, 0x6, 0x6, 0x4, 0x4, 0x5, 0x1774}], "", ['\x00']}, 0x1b0) 08:36:01 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r0, 0x800) write$cgroup_netprio_ifpriomap(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='bond_sMK\x00'/22], 0xf) 08:36:01 executing program 6: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:36:01 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xf35) 08:36:01 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(0xffffffffffffffff, &(0x7f0000000280), 0x0) r1 = dup3(r0, r0, 0x0) bind$802154_dgram(r1, &(0x7f0000000000)={0x24, @short={0x2, 0x1, 0xaaa1}}, 0x14) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000540)={0xa, 0x0, 0x2, @dev, 0x2}, 0x1c) r3 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f00000001c0), 0x1, 0x0) write$binfmt_script(r3, &(0x7f0000000580)=ANY=[@ANYBLOB="2321202e2f66696c6530202d28206d6f756e74696e666f0020ffff202d202920275c7d2e282821265c2e0af74744b54530bcb94906622ce87e7f7c29720a969ee3c97cb3406ea3f430a82c22b0f23c6d3f2e12d5a075e0080d5b4a1ac76fd433b15eff3967566ad102b29c3e60e66e1d52420c14a22561cab161554a33729edb19ea15b0acd5218819291a006ed400000000000300bd4db7916f6c09b186ec42145ba24586e2460a33e3202648f714c503a1909fb885c968616b6d9f89d68c3010b379a3eb0e0264d5b58a93b5f5164f0732b06dcea95e74179b404413e502e22d0392d6ec4b1deeb7e6f6bc0bb8ca73bd150955c90d559900a08e58bf8b2bb73e3e7710bbc33fe7ab231071aa56c3130f72f32423ab7fcd4e64e847bf8b1147db7949f49ea67d8d082ec9c29e6f3c705dd2d905c55d02155a623ac48eddfd16f584b12a5b1bca6bf3f89c8f8a6bed72f07e3e7a156d5109bb4f12a5c0a529d642be80f037dbaa520cad86597aab8b03096796fde6a416bbfd950aac73add0"], 0x95) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) sendmmsg$inet6(r2, &(0x7f0000003e00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000500)={0xa, 0x4e21, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000001740)=[@tclass={{0x14, 0x29, 0x43, 0x8f76}}], 0x18}}], 0x2, 0x0) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r2, 0x50009417, &(0x7f00000014c0)={{r2}, 0x0, 0x10, @unused=[0x0, 0x9, 0x7, 0x90c], @name="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"}) write(r0, &(0x7f0000000080)="d0f535aeb486bb5cfb3365f8a7824a6a0a436ab34fc6701fbbe8b3155938b1929067dff1574531ae79193ea5d6f7726ccdc5a6484e29ab5c934be4435c3e57453d167843159b883cbd08a7542f4a858c26ecffb20be3e7bb3abfd71f36957800359a0e697ab0a760e7c2f350f639e83eddcfdbb6a11649b206e5300fd36f82b24ed06904f69c9a1b071ef480a4a45dc9c97f370dcab6bb613742838ce779896beb5857d5e4b81317c859c197ab3e884f5c32926eb55ebbd93695", 0xba) 08:36:01 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r0, 0x800) write$cgroup_netprio_ifpriomap(r0, &(0x7f00000003c0)={'bond_slave_1'}, 0xf) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendfile(r1, r0, 0x0, 0x8000) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xa, 0x12, r0, 0x0) sendmsg$NFQNL_MSG_CONFIG(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x40, 0x2, 0x3, 0x201, 0x0, 0x0, {0x3, 0x0, 0x5}, [@NFQA_CFG_PARAMS={0x9, 0x2, {0xa9b, 0x9185bc1a1ef54579}}, @NFQA_CFG_QUEUE_MAXLEN={0x8, 0x3, 0x1, 0x0, 0x937}, @NFQA_CFG_QUEUE_MAXLEN={0x8, 0x3, 0x1, 0x0, 0x79d}, @NFQA_CFG_FLAGS={0x8, 0x5, 0x1, 0x0, 0x1c}, @NFQA_CFG_FLAGS={0x8}]}, 0x40}, 0x1, 0x0, 0x0, 0x44}, 0x4) readv(0xffffffffffffffff, &(0x7f0000000280), 0x0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(0xffffffffffffffff, 0x40049366, &(0x7f0000000000)=0x1) 08:36:02 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000002c0)=""/4106, 0x100a}], 0x1) 08:36:17 executing program 5: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x0, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:36:17 executing program 1: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:36:17 executing program 6: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:36:17 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1) 08:36:17 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000014c0)=""/4105, 0x1009}], 0x1) 08:36:17 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xf54) 08:36:17 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000003e00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000500)={0xa, 0x4e21, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000001740)=ANY=[@ANYBLOB="1400000000000000290000005f1666be568f000000000000"], 0x18}}], 0x2, 0x0) sendmsg$sock(r1, &(0x7f00000024c0)={&(0x7f0000000080)=@qipcrtr={0x2a, 0x3, 0x1}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000000)="6e5daac45515cb2c84633f09433ca0af2b68c3b4ffd2df4296f36e42bb", 0x1d}, {&(0x7f00000014c0)="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", 0x1000}, {&(0x7f0000000100)="f7e5a6990b1f6e6b", 0x8}, {&(0x7f0000000140)="0ce30a5aa3d2853a1e577fb00382fb6a9e03bc03bdcd91d3a6920015036b84e0f3295d", 0x23}, {&(0x7f0000000180)="a75d65e3331d4e2922bba438c762d7e109d5787cef3c09a71e23fbf00e4dc1acc5790ab2ef4479c01525c284f7d1777da2fff49d51349dbde3890b600e90d737c260b893a021c1683c3a5e7110f777a13843812f114714148e", 0x59}, {&(0x7f00000002c0)="dc753c66c2d73ee202c032f4a8df1673be873ddb3d543592d4be5940a93dc2dba18d8e46cde9733f907f6c94abc588af5f651994a9e0f83f2f2211c93b621793d38b482981494ea2cfc94085abd7440e97c53ea4fbef034bd1315352fa80dff57a61aff666de469741301cd11f5a1965c8b5c462313091a089047b095cb40eadf271f22de6c47c", 0x87}, {&(0x7f0000000380)="0d1b6736bb8ae667eb05f504e095cab4d16ec9d57620e0910cd375087329166a407c13e5b31c976680cdadec8d405ebdd4ae79653cc7d0be6d3a4a0c5c1607aa392f8ecedd6a3891b7acafa2fce3c70a09bafdc5a82628513054079651183744ca2caa0ea83fd4e41ffe94095c974b19a211ac8e5d83fe31f5582e1aa3f44fab8d515e52cfcaea30177fb2df13e5f8b54ed5887722a7ae0bc992159b9d18f9d93a18184624b513ad8c", 0xa9}], 0x7, &(0x7f0000000440)=[@txtime={{0x18, 0x1, 0x3d, 0x6}}, @txtime={{0x18, 0x1, 0x3d, 0x3e}}, @timestamping={{0x14, 0x1, 0x25, 0x1000000}}, @timestamping={{0x14}}], 0x60}, 0x1) 08:36:17 executing program 4: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x80, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x80}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:36:18 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xf93) 08:36:18 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') recvmsg$unix(r0, &(0x7f00000016c0)={&(0x7f0000000140), 0x6e, &(0x7f0000000440)=[{&(0x7f00000001c0)=""/71, 0x47}, {&(0x7f0000000240)=""/18, 0x12}, {&(0x7f00000002c0)=""/83, 0x53}, {&(0x7f0000000340)=""/79, 0x4f}, {&(0x7f00000003c0)=""/103, 0x67}, {&(0x7f00000014c0)=""/140, 0x8c}], 0x6, &(0x7f0000001580)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x118}, 0x10000) syz_open_procfs(r1, &(0x7f0000001700)='net/unix\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) r2 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000753000/0x1000)=nil, 0x1000, 0x2000008, 0x1010, r2, 0x2e7ac000) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r2, 0x0) r3 = io_uring_setup(0x5204, &(0x7f0000000040)) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(r3, 0x9, 0x0, 0x0) ioctl$BTRFS_IOC_SYNC(r2, 0x9408, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(r3, 0x5, 0x0, r4) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_TEE={0x21, 0x0, 0x0, @fd, 0x0, 0x0, 0x6, 0xc, 0x0, {0x0, r4, r2}}, 0x6) r5 = syz_open_dev$vcsu(&(0x7f0000000100), 0x2, 0xa4082) ioctl$BTRFS_IOC_SYNC(r5, 0x9408, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x1, 0x0, r0, 0x80, &(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x80000000, @empty, 0x0, 0x3}, 0x0, 0x0, 0x1, {0x0, r4}}, 0x4) 08:36:18 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') syncfs(r0) recvmsg$unix(r0, &(0x7f0000000740)={&(0x7f0000000300), 0x6e, &(0x7f0000000680)=[{&(0x7f0000000380)=""/89, 0x59}, {&(0x7f0000000500)=""/219, 0xdb}, {&(0x7f0000000600)=""/11, 0xb}, {&(0x7f0000000640)=""/33, 0x21}], 0x4, &(0x7f00000006c0)=[@cred={{0x1c}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x68}, 0x40) readv(r1, &(0x7f0000000780)=[{&(0x7f0000000080)=""/111, 0x6f}, {&(0x7f0000000100)=""/211, 0xd3}, {&(0x7f0000000200)=""/241, 0xf1}, {&(0x7f0000000400)=""/207, 0xcf}], 0x4) 08:36:18 executing program 1: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:36:18 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') r1 = socket$packet(0x11, 0x1, 0x300) dup2(r0, r1) readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) 08:36:18 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xf95) 08:36:18 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080), 0x20000, 0x0) pread64(r1, &(0x7f00000000c0)=""/103, 0x67, 0x4) readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) io_setup(0xca, &(0x7f0000000180)=0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000001c0), 0x1c3241, 0x0) r4 = openat$cgroup_ro(r1, &(0x7f0000000240)='memory.events.local\x00', 0x0, 0x0) r5 = eventfd(0x0) ppoll(&(0x7f0000000000)=[{r5}], 0x1, &(0x7f0000000080)={0x0, 0x989680}, 0x0, 0x0) r6 = openat$cgroup(r1, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) io_submit(r2, 0x3, &(0x7f0000000440)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2, 0x9, r3, &(0x7f0000000200)="080a310f540b742a242fd5a319c76bbf54247e9b18a0903c", 0x18, 0x9, 0x0, 0x0, r4}, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x7, 0x2, r1, &(0x7f0000000300)="6bed3af19346ed07b77033a760999856fa3ea54a45140c02c2f65c34f70dff677959c760ee135957215fb3029a7f14ffd35dded6ab64", 0x36, 0x1, 0x0, 0x1, r5}, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x2, 0x2, r6, &(0x7f00000003c0)="d7b3d26f2e23dfdfcc3df5bfccc6e71d1ce4a4bed97f80ac62a8a5be1bd7dd4eb9d1c64fd8581593", 0x28, 0xc0, 0x0, 0x0, r1}]) openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x25a040, 0x0) r7 = openat$null(0xffffffffffffff9c, &(0x7f0000000140), 0x400000, 0x0) ioctl$CDROMEJECT_SW(r7, 0x530f, 0x10000000000001) 08:36:18 executing program 4: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:36:33 executing program 6: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:36:33 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000440)=[{&(0x7f0000000080)=""/215, 0xd7}, {&(0x7f0000000180)=""/99, 0x63}, {&(0x7f0000000200)=""/106, 0x6a}, {&(0x7f00000002c0)=""/108, 0x6c}, {&(0x7f00000014c0)=""/4096, 0x1000}, {&(0x7f0000000340)=""/216, 0xd8}, {&(0x7f00000024c0)=""/218, 0xda}, {&(0x7f00000025c0)=""/250, 0xfa}], 0x8) write$binfmt_script(r0, &(0x7f00000026c0)={'#! ', './file0', [{0x20, '.['}, {}, {}, {}, {0x20, '\x00'}], 0xa, "b2ecd8c4a9d609142b168d74f0acdb6b0e2dbf36cc70a162dd955038c63f989d0749fe5139e357a865a05dd780975ebb299596b4c7aaafd6bd5706ef9270137fdd8c1b9ad35913756b5f78e328a180a415e7873027d0b1692293edfc6e88b7a618d464b4ec41cd286d0cc74334ba73"}, 0x82) readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r1, 0x800) write$cgroup_netprio_ifpriomap(r1, &(0x7f00000003c0)={'bond_slave_1'}, 0xf) r2 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) connect$inet(r1, &(0x7f00000027c0)={0x2, 0x4e23, @remote}, 0x10) r3 = fcntl$dupfd(r2, 0x0, r2) connect$inet(r3, &(0x7f0000002800)={0x2, 0x4e22, @private=0xa010100}, 0x10) sendfile(r2, r1, 0x0, 0x8000) copy_file_range(0xffffffffffffffff, 0x0, r2, &(0x7f0000003ec0)=0x6f48, 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xa, 0x12, r1, 0x0) openat(r1, &(0x7f0000002780)='./file0/file0\x00', 0x800, 0x42) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0x2a187000) recvmsg$unix(r3, &(0x7f0000003e00)={&(0x7f0000002840)=@abs, 0x6e, &(0x7f0000003cc0)=[{&(0x7f00000028c0)=""/85, 0x55}, {&(0x7f0000002940)=""/55, 0x37}, {&(0x7f0000002980)=""/176, 0xb0}, {&(0x7f0000002a40)=""/4096, 0x1000}, {&(0x7f0000003a40)=""/222, 0xde}, {&(0x7f0000003b40)=""/159, 0x9f}, {&(0x7f0000003c00)=""/107, 0x6b}, {&(0x7f0000003c80)=""/26, 0x1a}], 0x8, &(0x7f0000003d40)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x98}, 0x120) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r4, 0xc0182101, &(0x7f0000003e40)={0x0, 0x6, 0x1}) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000000)={@private0={0xfc, 0x0, '\x00', 0x1}, 0x2c}) 08:36:33 executing program 4: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:36:33 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xf97) 08:36:33 executing program 5: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x0, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:36:33 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000003e00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000500)={0xa, 0x4e21, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000001740)=[@tclass={{0x14, 0x29, 0x43, 0x8f76}}], 0x18}}], 0x2, 0x0) fsetxattr$security_selinux(r1, &(0x7f0000000000), &(0x7f0000000080)='system_u:object_r:crond_initrc_exec_t:s0\x00', 0x29, 0x1) readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) 08:36:33 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000003e00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000500)={0xa, 0x4e21, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000001740)=[@tclass={{0x14, 0x29, 0x43, 0x8f76}}], 0x18}}], 0x2, 0x0) pread64(r1, &(0x7f00000014c0)=""/4096, 0x1000, 0x1f) readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) 08:36:33 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r0, 0x800) write$cgroup_netprio_ifpriomap(r0, &(0x7f00000003c0)={'bond_slave_1'}, 0xf) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendfile(r1, r0, 0x0, 0x8000) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xa, 0x12, r0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) sendmmsg$inet6(r2, &(0x7f0000003e00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000500)={0xa, 0x4e21, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000001740)=[@tclass={{0x14, 0x29, 0x43, 0x8f76}}], 0x18}}], 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r2}}, './file1\x00'}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x74, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000ffff, 0x3b22}, 0x40}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r3, 0x800) write$cgroup_netprio_ifpriomap(r3, &(0x7f00000003c0)={'bond_slave_1'}, 0xf) [ 2305.029765] audit: type=1400 audit(1669106193.827:33): avc: denied { relabelto } for pid=11010 comm="syz-executor.3" name="UDPv6" dev="sockfs" ino=40517 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:crond_initrc_exec_t:s0 tclass=udp_socket permissive=1 08:36:33 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xf9b) 08:36:33 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') mq_timedsend(r0, &(0x7f0000000080)="895870e308195bf1281b2a8fd0d94a49a49db7a8a988321f37263769e0dd1705b8de6b9bb1126844956dcaad27a8d2694bc18053d1160ad83c31131582b3f1f8cabba41a24d291e440a69c4096b0e9d31be1862a7ed4c07207", 0x59, 0x100, &(0x7f0000000000)) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/module/video', 0x1, 0x4) write$P9_RSETATTR(r1, &(0x7f0000000140)={0x7, 0x1b, 0x2}, 0x7) readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) [ 2305.076668] audit: type=1400 audit(1669106193.875:34): avc: denied { map } for pid=11013 comm="syz-executor.7" path="/proc/11013/task/11027/mountinfo" dev="proc" ino=40535 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=file permissive=1 08:36:33 executing program 1: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x74, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x74}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:36:33 executing program 4: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:36:34 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xff5) 08:36:34 executing program 5: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x0, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:36:34 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') r0 = openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x400000, 0x101) readv(r0, &(0x7f0000000240)=[{&(0x7f0000000080)=""/192, 0xc0}, {&(0x7f0000000140)=""/117, 0x75}, {&(0x7f0000000200)=""/13, 0xd}], 0x3) 08:36:34 executing program 6: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:36:34 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xff7) 08:36:34 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xff9) 08:36:34 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') r1 = getpid() capget(&(0x7f00000000c0)={0x20071026, r1}, &(0x7f0000000100)) syz_open_procfs(r1, &(0x7f0000000000)='net/route\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4084, 0xff4}], 0x1) 08:36:34 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r1, 0x800) write$cgroup_netprio_ifpriomap(r1, &(0x7f00000003c0)={'bond_slave_1'}, 