, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x204}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000033c0)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x84) openat$cgroup_freezer_state(r1, &(0x7f0000000ec0), 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000f00)='cpuacct.usage_sys\x00', 0x0, 0x0) tkill(0x0, 0x34) prlimit64(0x0, 0x0, &(0x7f0000000380)={0x3, 0x6}, &(0x7f00000003c0)) 05:03:31 executing program 2: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0x5421, &(0x7f0000000040)={0x0, 0x0, 'client1\x00', 0x0, "cda33c7f90aa0fc1", "300b70da2bdee387baca12f4b7100489874d0d3e555f5f86e539c9e4bb6a36fe"}) [ 1488.810403][ T1076] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1488.835655][ T1077] Cannot find add_set index 0 as target 05:03:31 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x0) 05:03:31 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x119}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() [ 1488.956255][ T1086] Cannot find add_set index 0 as target 05:03:31 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x6001, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:03:31 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x8a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB="94000000000401030000000000000000000000007d39391a8bdf079f9f495a1fda171e3158f5c79ff5a4dfa267f9065b81eaa585529b1ed154c2e4de9fc975eb2bc712fe039df1a80dfb5986112b3f864dd6be18f185f6af53a91ef29a364869c075e208738464d03e023ce658bc45e51d0cd92f13dd19bed44b18c890ed907be58e2f0bcb02e3c1edb68f44d0d2c95d075a7ceddb3c8a0b063f62856a88e3e03f757467a06cf67105344eb3831130485e90b0e7d8317b2cdf3de6ff9b2c0307dc8d02d485923047d57b31d22a61abcc56"], 0x14}}, 0x0) r2 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x100000, 0x0) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000600)={0xc0, 0x464, 0x20, 0x70bd2b, 0x25dfdbff, "973f9703e43681c987947af3c1c8083de32ea8c59e17bb66fa1131bb71f62feb9d0e2d30dd5e0b3412958e5fe0cceec4126aac730f0637bbd5800c45a7540643c9c2c37aec0fd2421ecaab72641bc72be3958a965740c910b05431206b3784e1f84519555df72fc585d1fe8bc9c7edb156ad0efe2e5af3837edfddc3b7b14e00cda27aef1b0cbdee00e73a16858db80462c0721e260eb71762c36d071ce2212930ef26fbad80c57ca5f20663efbd6221", ["", "", ""]}, 0xc0}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000000) fcntl$setstatus(r2, 0x4, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x100) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x48, 0x80, 0x3f, 0x1, 0x0, 0xc4, 0x4, 0x5, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f00000004c0)}, 0x880, 0x8, 0x4, 0x222db880e1fb0bed, 0x9, 0x8228, 0x3, 0x0, 0xfffffff8, 0x0, 0x7f}, 0xffffffffffffffff, 0x10, r0, 0xa) r4 = open(&(0x7f0000000140)='./file0\x00', 0x501400, 0x1e2) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x40, 0x9, 0x7, 0xf4, 0x0, 0x6, 0x8002, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f00000000c0), 0xe}, 0x800, 0x935, 0x2, 0x3, 0xc23, 0xff, 0x7, 0x0, 0x8, 0x0, 0x6}, 0x0, 0x5, r4, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000840)={'veth0_macvtap\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) writev(r3, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) mount$9p_rdma(&(0x7f0000000880), &(0x7f0000000200)='./file0\x00', &(0x7f0000000580), 0x12288b8, &(0x7f0000000a00)=ANY=[]) socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8936, &(0x7f0000000080)={@ipv4={'\x00', '\xff\xff', @empty}, 0x43, r6}) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=@newlink={0xc8, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x242b8, 0x42a0a}, [@IFLA_LINKINFO={0x98, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x88, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_INGRESS_QOS={0x70, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x200004, 0x1f}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7, 0x10001}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3fc, 0x39e4}}, @IFLA_VLAN_QOS_MAPPING={0x2c, 0x1, {0x8, 0x49}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7ff, 0xc73}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xd1e7, 0x5}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xcaa3, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xfffffffc}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xa1ae}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1, 