0xf) r2 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendfile(r2, r1, 0x0, 0x8000) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xa, 0x12, r1, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_ADD(r3, &(0x7f0000000280)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)={0x5c, r4, 0x100, 0x70bd2d, 0x25dfdbfd, {}, [@TIPC_NLA_BEARER={0x48, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xcac}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x5, @loopback, 0x100}}}}]}]}, 0x5c}}, 0x4000) sendmsg$TIPC_NL_BEARER_ADD(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x44, r4, 0x300, 0x70bd27, 0x25dfdbfd, {}, [@TIPC_NLA_NET={0x24, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x10001}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xfffffffc}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x5}]}, @TIPC_NLA_NODE={0xc, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}]}, 0x44}}, 0x4000) readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) 08:36:34 executing program 4: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x80, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x80}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:36:34 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') r1 = getpid() capget(&(0x7f00000000c0)={0x20071026, r1}, &(0x7f0000000100)) syz_open_procfs(r1, &(0x7f0000000000)='net/protocols\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) 08:36:34 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') r1 = ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) pread64(r1, &(0x7f0000000080)=""/240, 0xf0, 0xfffffffffffffffc) readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) 08:36:34 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0xffd) 08:36:34 executing program 7: r0 = getpid() r1 = syz_open_procfs(r0, &(0x7f0000000040)='net/rt6_stats\x00') readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r1, 0x8040942d, &(0x7f0000000000)) 08:36:51 executing program 0: ioctl$KDFONTOP_COPY(0xffffffffffffffff, 0x4b72, &(0x7f0000000000)={0x3, 0x0, 0x1, 0x1f, 0x1f1, &(0x7f00000014c0)}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) unshare(0x44010080) 08:36:51 executing program 1: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x74, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x74}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:36:51 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000003e00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000500)={0xa, 0x4e21, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000001740)=[@tclass={{0x14, 0x29, 0x43, 0x8f76}}], 0x18}}], 0x2, 0x0) pwrite64(r0, &(0x7f0000000000)="a21122401990becff2da2757d1054a937d9b682e51caa3371a79240fd38fd3b7afd94cfa80d099031cae402dedab720be527be285de5a57c1082b7403deb85", 0x3f, 0x35) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) 08:36:51 executing program 4: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x80, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x80}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:36:51 executing program 5: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:36:51 executing program 6: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:36:51 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)) readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) 08:36:51 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='children\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) 08:36:52 executing program 6: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:36:52 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000080), 0x0) ioctl$EVIOCSREP(r0, 0x40084503, &(0x7f0000000000)=[0x3]) 08:37:08 executing program 6: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x0, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:37:08 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x301080, 0x0) preadv(r1, &(0x7f00000003c0)=[{&(0x7f0000000080)=""/9, 0x9}, {&(0x7f00000000c0)=""/72, 0x48}, {&(0x7f0000000140)=""/57, 0x39}, {&(0x7f0000000180)=""/39, 0x27}, {&(0x7f00000001c0)=""/24, 0x18}, {&(0x7f00000002c0)=""/238, 0xee}, {&(0x7f0000000200)=""/86, 0x56}], 0x7, 0x3, 0x1000) 08:37:08 executing program 5: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:37:08 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0x102f}], 0x1) 08:37:08 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') r1 = openat$cgroup_subtree(r0, &(0x7f0000000000), 0x2, 0x0) pread64(r1, &(0x7f0000000080)=""/174, 0xae, 0x6) readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) 08:37:08 executing program 4: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x80, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x80}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:37:08 executing program 1: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x74, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x74}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:37:08 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) write$binfmt_script(r0, &(0x7f00000002c0)={'#! ', './file0', [{0x20, '([.\\(#}]*]'}, {0x20, 'mountinfo\x00'}, {0x20, 'mountinfo\x00'}, {0x20, 'mountinfo\x00'}], 0xa, "05fb2ad862623306b595fa866b6c8c0bd278bfd894136529c38ad0c8dcf42c4ce3856965b4661eebe1cadd1f4643851390e300de330848d76770a946df4a60d6c776fdbb4e11fd42d0dc644253b6e75f81a1f837f0746ab02bfc1a3b86aeba95915771c28a94579f0e7e4722bced5f17ff3b7bb2a64a4ef47ad4117cd65f0387c0684dfb7a3c04012eaec3fb710738fbdd18118d1a2eae452d6935bb24339e1db423d4e42471136b020beb64ac5d798ef0ef8038e3"}, 0xec) readv(r0, &(0x7f0000002800)=[{&(0x7f00000001c0)=""/78, 0x4e}, {&(0x7f00000003c0)=""/138, 0x8a}, {&(0x7f00000024c0)=""/230, 0xe6}, {&(0x7f00000025c0)=""/211, 0xd3}, {&(0x7f00000026c0)=""/90, 0x5a}, {&(0x7f0000000240)=""/59, 0x3b}, {&(0x7f0000002740)=""/164, 0xa4}], 0x7) preadv(r0, &(0x7f0000000180)=[{&(0x7f0000000080)=""/99, 0x63}, {&(0x7f0000000100)=""/128, 0x80}, {&(0x7f00000014c0)=""/4096, 0x1000}, {&(0x7f0000000000)=""/33, 0x21}], 0x4, 0xdfa, 0x9) 08:37:08 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team0\x00', 0x0}) accept4$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000140)=0x14, 0x80800) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) setsockopt$packet_add_memb(r3, 0x107, 0x1, &(0x7f0000000000)={r5, 0x1, 0x7, @local}, 0x10) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) r7 = socket$packet(0x11, 0x3, 0x300) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) setsockopt$packet_add_memb(r7, 0x107, 0x1, &(0x7f0000000000)={r9, 0x1, 0x7, @local}, 0x10) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000200)={'syztnl0\x00', &(0x7f00000001c0)={'syztnl2\x00', 0x0, 0x20, 0x80, 0x7, 0xd413, {{0x6, 0x4, 0x1, 0x1b, 0x18, 0x66, 0x0, 0x6, 0x29, 0x0, @broadcast, @multicast1, {[@end]}}}}}) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f00000002c0)={0x0, @in={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}, @nfc={0x27, 0x0, 0x2, 0x7}, @can={0x1d, 0x0}, 0x9b5f, 0x0, 0x0, 0x0, 0x800, &(0x7f0000000240)='team_slave_0\x00', 0x8, 0x2, 0x9}) r12 = socket$packet(0x11, 0x3, 0x300) r13 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r13, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) setsockopt$packet_add_memb(r12, 0x107, 0x1, &(0x7f0000000000)={r14, 0x1, 0x7, @local}, 0x10) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000000380)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xc}, 0xc, &(0x7f0000000340)={&(0x7f00000014c0)={0x4ec, 0x0, 0x10, 0x70bd2a, 0x25dfdbfe, {}, [{{0x8, 0x1, r1}, {0xfc, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0xfffffffffffffcbf}, {0x8, 0x4, 0xa00}}, {0x8, 0x6, r2}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}]}}, {{0x8, 0x1, r5}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x10000}}}]}}, {{0x8, 0x1, r6}, {0x44, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x6}}, {0x8}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0xfffffd3f}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}]}}, {{0x8, 0x1, r9}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x7}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1f}}}]}}, {{0x8}, {0xc4, 0x2, 0x0, 0x1, [{0x40, 0x1, @name={{0x24}, {0x5}, {0xf, 0x4, 'roundrobin\x00'}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x2}}, {0x8, 0x6, r10}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r11}}}]}}, {{0x8}, {0x178, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r14}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x44, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x14, 0x4, [{0xaa, 0x5e, 0x6, 0x7}, {0x2, 0x5, 0x8}]}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x1}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x100}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x1}}, {0x8}}}]}}]}, 0x4ec}, 0x1, 0x0, 0x0, 0x40d0}, 0x4008000) readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) 08:37:08 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') pread64(r0, &(0x7f0000000080)=""/192, 0xc0, 0x20) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sysvipc/shm\x00', 0x0, 0x0) readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) 08:37:25 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') ioctl$F2FS_IOC_RELEASE_COMPRESS_BLOCKS(r0, 0x8008f512, &(0x7f0000000000)) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0), r0) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x34, r1, 0x1, 0x70bd25, 0x25dfdbfd, {{}, {}, {0x18, 0x17, {0x13, 0x8, @udp='udp:syz0\x00'}}}, ["", ""]}, 0x34}, 0x1, 0x0, 0x0, 0x24000005}, 0x50000) readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) 08:37:25 executing program 1: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:37:25 executing program 5: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:37:25 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) pread64(r0, &(0x7f0000000080)=""/155, 0x9b, 0x35) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r1, 0x800) write$cgroup_netprio_ifpriomap(r1, &(0x7f00000003c0)={'bond_slave_1'}, 0xf) r2 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendfile(r2, r1, 0x0, 0x8000) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xa, 0x12, r1, 0x0) getsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f0000000000)=0x8000, &(0x7f0000000140)=0x2) 08:37:25 executing program 4: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:37:25 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000080)={0xae, 0x9, 0x7f, "6087f5b70a087c7d569a2489937a21bf3c4ae3c85d1f838c2ef700992153df1c5d10a34693ae89e6b30b6910f03680c7a63c9d0062115d06e02058f0c3538720d3b22f0cc1bfda630a51f24598782a3a1886c1df5388ba91f8af7e733f7b282c278f96c5dad05f835d20a26eab81ca3b1f590402c5c5a2967cb38cae9e60594155aa054e4c2024d96d93cc7fc0ca190e49721807e85c6499b281cadeb193c1b2deb51a5228fe5765ef4144308ee2"}) readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) 08:37:25 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) r1 = openat2(r0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)={0x18180, 0x110, 0x8}, 0x18) ftruncate(r1, 0x8) 08:37:25 executing program 6: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x0, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:37:25 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080), 0x40, 0x0) sendmmsg$inet6(r2, &(0x7f0000000300)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000000c0)="d6831f1e078a63cbb6ec7460a0914932f6c78fc354ae4a2b7e1be43600fafd59b10b5e0c5ab55664c81d30fc9bf99c0f0b8e017abfce5c748143a118", 0x3c}, {&(0x7f0000000100)="ac463ee6c0856375c003cfeb57c8f787d16f5d7a", 0x14}, {&(0x7f0000000140)="604c5b47f4e8e2916a1fd7abf40af8350904fa45df8cb438027ec24e6024a6288f592271d9552e3819d3f9a49023d5ab039fdef6230f27acf1ddce55a84d8abaede60d0e11505cc4e84928415acd80a92053b15dee712b4cb8a2c4c28f273df568b279bc66247fcafd1f9a9e0faea6f16cf4927bc4d6dddaa109875495fcff3af7e7a91b857daad829c56e84d2fb3e6f9dc9f31ad1c3299cd8b187b011e3a3b64a5cc112d4a365f5b8abbdbd4064950c9c00f6b8b33ca0123ce5ed6d85127741ec67bf08e2f7a7a0204c21b9aa3443d603aaa407cb96c355f40fa053c7b180a8c89a806fdd5e9b9959d9fc9c6acc", 0xee}], 0x3, &(0x7f00000002c0)=[@flowinfo={{0x14, 0x29, 0xb, 0x8}}], 0x18}}], 0x1, 0x4000484) sendmmsg$inet6(r1, &(0x7f0000003e00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000500)={0xa, 0x4e21, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000001740)=ANY=[@ANYBLOB="1400000000000000290000050000e0f1ffffffffffffff00"], 0x18}}], 0x2, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r4 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) sendmmsg$inet6(r4, &(0x7f0000003e00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000500)={0xa, 0x4e21, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000001740)=[@tclass={{0x14, 0x29, 0x43, 0x8f76}}], 0x18}}], 0x2, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r4, 0x8918, &(0x7f0000000340)={'ipvlan0\x00', {0x2, 0x0, @broadcast}}) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f00000016c0)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x200}, 0x1c) sendmmsg$inet6(r3, &(0x7f0000003e00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000500)={0xa, 0x4e21, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000001740)=[@tclass={{0x14, 0x29, 0x43, 0x8f76}}], 0x18}}], 0x2, 0x0) dup2(r1, r3) readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) 08:37:25 executing program 7: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xb, &(0x7f0000000000)={0x2, &(0x7f0000000080)=[{0x6, 0x1, 0x0, 0x1}, {0x7fff, 0x46, 0x7e, 0x7}]}) ioctl$EXT4_IOC_CLEAR_ES_CACHE(r0, 0x6628) readv(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000014c0)=""/4089, 0xff9}], 0x0) 08:37:25 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') pread64(r0, &(0x7f0000000080)=""/77, 0x4d, 0x10001) readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) 08:37:25 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') getpeername(r0, &(0x7f0000000080)=@xdp, &(0x7f0000000000)=0x80) readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) r1 = socket$inet6(0xa, 0x80000, 0x3) recvmmsg(r1, &(0x7f0000005e80)=[{{&(0x7f0000001d00)=@nfc, 0x80, &(0x7f0000001dc0)=[{&(0x7f0000001d80)=""/39, 0x27}], 0x1, &(0x7f0000001e00)=""/4096, 0x1000}, 0x3}, {{&(0x7f0000002e00)=@generic, 0x80, &(0x7f0000003000)=[{&(0x7f0000002e80)=""/74, 0x4a}, {&(0x7f0000002f00)=""/149, 0x95}, {&(0x7f0000002fc0)=""/30, 0x1e}], 0x3, &(0x7f0000003040)=""/16, 0x10}, 0x6}, {{&(0x7f0000003080)=@nfc_llcp, 0x80, &(0x7f0000004480)=[{&(0x7f0000003100)=""/230, 0xe6}, {&(0x7f0000003200)=""/22, 0x16}, {&(0x7f0000003240)=""/124, 0x7c}, {&(0x7f00000032c0)=""/152, 0x98}, {&(0x7f0000003380)=""/244, 0xf4}, {&(0x7f0000003480)=""/4096, 0x1000}], 0x6, &(0x7f0000004500)=""/182, 0xb6}, 0x10001}, {{&(0x7f00000045c0)=@nfc_llcp, 0x80, &(0x7f0000004700)=[{&(0x7f0000004640)=""/178, 0xb2}], 0x1, &(0x7f0000004740)=""/61, 0x3d}, 0x2c9}, {{&(0x7f0000004780)=@nfc_llcp, 0x80, &(0x7f0000004c00)=[{&(0x7f0000004800)=""/160, 0xa0}, {&(0x7f00000048c0)=""/195, 0xc3}, {&(0x7f00000049c0)=""/8, 0x8}, {&(0x7f0000004a00)=""/146, 0x92}, {&(0x7f0000004ac0)=""/46, 0x2e}, {&(0x7f0000004b00)=""/119, 0x77}, {&(0x7f0000004b80)=""/91, 0x5b}], 0x7}, 0x1ff}, {{&(0x7f0000004c80)=@ieee802154={0x24, @long}, 0x80, &(0x7f0000005e00)=[{&(0x7f0000004d00)=""/4096, 0x1000}, {&(0x7f0000005d00)=""/237, 0xed}], 0x2, &(0x7f0000005e40)=""/54, 0x36}, 0xea4}], 0x6, 0x2000, &(0x7f0000006000)={0x77359400}) utime(&(0x7f0000006080)='./file0\x00', &(0x7f00000060c0)={0x1000, 0x7}) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000006040), 0x4) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r0, 0xc018937e, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, @in_args={0x4}}, './file0\x00'}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000001c00)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000140)="48a20c715b6b389de5f427dbbfa2f83a610d3ba618384c0558888ce3dd5815c1ba6a80fd9667acfa8fd1d8c765bc57af46eb18ece9c564b1ac16911984a800204b0153ded2906ad5fa2270fa497eee0fbc405eb3e99cf11615202957d517c53f57fc1d907a26bf22498445746a4130d60a8cb6c89e4e64b8987cac6199474a35a9c89997ff0f06accff412c16469b42826e53d16cf4eedea878d8e5de3cf5525062ddefe44fc3c94765cf578917cf3c0b6300c4a4532d3151ee07205f6e69fa0dfd156dad7703a9d66b371638f5aac8a6daea622bbad", 