0x8}}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0xc8}}, 0x0) 05:03:31 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x265}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000033c0)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x84) openat$cgroup_freezer_state(r1, &(0x7f0000000ec0), 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000f00)='cpuacct.usage_sys\x00', 0x0, 0x0) tkill(0x0, 0x34) prlimit64(0x0, 0x0, &(0x7f0000000380)={0x3, 0x6}, &(0x7f00000003c0)) [ 1489.060811][ T1093] Cannot find add_set index 0 as target [ 1489.186715][ T1104] Cannot find add_set index 0 as target 05:03:31 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x14c}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:03:31 executing program 1: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0xc08c5334, &(0x7f0000000040)={0x0, 0x0, 'client1\x00', 0x0, "cda33c7f90aa0fc1", "300b70da2bdee387baca12f4b7100489874d0d3e555f5f86e539c9e4bb6a36fe"}) 05:03:31 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000100)=[{0x0}]) r0 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffa000/0x4000)=nil) shmat(r0, &(0x7f0000003000/0x1000)=nil, 0xc000) 05:03:31 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x6502, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() [ 1489.365522][ T1116] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 05:03:32 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x160}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:03:32 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x8a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB="94000000000401030000000000000000000000007d39391a8bdf079f9f495a1fda171e3158f5c79ff5a4dfa267f9065b81eaa585529b1ed154c2e4de9fc975eb2bc712fe039df1a80dfb5986112b3f864dd6be18f185f6af53a91ef29a364869c075e208738464d03e023ce658bc45e51d0cd92f13dd19bed44b18c890ed907be58e2f0bcb02e3c1edb68f44d0d2c95d075a7ceddb3c8a0b063f62856a88e3e03f757467a06cf67105344eb3831130485e90b0e7d8317b2cdf3de6ff9b2c0307dc8d02d485923047d57b31d22a61abcc56"], 0x14}}, 0x0) r2 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x100000, 0x0) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000600)={0xc0, 0x464, 0x20, 0x70bd2b, 0x25dfdbff, "973f9703e43681c987947af3c1c8083de32ea8c59e17bb66fa1131bb71f62feb9d0e2d30dd5e0b3412958e5fe0cceec4126aac730f0637bbd5800c45a7540643c9c2c37aec0fd2421ecaab72641bc72be3958a965740c910b05431206b3784e1f84519555df72fc585d1fe8bc9c7edb156ad0efe2e5af3837edfddc3b7b14e00cda27aef1b0cbdee00e73a16858db80462c0721e260eb71762c36d071ce2212930ef26fbad80c57ca5f20663efbd6221", ["", "", ""]}, 0xc0}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000000) fcntl$setstatus(r2, 0x4, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x100) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x48, 0x80, 0x3f, 0x1, 0x0, 0xc4, 0x4, 0x5, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f00000004c0)}, 0x880, 0x8, 0x4, 0x222db880e1fb0bed, 0x9, 0x8228, 0x3, 0x0, 0xfffffff8, 0x0, 0x7f}, 0xffffffffffffffff, 0x10, r0, 0xa) r4 = open(&(0x7f0000000140)='./file0\x00', 0x501400, 0x1e2) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x40, 0x9, 0x7, 0xf4, 0x0, 0x6, 0x8002, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f00000000c0), 0xe}, 0x800, 0x935, 0x2, 0x3, 0xc23, 0xff, 0x7, 0x0, 0x8, 0x0, 0x6}, 0x0, 0x5, r4, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000840)={'veth0_macvtap\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) writev(r3, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) mount$9p_rdma(&(0x7f0000000880), &(0x7f0000000200)='./file0\x00', &(0x7f0000000580), 0x12288b8, &(0x7f0000000a00)=ANY=[]) socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8936, &(0x7f0000000080)={@ipv4={'\x00', '\xff\xff', @empty}, 0x43, r6}) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=@newlink={0xc8, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x242b8, 0x42a0a}, [@IFLA_LINKINFO={0x98, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x88, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_INGRESS_QOS={0x70, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x200004, 0x1f}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7, 0x10001}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3fc, 