0xd6}, {&(0x7f00000002c0)="4752a893396507b1724e307236f6f508ef511e6d69e3ae3d5162aa46acfbaad3c0e824b5ac11a564057ffd81640cab8bb068140abe63d8cde5ad96be94813421cbad8fbd47a7d78bd21354b178206f11ca4af94682f0ac44b22144f3a11bb428b9d8421089df47163b5dd62957937a6447c8", 0x72}], 0x2, &(0x7f0000000340)=[@hoplimit={{0x14, 0x29, 0x34, 0x6}}, @rthdrdstopts={{0x30, 0x29, 0x37, {0x1d, 0x3, '\x00', [@hao={0xc9, 0x10, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @jumbo={0xc2, 0x4, 0x9}]}}}, @hopopts={{0x58, 0x29, 0x36, {0x0, 0x7, '\x00', [@generic={0x5, 0x16, "da456031ff1df9930b5a9ed75a96943ecb3a0a491865"}, @pad1, @generic={0xff, 0x3, "908e2e"}, @padn={0x1, 0x2, [0x0, 0x0]}, @jumbo={0xc2, 0x4, 0x1}, @hao={0xc9, 0x10, @loopback}, @pad1]}}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x4}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x1}}], 0xd0}}, {{0x0, 0x0, &(0x7f00000016c0)=[{&(0x7f0000000440)="c74267d15338eec6c7325eb52a1ba3c0f35a348ce5558389347be1de3ba1821d0a515c7cbcdc70659c4fd83d16ee9a500c07f0c9b3f4dd5f8459b36005c2119aa1bd391e20d2e1e2776c4dc07467e7a309bcf3dcd10c6a449bb8a4fa6f89bd7e5d793619248572a480712d", 0x6b}, {&(0x7f00000014c0)="fed106a86d0974796d15d3f2819ea99ffb0f0268665d7305bf83a3a3ac6704c95fc6e180ce6cf5ab667ad0a0809f31e9c92caca1ee259a27ae8c33a07dc73e328ddd31fed47856199e2e560594a14de7b1cb704966d5bb13b17399c9", 0x5c}, {&(0x7f0000006100)="846dde1371ad0c2c8fefd15b7116f686a181ad2bb5ff6efac57cb3cad35ed94f20ca566f61be148ea6b1f439031a69e5538fee390e979d663830d4e98b14091622c268fc416826f39cbd333a32748e8c35a75a8991a998447ed22feacdc32b14e4691bb50a6062298cd1822600b98d663cd4d866db55deb43a826b", 0x7b}, {&(0x7f00000015c0)="09860beff099e5ba76b2962ed75a09e940812b98f3ed4eeec7f2efecdc49929f439a4f5a135834ea70", 0x29}, {&(0x7f0000001600)="e30710cbda4f6b0aa5f3c156226fe6c0c0bd672be6a55b11493f749f5d537cf410a2110d9016411ac171272dca17c96c4e9f864d914495ef", 0x38}, {&(0x7f0000001640)="05fbd125d817a03e5ee0a00c173a73ef9255ad78e54cbe134d3b79d8b9c52021c28744ccddfb6cdf4ba8fcbf36", 0x2d}, {&(0x7f0000001680)="12c8c15449c814", 0x7}], 0x7}}, {{&(0x7f0000001740)={0xa, 0x4e21, 0x3, @empty, 0xc6}, 0x1c, &(0x7f00000017c0)=[{&(0x7f0000001780)="f3bf9421f7e5e215a00d761dc01dc2c452c64eee1d352445de0c", 0x1a}], 0x1, &(0x7f0000001800)=[@hopopts_2292={{0x110, 0x29, 0x36, {0x2, 0x1e, '\x00', [@pad1, @hao={0xc9, 0x10, @ipv4={'\x00', '\xff\xff', @loopback}}, @generic={0x7, 0xc1, "fe662e21e5c4fd97f41774f8495fc20cf1adcb8b1ea0d650dbf6c3f8d3132b78ed5fcc37680040f3cfd177b63200b60dafa05df609b9bf145b24eb8b4e22dbd31c757821582b70dae51d6d6564b4b1a74d26f0d433e04ee2c8eabc16ace48b09164c46451a71c830a9b7f5b3077892bf2f355e6c7defd281f7fde4247e6404fed6810e08074380bd1a01134cc25f472a8043ca5888ce035c3d9fdd1ee3e1f906cf1b8db83f3fb2f7db75e7bb2d867f358d0350819f184650725b851810f1730874"}, @enc_lim={0x4, 0x1, 0x3f}, @enc_lim={0x4, 0x1, 0x3}, @padn={0x1, 0x1, [0x0]}, @hao={0xc9, 0x10, @ipv4={'\x00', '\xff\xff', @multicast1}}, @ra={0x5, 0x2, 0xffff}]}}}, @rthdr={{0x68, 0x29, 0x39, {0x29, 0xa, 0x2, 0x1, 0x0, [@private1={0xfc, 0x1, '\x00', 0x1}, @empty, @private2, @ipv4={'\x00', '\xff\xff', @remote}, @private1]}}}, @flowinfo={{0x14, 0x29, 0xb, 0x1f}}, @flowinfo={{0x14, 0x29, 0xb, 0x1}}, @flowinfo={{0x14, 0x29, 0xb, 0x5}}], 0x1c0}}, {{&(0x7f0000001a80)={0xa, 0x4e21, 0x2a46, @private0, 0x10000}, 0x1c, &(0x7f0000001bc0)=[{&(0x7f0000001ac0)="ef45565e0cb976673053ac90f0d2726c2bf6eec35e589aa6871b0c75156c81add0feb6b826d26954a953c84744d1e0390368ed8fdc4a206b265752ecbe2630cce4d3b18214f292aca85d928c1df63f3dbb8ad2e0766e9fb6254fc2ce4ff2b7856d4bcc93ae8c7e44c57887918d7201feead5eaf2ab818c4bb5fd3b408462afcb0bdc4c42732d67339670809a09755322232af440fbd2f7369a0c2d4c8552f43527eb3593c08009318b626d972b2e9374fb33e5d49b86e6a5d91733c02b01bfcabd77", 0xc2}], 0x1}}], 0x4, 0x20000840) 08:37:25 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') 08:37:25 executing program 4: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:37:25 executing program 6: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x0, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:37:25 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x3, 0x9, &(0x7f0000003580)=[{&(0x7f00000014c0)="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", 0x1000}, {&(0x7f00000000c0)="3096ea85a31233aa143b0dec264b1bbf88ac67a2f1ae0b0855764a1663e7c564a43620e009970a919fea412d11b574297fce8b73589dc146a56aa69d8846fa8c5723504f9deb6806b2f5d3f5275436891f15e2619e", 0x55, 0x8}, {&(0x7f0000000140)="86323a94245918b75e76e16a1eb74533647dcf4c08cac5b60b0b82305d189d7f9a306669c6618c294ee8ad1167dd6d7f55f868fb062eba6b33282a05ca074949bd67aeaf27cc3c23b7467d5252978553293f48748846e3adb4781f347af2c614f14b40cffdf822cb5b1eac8e53152ba5961fd0a1e95b38b57bf057bcb9adb5994a4ee7be", 0x84, 0x82d}, {&(0x7f00000002c0)="e629022b8e3a0a8d19c439bf036ce01c3e7bca305835b2bafa85822aea09019706e857f4a99e545ec0aecbbcf13eabfecf82a0cff7596c4dacd89f9ae9423028d97fb689382e651b93ca31a7f8e6f085bbb5a3cffa0322c3ec3b9086a74068509839e41ba4b32c28ce2535ad5b01caa26d894e4112388705091eb3197c0e792cc151408a7432b4405f873a4779bc6607795a5ea86175cb5fa31e11514a6be8012f2af81e29864f1d536d2c354c4850981b862621cf88759d34c87e5cae9d9ba78ce9d5a1fc2341eed82a5173f528", 0xce, 0x101}, {&(0x7f0000000200)="4d5cf374cb37cbfe1f748e4959c44a4eef9fa8ca5277e243e8c20d849d3ffe2a8f7436f5e5f2a9158e39c5a5e76c332977a21edf867587f9bf247787532e9e4ec3586a741f53c39a979222e7c11f2c2baca72fcf5831a6bbef31d16af8bbf67a4683b2c10a70020b6be4db6345216f67f4cf19d0013042129de283e8feec", 0x7e, 0x100}, {&(0x7f00000024c0)="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", 0x1000, 0x3}, {&(0x7f00000003c0)="3cefb0", 0x3, 0xffffffffffffff81}, {&(0x7f0000000400)="87c1183ec76ca5f3065f57fcca9e6ccf79bda67eb7a8a0b73fbfb02b86410a6c9c77bd9d813ce8f35a14865e4731a3be1ea2ae5888b1a8676888bb06b5932743fdc90b23618d78271691711fc2f9612755312e03ec5a6af08b1f8a4409e593b5b0d17c2d67d21ae2c8438199551e36f246d44dff00b36553f5404fff87e9bdd6214df6", 0x83, 0x1a916024}, {&(0x7f00000034c0)="5add7534e2abd5d2a956211a7ecb75c84df3be5877e7d7bdce5f0b83228314ae052e9278530be93663e0402889207fb599c6060d45d39660b8b8b767c1e5a782d9b6ee5a3891246a7cce346a37e1cd06bed2fb77a7b9876f66001981ce8b695cd3094f5298c2797691f21feaa0d5899b210ef961d506918443d7b51f1e19bd369967", 0x82, 0x7}], 0x112484, &(0x7f0000003680)={[{@min_batch_time={'min_batch_time', 0x3d, 0x5}}, {@nombcache}], [{@subj_role={'subj_role', 0x3d, '-*%{}\\%}/.-{'}}, {@euid_eq}, {@smackfshat={'smackfshat', 0x3d, 'mountinfo\x00'}}]}) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(r1, 0xf505, 0x0) readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) 08:37:25 executing program 7: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x40000, 0x0) fcntl$setpipe(r0, 0x407, 0xa7) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) 08:37:25 executing program 1: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:37:25 executing program 0: ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000000)={'syztnl1\x00', &(0x7f0000000080)={'gre0\x00', 0x0, 0x40, 0x7800, 0x3, 0x101, {{0x32, 0x4, 0x1, 0x3c, 0xc8, 0x64, 0x0, 0x51, 0x2f, 0x0, @local, @private=0xa010102, {[@lsrr={0x83, 0x17, 0xe6, [@remote, @rand_addr=0x64010101, @remote, @multicast2, @local]}, @timestamp_addr={0x44, 0x34, 0x4a, 0x1, 0x0, [{@rand_addr=0x64010100, 0x401}, {@empty, 0xff}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x9}, {@broadcast}, {@dev={0xac, 0x14, 0x14, 0x3c}, 0x8b}, {@private=0xa010101, 0x6}]}, @timestamp={0x44, 0x18, 0x41, 0x0, 0xb, [0x81, 0x7, 0x3, 0x0, 0x3a80c70a]}, @lsrr={0x83, 0x13, 0xbb, [@remote, @remote, @multicast1, @private=0xa010102]}, @lsrr={0x83, 0xb, 0x20, [@rand_addr=0x64010101, @local]}, @rr={0x7, 0x7, 0x72, [@loopback]}, @end, @lsrr={0x83, 0x2b, 0x22, [@dev={0xac, 0x14, 0x14, 0xa}, @private=0xa010100, @initdev={0xac, 0x1e, 0x0, 0x0}, @loopback, @multicast2, @rand_addr=0x64010100, @multicast1, @empty, @remote, @rand_addr=0x64010101]}]}}}}}) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000180)={@mcast2, r0}, 0x14) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) 08:37:26 executing program 5: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:37:26 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) 08:37:26 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r0, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) read(r1, &(0x7f0000000080)=""/1, 0x1) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) sendmmsg$inet6(r2, &(0x7f0000003e00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000500)={0xa, 0x4e21, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000001740)=[@tclass={{0x14, 0x29, 0x43, 0x8f76}}], 0x18}}], 0x2, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r2, 0xaf35, 0x3, 0xa6, 0xffff}) 08:37:26 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e24, 0x0, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x42}}}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000003e00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000500)={0xa, 0x4e21, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000001740)=ANY=[@ANYBLOB="54000000ef0800000000000043000000768f000000000000"], 0x18}}], 0x2, 0x0) r2 = dup3(r0, 0xffffffffffffffff, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000240), 0x90002, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) r5 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r5, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) sendmmsg$inet6(r5, &(0x7f0000003e00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000500)={0xa, 0x4e21, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000001740)=ANY=[@ANYBLOB="14000000c1d75e692900000043000000768f00000000e200"], 0x18}}], 0x2, 0x0) io_submit(0x0, 0x4, &(0x7f00000015c0)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x5, 0x6, r1, &(0x7f0000000180)="818bc44238f4c0a67a911752910fc1834626a9953c4501db5069cca1bbd2c35c10d16cb55e34f73f346c69490882ff9020c879f5d64f9e4dc631c911311ece3a916298b5bec71a2715952a0bac0cbe0a2279eabf2b3a83b911fc5017747e0a97c14ea0b2709a1650f6ded2f3f3de2630c9c478176b9fe2dfd66f92ede115a11d7ae6822a8dec813d52b795d983fb905d5f133f9f4c9302a50398b91d1ff150a4e50a309eae070fa95a86f62b9aba222e1545129dc108db80d0ba3b", 0xbb, 0x4, 0x0, 0x1, r2}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x3, 0x5, r0, &(0x7f00000002c0)="3d54d21f7937e60f7a6d5f752af5c11d60a534a8b88d4d631ecc01ac3fee93f4ed1e889dc31e33eaf0ff37abfce9fa26d1391b67aca2dd84ec6ee50d9bc978fbd1d585d1fbd4dfe0ea07aa1549930887bd3020c9d3160d15a91f78d1fbf6f21f16a6c3ef7660b1508aa407cfbf3110aa67d849398d14c94020aef9d70f7e40452d67ed0537d110e2364088cdcb1c7a6167383f581ca60675aa6204046d661e7ce519f4d527cb6723ce0cdd3ee599cda376854b23329dcf1acbfc7263efa28a70168b06b1cbaf66a42015cf949ba0d3a0b92925f4c1e095f980ce925b9489d1853d19bc93af67156bff7ab076f52e59", 0xef, 0xc6, 0x0, 0x2, r3}, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x7, 0x2, r4, &(0x7f0000000400)="d10f414edf516c6fdabe1e25546109be83557a21040f3df07e6d970901649daa1d71face5ddd07e13d2d17cef6a53f3abf0c961ce690693445aa92732aa5c936b9edc2c5c974ae1de6cd34ce7bd8f9e234f8", 0x52, 0x800, 0x0, 0x0, r0}, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x9, r5, &(0x7f00000014c0)="37efcfcd4d42a3efc9d2ac1b266e3262ac5d1e251d10ef4b5ff36a2ebf2307db77c138f9d5197d1bfc3cb019392619099ba7bd64ec3a5483aa863def161d5878b5c7acb142d8e458cc742267b463c6b4ee7993fbd303fc696975d5876b349423924de7f18b98b1f2c42b7a912e5fe44b4855ba98fac7178087d6fe4c53040f0069af17", 0x83, 0x3f, 0x0, 0x1, r0}]) readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) pread64(r0, &(0x7f0000000080)=""/253, 0xfd, 0x316) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000000)={r7, 0x1, 0x7, @local}, 0x10) setsockopt$packet_add_memb(r3, 0x107, 0x1, &(0x7f0000001640)={r7, 0x1, 0x6}, 0x10) ioctl$FS_IOC_FSSETXATTR(r4, 0x401c5820, &(0x7f0000001600)={0x7f, 0x9, 0x7ff, 0x8, 0xffffffb1}) 08:37:26 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/snmp\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) 08:37:42 executing program 5: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:37:42 executing program 4: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:37:42 executing program 1: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:37:42 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/protocols\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000003e00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000500)={0xa, 0x4e21, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000001740)=[@tclass={{0x14, 0x29, 0x43, 0x8f76}}], 0x18}}], 0x2, 0x0) ioctl$AUTOFS_IOC_READY(r1, 0x9360, 0x4) 08:37:42 executing program 6: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:37:42 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') r1 = socket(0x8, 0x4, 0x9) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r1, 0x8982, &(0x7f0000000000)={0x0, 'ipvlan1\x00', {0x4}, 0x8}) readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) 08:37:42 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) ioctl$TIOCGPTLCK(r0, 0x80045439, &(0x7f00000002c0)) sendmmsg$inet6(r1, &(0x7f0000003e00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000500)={0xa, 0x4e1d, 0x0, @remote, 0x40}, 0x11, 0x0, 0x0, &(0x7f0000001740)=[@rthdr={{0x18, 0x29, 0x39, {0xc, 0x35, 0x1, 0x4}}}], 0x18}}], 0x2, 0x24008010) getsockopt$IP_SET_OP_GET_FNAME(r1, 0x1, 0x53, &(0x7f0000000200)={0x8, 0x7, 0x0, 'syz2\x00'}, &(0x7f0000000240)=0x2c) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x4e22, 0xfffffffe, @mcast2, 0xa5}, 0x1c) readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, &(0x7f0000000000)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) readv(r2, &(0x7f00000001c0)=[{&(0x7f0000000080)=""/80, 0x50}, {&(0x7f0000000100)=""/85, 0x55}, {&(0x7f0000000180)=""/13, 0xd}], 0x3) 08:37:42 executing program 7: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') 08:37:42 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000003e00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000500)={0xa, 0x4e21, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000001740)=[@tclass={{0x14, 0x29, 0x43, 0x8f76}}], 0x18}}], 0x2, 0x0) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000080)=""/71, 0x47}], 0x1) r2 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2, 0x8010, r0, 0x0) r3 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(r2, 0x0, &(0x7f0000000000)=@IORING_OP_FADVISE={0x18, 0x4, 0x0, @fd_index=0x8, 0x80000001, 0x0, 0x8, 0x1, 0x1, {0x0, r3}}, 0x200) 08:37:42 executing program 2: pselect6(0x40, &(0x7f0000000000)={0x5, 0x0, 0x1, 0x9, 0x3c9a494e, 0x8001, 0xb59f, 0x7fff}, &(0x7f0000000040)={0x800, 0x9, 0x7ff, 0x7, 0x9, 0x4, 0x8, 0x1000}, &(0x7f0000000080)={0x9, 0x3, 0x2, 0x4, 0x2, 0xfffffffffffffffe, 0x5, 0x40}, &(0x7f00000000c0)={0x77359400}, &(0x7f0000000140)={&(0x7f0000000100)={[0x9]}, 0x8}) readv(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) 08:37:42 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') ioctl$FAT_IOCTL_SET_ATTRIBUTES(r0, 0x40047211, &(0x7f0000000000)=0x4) readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) 08:38:01 executing program 7: fsync(0xffffffffffffffff) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) 08:38:01 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) r1 = fcntl$getown(r0, 0x9) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) sendmmsg$inet6(r2, &(0x7f0000003e00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000500)={0xa, 0x4e21, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000001740)=[@tclass={{0x14, 0x29, 0x43, 0x8f76}}], 0x18}}], 0x2, 0x0) kcmp(0x0, r1, 0x4, r2, r0) 08:38:01 executing program 4: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x80, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x80}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:38:01 executing program 5: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:38:01 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) 08:38:01 executing program 2: readv(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) 08:38:01 executing program 6: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:38:01 executing program 1: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:38:01 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r0, 0x800) write$cgroup_netprio_ifpriomap(r0, &(0x7f00000003c0)={'bond_slave_1'}, 0xf) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendfile(r1, r0, 0x0, 0x8000) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xa, 0x12, r0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x34, r3, 0x5, 0x0, 0x0, {{0x2}, {@val={0x8, 0x3, r4}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x96c}]]}, 0x34}}, 0x0) sendmsg$NL80211_CMD_SET_WDS_PEER(r0, &(0x7f0000000200)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x2c, r3, 0x800, 0x70bd2a, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x80000000, 0x52}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @from_mac=@broadcast}]}, 0x2c}, 0x1, 0x0, 0x0, 0x880}, 0x4000) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003e00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000500)={0xa, 0x4e21, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000001740)=[@tclass={{0x14, 0x29, 0x43, 0x8f76}}], 0x18}}], 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000240)={0x89b1, 0x81, 0x8, 0x1, 0x8}) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r5, &(0x7f0000000280)=[{&(0x7f00000014c0)=""/4104, 0x1008}], 0x1) r6 = getpid() capget(&(0x7f00000000c0)={0x20071026, r6}, &(0x7f0000000100)) r7 = perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x0, 0x3, 0x4, 0x1, 0x0, 0x1, 0x2001, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000000), 0xa}, 0xc380, 0x3, 0x8, 0xd, 0x4, 0x6, 0x7, 0x0, 0x6, 0x0, 0x1}, r6, 0x8, r5, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(r7, 0x4018f50b, &(0x7f0000000100)={0x1, 0x0, 0x2}) 08:38:01 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r1, 0x800) write$cgroup_netprio_ifpriomap(r1, &(0x7f00000003c0)={'bond_slave_1'}, 0xf) r2 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendfile(r2, r1, 0x0, 0x8000) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x4, 0x7fffb, r1, 0x0) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000080)={0x3, 0x5}, 0x4) readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) 08:38:01 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x344d990b2858c82d) r1 = mq_open(&(0x7f0000000240)=',&/@+&\xc8,&@(*-\x00', 0x0, 0x8, &(0x7f00000002c0)={0x5, 0x4, 0x33, 0x6}) readv(r1, &(0x7f0000000280)=[{&(0x7f0000000180)=""/91, 0x5b}, {&(0x7f0000000200)=""/51, 0x33}], 0x2) r2 = dup(r0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r2, 0xc0f85403, &(0x7f0000000080)={{0x1, 0x3, 0x0, 0x1, 0x80}, 0x29, 0xffffffff, 'id1\x00', 'timer1\x00', 0x0, 0x8000, 0x2, 0x9, 0x401}) r3 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000002640)=[{{&(0x7f00000003c0)={0xa, 0x4e23, 0x40, @empty, 0x3ff}, 0x1c, &(0x7f0000000580)=[{&(0x7f0000000400)="9ec3187c18579efea6ab9b75904d9af6850e9d958c4ad6c6a6ece2e81c25fda930fcba99a4bd61296ad0fb9dfccf851ceed70ff9d4b5803669fbd1167339160835c1ebf130d4b949c194d1d19622926b790f2eac0248cf6a2b9529fa52af64ab123c24ca4ffd783b21a1c8baeaa2eaad6a538b63dc3d9dca67e7e57c0775e3f6f5fa8778e17bc8afa8bb832b4348c3029456a7584d9547fbbf25e9565863490dedaffc00c31c48ce28e309e5b1e2c57a648cd0429bdbfd73c5c866389e840f6febda691ee2b9b54f00f19d71abf03a1da3bb51ddea614a270ae0247a", 0xdc}], 0x1, &(0x7f00000005c0)=[@hoplimit_2292={{0x14, 0x29, 0x8, 0xffff}}, @rthdr={{0x38, 0x29, 0x39, {0x0, 0x4, 0x0, 0x0, 0x0, [@private0, @mcast1]}}}, @rthdrdstopts={{0x1040, 0x29, 0x37, {0x33, 0x204, '\x00', [@pad1, @jumbo={0xc2, 0x4, 0x1}, @generic={0xb9, 0xe, "90ddd8683e1c3eb4fdf4a4b1a3f3"}, @enc_lim={0x4, 0x1, 0x2}, @generic={0x9, 0x1000, "7a7befec4062a1af59261126bc114047566a7bc12475812c4b11efb9c24a5f6da4c4d8d62252c94ddd37b832dc5735967c98f51e4523ce419a75ee3a332279c49726dcd7cf80418e1c4ca98c7248b54f7c276e0d820b4b3e1ba89937a7066f60cce100555ab81727efb7a60a7a923eee614b89fb5e2214fce064c8567e04eed37f645e33232c19e52d9b1a728bd39759ff2dd1d491a7ebcbc984432dadcc30e8a2577459dab9ea33e944d11f9da816bdfd144d3bedf6e5afb28c0d1af71588ddd6cc563aca3bb9a6d5c8b486f638642e4a6a981aad18f6008922ae45c5fee69ce2c756d073f1b35aeb97a840c7d6b9e9aed76d083b5a6ad8dff8260bacc69c064dc68f8fb330d8f38092bb144fdb61a3ce4f47b27cabd0784f0612f35e2cc8e8abf86e9d9b23c196dbad1b053c910ae51c4bc01bf45a73717f22bb935b5d849c5b8e21466f21c2925a178d45d932c9245f0db72a72c6064f2bb2d8f46238eea2316443930a2c3b48f8b44c5798d0713f5b69ddd0da77a6ef37e98c5b8ab0fb3abf77bec2116758d6e8d2949c0fc8c682a551fa80c58ea52813da9e6241f6fe2d83fa8080393db928f093d440a6e9eed2b15c41164487243ebe4c210ebd6710fda27a1bc21ee3ecdf372b6e88e2a6be4461020f9ffecdcf104e2d154acef2f88917a0c3fb64ba05a6fd89e6cb8e9426c9a6c8793896ee563f2b2e32833e3a9c814fe775f217ab454542fedbdfc0fcc78da3bf7280c9d1d493445e7d1d5e76e542c8494c85ee6374a60810a0a903e0a1492240d5752d5f3cec4c663e591081e86827850efec6b7292c88d3d4af6bd55cddc2ed7ae84a4f1b81327f39c02b4d5c43a04ffaf88d147560763dd89506a380440cac2568098c598659e86e0fa1f73d150434400023a4c58426ef1c68b3c04777d2b49604e6e0a8f34bd60dc8be898c5da98229c901071cc174bc6610abf7457a54f107038b847bd5d08aca7b471549bab3b2b29ccf5cae13f664579ba1fb5671492c757ae533e0cc43ff81ec8dd17a3ea8bf3532cb17b2fdab68a0a11d654cf7b7e87555a34f85ce2a40b79397be7dc9201a2253f280213f84fd4dcf2c54f799969c2262e9fd5bf8d24f18d2f549da9d59f9f93dbb8377a95bf9e47456c2a42fac6064f99de563fec9b75566a8e97c831078114966e1ba2784f4a7052fc96a973f958e4a58318f0924aede807607dbaaa4527c2e1922439b14ee93889b8df02b92e80277a45d8dc467883036c2ce8c2c3d7b4ac18bca23343374eeaaa0acdd5a60c44f345a961644a7e28378c5385da206f4fb0526a972030ad91ce7fa87aeec6b61ad9b8f075748734db1c949999977df9885122fc6cc74891de1624bb855a52490838c13764be5fd82c0e24c9d3615e908ef87e13d0ac89fd89c91b553531f8fa33ffbc07040c5d74acbe2971b92cff23768ae925d777662ff815d7c86912f25623167db16bedf8ca50b0a373c529a13b25f4146d5dc922340d8fb78b48d3b9f6998f80a8a93c5d67143b2674e4cbbd06f5cc8b3a38b6187b082e4fbceb2234c89b1a737bc21e556b678e540cb4bba7eb587a6f69e77d107008e9f7d3d957f6917d245ffedb587f9910cf2fe81d0b975df6df1da180495d5083233166317ae6c12f07820c7b76f9b72cdfe2b881504df6fc316eb84c39e177b91ee4d22151f8f81dd4555412ba5824499483457cb4e3c65593ab00568cd854ce3b76dcadea62405008e9e884d255cf82c835a89cd5ad96591a631d8fa72d519ea73a2931509ca7f0cd5678a30559eada05b1a41b1fca2b86d4102dc32b5823d5b76d9dd96e7c0fa3af4320d3247002c7ac873c64144e1d8fe00c38a2ab443e441ad068dae9bc7892c447526a22092a52c65ccf2f236fad59b6310bc883f2e77136018b34603a445c500173972b6a13e4319a27897d33d6edda32858fca5e2a486a4393865e156a01870a3529749211fd284e857dbee7863548dc977971180de0662b5a3b17c19d9d80bd63e16ce4c2b6eda1c93e727277e5b5759dbef3b634278fdc8961f549a6eba1c487a8de74cf6fc08f528ccba710bb0f76798dd409416cc34d525825e363edcfd983dc9cf56b583a685f9f61b216ec68c59c1bd81994ba2cc2f37e32e1f2999eb3d471da1545891b0abff351bfec685337fda8d3b2eba949be3c82e1c5e5054fd485925a6023307a5107354767f460c69baff81bc65e18fc680c86b65d5646412770e70273603c68d4a3da397a4b6100e817fee41f92e36e2b91f1281da3ad05cd450825f89fa59aa7cab83393b0cf3575e8fafd4b5229cc09f34a7bd356fd5b8bae637894aeeafbee18bd37893b5e15e4580e4ba89f91a4a3876927b58115b5f185c3d6d82c3916db0025f81ec76a28caf619f9e7ece0f69a9cfb633b1d92593137ac146f2db27b9c913509e0a2114b0babf4c94e7db9579468aa736d24451afe51d20d7d2a009cbb6a5def83da42fb6169dd29fd788e99a099ca8632e11e6e754103058f36749ce55453cc39de240856f00e5351de647ded3c11fc49ddb0bda74aa800f7fc802c8f2ae176a82b78a0402b126aaf2e6eb746fee19797b80d4abf20824deb59164ea4f4e2345cb660b95eb72814641217769215f466e17b18c7898b2d48cef998951236a1cb53a487bd2390705049de5713387129244337500266490d7af0130eb0f87e078899634709842e49b7b6d8c9cb64b90279a02c0f95785e8a0765fb65fe73d2bad8d51f3756c1ba09c6ce49624a920f70603c6b176bac5211840ddc2e8b2e241a2f4a18e7d4deb101fa3ea798061f12ef4a73e2292b80252096db4ba5f7ed12179209926d21a277c2ea1b5d802be6f6722f8d115b005f42d6b1fca4663062df1c4cfe18a6840c2444b949a6c6411647499d63157fe8800fde8322b19ee3d079f7c91d04dd3737351ea14264cfdd8ed750c4ea85fb42341cc807d60758c716d65093ae8420d2d6caf89be29575d9422327c426e645248dd0814d59ed2d12369567b44349ce40b5326ed034783356c1a52877a058e45c42c5ead0838a58a81a6dc89128a3fdfbb25e64d3c9090f66bd8f2464eeefa46e7a7b30cd27e3419e6f3ee27cb5013cf7bd6732a99a49699180650ad87c7214f49bc9e0025663e40a055a430410fb909d44974f5ce63798388e68affd86377463734239a6a929a3761edc4a7885c2081d838e70c9367cf0498f4639dd231f585ea7765eab1654645b3c1cee80f6e74a15f6793cbe9eedab00cd5e42475a8071d7cba838a3e6fc2252d24b412a4f84608b9484c92d00dc19334c7aed64ed522fdb8919428bcb52f18b37dcc6d49f3d815cbc0146c58064910960e15c8374cce29613d9d077d257325b2d95ff61924aee9c248c23e31bbe6b1a4e4881b1820407758b6d4356dcb494b271a31bd0a329092487553089fee2419f96fbf5605935eead1c349c502cdf57b46b9fb3712b5f990325928f94df3f69d3b463a5c3e7cdc8b672eab0019332ee7bc832305e7d042f48850c2a39d0ad771c8b3e7e863b710df6e652124f6fe4e890a695f13950cd310891ccf9e07f62e5082f1155ea949567706c0d85e6c4ac6b642c3a1f1eec5a661a18b13d1cf4789f066aac7d1aec1e52e678080d4a8abd78c924e78d8c6032555088dda2775b7f024165c195b51c68bfe0a0b51ba468a6d3f645641cf6f75a73d2434c035de95b7ee871aa0c43f5fa3de0af82b34379e69503e87d2e5aac1b40eeca58931a2ea89858927733627712336e9bf30f56a4ba923b844601aec66f3b4eaaaa1e95cbac921399c26806569e7b3d415f5d069157b95875f79fa3e47a08b57814d07ef5a2b899e78353ea67608416d3b6dfe9820c5190692c27f91db61e8df8d1cae479c689a010f0b9e0a76150621e7fecadc42945917a53cfa73a397cc0555b35db587f5b961fcb0ae029052bab83c28a11d3b1015447119e1aebc18d24e7aea720203e3dfbd927129b81015f01e408b39370d8829460adb08e168caba77dc764e37222f60731c4d503c3e4a5d892b2745ba0fee5111db03a2b872486436f118e521158f0533c8f3130065fb92b4891e719a25da6aaf5503b033b30003459ec31522114f762522ac488eb1df31c97030c7a1650fb7a93e3a172e6e79dc7f365200032bdfdeeb671baff00e63ac457fd25e9e8bd27c9f050970733e7fb273e9814ed6b32511a39d28b1460d7101c9f488cb2c637fde62fd6e4f625460cb8a30799eb97ed269fd8faddb9fd152b99eb3c3897a91e88fb433cc15d09a095e7c74ef9db9005c8ec8d7fb418dd18d698f4e1bb62baa033b735d34c263fc208413e136769513d94c5b7ece585e8b488000f97a03a531eaa063e09858f9fb059e41e0e329440f7e51dc2df33ec0f148391f98006d4c86ab39c9d230e25c0f4ed47959ca2e3ce96071432739adec0fe94e250f4f852fe8ccd1c9d5b9e2d9a7c69d1ec85bedb9231640157626b27118e16884c5736cc1fa9ee1c49efb734cb406e7bea498a67e91892613c39a8cdeba6c84e8d1f0988a706a43342d378a24984b88e005b4b1f355795a9740c948cf161c8aaa9f1db9ed400363997682d272fb1c5ea752262bb5b6e80906d53396c1868b4a8aba26e3ea63a18bae5ea99a4193853d64409c204443b3212cdbb3327fb74edd74714458b33495e3ed41d13a892d5de4eadd560a105633a1b4a99bda396c3e8ec081dfce965a2cdfde1efd5f34bf74270e1ca8c2a00ecbecaf6f7fa2cf0f0226853fabbf6cd86896f6182866e157bd4d8ed3f6b6f4423f0d357a803372afca0710a1fbe76a4dfea4e25d08e86904e237c80f82528813c889643afe72f3ee98e4ddaa0192fa424c5c4bf07f081a3cd25944fa14ab8ff05a11fe12ef37b296119013e5e953b56ce39b01176652fe261ea37600b612ae19769e0c284138ef1f2a0012ff774fd6cdc028af9af0fcfcd01962286eb440ca3cb7298645be1083512ce5cfd81ac790c56d924840ed62043a620a81dcba290ec9418df2c90d99a9a540cbbc379e3bab17c05326354b2670fe6ac1c6f6c01b0bd946398115f21847fa2f26d973a9836e9035969e22f9fe2f9a37c8bf3920994c68c42a6e8bf99d31867912dbd2a62253889e80207c844f3dd86e7e9a75dd64bfc967316df25ab5376fc04d9ca9892160f77db36b6a3de42f9334dee8471790fa43995a23b1b66674b284e2314313288473b32b6afc93f86df88ddac5c0d445a27993298a3e2f3ffa6375f2f2456861313a2924e42ef44b47006a8ae9dd14253c16dd27c23bc45262e87443b3c685e6fb7aeb3f73c60a1ae0b6bc49c86dec3172ec0ed69fd64c6215dd389d289cdb753a681d7cc782b90ac58a39eb8a677e98591aeb8156e2cdcb1c71be4adb72754599790d76ba29543231f42d20d171e8919125715794f07e1a3d8d881560e4afad5c0f3ddfaf03e865136458d679009e5e39569a3b6cd1b9ba84bae4c282e51c0afdeef3728818263a31b7c4dd5378f2ea6607a9ca5bd3ae04078bb6e2f0dfcd919955ad54733f2de3e29553aa2bf2b49a789498315c064476506d21f45fc715aeeb272377782011ea26e8d993ffd905b4364f5f639ae99f63076f1f121a707f411e0b0f8942b2a41097b8b003c5e8fb5da371485f9e646267fb11077b2ce4c57f723abac085cb232e5644203d5335190df9c3034f7a7238fd09789b99f3c900e773bf4859c71fdf679ee7367c983c476a65947a1c8eb6b96ba1d61a4dd173ba34053cb5ed98bc35cbf1"}, @ra={0x5, 0x2, 0xff}, @enc_lim={0x4, 0x1, 0x9b}]}}}], 0x1090}}, {{0x0, 0x0, &(0x7f0000001980)=[{&(0x7f0000001680)="bf5f524d21f284ed7aeb57efb184142479ea1338c3256e146bb7404927ae94c82f23a7e8e27c5934bef4e7c5659f3d0e2bd33e7be63c96b2cfdf71828115f1b39d02275ad000a6fa1f02714d7dd8b0fbd96ae08f2e6a655774de12bc2d1ed475222bae2b3754550573108736e12e7f616217af51920371be42719ffbb565a5fc593cd5cf7fe01f38dc3b75edba87f8d53f0a853c7d7c9c67dc7f57064cad4f0a5c542024b3c9db4991fa30eff0c24475bfc30b94dd713b3198e0db275181675d", 0xc0}, {&(0x7f0000001780)="ef6d4b0e6aa5f69653605ac80fa36007e8d298f65fd9ca14da29c2009d78a58eb85e4b8202016c0b61032be599f64ae36378285c0e97b3667ec9fbd0787f9e4a4f8bdfa81541fa0ea6bdae0c7b33ab6e28edf83fe7025823f4174d5f8a5ee2088f0045de78d9f6f12bd48f2c2d21490f293ec449245030b332a1d71483a8a5e1b4361091c8e4c40d9254f2fd8344c2737feec17ec137ac8b87ad61885e57e8a7bf3e3152cb6ad937e8362dbc33", 0xad}, {&(0x7f0000001840)="ea97090d0f8a2ef549b9c64b8a5e510b22daaa29abf0f9367d4e2d57906261e69f2a538e234068f158dd9955896f94b7daafbca9804a72d302313f61ea82f0ed5281ba0d5299ff1c244eb8d8f260e6e6830dfe82245880ba6f262a871b94ece0118956eb71711515a96ed0d9092dae70912b853d06f6917b18a011bd5d40cbeded57c3adeafe1274878de8f0650b3104a4e8434c8a65dbd3a4d2fe14de7243a29acafd18e5a3a222ef0cd7a786ea8fa08d5394caeff35d241db6e94a000000000000000000", 0xc5}, {&(0x7f0000001940)="3efc474a60335dfefcc1fbf915168b46", 0x10}], 0x4, &(0x7f00000019c0)=[@tclass={{0x14, 0x29, 0x43, 0x6}}], 0x18}}, {{0x0, 0x0, &(0x7f0000001d40)=[{&(0x7f0000001a00)="40b94eb19db3bce29610947173aef9ac8e9c3c0bc28502486a21", 0x1a}, {&(0x7f0000001a40)="46be83aa235f97caf6ec575761a866f13dcc0472f35be8f7d4765e9dcdf15e705cf88b617cb7923fe1f5928abcb69fd14dae26b2b56e318e942ff34f23e54515141e5e5c2e012006b58415311c25a6d6bf81632135fd53ce193a090f3878867ebdc598f77b6fd4cc27e05869bc5ff1a98fc7ade702cf3166a51813b3eaed0dc7ec1a864e97c8c5f01b19b2610da1b6330c3fe52e016449d15daf2817c6e2162475e46b41022425395cb15f1f", 0xac}, {&(0x7f0000001b00)="d867be9cb60ef60261975254f6dbc760e66bb0729ac5b8628df10d707eabbc6fa0b900b625111469e2e041ab16c177251e0991c87c0a0fe34eabdcd62d0747dafb47b4d029e677fcbe19e66850bffe8db15ab152d083b38a6a4de4e450fa21b0c42520b474d6f7eec4f717356680a06db0168dfdb8a49433fd7a7c1b3f510302ef3940bc99f4d1a990c325b80609ab771e93855bb13963cfb9ecec189b0f621798e07ef79545642fdd3965fcdb1bb32eb4e64aaf596aefc49e59778b15321222af2aadbece75c99d2c5d8a423e09e7b380cdcf2f9e3fe06987f014adca8e9aaab748378c5a50", 0xe6}, {&(0x7f0000001c00)="da9e0aa0b38e5bc486a63e0153501c21c4be960e9ad3e1984bcd6425b0294fac55f19d3f31bc66", 0x27}, {&(0x7f0000001c40)="d3b25f7cc6dc6ac400c487074c9eed6141edb365ca20eb32f65e6c037f1c8bb7132bac9ffc5a47ec73b0bbaaba71a96f6c9c21dd0ef72c1d1f78c8d145f2a2666f66d280feabb108d95c18af0b6458e09be17110071f353cd7427518d8b00e3fd0c5b3d23e39252a753463429b67c62c1943a022c78f355d34d839a43575c5548175e7a66f5d4ca5bcc99b7b1e26184013f7ed442655bb35573a05f40f5e5664291af5dc2f25ca90bc5e8382a46b80ebbca2b453e69915b715590791837fa7b60f3b8507097e22f014fef5a8b8002ef381e50d706efeb6e463", 0xd9}], 0x5, &(0x7f0000001dc0)=[@rthdrdstopts={{0x20, 0x29, 0x37, {0x2f, 0x0, '\x00', [@pad1]}}}, @hoplimit={{0x14, 0x29, 0x34, 0x8}}, @flowinfo={{0x14, 0x29, 0xb, 0x39}}, @hoplimit={{0x14}}, @tclass={{0x14, 0x29, 0x43, 0x65}}, @hopopts_2292={{0x68, 0x29, 0x36, {0x87, 0xa, '\x00', [@calipso={0x7, 0x48, {0x1, 0x10, 0x80, 0x200, [0x8, 0x3, 0x6, 0x10001, 0x2, 0x7e000000000000, 0x400, 0x0]}}, @jumbo={0xc2, 0x4, 0x3c23}]}}}, @dstopts_2292={{0x20, 0x29, 0x4, {0x3b, 0x0, '\x00', [@enc_lim={0x4, 0x1, 0x4}]}}}, @pktinfo={{0x24, 0x29, 0x32, {@local}}}], 0x130}}, {{&(0x7f0000001f00)={0xa, 0x4e24, 0xfffffffe, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x2}, 0x1c, &(0x7f0000001f80)=[{&(0x7f0000001f40)="528470736b0c8b3c2014a07c29957e68ece3648843b4f67bc7282c79d76b1097aa77ae73", 0x24}], 0x1, &(0x7f0000001fc0)=[@pktinfo={{0x24, 0x29, 0x32, {@dev={0xfe, 0x80, '\x00', 0xf}}}}, @rthdr_2292={{0x38, 0x29, 0x39, {0x32, 0x4, 0x1, 0x7, 0x0, [@local, @private0={0xfc, 0x0, '\x00', 0x1}]}}}, @dstopts_2292={{0x120, 0x29, 0x4, {0x2e, 0x20, '\x00', [@generic={0x9, 0xf4, "0e4c65f4423163c34478aee8e300e1a9d07d4b1cb13aaa32b25301cfec634152a232c6c89600b6eb17d381a34806855c4c177044ce00a1bda02f84443e47935be7bc329a723965ac183519a07e9f0d74691afdba39629911f36c5b46cb6e0eef80f58584f17cfa23b14d5afdca86bc701782d857b82ec664f48a2b230327867d014449c3f01281d677fd0bed80fce166fa0915652bca01607c9d918b85530e650742e399fb50e8eb8e15901c110f2ad28d855a734d81a8b296e4af11e2fb6a3366c7744fd08cd3501dc650b1355a7f9b58f9e713c14583fe7785be4a09300b917e461141da36a97b8ce47260a49298c893e08c99"}, @generic={0x0, 0x9, "85674326c1f467e832"}]}}}, @hopopts={{0x30, 0x29, 0x36, {0x2f, 0x2, '\x00', [@hao={0xc9, 0x10, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, @enc_lim={0x4, 0x1, 0xfc}]}}}], 0x1b0}}, {{&(0x7f00000021c0)={0xa, 0x4e24, 0x5, @private0={0xfc, 0x0, '\x00', 0x1}, 0x10001}, 