0x39e4}}, @IFLA_VLAN_QOS_MAPPING={0x2c, 0x1, {0x8, 0x49}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7ff, 0xc73}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xd1e7, 0x5}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xcaa3, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xfffffffc}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xa1ae}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1, 0x8}}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0xc8}}, 0x0) 05:03:32 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x288}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000033c0)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x84) openat$cgroup_freezer_state(r1, &(0x7f0000000ec0), 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000f00)='cpuacct.usage_sys\x00', 0x0, 0x0) tkill(0x0, 0x34) prlimit64(0x0, 0x0, &(0x7f0000000380)={0x3, 0x6}, &(0x7f00000003c0)) 05:03:32 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x3c, 0x0, 0x8, 0x3, 0x0, 0x0, {}, [@CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}, @CTA_TIMEOUT_L4PROTO={0x5}, @CTA_TIMEOUT_DATA={0xc, 0x4, 0x0, 0x1, @gre=[@CTA_TIMEOUT_GRE_UNREPLIED={0x8}]}, @CTA_TIMEOUT_L3PROTO={0x6}]}, 0x3c}}, 0x0) 05:03:32 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x6801, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:03:32 executing program 2: socket(0x1, 0x2, 0x1f) [ 1489.896065][ T1166] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 05:03:32 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x29d}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000033c0)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x84) openat$cgroup_freezer_state(r1, &(0x7f0000000ec0), 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000f00)='cpuacct.usage_sys\x00', 0x0, 0x0) tkill(0x0, 0x34) prlimit64(0x0, 0x0, &(0x7f0000000380)={0x3, 0x6}, &(0x7f00000003c0)) 05:03:32 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x8a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB="94000000000401030000000000000000000000007d39391a8bdf079f9f495a1fda171e3158f5c79ff5a4dfa267f9065b81eaa585529b1ed154c2e4de9fc975eb2bc712fe039df1a80dfb5986112b3f864dd6be18f185f6af53a91ef29a364869c075e208738464d03e023ce658bc45e51d0cd92f13dd19bed44b18c890ed907be58e2f0bcb02e3c1edb68f44d0d2c95d075a7ceddb3c8a0b063f62856a88e3e03f757467a06cf67105344eb3831130485e90b0e7d8317b2cdf3de6ff9b2c0307dc8d02d485923047d57b31d22a61abcc56"], 0x14}}, 0x0) r2 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x100000, 0x0) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000600)={0xc0, 0x464, 0x20, 0x70bd2b, 0x25dfdbff, "973f9703e43681c987947af3c1c8083de32ea8c59e17bb66fa1131bb71f62feb9d0e2d30dd5e0b3412958e5fe0cceec4126aac730f0637bbd5800c45a7540643c9c2c37aec0fd2421ecaab72641bc72be3958a965740c910b05431206b3784e1f84519555df72fc585d1fe8bc9c7edb156ad0efe2e5af3837edfddc3b7b14e00cda27aef1b0cbdee00e73a16858db80462c0721e260eb71762c36d071ce2212930ef26fbad80c57ca5f20663efbd6221", ["", "", ""]}, 0xc0}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000000) fcntl$setstatus(r2, 0x4, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x100) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x48, 0x80, 0x3f, 0x1, 0x0, 0xc4, 0x4, 0x5, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f00000004c0)}, 0x880, 0x8, 0x4, 0x222db880e1fb0bed, 0x9, 0x8228, 0x3, 0x0, 0xfffffff8, 0x0, 0x7f}, 0xffffffffffffffff, 0x10, r0, 0xa) r4 = open(&(0x7f0000000140)='./file0\x00', 0x501400, 0x1e2) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x40, 0x9, 0x7, 0xf4, 0x0, 0x6, 0x8002, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f00000000c0), 0xe}, 0x800, 0x935, 0x2, 0x3, 0xc23, 0xff, 0x7, 0x0, 0x8, 0x0, 0x6}, 0x0, 0x5, r4, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000840)={'veth0_macvtap\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) writev(r3, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) mount$9p_rdma(&(0x7f0000000880), &(0x7f0000000200)='./file0\x00', &(0x7f0000000580), 0x12288b8, &(0x7f0000000a00)=ANY=[]) socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8936, &(0x7f0000000080)={@ipv4={'\x00', '\xff\xff', @empty}, 0x43, r6}) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=@newlink={0xc8, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x242b8, 0x42a0a}, [@IFLA_LINKINFO={0x98, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x88, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_INGRESS_QOS={0x70, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x200004, 0x1f}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7, 0x10001}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3fc, 0x39e4}}, @IFLA_VLAN_QOS_MAPPING={0x2c, 0x1, {0x8, 0x49}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7ff, 0xc73}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xd1e7, 0x5}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xcaa3, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xfffffffc}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xa1ae}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1, 0x8}}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0xc8}}, 0x0) 05:03:32 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x168}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:03:32 executing program 1: clock_gettime(0x0, &(0x7f0000000c40)={0x0, 0x0}) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000c80)={0x0, r0+10000000}) 05:03:32 executing program 2: r0 = eventfd(0x0) write$cgroup_freezer_state(r0, &(0x7f00000093c0)='FREEZING\x00', 0x9) 05:03:32 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x8800, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() [ 1490.353659][ T1198] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 05:03:32 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x2a4}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000033c0)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x84) openat$cgroup_freezer_state(r1, &(0x7f0000000ec0), 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000f00)='cpuacct.usage_sys\x00', 0x0, 0x0) tkill(0x0, 0x34) prlimit64(0x0, 0x0, &(0x7f0000000380)={0x3, 0x6}, &(0x7f00000003c0)) 05:03:32 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x8802, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:03:32 executing program 1: r0 = eventfd(0x2) read$eventfd(r0, &(0x7f0000000080), 0x8) r1 = eventfd(0x1) read$eventfd(r1, &(0x7f0000000440), 0x8) 05:03:32 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x8a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB="94000000000401030000000000000000000000007d39391a8bdf079f9f495a1fda171e3158f5c79ff5a4dfa267f9065b81eaa585529b1ed154c2e4de9fc975eb2bc712fe039df1a80dfb5986112b3f864dd6be18f185f6af53a91ef29a364869c075e208738464d03e023ce658bc45e51d0cd92f13dd19bed44b18c890ed907be58e2f0bcb02e3c1edb68f44d0d2c95d075a7ceddb3c8a0b063f62856a88e3e03f757467a06cf67105344eb3831130485e90b0e7d8317b2cdf3de6ff9b2c0307dc8d02d485923047d57b31d22a61abcc56"], 0x14}}, 0x0) r2 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x100000, 0x0) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000600)={0xc0, 0x464, 0x20, 0x70bd2b, 0x25dfdbff, "973f9703e43681c987947af3c1c8083de32ea8c59e17bb66fa1131bb71f62feb9d0e2d30dd5e0b3412958e5fe0cceec4126aac730f0637bbd5800c45a7540643c9c2c37aec0fd2421ecaab72641bc72be3958a965740c910b05431206b3784e1f84519555df72fc585d1fe8bc9c7edb156ad0efe2e5af3837edfddc3b7b14e00cda27aef1b0cbdee00e73a16858db80462c0721e260eb71762c36d071ce2212930ef26fbad80c57ca5f20663efbd6221", ["", "", ""]}, 0xc0}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000000) fcntl$setstatus(r2, 0x4, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x100) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x48, 0x80, 0x3f, 0x1, 0x0, 0xc4, 0x4, 0x5, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f00000004c0)}, 0x880, 0x8, 0x4, 0x222db880e1fb0bed, 0x9, 0x8228, 0x3, 0x0, 0xfffffff8, 0x0, 0x7f}, 0xffffffffffffffff, 0x10, r0, 0xa) r4 = open(&(0x7f0000000140)='./file0\x00', 0x501400, 0x1e2) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x40, 0x9, 0x7, 0xf4, 0x0, 0x6, 0x8002, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f00000000c0), 0xe}, 0x800, 0x935, 0x2, 0x3, 0xc23, 0xff, 0x7, 0x0, 0x8, 0x0, 0x6}, 0x0, 0x5, r4, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000840)={'veth0_macvtap\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) writev(r3, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) mount$9p_rdma(&(0x7f0000000880), &(0x7f0000000200)='./file0\x00', &(0x7f0000000580), 