0x1c, &(0x7f0000002500)=[{&(0x7f0000002200)="24e9ceb7e574f9d9341b22be03ff2972717a4c1f546b04a1f9762da6f90f71df85e27404e76f05c06012c7fdc29acee78f88801ab6a06b9174e519ec465a740ddd8fa6cbd2e97c1b8ba9cff688306ea71b4a2e28bf27034abd095db42fd88008f231816d102713cdb095501dc6d5ec10", 0x70}, {&(0x7f0000002280)="2acedd0d01b811b88200175826cb818c1b8fd13589bf49a24fd5d3e75547abc3896b94e0", 0x24}, {&(0x7f00000022c0)="178cd931a9a9886f989692e8e1e3df405088903713c9f471e39149872a45ac0da8db90aac71a0d03cf9969dc6cbac5416a4b9d312b0aade16c851693643b1f78a4cdcc67f9165675ec19901c063fa03a590cdc83ceded5aa728b262a9df41221e9dc835e6566da8055af3a32774ed446d85aca02f6809a7fd39d3658a8c144c458effbdd1fb4c1799df5ea3e45f8af45dc22e82b733524fd905de7e850af91dd5ee4affd450199e289500619e1bd33a6ace18246105f25b0104914d86ed968a21914c489d2", 0xc5}, {&(0x7f00000023c0)="ce736606bb5e32793cf726683e2c21274a22ebaf358737ca930b57286efe0484266bf53decfd81ad973c737c117bd718db89e5158da6a14222fa0704994c4ad1d7e68d921a5ee1670fdb7d", 0x4b}, {&(0x7f0000002440)="21857a85178ec947dee956b6b35b38734592026e179c958f4ceff142d7e192b2a92394ecab79073f484a9bdd981ed9dea191917d6711fd98a2e7ecf39d583b49331dc69e4eeb9ca19799216ccd2107cc555a69bd9556362f7358322bb7b907e0f3bff3b654cccb3fe2b4d272db5d0164b27f0f15a7bbbfece706b8c0d72e926e", 0x80}, {&(0x7f00000024c0)="7cfc39abc5573e7efeb9dfb0bd917e2d539e", 0x12}], 0x6, &(0x7f0000002580)=[@rthdr={{0x48, 0x29, 0x39, {0x3a, 0x6, 0x0, 0x7, 0x0, [@ipv4={'\x00', '\xff\xff', @remote}, @mcast2, @remote]}}}, @dstopts_2292={{0x48, 0x29, 0x4, {0x2e, 0x5, '\x00', [@calipso={0x7, 0x20, {0x2, 0x6, 0x1, 0x6, [0x9, 0x0, 0x9]}}, @ra={0x5, 0x2, 0x3}, @pad1, @pad1]}}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x6}}, @flowinfo={{0x14, 0x29, 0xb, 0x3}}], 0xc0}}], 0x5, 0x28800) sendmmsg$inet6(r3, &(0x7f0000003e00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000500)={0xa, 0x4e21, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000001740)=ANY=[@ANYBLOB="140000000000000029000000430000768f000000000000"], 0x18}}], 0x2, 0x0) bind$inet6(r2, &(0x7f0000002780)={0xa, 0x4e23, 0x9, @dev={0xfe, 0x80, '\x00', 0x1a}, 0x7fffffff}, 0x1c) mq_open(&(0x7f0000000340)='g&[)^\x00', 0x800, 0xa, &(0x7f0000000380)={0x7, 0x0, 0x5, 0x101}) ioctl$AUTOFS_IOC_ASKUMOUNT(r3, 0x80049370, &(0x7f0000000300)) 08:38:01 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f0000000080)={{0x2, 0x3, 0x8, 0x3, 0x1}, 0x9, 0x8, 0x480000}) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) timerfd_gettime(r0, &(0x7f0000001180)) sendmmsg$inet6(r1, &(0x7f0000003e00), 0x0, 0x0) r2 = signalfd4(r1, &(0x7f00000011c0)={[0xf3f7]}, 0x8, 0x0) ioctl$BLKTRACESTART(r2, 0x1274, 0x0) ioctl$FS_IOC_GETFLAGS(r1, 0x80086601, &(0x7f0000001140)) ioctl$FIOCLEX(r1, 0x5451) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f00000013c0)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) bind$inet6(r3, &(0x7f0000001400)={0xa, 0x716, 0x4, @loopback, 0x95}, 0x1c) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000140)=""/4093, 0x1003}], 0x66) 08:38:02 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/dev_mcast\x00') pread64(r0, &(0x7f00000014c0)=""/4096, 0x1000, 0x6) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000003e00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000500)={0xa, 0x4e21, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000001740)=[@tclass={{0x14, 0x29, 0x43, 0x8f76}}], 0x18}}], 0x2, 0x0) ioctl$BTRFS_IOC_SCRUB_CANCEL(r1, 0x941c, 0x0) readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) 08:38:02 executing program 4: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x80, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x80}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:38:18 executing program 5: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:38:18 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) r1 = socket$packet(0x11, 0x2, 0x300) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) sendmmsg$inet6(r2, &(0x7f0000003e00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000500)={0xa, 0x4e21, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000001740)=[@tclass={{0x14, 0x29, 0x43, 0x8f76}}], 0x18}}], 0x2, 0x0) ioctl$FICLONE(r1, 0x40049409, r2) 08:38:18 executing program 4: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x80, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x80}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:38:18 executing program 7: r0 = socket$netlink(0x10, 0x3, 0xb) close(r0) ioctl$HIDIOCSFEATURE(0xffffffffffffffff, 0xc0404806, &(0x7f0000000000)="c9a2afe4466046673fa7d73be591f247d2ba737d") r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) 08:38:18 executing program 1: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:38:18 executing program 6: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:38:18 executing program 0: r0 = getpid() capget(&(0x7f00000000c0)={0x20071026, r0}, &(0x7f0000000100)) r1 = syz_open_procfs(r0, &(0x7f0000000040)='net/tcp6\x00') readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) 08:38:18 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_tables_names\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000003e00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000500)={0xa, 0x4e21, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000001740)=[@tclass={{0x14, 0x29, 0x43, 0x8f76}}], 0x18}}], 0x2, 0x0) ioctl$BTRFS_IOC_FS_INFO(r1, 0x8400941f, &(0x7f00000014c0)) 08:38:18 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r1, 0x800) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x0, 0xee00}}, './file1\x00'}) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r0) write$cgroup_netprio_ifpriomap(r1, &(0x7f00000003c0)={'bond_slave_1'}, 0xf) r3 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r3, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendfile(r3, r1, 0x0, 0x8000) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xa, 0x12, r1, 0x0) syz_io_uring_submit(r4, 0x0, 0x0, 0x0) syz_io_uring_setup(0x3167, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000340)=0x0) r7 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r8 = dup2(r7, r7) syz_io_uring_submit(r5, r6, &(0x7f0000000300)=@IORING_OP_ACCEPT={0xd, 0x0, 0x0, r8, 0x0}, 0x0) syz_io_uring_submit(r4, r6, &(0x7f0000000080)=@IORING_OP_READ=@pass_buffer={0x16, 0x1, 0x0, @fd_index=0x9, 0xc491, &(0x7f0000000040)=""/20, 0x14, 0x1}, 0x96) 08:38:18 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) 08:38:18 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_tables_targets\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) 08:38:18 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r2, 0x800) write$cgroup_netprio_ifpriomap(r2, &(0x7f00000003c0)={'bond_slave_1', 0x32, 0x38}, 0xf) r3 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r3, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendfile(r3, r2, 0x0, 0x8000) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xa, 0x12, r2, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r4, 0x800) write$cgroup_netprio_ifpriomap(r4, &(0x7f0000000140)={'bond_slave_1'}, 0xf) r5 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r5, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendfile(r5, r4, 0x0, 0x8000) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xa, 0x12, r4, 0x0) bind$inet(r4, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1d}}, 0x10) setsockopt$WPAN_SECURITY_LEVEL(r2, 0x0, 0x2, &(0x7f0000000000)=0x2, 0x4) pread64(r1, &(0x7f0000000080)=""/113, 0x71, 0x6d) 08:38:18 executing program 6: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x74, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x74}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:38:18 executing program 7: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) 08:38:18 executing program 4: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:38:18 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r1, 0x800) write$cgroup_netprio_ifpriomap(r1, &(0x7f00000003c0)={'bond_slave_1'}, 0xf) r2 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendfile(r2, r1, 0x0, 0x8000) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xa, 0x12, r1, 0x0) write$cgroup_devices(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="61202a3a2abd746d00"], 0x9) readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) 08:38:19 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000003e00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000500)={0xa, 0x4e21, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000001740)=[@tclass={{0x14, 0x29, 0x43, 0x8f76}}], 0x18}}], 0x2, 0x0) ioctl$INCFS_IOC_GET_FILLED_BLOCKS(r1, 0x80286722, &(0x7f0000000000)={&(0x7f0000000080)=""/174, 0xae, 0x0, 0x80000000}) readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) 08:38:19 executing program 5: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:38:19 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) r1 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$GIO_FONT(r1, 0x4b60, &(0x7f0000000080)=""/181) 08:38:19 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f00000004c0)=""/4089, 0xff9}, {&(0x7f0000000080)=""/181, 0xb5}], 0x2) 08:38:35 executing program 5: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:38:35 executing program 6: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x74, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x74}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:38:35 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/rfkill', 0x8202, 0x0) fsetxattr$security_ima(r0, &(0x7f0000000080), &(0x7f00000000c0)=@sha1={0x1, "c2f988c42ecaa3d3ffed3ebf8f38f3572abf1eb0"}, 0x15, 0x2) readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) 08:38:35 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') preadv(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/232, 0xe8}, {&(0x7f0000000180)=""/104, 0x68}, {&(0x7f0000000000)=""/24, 0x18}, {&(0x7f0000000200)=""/115, 0x73}], 0x4, 0x9, 0x1) readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) 08:38:35 executing program 4: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:38:35 executing program 7: ioctl$INCFS_IOC_FILL_BLOCKS(0xffffffffffffffff, 0x80106720, &(0x7f0000000200)={0x2, &(0x7f0000000000)=[{0xffff, 0xd7, &(0x7f0000000080)="397010eb18e3d417cc1ed187785e988dba657d48b5cd8d0b444c624746ff9baf13610b0f3f82a7c7ffba5deb782a832715fcf15bdf0826d97e7a491797f0f41ce31bc86cb7d6f4da19b2b5c576e6ae22e304847a68b8fc6b378e0a9a14e345901b6ef3afe61a6603f686b1b9cbe691394337980dcb2b41b4f67e125a174b5df500ad9ff09e5839b2cddfbe851ad56ac34da0be94166b8e0fe982f923e8f1ff99e651149b7b0906ab662c2e2a2ef22f516019888dcd2c586b6d4c72277f3af8f39af286910c1ad8de3a9994646306da489aaa2c8f64fad7", 0x0, 0x1}, {0x7fffffff, 0x49, &(0x7f0000000180)="588b2258713c70e2654b45fa17e65f503c5a02ccb8cf1376e227eb50e006921ab62871e428f565c9e14a2cd4cc1a8f38c8f196658d5d554af4e20ca964756ffb45f965f071cf100bc9", 0x1}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) 08:38:35 executing program 1: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x0, {}, [@SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:38:35 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f00000004c0)=[{&(0x7f0000000080)=""/177, 0xb1}, {&(0x7f0000000540)=""/227, 0xe3}, {&(0x7f0000000240)=""/101, 0x65}, {&(0x7f0000000140)=""/14, 0xe}, {&(0x7f00000002c0)=""/203, 0xcb}, {&(0x7f00000003c0)=""/206, 0xce}], 0x6) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000000)={{r0}, 0x8001, 0x8, 0xf23a}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r1, 0x800) write$cgroup_netprio_ifpriomap(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB='\x00'/15], 0xf) r2 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendfile(r2, r1, 0x0, 0x8000) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xa, 0x12, r1, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(r1, 0xa, 0x0, 0x0) [ 2426.743941] audit: type=1400 audit(1669106315.542:35): avc: denied { setattr } for pid=11401 comm="syz-executor.2" name="mountinfo" dev="proc" ino=42441 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=file permissive=1 08:38:35 executing program 2: sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000300)={0x1b8, 0x0, 0x300, 0x70bd2d, 0x25dfdbfe, {}, [@TIPC_NLA_NET={0x34, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x4}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x8b4}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x7}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x57f2}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x18f60}]}, @TIPC_NLA_BEARER={0x128, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x1, @remote, 0x80000001}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x5ee, @local}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x200}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0xffffffb4, @private1={0xfc, 0x1, '\x00', 0x1}, 0x62}}, {0x14, 0x2, @in={0x2, 0x4e21, @rand_addr=0x64010101}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'syz_tun\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x1ff, @local, 0x3}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0xfffffffb, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x1}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1400}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x4}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x20}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7ff}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3}, @TIPC_NLA_BEARER_DOMAIN={0x8}]}, @TIPC_NLA_LINK={0x48, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x200}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xfffffffffffffd39, 0x1, 'syz1\x00'}]}]}, 0x1b8}, 0x1, 0x0, 0x0, 0x4000000}, 0x20004010) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) 08:38:35 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x103200, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000003e00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000500)={0xa, 0x4e21, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000001740)=[@tclass={{0x14, 0x29, 0x43, 0x8f76}}], 0x18}}], 0x2, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) sendmmsg$inet6(r2, &(0x7f0000003e00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000500)={0xa, 0x4e21, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000001740)=[@tclass={{0x14, 0x29, 0x43, 0x8f76}}], 0x18}}], 0x2, 0x0) dup2(r1, r2) readv(r0, &(0x7f00000001c0), 0x0) 08:38:35 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') r1 = openat$cgroup_subtree(r0, &(0x7f0000000000), 0x2, 0x0) dup2(r1, r0) readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) 08:38:35 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r1, 0x800) write$cgroup_netprio_ifpriomap(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="000000000000000000124c18c60000"], 0xf) r2 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendfile(r2, r1, 0x0, 0x8000) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xa, 0x12, r1, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0xb, &(0x7f0000000080)=""/84, &(0x7f0000000000)=0x54) 08:38:35 executing program 4: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:38:35 executing program 1: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:38:35 executing program 6: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x74, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x74}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:38:35 executing program 5: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:38:35 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') r1 = openat$incfs(r0, &(0x7f0000000100)='.log\x00', 0x9408bc93ad15b906, 0x1df) ioctl$KDSKBSENT(r1, 0x4b49, &(0x7f00000014c0)={0x2, "fc7ccb83c8231c6ed2c86f617b118257f9c12492952a29caa09555251993726ae29730ec81ee698e8f1a92bbd0f9ff21719936d76bf1d1637ca69d34c5ac68e552363e120894b5ce0e9cc03c0cd745425cc278686904020a9485554520fd2caf94fcb5d94788ac442281e3109ecf41af73eefe4fd764a98ad01cbe54bd9d32890040e4a97769eb8a0d0f43569aaaa870cd174c7b7d41d2bb46525ff7ef1c3bda6e701e03246eceaf99b0119e481c2de9f346f0f4c78c675191f77d0174546cb57bd6dedfbeea5b44740622f89706f930f515db5b090d6db7e684164cdc640704b30e6066653dbbd592cda97c2231879bfb5eb38401292fc363abdd3b11b2931c1b0d8c77b130bdd9e954f7e7ca0fdbf3153cab19a277ff2f4c58b0cf1b6ce5967017cd1eff2c24aea2db83c4d1cd618b5e3dc2df2f6f61d175b1cb6d7d4c500839feafd6cacf7d6225e4f74c9530442182174facd5201fafe4b7bb12ec4ee93cc14f624a2acb8144d8ba7e866a657245619099f13edb1092efba9bb63ad6d50f42e84625c42e39b5004c07c27271ca05c249ff541ec8527a7849b56cb103181607c806e5c89f59533a8d00be47f52c56222f8bad3c444ae147c0d23e6310ee5776b0201ea46a1f5a4df60fe405dba6700fa3703cedd66cf57efefec584a61e94fc27d2015300c16b7547765aceaef8e7da2c94c15e3e36c9f17d018cc10939cf"}) readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) sendmmsg$inet6(r2, &(0x7f0000003e00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000500)={0xa, 0x4e21, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000001740)=[@tclass={{0x14, 0x29, 0x43, 0x8f76}}], 0x18}}], 0x2, 0x0) read(r2, &(0x7f0000000080)=""/87, 0x57) 08:38:35 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r1, 0x800) write$cgroup_netprio_ifpriomap(r1, &(0x7f00000003c0)={'bond_slave_1'}, 0xf) r2 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r2, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendfile(r2, r1, 0x0, 0x8000) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xa, 0x12, r1, 0x0) ioctl$CDROMREADALL(r1, 0x5318, &(0x7f0000001700)) readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f00000014c0)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) sendmsg$SMC_PNETID_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="60000000479129", @ANYRES16=0x0, @ANYBLOB="00012abd7000703cd792557a8ac00900030073797a3100000000140002007465616d5f736c6076655f31000000000900030073797a310000000005000400410000001000030073797a31000000000900030073797a3200000000"], 0x60}, 0x1, 0x0, 0x0, 0x4800}, 0x20000011) 08:38:35 executing program 3: getsockopt$bt_l2cap_L2CAP_LM(0xffffffffffffffff, 0x6, 0x3, &(0x7f0000000000), &(0x7f0000000100)=0x4) r0 = getpid() r1 = getpid() capget(&(0x7f00000000c0)={0x20071026, r1}, &(0x7f0000000100)) capget(&(0x7f00000000c0)={0x20071026, r1}, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2}) r2 = syz_open_procfs(r0, &(0x7f0000000040)='auxv\x00') r3 = syz_open_dev$char_usb(0xc, 0xb4, 0x800) readv(r3, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) openat(r2, &(0x7f00000000c0)='./file0\x00', 0x4480, 0x84) 08:38:52 executing program 0: r0 = getpid() capget(&(0x7f00000000c0)={0x20071026, r0}, &(0x7f0000000100)) r1 = syz_open_procfs(r0, &(0x7f0000000000)='net/netlink\x00') readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) capget(&(0x7f0000000040)={0x20071026, r0}, &(0x7f0000000080)={0x20, 0x200, 0x4, 0xc61, 0x400, 0xfff}) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r2, &(0x7f0000000000)={0xa, 0xce20, 0x0, @ipv4={'\x00', '\xff\xff', @private=0xa014101}}, 0x1c) sendmmsg$inet6(r2, &(0x7f0000003e00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000500)={0xa, 0x4e21, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000140)=[@pktinfo={{0x24, 0x29, 0x32, {@private1}}}], 0x28}}], 0x2, 0x0) ftruncate(r2, 0x340000000) 08:38:52 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000480), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f00000014c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_GET_SCAN(r0, &(0x7f0000001580)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001540)={&(0x7f0000001500)={0x28, r1, 0x800, 0x70bd25, 0x25dfdbff, {{}, {@val={0x8, 0x3, r2}, @val={0xc, 0x99, {0x8, 0xe}}}}, ["", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x4800}, 0x40000) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)={0x34, r3, 0x5, 0x0, 0x0, {{0x2}, {@val={0x8, 0x3, r4}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_WIPHY_CHANNEL_TYPE={0x8}, @NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x96c}]]}, 0x34}}, 0x0) sendmsg$NL80211_CMD_DEL_PMK(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000600c}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x2c, r3, 0x4, 0x70bd2b, 0x25dfdbfb, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20004800) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r6, 0x800) write$cgroup_netprio_ifpriomap(r6, &(0x7f00000003c0)=ANY=[@ANYBLOB='bond_s\x00\x00ve_12\x00\x00'], 0xf) r7 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r7, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendfile(r7, r6, 0x0, 0x8000) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xa, 0x12, r6, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001680)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x5, 0x0, 0xfffff001, 0x1, &(0x7f00000015c0)="a85cf1932e300eda5424e88f56c4c5d58d2dc2497c32ed134924d5ee40efe28a480beba0b87f4a05dec51504d7d04c11b6b5e1f0d22a9826a4761946861f6737f7677fd987ee4d73dc18f6a13686c1b715f06b83b799d3e88b34d87aac4832ff8d4e705939d78871938076b5fb5495610b7e1cd86ba8a8ce0484ad08da63452a8d795f8bc888ef6a46eab823b8dda83f6aeb4b4892ae96325113ff02bddb71237b917d6cebe98471", 0x7, 0x0, 0x0, {0x1}}, 0xaba9) sendmsg$NL80211_CMD_SET_INTERFACE(r6, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000380)={0x20, r3, 0x20, 0x70bd29, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x7f33, 0x1f}}}}}, 0x20}}, 0x4000804) readv(r5, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) sendmsg$AUDIT_GET_FEATURE(r5, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80100404}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x10, 0x3fb, 0x2, 0x70bd2b, 0x25dfdbfb}, 0x10}}, 0x800) 08:38:52 executing program 7: openat$incfs(0xffffffffffffffff, &(0x7f0000000240)='.log\x00', 0x100, 0x181) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') preadv2(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)=""/129, 0x81}, {&(0x7f0000000140)=""/96, 0x60}, {&(0x7f00000002c0)=""/212, 0xd4}, {&(0x7f0000000000)=""/34, 0x22}, {&(0x7f00000014c0)=""/4096, 0x1000}], 0x5, 0x8, 0x0, 0x16) readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) 08:38:52 executing program 5: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:38:52 executing program 4: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:38:52 executing program 6: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x80, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x80}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:38:52 executing program 1: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x74, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x74}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:38:52 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280), 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000003e00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000500)={0xa, 0x4e21, 0x0, @private2={0xfc, 0x2, '\x00', 0x1}}, 0x1c, 0x0, 0x0, &(0x7f0000001740)=[@tclass={{0x14, 0x29, 0x43, 0x8f76}}], 0x18}}], 0x2, 0x8831) write(r1, &(0x7f0000000080)="9272d0b56b382bef82c5e6b8ff1359666db8d1ee7d55434cd92789bbf3e5318364657e570d49f99f1204197de29da4890dbf953d0e0d01e3ee729d3dff7c0d4d780247b6c9d6469be08a00c52b555b24116e50e90adbe3a3b1109a5d835897f300c88d3f12b6c0e132d0e134ff34a7d41b7b977bf58e4016b7b61558b0e6a8fbe073f7e94ea5ed0d3076eec99566acbf6201d8088dd60ff9eb23e2ce068b4bd22dc4ca603e46", 0xa6) 08:38:52 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000004c00)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000080)="7a47d8a925240678253a35c096859aa3f852fd4d576f8162b3801ac858d557f6db38a67602cdeae013c4a1fdffd36c69f4e0aa83259f196bdd81b0dd1ae99a50e86f75f0f9fcb752da5c4e92630b67a8c2c87f47ed9983c06a94e0d9cfddcf5fae6b01fe8050adae747b58ef97bc17d033b2aaae8d01ddbfc994bc9866c6ddd52b3947809c667e84b86ad1a0e4f54c4a2d1183ef09357e822eccacfa9ed654", 0x9f}, {&(0x7f00000014c0)="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", 0x1000}], 0x2, &(0x7f0000000180)=[@rthdrdstopts={{0x58, 0x29, 0x37, {0x21, 0x7, '\x00', [@pad1, @ra={0x5, 0x2, 0x7ada}, @calipso={0x7, 0x30, {0x0, 0xa, 0x9, 0x5, [0x3f, 0x8, 0x4, 0x4, 0x7]}}]}}}], 0x58}}, {{&(0x7f0000000200)={0xa, 0x4e24, 0x0, @empty, 0x80000001}, 0x1c, &(0x7f00000025c0)=[{&(0x7f00000002c0)="e735d2155d27590107125fda340de388dbc8de8f93c76df186a319e060d5164a4a691bf58314665d2725fdcd2efb704435c94dab071aa9c2978e2281fcda7b29ccc0cf4c706f77aa3ebf", 0x4a}, {&(0x7f0000000340)="b1362bf890eb003bf95514f307368bdf3df949f004d21fde42791e9b24044cd2f51bebcdc8ff4b7177265c18c5df7a202a52a7fcce9d371c89b0d847fd60d05594ef37e4806ba39deab6f2c172007e6873038b3dbfdf92fae276d38da50430aaab41794ccc5204b69f69c5b3c88050a443bc185708fbfd631b072570a368474c7bc42c206ffa76065a733046adb037d9296dd720e38ba93f7a043f6c6a3ee61948e2b4440de1930391ffc36326f37559887c57c695a3ef688f62bdb303", 0xbd}, {&(0x7f0000000240)="83642f4c0fd0537a9143251dd2a6b61978747107c618544117e4c70d7f50de84", 0x20}, {&(0x7f0000000400)="da3650975f4780a5912cc93a58de553f51af5e2dafe603e88983ae0bebad8287703618a84cbda21661619221288abe2fdb23c5fd5fb9cfb7b56896359ebadb708918f4922925c8cbc30de9bd3febad4e788f841941a29e4c0589a6dc56d4a16c37dae50a33ac5f7a11dceadd9ab243dc06075e73d5e01c9cbea0", 0x7a}, {&(0x7f00000024c0)="78c7ad742ad5c9166d6b13db962ce13a04ad01e388dee101a5635f81da5e4bdf717a4eb7fce0d43edd805195300bce1fbee1ab94bd2ccdf53e145cb72e7c716544d94ba3c96164c3eb1f01653f6c35c43ee4ba1d6c7064f1cb4288260894dc8c3cc9150a45af5c248c602db351faa62d81e9c535870974983aaf397506299cd7d6b6b238bd76fd192e3dd47d56e4e3f74ad4a64c8537ac8e71c3c13ef27020d988a416d219dfe99d0948697d437d32d961f769bd434c75cfa6bfa929c03cc72f0c1399f7bab259c4cdaa565acf49f60ab40526d9a40e78a79083eff0c0da17b8af2fe317c53a8b34ea6435db280aa2b6d1fe6e2c0726", 0xf6}], 0x5}}, {{&(0x7f0000000480)={0xa, 0x4e22, 0x1720, @local, 0xfffffff9}, 0x1c, &(0x7f0000003840)=[{&(0x7f0000002640)="b14749b30b8f8b0637dfe3fed756f07ac9e3d3505927027c2561557e753219771c5434fc5eeeb6c84ef50061630ef5c52b0060cab8ac30d6cfb8ace4e568cf170b835c5c4639beaca7696f17e105b83187707126035a90f551a75939204855201e064313782bb2d0d11c984721f1ad0a342ffd10ce0b6bf5e6263e03c544add796c367b6771d6daa3fbb3cfe2cd9ff19b42e193a3e8d3526e83267c9a955e06bab7609487900c7fb6cecd79eb53d9144798d97c70713cbdc", 0xb8}, {&(0x7f0000002700)="5640a37d1a60100ff471a995b8d5abaecd8a3d2edf5c293c6ebf2735151cbafa33f60eee809276f3e97237d3eeb88a33f64f39596ea545af72121cc1b8ffcd4dbf324effba6033ef67523ce2aa783a29cbcdc2604cd1a5d973d9d45a4e14219d22e985a4680a4efd15f2f8740805cb3dab53179f515102", 0x77}, {&(0x7f0000004cc0)="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", 0x100e}, {&(0x7f0000003780)="a4473ba5e22289a3f193e600fb01a335ebb4ef6e2f1f0fa75e74edd95192e82859d30167f6fc9230a7b981775d435af4e18ee3644fd8352b8719d5d76c29dd1cb9fab18742659819da9f957f6511e32922b1ed625be96d1bd30a03ede934a681de745f5ce44ff287f83b25d5724e29873b2721cc5b3216813dd741ad07ad7aceb8bbdee8f2792d94cbcffb399314f8f8e818f149ded5e1", 0x97}], 0x4, &(0x7f0000003880)=[@rthdr={{0x68, 0x29, 0x39, {0xc, 0xa, 0x2, 0x3f, 0x0, [@mcast2, @private2={0xfc, 0x2, '\x00', 0x1}, @mcast2, @private2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}]}}}, @pktinfo={{0x24, 0x29, 0x32, {@mcast2}}}, @dstopts_2292={{0x40, 0x29, 0x4, {0x3b, 0x4, '\x00', [@hao={0xc9, 0x10, @rand_addr=' \x01\x00'}, @padn={0x1, 0x2, [0x0, 0x0]}, @ra={0x5, 0x2, 0x1000}, @enc_lim={0x4, 0x1, 0x2}, @enc_lim={0x4, 0x1, 0x40}, @jumbo={0xc2, 0x4, 0x7fff}]}}}, @hopopts={{0x108, 0x29, 0x36, {0x3a, 0x1d, '\x00', [@pad1, @calipso={0x7, 0x50, {0x0, 0x12, 0x40, 0x3ff, [0x100000000, 0x5, 0x7fffffff, 0x97, 0x3ff, 0x3, 0x80000000, 0x847, 0xdd]}}, @calipso={0x7, 0x10, {0x3, 0x2, 0x80, 0x0, [0xc4d1]}}, @calipso={0x7, 0x28, {0x1, 0x8, 0x20, 0x101, [0x0, 0xffffffffffff0000, 0xffffffff, 0x8]}}, @enc_lim={0x4, 0x1, 0x4}, @padn={0x1, 0x1, [0x0]}, @calipso={0x7, 0x50, {0x2, 0x12, 0x7, 0x3, [0x0, 0x80000000, 0x4, 0x5, 0x4, 0x2c2, 0x4, 0x8, 0x4]}}]}}}, @rthdr_2292={{0xa8, 0x29, 0x39, {0xb6, 0x12, 0x2, 0x40, 0x0, [@empty, @remote, @mcast1, @local, @private2={0xfc, 0x2, '\x00', 0x1}, @dev={0xfe, 0x80, '\x00', 0x30}, @empty, @ipv4={'\x00', '\xff\xff', @multicast2}, @empty]}}}, @rthdr_2292={{0x48, 0x29, 0x39, {0x9d1c3ec0be714711, 0x6, 0x2, 0x4, 0x0, [@private0, @empty, @empty]}}}, @hopopts={{0x1080, 0x29, 0x36, {0x3f, 0x20c, '\x00', [@padn={0x1, 0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @padn={0x1, 0x9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @jumbo={0xc2, 0x4, 0xc4}, @padn={0x1, 0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @calipso={0x7, 0x10, {0x3, 0x2, 0x9, 0x5, [0x5]}}, @enc_lim={0x4, 0x1, 0x3}, @ra={0x5, 0x2, 0x4}, @generic={0x80, 0x1000, "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"}, @calipso={0x7, 0x28, {0x0, 0x8, 0x3c, 0x3, [0x4, 0x4, 0x2, 0xfffffffffffffffd]}}]}}}], 0x1348}}], 0x3, 0x0) pread64(r1, &(0x7f0000000000), 0x0, 0x10000) readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) 08:38:52 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) ioctl$FITHAW(r0, 0xc0045878) setsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, &(0x7f0000000000), 0x2) 08:38:52 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000080)='./file0\x00', 0x1f, 0x9, &(0x7f00000024c0)=[{&(0x7f00000000c0)="246fa6e2fde5e1f875539522d92de09819ddcf55dc917c1be0a76a9fad81756bb03af746a979bfb2169691b55b9d80cc6eda561c3b015b", 0x37, 0x7}, {&(0x7f0000000100)="86c244f74674d87f3170e9cba9eed88fd320bb74a5c153d808d336e8896c622bd1700da5bf62467500f8834ef4ef770b4bcc823764a7b1f34d", 0x39, 0xae7a}, {&(0x7f0000000140)="17ebab48a2504326bb08bdd43e657609896658f92fb8302ceed079021b49a9eef22d151189982b4e2f0a512791", 0x2d, 0x3}, {&(0x7f0000000180)="3c1f4b5c7849f2dc1a024b7c4d5acc75f85ee43f3f3dd99d0266fc126b0406b82826de4e6f508b70b20e03e7ceba0fa840bea700bd5a4aecfa03db6caa998f4eb2dfd044154a124554efa637891a7c49683d8fcf21db4a292334a3090516fa", 0x5f, 0x80000001}, {&(0x7f0000000200)="f2b1657b682e929f71ac8a4179df5178eef2b801433145584f8a8193f8b69a52ea16fdb2fcd9338bad302708837b19d24c73102d3307c33bca5b3c6b0f82a857153d852eb90651edc946af467a7826fee20b46e2b5024b8c9ac426bd", 0x5c, 0x9}, {&(0x7f00000002c0)="4c3d27f0b0476bb1f753d9c3ba2d069c88431eb3b22d6aef9c79f596be93865ba360ac95e4a66bfd7a0d35904b417e5a984669de36302d024aa97c01600c", 0x3e, 0x80}, {&(0x7f00000014c0)="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", 0x1000, 0x8}, {&(0x7f0000000300)="790efcdfde2367fc6f47d520ba05e810acef12c1f9efccdd249bdc4486af598e99081eaa6ae1fa739b5ba183f2ef94dcde5b396691f5da7c46a21a465b66e97534985b4760edeae02ad5c89b82e5bcadb351f39e4eb494cd578b6bcc5a2544c834d6f48e02ce4c9c1e91722201a9650e00e2fb04c29fc2af21d58b2fa830901dd5f0a69f6ea59ebfd78a8957a5f9baf659941327a896e666983dd219622eac5f87f4e4f265cbbd93732431b44ff8c4945e8f783b333f8c07ffe3e467a533d2c8dab78474ef77cbc7c46a4e6f55d6e525ccbf2ea6587f8ebb099cc73bcc7f4bb0ac08973c3aaa7dd61a94620863e21e51a729138b92db62c98e", 0xf9, 0x3}, {&(0x7f0000000400)="b535cd79991caeef0fc2e2b9dd6ee05f246db9d8dce751da6809c5be400019b5fc2631d0d7815302b0f20d6b8927946f832227d8392181ba0b229c279215633dc59f606040d41192c2779a5f13eedfa7d1ef9da3e68fa6b09925e41c99389f2a945a029753cc1dc34cb7113544a348ac59260ce75dc876dbb6fc23232c4baebadec2465a532d2e073027da82a5366cc9", 0x90, 0x4}], 0x0, &(0x7f00000025c0)={[{@orlov}, {@data_ordered}, {@journal_path={'journal_path', 0x3d, './file0'}}], [{@fsuuid={'fsuuid', 0x3d, {[0x31, 0x37, 0xc6ba8cba6ef0957d, 0x37, 0x66, 0x64, 0x64, 0x64], 0x2d, [0x63, 0x38, 0x63, 0x62], 0x2d, [0x32, 0x33, 0x32, 0x62], 0x2d, [0x38, 0x66, 0x34, 0x66], 0x2d, [0x30, 0x34, 0x63, 0x35, 0x39, 0x37, 0x61, 0x30]}}}, {@measure}, {@fowner_gt={'fowner>', 0xee01}}, {@dont_appraise}]}) r2 = getpid() capget(&(0x7f00000000c0)={0x20071026, r2}, &(0x7f0000000100)) fcntl$lock(r1, 0x25, &(0x7f0000002680)={0x0, 0x1, 0xfffffffffffffffe, 0x8, r2}) ioctl$KDADDIO(r0, 0x4b34, 0x9) readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) 08:38:52 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000), 0x149100, 0x0) readv(r1, &(0x7f00000024c0)=[{&(0x7f00000002c0)=""/4096, 0x1000}, {&(0x7f0000000080)=""/169, 0xa9}, {&(0x7f0000000140)=""/133, 0x85}, {&(0x7f00000012c0)=""/216, 0xd8}, {&(0x7f00000013c0)=""/224, 0xe0}, {&(0x7f0000000200)=""/59, 0x3b}], 0x6) ioctl$FIOCLEX(0xffffffffffffffff, 0x5451) readv(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000014c0)=""/4088, 0xfffffe7b}], 0x1) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r0) [ 2443.801534] EXT4-fs (loop7): VFS: Can't find ext4 filesystem 08:38:52 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) pwrite64(r0, &(0x7f0000000080)="3996021bf8a986aa12589dc0d805e2c89ed4743e81794357386c1326d482925ec3eace37a8157fa4ecb486dba858039543a43c2ac0a53553de1c869ea3c7547336b3661b5fabba7ceae94e2a7e3ccb75bb190f0fa7a0c45f8c2af3bfd67fb6fce4b3c72157ae67c62411c2a6f5618e8ff232875972230f0301b57ca8ddf54d43eebc40bc1695948fbbf4063ff343d38d76ae940787fb99d334651c0f7a2cf917e0feb1ec0dc2f8670a7cc0c291714c451c40dd7703333362403da74214ec97dab4989b9298aae1d877b528d6682b19eb0472f4f9528a", 0xd6, 0x53) 08:38:52 executing program 0: ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000000)=""/38) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000080)={0x3f, {{0xa, 0x4e24, 0xfff, @private1, 0x80}}}, 0x88) readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) sendmsg$NL80211_CMD_DEL_MPATH(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x20, 0x0, 0x100, 0x70bd2c, 0x25dfdbfe, {{}, {@void, @val={0xc, 0x99, {0x20, 0x25}}}}}, 0x20}, 0x1, 0x0, 0x0, 0x48805}, 0x20004014) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x78, &(0x7f0000000140)={0x1, {{0xa, 0x4e24, 0x5150, @dev={0xfe, 0x80, '\x00', 0x25}, 0x7}}, {{0xa, 0x4e21, 0x3, @private2={0xfc, 0x2, '\x00', 0x1}, 0x400000}}}, 0x108) 08:38:52 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000014c0)=""/4101, 0x1005}], 0x1) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) sendmmsg$inet6(r2, &(0x7f0000003e00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000500)={0xa, 0x4e21, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000001740)=[@tclass={{0x14, 0x29, 0x43, 0x8f76}}], 0x18}}], 0x2, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) setsockopt$packet_add_memb(r3, 0x107, 0x1, &(0x7f0000000000)={r5, 0x1, 0x7, @local}, 0x10) sendmmsg$inet6(r2, &(0x7f0000001300)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="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", 0xff}], 0x1, &(0x7f0000000580)=[@rthdr_2292={{0x38, 0x29, 0x39, {0x5, 0x4, 0x0, 0x0, 0x0, [@loopback, @private1]}}}, @hopopts={{0x50, 0x29, 0x36, {0x21, 0x6, '\x00', [@ra={0x5, 0x2, 0x3}, @ra={0x5, 0x2, 0x6}, @pad1, @hao={0xc9, 0x10, @dev={0xfe, 0x80, '\x00', 0x44}}, @hao={0xc9, 0x10, @private2}, @pad1]}}}, @hopopts_2292={{0x50, 0x29, 0x36, {0x2b, 0x6, '\x00', [@padn={0x1, 0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @hao={0xc9, 0x10, @private2={0xfc, 0x2, '\x00', 0x1}}, @padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}, @hao={0xc9, 0x10, @empty}]}}}, @rthdr_2292={{0x58, 0x29, 0x39, {0x88, 0x8, 0x0, 0x3f, 0x0, [@private0, @dev={0xfe, 0x80, '\x00', 0x2a}, @private2, @mcast2]}}}, @dstopts_2292={{0xc8, 0x29, 0x4, {0x1d, 0x15, '\x00', [@pad1, @hao={0xc9, 0x10, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @generic={0x0, 0x65, "c0099ba5cdb63361122a691c8c58efd089892c96840f259f0867ac38d85b1c8d42fa70c202ca5a1b213b27c26d43f7d98acb7ca24dc9605b69a627877c34123700c689d941f34bdc39a0d0223cd71e27b0ce533598a2849c60aac133bb1f2f342a1e62bae9"}, @pad1, @hao={0xc9, 0x10, @local}, @hao={0xc9, 0x10, @mcast2}, @jumbo={0xc2, 0x4, 0xffffffff}]}}}, @dstopts_2292={{0x118, 0x29, 0x4, {0x5e, 0x20, '\x00', [@padn={0x1, 0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @padn={0x1, 0x3, [0x0, 0x0, 0x0]}, @jumbo={0xc2, 0x4, 0xf11b}, @generic={0x80, 0xb1, "d1845d40ceb5268263ba8db046cf8de23198d1483356ef2f88701e26737464b24e28a3e912ffb626f2317d2bc6b2a8f181b095b0a259cfe83c3625e03227d66261c1e073de56f7a947a853d393faf4e0c11a28e68792358a8be7c684c1f8237ccb46eedbb36fbc654652f39acf6071255a899564f0950ce1de05a869184c6b03abe5e40a2c650453e6dcc5219e473313664d500df988c59fad5457c06a5ef75df3aa03398f595e46adc6ec7f055cd45ac8"}, @calipso={0x7, 0x38, {0x1, 0xc, 0x1, 0x35be, [0x0, 0x9, 0x100000000, 0x8, 0x2, 0x8]}}]}}}, @flowinfo={{0x14, 0x29, 0xb, 0x7}}, @hoplimit={{0x14, 0x29, 0x34, 0x8}}, @dstopts_2292={{0x158, 0x29, 0x4, {0x32, 0x27, '\x00', [@generic={0x80, 0xb5, "ccc29d948e5281fadf8eff2bf40451f1605d2e8c22fe04266b3eef7b3cc0c91e02f6aeb778473d34e0e15f11abea5dea4a87b58dce7e59cd5129515dd878ec367072d45fac330a22e3ccc396b9b6b979d42644ec74b1f7b9d4629bdce365036c413d58f63684b5f81d4feb45f61742a4f4eec45be9a7a52c586f0eb008cd06e1c004a18c0399250186a52524250de0a30ed86d688a6e97fdd41363a476b27064f750bf904335a23d92b67e1ba36f926a540116eba1"}, @enc_lim={0x4, 0x1, 0x8}, @ra={0x5, 0x2, 0xa0}, @calipso={0x7, 0x30, {0x2, 0xa, 0x5, 0xf93, [0x9, 0x10001, 0x0, 0xfffffffffffffff9, 0x2]}}, @calipso={0x7, 0x30, {0x1, 0xa, 0x7, 0x4, [0x3, 0x1, 0x1f8f, 0xf286, 0x3]}}, @generic={0x4, 0x18, "d96de74f2e2b012d51c8fa1d2cd639922414de45667eacb7"}]}}}, @flowinfo={{0x14, 0x29, 0xb, 0x3}}], 0x4b0}}, {{&(0x7f00000001c0)={0xa, 0x4e23, 0x10001, @remote, 0x8}, 0x1c, &(0x7f0000000200)=[{&(0x7f00000002c0)="b602a9c8dd168964e26b60a39ad8ee3c22b8da2fa98b59c0dcab998c86d0fbca083d0611972ab62034794d06712d640debce5e0b587b8112f8c307842cd4f182cc53b6411783363ad5c67fdcc8df45fd4e9bb145f95f95f3d682cdaa1aab9fa492233d2982feaddf65a235a51cf53cc89bad998a81d22133c7015601c1d5e29757851300d85a7f2672fd4a7261", 0x8d}, {&(0x7f0000000380)="07bb5bc095731112c22a758dbe803e0248600d46110edc6a022fefbef458a1c49c07a67d642df66797e8c3af837fa47076a573f89ac7305037592ee2d36b9973a3da722e8ad453e9eb11a63762ebd03ae85f9f00aef5751b7c541f234a95e31be2cc1fa1e05ff565c9fdb171891d4bc94e698e2247695a5524816a79ce9bd8ab1b0884a4a76b16b558e6bd5203", 0x8d}], 0x2, &(0x7f0000000440)=[@pktinfo={{0x24, 0x29, 0x32, {@local, r5}}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x1}}, @rthdrdstopts={{0x50, 0x29, 0x37, {0x32, 0x6, '\x00', [@enc_lim={0x4, 0x1, 0x6}, @enc_lim={0x4, 0x1, 0x6}, @calipso={0x7, 0x18, {0x1, 0x4, 0x4, 0x9, [0xdd, 0xfffffffffffffff9]}}, @jumbo={0xc2, 0x4, 0xd6e}, @enc_lim={0x4, 0x1, 0x40}, @jumbo={0xc2, 0x4, 0x3}, @ra]}}}, @dontfrag={{0x14, 0x29, 0x3e, 0x7}}], 0xa8}}, {{&(0x7f0000000240)={0xa, 0x4e21, 0xb11, @mcast2, 0x400}, 0x1c, &(0x7f0000000c00)=[{&(0x7f0000000a40)="d3a3e3438af3a4215efc6512cbe920df4685b8d26ea1c811401f12dcfd1589c23eeb55b81aba871782ecf390cd461658842f5c70415482753886f373317b260c06ac9c926cd0f5f7fdd440784a90328bcf6746c811f7d8d10fbb3e46c97c3b7dc1b1affd279f39c1c2965ecaaa15074a3c76d740c9f678d529ae78145d171e8f21e390bbc56d6c515be0f42c828014ce7d7ce1ab8935a22f693db71c736375a3c878d4eb8e4bcf14aee09955a79926f20ada04a5e10021", 0xb7}, {&(0x7f0000000b00)="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", 0xfd}], 0x2, &(0x7f0000000c40)=[@hoplimit={{0x14, 0x29, 0x34, 0xffffffff}}, @rthdr={{0xa8, 0x29, 0x39, {0x5c, 0x12, 0x1, 0x0, 0x0, [@mcast1, @mcast1, @private1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @dev={0xfe, 0x80, '\x00', 0x19}, @remote, @empty, @empty, @dev={0xfe, 0x80, '\x00', 0x25}]}}}], 0xc0}}, {{&(0x7f0000000d00)={0xa, 0x4e24, 0xe64, @mcast1, 0x561b}, 0x1c, &(0x7f0000000e00)=[{&(0x7f0000000d40)="e8bda203086452cca1c1bfe91bdf758e598f3d898e556a4adddfeec050e8", 0x1e}, {&(0x7f0000000d80)="471b93cb1dbb9e6a22eef11bb195571f5dbb599af47179fc85cd2d519b73247b88c4b19083d32c2e7964627c16992a823f7d6d33e28b9e874ef24f0874661fedcfbb9d2457e05195", 0x48}], 0x2}}, {{&(0x7f0000000e40)={0xa, 0x4e23, 0x8, @dev={0xfe, 0x80, '\x00', 0x17}, 0x3}, 0x1c, &(0x7f00000011c0)=[{&(0x7f0000002500)="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", 0x1000}, {&(0x7f0000000e80)="f658123984c33d4266a120724f3d792437d505a37290ffd6b2e3202ecf6cac3f5f617bd55b76341739a53fa41a72d9c3e53e94ce6d60a0a430b29fd2e2898219e22cd8510094a50007358f68b040d6d316afe6a11b964d980f39ad3f1e31f7956a6aa06c86da58b0941a5c5acf98a5dec074f53d1b948b6f0277ec3aa19b3b5e5d30cf908d17401076b9e9b9c4b9786d2c4b43", 0x93}, {&(0x7f0000000f40)="41af5a8cd6762493693c290215f2d945033ea66712e4c4116e41ada74b13f2db103b7c4ec4a0eac05c3f965b610645d9d58d5ee652630ee53dde0b8d02b657966a598389dca6400c7b2f078475675050496a5d328b7348453ff0ba6dbe2149728914a3479a927681164d3fb48b9b4590761ed6a6443e8875e7f32c0154e211e734", 0x81}, {&(0x7f0000001000)="743b6dcc90c224aa94057a77b70104a2c72cee1afde4ffa278b7080b836809523702bfe3849184fafcab83a19bf3615cb0db14032caa36a01408fdd31d1a1c9e4edf8bdae6ac8d323500504008b35e0eac30f4a77955d6350d9ef41663f8940d5c85130dbf816455951e85387bc0975a5a602c2595b75961fecf6e415e1813f50ae10931d25bc819ad7209da57832deadc10b36f512e823cd001103c36cf2549191e868e1e7dccdca57ea07d7ec9b1a47100b6b89af7bf088de34795d28a5a978b9502951ea96346d6957af7293c47dbe0ae06812ef9aef5167629eaf26bf9fe23479feeb1fd58", 0xe7}, {&(0x7f0000001100)="edaadbda4682f4eeb2b9dd64675da7109a814a82fc3283d5f90d84398888c81cc7b5759c27e13aaaae4aba413ed53c9ae39338b094603b18dfe22d9f1afaa45cde03c21ca72a3c368393433841cca997b2c170dbacf89c798ffc97220348da99cb3b1684bb3c109e1c04fe1d8193d5a7904f17bb977f3c7b9da0e6d9b6510b6914292d9c9ed3b277f7edd0a5bff924027f26ddac72362d3de9ae3e78e432b2ff641441654da25ebb21e005e90baebac909567366", 0xb4}], 0x5, &(0x7f0000001240)=[@rthdr_2292={{0x78, 0x29, 0x39, {0x3c, 0xc, 0x1, 0x1, 0x0, [@mcast2, @empty, @remote, @mcast1, @private2, @private0={0xfc, 0x0, '\x00', 0x1}]}}}, @hopopts={{0x28, 0x29, 0x36, {0x0, 0x2, '\x00', [@pad1, @enc_lim={0x4, 0x1, 0x9}, @jumbo={0xc2, 0x4, 0x3}, @ra={0x5, 0x2, 0x5}]}}}], 0xa0}}], 0x5, 0x4004000) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000003e00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000500)={0xa, 0x4e21, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000001740)=[@tclass={{0x14, 0x29, 0x43, 0x8f76}}], 0x18}}], 0x2, 0x0) fcntl$F_GET_RW_HINT(r1, 0x40b, &(0x7f0000000000)) 08:38:52 executing program 0: sendmsg$NFT_MSG_GETRULE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000080)={&(0x7f0000004300)=ANY=[@ANYBLOB="00170000070a03000000000000000000030000006e000740357793dbe548a045e5454fc82b2ddee641eb387ab4b542521ef7a91575f571377b24a9c309972dcce9b62c553768bf6b5592be44d2c0b459448a00ce2dbeee551a34596c0b8bad9b4b812463de0efdadb79d6ea12e83efd60afb9f815b85615fb56fd7cda4cd23fcc6b300000dfe05800800024000000002080002400000000208000a400000000308000a40000000023816048050000180080001006677640044000280080002400000000f0800024000000005080002400000000c0800034000000002080001400000001608000340000000020800014000000015080001400000000c901101800a00010072616e67650000008011028008100380041001001e57eb30d37d6849ec8c6136991971621817775c349b1dc6adcbc4c1d388aa19a17518c35e70af02c6b826cc8c40de35deea890f32bc5fac833e4f34ca6110e37cfb5fec8fee4d616ec67003e7ab2ac241b33d55adb1f628b8d082773dac903070e4e850cecaf77f815f713ac9013cc5b6792a56e26d03a474eff0edcbef8fd5243c263bd2293703c133d585ff6f568d57704a6ad6672b19cb513e16c0ace0f73278176a935b007a42645f58073c901b871943b6ddf73b1b44861b64e7d31ae1c931f12db63aa1415cad5503ea5765130fd8642129f1a23382eca437acef4180afbd0cd7d7e03c3a5fab67ed5c2872d5d12a209f4cc99f12fa57cee1be6876b1a7beeff69f0bb3f0e1cd101f22ebc943c54d80ac02b73c1b3622433ef33090419550fa3728af50a22e283d40e5c46e1b3ef669fbcb462c207073385580c95445d24043c84b902794231619357c6aa7f528ccc38b196dd58f4ca74124b82afe48baebc8b34b1fe8724d62938b0e6b787ae69d3a1fb88d354c1240a343fb7e5b814fb6485714d1c21dd9ce5cfc79798bdb56489f044ad0d7eea130d40308ef466088f7f1a6f038c6e088a21ee2e3e4a8a6aba65ba39c754f99bf250cb5d562a8b595a67f8e277d2cd00f94d2851da919fa669f61a4554c3a6bc467f8ce356f4546a0dc65a69eb73ae137ac9fbe358325a518faf5eac97170d57cba9817b635c02111600bd2d2639c8ef959d0357e4412f38b1baeb01f8d1afadb6a092a19c7535ea660143313cbfd6e8ff5f1364f3b2d556be3d4cfaa06eca7c6a76ac52cfa7ed2b26f5a33291eaca90a1d8b8bf6f646eeacc5694f9bb503141b45fd6e9fc734c64d14fc960982b6c21badddda3e2a8c17603147fd4e68e5963d11236714b88419efff61988f688ffb05390c3084d9b33a6bd8c67a14747d465c2902265e8a5c08d6b6352ef3973145b51133bcaf33b18713c64d9e57e7607eb10b1a5b8f7314198a93f72a6d93f4d0f93060d6b712285e2fc0fd61fc2b22a1bf00829d75ad7f3e368ddb34cd8c50fc9e99edf73d8bfc9db6eb473b0dcad1053376c3606a157b581e30648945c9ecb23adc13a0544751473a5517e9ca0e7ee01414bdb8099925dc247d4965ebc1ce76a7306ef4817eda63370b823d25b6ff805a342d9d2690bcdd1277baacafe6404b522d95c7ee9ecf4ffcd30fa7fdc930a601d8fe4af46da8edac9bbc085b4ea5e5e22c641f59690af913cec0ff4e459dede55fecd00ace6b22675b6870ac9e0b13be7a51082b83d4c21058fa2ddfbc89006f3d8f8df9d81f857aaea1120a3c09a15d755e7f90067f84d49a424e9bc9277eecf636ece7ad7c6b72dc2c7ac411cc20e21f58337998be4059ade0449728c607edfbb7c4b3b0b8a2e007109d745b541393771577171232be49fb6f1cfcfb170089d587d6922504a57bf22d739df5e683ec8595a7913773d3ab5aa85159a64412bb26ff79d300fe9563abd84792e803fcfce6eeb9e43f67f6de8e75e79adb6123938c7c85219eb22697362dfaf262214b36d4d70862831e1fbcbd06eb454bfdaebfe1b008a6e20a9a582affd10e7c8e076033095b4cdc957548804fec567de7acc8b15a2701d4ca4bb32de3d6963b0b3824d7053c2a13779945d1bb29407e03a95587326a8c244b8b66931dfbc885843fc7cb4be3fe3cc70d5024e65ae3fd46c5cccd99d0304bd0528b422ccad1751774c4dd9dbad9c801a3d697bf04abace14a21ddfa195d4319489ee5401dcdf835074eff4fdbf12c86af04a52471425b8573095f8cbc0585bd36ea3004612f4c29980bff4ce246e91ed4525c65c2ade81a592c46baf6a44194f3665cdb381d49fb2b5b2ba6ec1be06a89979d8ff7850f89e061ca1a58b9ef2a0222ca2dcb973c2f60657b6686d8beebc664cbadf05a5c789ca454053b91a74c0ad2f79a198b99924ef6fa37c8f170f0897b6d3ebd891815b4e384b153c0389d64ecf0b1bde0d8fcc210ffbcdc65268ac9cb0e611074bccbc715364fbfe9d9fab7e498ff50f12f1dd3f9525a411289ee7c32676c1c45bdf32c2d736707ec5a8a6cf333514a7a3c6751bedf9b59d07e906e3f70a2189adb4483962c38062a85670cb79511110cd72fb60d3135f5463cffa2480e22d0abc7d0548dc8aef1edfb688f50621a82f0d36105f8ddf9cf0ba14fe4b4d7273b4d17faa5047ddbc67b0429778233a1fceb74f00854e30b6da75ce475fa77f94f94715d8fa271a2befe4d9fb38406ba8cf29c1012b6e9a0ac7ebe94a5f4503ecac17dc01be6fa22f8be4c9297210d1d06979e6f33c3a3ced93c903dafb5aa3e2c028e968e34e5b41b075866ce18f054d899eb3ba9415f0ad36a725ecaf7ca90af6143a0c13d4f9d6efd5a862200f80853739608019ced3fb14307f9b675eb83449ceededcb4aa5a00231d2447a632387a98d4c4536037cfb3e382cfd3ed421fa7c862e92f0218079c2d9aca449b23473853a613685a9b686219a11eadde72bf528f0f81853d3f9cc11a92c865366609eb552f07981fd8acac2db509b9b436bcfd8037982dd291ae2a1adcf3da27e0a1f8b0658bbe83a138b48f7ca7000e41374ca8ccbf11e54ffd68b0c0a4825a3b94c748c979ab8ef24d93eb84fda458a978fce77810197243a5a5323bf47fd6f8b16e16ea16cb1b32dc69e1dc21e5f386cfcaefb1f89b7a7d9a721ad183a30c91e35b76fdb9f2badbd1cffc71e2fe6ca8e7dae722cc9d735bb7c4c31c758195249527ec90a4053ca4d6762de921ebedade962b0eb32ac56a229d0598f11cbad0f040fde2f3cd5d7ec724c7114a79fb4e4efc292ae88a7d8118a8fec81e6bcc39e00ff80c524f92fbff56dc3b7639652fc34bcf41e6d299faa5b513c14590346ddc3b082ace27bd79880ae4b090efacca2834fa8485b350b86df9807b721fdec05813739e788570d6eeb7ea9ab4a334bcaf83cd4f4e822ebbba8623af7895f9520524424d883cc431b4543a5af62ed917d0b408f191e06743ce33b8f53144e06732c68d0497e08f76c12b1478120a957fd33ff8511901a49f6f9586d0a54a3189483ba3fe0ba4c7f99ea41cfff467e1a06e077ccd38d5c635c9acf1d9b2566042634da77f83483861307358358c269d1d3ee57a5acac8a005f9c94c2bf8042f80ab480011f1ff550247b6560963fc675ec3c079e74bd71ba8b0779a5d7e3bf8f09bd89aece57ca07e3e47c024b4cdd86534e614320866149cc2df2c749da638f5b50a752fd200a16de5c9e5836cbcfefca225f9e458997253298a4cb6f50b42c051d1c236d9cbb6dda3ac31ad78b0f3f0bad4a9923178b6f150b181873efe65793024ce2e75d43bd531ec10459a467d15473e254a55dc00be0dd5fd56d1498549a69616f97b13edf20e911f0990dc985c270aca06876509aa5962d8d3b5c4889f9f6e46411cf13bb81ab88d4150a63e54fe12c87fef29f9b7cee9a017381a1baafce2841467f1b4fb0f085541b3f7e107c231c538711a7c72cb93a7177d7986283410541bb77c7bddcc87d71e4a473c9c7d5a431f9ba9973ea979637e4394c585947b2055867774d8c5a04eb87d64f6877e4a5ab7a6bca25bfa7a89877cce1011c7b3af2e725c2051f425adce935c71178be009385a977ac3fafb52e6a0179dff4d9008eda356083977f09b8720f05991cc8b0caac1575cdf76a274501934ead3f0b2d0fbd1c464a6482ced07c0a41e38b4ff76b5010fded19a55bd65e5deb459404f58f362135588c8e2969e468e13bd7ea11aacacdbcc5bfb8f0c91196f9ce07faaa9428c084be852440d8d86ea8128235cad84c33bacf63e4e57f5e74a084389405040acb35bbe1c0934a6461131ec5ef5e41604cf35733eb7fd9696a45f13ce5f365d1900813dadd01bb92202f969682c716d2d5c0beb6353688c687bd084d821484eb463a1e5d2c67957d63545238d1148692b4cbd4e75c789f10eeda769c525b9de0fef2de2df52b005ae19eb5f07320e69f722522a2b4051a5c2c2dd1c6f8bf1fb37af99c28a5104c6e3177651bfb77754c4cf0ec8b1124e19b329e0e57a5767e22771c58b2746c7291de19a2fba14f4d961f651378574918aae0999c3433a2f48c5a27db4ab7fe91a12d4cb567f4a25619ce4667f1315a98b99994e758f30e7f47863a970082d3c75420d6057c5294cdabb42f99c99e3db3c7bfc53b15cf17b2368ff10eed25e83f24c646f5f81be8ab62cbd715984195015ffdb6ad87275ef5f39e2c134045dc19e632ef0862e9855cdc222aaeaa076a3c17daaa288c7ae6d8e6e591416a3f0a4c93296d0de9790913768be2b70df82ddb171e1d032161125a05ad047cc46db093df8ffe579ab8a5e2af87c51e986767a2d7f34421f7f5b4db5e672f02ea2026e9bfd0f5f4a76a2ab9da4ceee334bedcf486ba89d0accd01cfdcc4997c478ffcabb7eb9a16f2fd51f1eaed9ddc005a0de43e73e0351d3593377359258556d333334d72f1115a34c6279e0307668b00e568921b0c418f68837d8b7a52dee6fbe9cda8bf33b1af08030094bc54310227c7d45aa3ce1511a96151e9f2ff941b986fb9bd09a2518b0d3a68c2337d0ab448fc479c0f0cdbfaedaa1fcc972363a4c1aa7a6940398d9899d129c2af63ebcc310eeeafdf00f7030d7dae1c60e1b0d2eae043abbfed2d5d5753320ca1b4f4264fbf68c034aea5a1ef7e14deac46c377a042923c2a3de2f37fa372a7f805376844461afe25803b3d8d1e7672b79ba0fb9a23f9c30789daa3be0c87b01e25e63721a9ed717cd84277bbef1600156b4b109b545a58da0dc1a1c0539384a79880d8bf2f0d99926237684d9a31efdccccad22b5a67c5dd28d0a93d1ca9997bc83a5bed905f7a43b8091a5479a2979f2f0b9b4c53990a80273c07decfc97b66deef0bdc850046cd8a562587e032b11406a66f9959b27445c9b760f7f8714f0677ec65b11a9a57a6d6842d02c6c2e90fc8c1b2d99d75e9c574d09d43c3ed13ff1594ff5a6413fe279181a61818affc47636d9ff9630e86e57d4997da29634cfaaa4e109ea80270fb03fc75098ac2fdb0a21a0f8fe32f0729a6c0899ae0dfb6c2df040da2a190f2d8c40a51749611d30b467c445d2c4ced2de324c3eafa989c6645a766d63bd46e2f16548a97f26c42608f25416d3c17de89c2bc80cf65a1e2cc78443e766b7975de2e23b41b584188235ded89530f9c97e9fcf00d304ab9b5fa653239ce325b09fe20c65d197a99d99c66e86145ac60556feb2234d42fc6907bd3ede890d20e22da2df53ed6bb9362f8ad6eecb694719a5cc087a81771cdcf8e1561b354d8cc92aa63ff4a976b5196d45c4a2099fe8c8b68010b4b54a0c9ca509bc8a71a6cb8812a54dc531acf3e40f1e6107ecc022346afd79a3f61add5042e4a8a35735306dd9bf627abe9c41b62e11543bec95cb2a5c1861136ddcbbd400764ea16562bf33be323946ba86778021966a0ae870be2c980705edc7a374674bed7778b320d0c4de431f0a171075b794d392f88aa81fbc29c8c6da8bda393213686dfe4aa2e71c5832bb13a95ae12e8a6431986d0b395b658d1adc727c25147c08ba134a351341dd2278a0e84a2025455f6ff56339239e4e4a2dfd2e5ca99bfbfd487914eb6293998e6a7114ad44532db8b6f4142e8ad1be47cee48d15b622ce3d16d9ef95026d3d2c50e22d9064e9a996040bc1b1ab5f56353a01c7d4105cd5e0fb738b0f879d043721c60c4f63869f95c3615fbb47639a9675bbb22e44aa41ee0f16c010380970001005ee90bd4ba248f26c84ca652571ea35a1421dacd7bf4d864b3587c46b413fda0b5cd08c916c4b4cb15b9afb3c0d82e967a7817ae66fb129a0a095b011676f52a348ed82c7770ee4193f1ca2dc8cacad55456249b49ce30acf2f6c5980276327fa043c351956fc8d9359a6b44b54c1b7464d4c7aa50bc2860a66d7a6222225e38955d8d3dd0ff60f03f6200f7ea74091c3f689900200002800900020073797a310000000008000180fffffffe08000180000000002c00028008000180fffffffb08000180fffffffe0900020073797a30000000000900020073797a310000000028000280080001800000000008000180fffffffd0900020073797a300000000008000180fffffffe3c0002800900020073797a300000000008000180fffffffe08000180fffffffd0900020073797a32000000000000020073797a300000000008000180fffffffb200002800900020073797a300000000008000180fffffffc08000180000000000800024000000001bc0201800b00010074617267657400008c01028007000100525c0000080002400000000106000100290000000e0003002a26ded83e9d5aa4ac540000700003003d2493f0985c7c65968ca1c98606568cca9df568e1e91a587343802fc8c0233f2a19dead8ffc2489d45d55c5a69a994272b65cf8cf58cbf25aa5122b05fe13e1b4ba3759d156e16ee7123efe23cca1285a0857f4fb968430d6d976bbd9beb40e4ae7d06278f0c5d5be6240ac0e0001006d6f756e74696e666f000000dd000300e22a14c02bc6f8a7483a6bc07b871ae187fc4d3f28a328b1511dc650c31a308fc250f8365d9e0d6d34338d76e856ffed3064629fe56be5a7a6f6a7694728bff211f54c511431004727b2bfdd17600b83b43a379387f1128d41c5823f107c0ba3081102e75d3277dd3bcefa31eacc80f8bdc871be731cb7b074c4cb7fd8def42e0c8f2ca1636c72d2148528f44f34c88e338580ac76b743a15e07525bbb6331d1bbbb28eb97b6b348839035f7de1469bb9c3794169e909a59da965d93f9aa71895d9b08a581cefb40b0ec197f1a2d90614fe7e3e32a66ef52440000000e000100696d6d6564696174650000000b00010074617267657400004000028029000300bd8cb0a72349c1463b37d8f0dc7ce669820a93d6430e206ec2fe5e888a72606cfc6f81d85d0000000e0001006d6f756e74696e666f0000000900010068617368000000000c0002800800024000000004080001006475700014000280080001400000001408000140000000110c0001007061796c6f61640034000280080005400000000b080003400000f6310800024000000000080005400000000b080007400000000008000440000000090b000100736f636b657400000e000100627974656f7264657200000034000280080004400000009c08000440000000e2080004400000007a080002400000000b080004400000007808000140000000175401018011000100666c6f775f6f66666c6f616400000000080001006f73660054000280080003400000000108000340000000010800014000000013080001400000000d080003400000000108000340000000010500020040000000080001400000000d05000200060000000800014000000008080001006c6f67003400028008000540fffffffa0600014000060000080003400000001f06000440000100000600044000200000080006400000000907000100727400001c000280080001400000000f0800024000000001080001400000000f080001006f7366001400028005000200c200000005000200040000000a0001006c696d69740000000d00010073796e70726f7879000000001c000280080003400000000a060001400005000008000340000000080b0001006f626a72656600002000028008000540000000010900040073797a3200000000080001400000000f44000180080001006669620014000280080001400000000b0800034000000001080001006f7366001c0002800800014000000008080001400000000f080003400000000108000a40000000030900010073797a31000000000c00064000000000000000035887b9af4c1c51f36082688134ff9a94b3344a92297db18370389690da6628ea006fcc1ceb8032b369c530263b404e00"], 0x1700}, 0x1, 0x0, 0x0, 0x8001}, 0x40000) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_SET(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x38, 0x3, 0x8, 0x201, 0x0, 0x0, {0x7, 0x0, 0xa}, [@CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x88f7}, @CTA_TIMEOUT_DATA={0x1c, 0x4, 0x0, 0x1, @gre=[@CTA_TIMEOUT_GRE_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x80000000}, @CTA_TIMEOUT_GRE_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x8a400000}, @CTA_TIMEOUT_GRE_REPLIED={0x8, 0x2, 0x1, 0x0, 0x7ff}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x8000}, 0xd0e996903722486b) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) sendmsg$NL802154_CMD_SET_ACKREQ_DEFAULT(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000140)={0x1c, 0x0, 0x400, 0x70bd2b, 0x25dfdbfb, {}, [@NL802154_ATTR_IFINDEX={0x8}]}, 0x1c}}, 0x4010811) 08:38:52 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000003e00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000500)={0xa, 0x4e21, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000001740)=[@tclass={{0x14, 0x29, 0x43, 0x8f76}}], 0x18}}], 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {r1}}, './file0\x00'}) 08:39:08 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003e00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000500)={0xa, 0x4e21, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000001740)=ANY=[@ANYBLOB="1400000000000000290000004300000080b458b200000000"], 0x18}}], 0x2, 0x0) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x8010) sendmmsg$inet6(r1, &(0x7f0000003e00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000500)={0xa, 0x4e21, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000001740)=[@tclass={{0x14, 0x29, 0x43, 0x8f76}}], 0x18}}], 0x2, 0x0) dup2(r1, r0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f00000000c0)={{r0}, 0x80000000, 0xffffffffffffffff, 0x81}) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) sendmmsg$inet6(r3, &(0x7f0000003e00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000500)={0xa, 0x4e21, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000001740)=[@tclass={{0x14, 0x29, 0x43, 0x8f76}}], 0x18}}], 0x2, 0x0) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r3, 0x4008941a, &(0x7f0000000080)) connect$inet6(r2, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) sendmmsg$inet6(r2, &(0x7f0000003e00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000500)={0xa, 0x4e21, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000001740)}}], 0x2, 0x0) readv(r2, &(0x7f0000000000), 0x0) 08:39:08 executing program 6: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x80, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x80}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:39:08 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='loginuid\x00') r1 = epoll_create1(0x0) fremovexattr(r1, &(0x7f0000000000)=@random={'btrfs.', '\x00'}) r2 = creat(&(0x7f0000000100)='./file0\x00', 0x82) statx(r0, &(0x7f0000000140)='./file0\x00', 0x0, 0x200, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) getresuid(&(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)=0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) flock(r5, 0x3) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@fscache}, {@dfltuid}, {@aname={'aname', 0x3d, '{\xdc'}}, {@loose}, {@cache_none}], [{@fsmagic={'fsmagic', 0x3d, 0x1}}, {@uid_gt={'uid>', r3}}, {@euid_eq}, {@uid_gt={'uid>', r4}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, 'btrfs.'}}, {@subj_role={'subj_role', 0x3d, '-%\x06/})'}}]}}) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r6, 0x800) write$cgroup_netprio_ifpriomap(r6, &(0x7f00000003c0)={'bond_slave_1'}, 0xf) r7 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r7, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendfile(r7, r6, 0x0, 0x8000) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xa, 0x12, r6, 0x0) ioctl$SIOCSIFHWADDR(r6, 0x8924, &(0x7f0000000480)={'lo\x00', @link_local}) 08:39:08 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000180)={&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00006d5000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000400000/0xc00000)=nil, &(0x7f0000b76000/0x1000)=nil, &(0x7f00004bc000/0x2000)=nil, &(0x7f0000000080)="2cfd96e220d3835d1ed3e70dd81bedce6817666342bcb3b79ae182edcc68ee2728e04781f13724ef76efc424572aeb80ff73b96c30787d6aadc623c71699501f47501b5d5eab2b959a84e67b2f081474989137eed5d6715a7c7e549fbca5a8a41b1a3e092211414015597419f93ab0d2812f5d049c82e995088c931c40ae0b0a120ad175690b1da1bc00daf2a5c09d6d3e6181d84507b7f676add13587df9ff98fec83dc9cfd0c3731a96f59265e075c58a0b83e4e255a8021d6cb64a2193f4e6d3fd46ea52e0573939e4094ccc4f82bf3fc4de2eb2a6975778bfb3a4b22ab000ec897fc9a0bd9974907", 0xea, r0}, 0x68) readv(r0, &(0x7f0000000280), 0x0) 08:39:08 executing program 5: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:39:08 executing program 1: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x74, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x74}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:39:08 executing program 4: syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x88, 0x0, 0x800, 0x0, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x88}}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0xcd, 0x7f, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000100), 0x10}, 0x4001, 0x400, 0x7, 0x6, 0xb3, 0x40, 0xfff, 0x0, 0x1}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 08:39:08 executing program 2: r0 = getpid() capget(&(0x7f00000000c0)={0x20071026, r0}, &(0x7f0000000100)) r1 = syz_open_procfs(r0, &(0x7f0000000000)='net/xfrm_stat\x00') readv(r1, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) 08:39:08 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000000), 0x0) ioctl$BTRFS_IOC_DEV_REPLACE(r0, 0xca289435, &(0x7f0000000080)={0x0, 0xffff, @start={0x0, 0x1, "4ce7c53d20aa4f0702328c1882a4984228f1c4c21221f0f28ef5c83eed127e50da13060c7e8dc07bd51310ed10dd3625c5a1bb76d78a9aa648bb843d9cee11835b94c6c3813d3f3f57b33d41f657ea4f3e817ff90f1a8851b00287acb61ac0f8afcfdd03fc3ddbd22d6211fa14301d5b409b3fb29cc63ff85a5a8516e655bc3514ba093b3ca1880d568641bf2bb26e5fecfc9929bfc1e74778760a44536dae8f0a21efaaddd969569fe0b6d80ad9b68fe82fcf7e5ec5dbefdca58645e6651b3eddaaf4b31fc73295cae25a54280797289084a04017acbf3ea405c20c711a17bc9b6838574e5dcb6b3d69f2b5f665b82e4432ac6424ab4703ba66d604ef9ef5d5a547d9b7883f1e2581fdeff1dd02206ed50cfd866dd0202bcf2352d1c659faf8abbc109aedd63d17f121688a880c30e72bbcf8befbb02f675bf6a1f7388f78c83950807c6300915ab098ebae3cb3b04603f7db1cc928b0e1b5daaeed5d24f768b0988667894f293f3a423cf31558f188b1af44b7e6706d46fa0b63547e16aa8debff16731ca4c0678df3c880555cd4256aa9902631e379555d28542163169285fa9205fb0fbc5990e0b7914eeba7a0d5533988f14af4cd4bdbdf65dce7c5bda1b9a32e6b7787c1fe4eded3550521681117438be3039881f4d6c5fc6b03a69b48d7b28375adf74fdfb0329e126e7c3f728845f2e20f64681f5425b7dda468bc488e5f6ef1ebe94b953c0b22061c128386d6593d99e58c1a3ea92c6aa97cb527b582bda15f15b164232d2551153c28bf37ffe96dbdee7d65914edd7aa1bfbfdd08bd5c3debd147ec721a1eb565ebdb1d338bee124e22e8a3f2a1f1c5f904f6befc2dc934fbc7182fb21341f23092f566205a755b99897a42b7340381290693a9cc9bb8bbc244a7eb42590af97432b43b6f2ea775edfeb64a08221131646e66e02fb9306d12647022d1089b6a4b794e66d107798c1416980e0a9368644768ac9f4fa4303d852e26c6fbaeedda790d0420fe3cf856ca32b77f1c59d4f4b9aac2567ccc207ec8848ca6d77a1785281d7105874571dc4336953fc856bb77f1801c0c499377f0cfbb78ba08ff0afec2b65bf7a4785ddeccb6c7d8283bc251096b38506130cb0d5d611721e421038192b014deb73922fdb90cd4ef0929ef32c23054e45ba03741bb1bbae9a3fb4193710778ee213b6ac06197184ba7d9f122a403e1b1c27b64a59b8e410d25f091e3a3fb256493092b4fa2cce744fed66613b98a8cee12dc6a104870c69234d89d8e0a35377bd4899476b772730e4738fa013103ab7d75c0ae24d8ee8f11fba10ebf6d181fade326954c363a1451d8abb688c76f71b617698ee1166440d8494dcf5c79a05a3551ffe9e723f59b6cc00612415890b7910cfd536c726ef21e0d0f22544a157ee7c1265c47b0abfee10300cf39e83fb0f7ff1a", "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"}, [0x5ebe, 0x8, 0x80000001, 0x3ff, 0x31b, 0x5, 0x7, 0x401, 0x3, 0x5, 0x7ce6, 0xac1c, 0x56f5, 0x4, 0x800, 0x9, 0x7, 0xfff, 0x10001, 0x0, 0x0, 0x6, 0x8001, 0x5, 0xfff, 0x20, 0xb0, 0x7fffffff, 0x2, 0x3, 0x11, 0x1, 0xfffffffffffffffa, 0x800, 0x8, 0xfb, 0x2678a878, 0xffff, 0x0, 0x3, 0x4, 0x8000000000000000, 0x7, 0xff, 0x7, 0x1, 0x6, 0x0, 0x8, 0x6, 0x4, 0x8, 0x1, 0xc04, 0xfffffffffffff8af, 0xc5, 0x1, 0x10000, 0x6, 0x1, 0x2, 0x1ff, 0x5a7]}) 08:39:08 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') open_tree(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x800) readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f0000000080)=0x9, 0x4) 08:39:08 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) readv(r0, &(0x7f0000002580)=[{&(0x7f0000000080)=""/158, 0x9e}, {&(0x7f0000000140)=""/151, 0x97}, {&(0x7f0000000200)=""/94, 0x5e}, {&(0x7f0000000000)=""/48, 0x30}, {&(0x7f00000002c0)=""/149, 0x95}, {&(0x7f0000000380)=""/223, 0xdf}, {&(0x7f00000014c0)=""/4096, 0x1000}, {&(0x7f00000024c0)=""/170, 0xaa}], 0x8) r1 = socket$inet6_udp(0xa, 0x2, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000000480), 0x90000, 0x0) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000003e00)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000500)={0xa, 0x4e21, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000001740)=[@tclass={{0x14, 0x29, 0x43, 0x8f76}}], 0x18}}], 0x2, 0x0) pwrite64(r1, &(0x7f0000002600)="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", 0x1000, 0xab2f) VM DIAGNOSIS: 08:44:13 Registers: info registers vcpu 0 RAX=ffffffff83e1e7f0 RBX=ffffffff84e322c0 RCX=ffffffff83e0653c RDX=0000000000000000 RSI=0000000000000000 RDI=ffffffff83e1ebb3 RBP=fffffbfff09c6458 RSP=ffffffff84e07e40 R8 =0000000000000001 R9 =ffff88806ce3c12b R10=ffffed100d9c7825 R11=0000000000000001 R12=0000000000000000 R13=ffffffff85670c88 R14=0000000000000000 R15=dffffc0000000000 RIP=ffffffff83e1e7fe RFL=00000202 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f2e95e39000 CR3=000000000e120000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001fa0 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00000000000000000000000000000000 XMM02=000000000000000041840f7700000000 XMM03=0000ff00000000000000000000000000 XMM04=732f6c61636f6c2f7273752f3d485441 XMM05=622f6c61636f6c2f7273752f3a6e6962 XMM06=73752f3a6e6962732f7273752f3a6e69 XMM07=6e69622f3a6e6962732f3a6e69622f72 XMM08=00000000000000000000000000000000 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=ffffffff83e1e7f0 RBX=ffff88800852b300 RCX=ffffffff83e0653c RDX=0000000000000000 RSI=0000000000000000 RDI=ffffffff83e1ebb3 RBP=ffffed10010a5660 RSP=ffff88800856fe78 R8 =0000000000000001 R9 =ffff88806cf3c12b R10=ffffed100d9e7825 R11=0000000000000001 R12=0000000000000001 R13=ffffffff85670c88 R14=0000000000000000 R15=dffffc0000000000 RIP=ffffffff83e1e7fe RFL=00000206 [-----P-] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f2e9711e010 CR3=000000000e120000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001fa0 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00000000000000010000000000000001 XMM02=000000000000000041096e0000000000 XMM03=0000060101dbd20771fc0101039aff0f XMM04=0a006873616d7320636578650a006567 XMM05=636578650a0073646565732063657865 XMM06=6e6567206365786508006c61746f7420 XMM07=6578650d007a7a756620636578650900 XMM08=636578650b006574616469646e616320 XMM09=6d7320636578650a0065676169727420 XMM10=00736465657320636578650a00687361 XMM11=65786508006c61746f7420636578650a XMM12=7a7a7566206365786509006e65672063 XMM13=00657a696d696e696d20636578650d00 XMM14=657865110073746e696820636578650a XMM15=0000737472617473657220726f747563