0x12288b8, &(0x7f0000000a00)=ANY=[]) socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8936, &(0x7f0000000080)={@ipv4={'\x00', '\xff\xff', @empty}, 0x43, r6}) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=@newlink={0xc8, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x242b8, 0x42a0a}, [@IFLA_LINKINFO={0x98, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x88, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_INGRESS_QOS={0x70, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x200004, 0x1f}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7, 0x10001}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3fc, 0x39e4}}, @IFLA_VLAN_QOS_MAPPING={0x2c, 0x1, {0x8, 0x49}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7ff, 0xc73}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xd1e7, 0x5}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xcaa3, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xfffffffc}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xa1ae}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1, 0x8}}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0xc8}}, 0x0) 05:03:33 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x191}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:03:33 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xfd39, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) bpf$PROG_LOAD(0x5, 0x0, 0x0) 05:03:33 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x2ac}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000033c0)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x84) openat$cgroup_freezer_state(r1, &(0x7f0000000ec0), 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000f00)='cpuacct.usage_sys\x00', 0x0, 0x0) tkill(0x0, 0x34) prlimit64(0x0, 0x0, &(0x7f0000000380)={0x3, 0x6}, &(0x7f00000003c0)) [ 1490.820910][ T1232] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 05:03:33 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x19d}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:03:33 executing program 1: syz_open_dev$sndpcmp(&(0x7f00000000c0), 0x7, 0x0) 05:03:33 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x9101, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:03:33 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x8a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB="94000000000401030000000000000000000000007d39391a8bdf079f9f495a1fda171e3158f5c79ff5a4dfa267f9065b81eaa585529b1ed154c2e4de9fc975eb2bc712fe039df1a80dfb5986112b3f864dd6be18f185f6af53a91ef29a364869c075e208738464d03e023ce658bc45e51d0cd92f13dd19bed44b18c890ed907be58e2f0bcb02e3c1edb68f44d0d2c95d075a7ceddb3c8a0b063f62856a88e3e03f757467a06cf67105344eb3831130485e90b0e7d8317b2cdf3de6ff9b2c0307dc8d02d485923047d57b31d22a61abcc56"], 0x14}}, 0x0) r2 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x100000, 0x0) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000600)={0xc0, 0x464, 0x20, 0x70bd2b, 0x25dfdbff, "973f9703e43681c987947af3c1c8083de32ea8c59e17bb66fa1131bb71f62feb9d0e2d30dd5e0b3412958e5fe0cceec4126aac730f0637bbd5800c45a7540643c9c2c37aec0fd2421ecaab72641bc72be3958a965740c910b05431206b3784e1f84519555df72fc585d1fe8bc9c7edb156ad0efe2e5af3837edfddc3b7b14e00cda27aef1b0cbdee00e73a16858db80462c0721e260eb71762c36d071ce2212930ef26fbad80c57ca5f20663efbd6221", ["", "", ""]}, 0xc0}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000000) fcntl$setstatus(r2, 0x4, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x100) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x48, 0x80, 0x3f, 0x1, 0x0, 0xc4, 0x4, 0x5, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f00000004c0)}, 0x880, 0x8, 0x4, 0x222db880e1fb0bed, 0x9, 0x8228, 0x3, 0x0, 0xfffffff8, 0x0, 0x7f}, 0xffffffffffffffff, 0x10, r0, 0xa) r4 = open(&(0x7f0000000140)='./file0\x00', 0x501400, 0x1e2) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x40, 0x9, 0x7, 0xf4, 0x0, 0x6, 0x8002, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f00000000c0), 0xe}, 0x800, 0x935, 0x2, 0x3, 0xc23, 0xff, 0x7, 0x0, 0x8, 0x0, 0x6}, 0x0, 0x5, r4, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000840)={'veth0_macvtap\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) writev(r3, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) mount$9p_rdma(&(0x7f0000000880), &(0x7f0000000200)='./file0\x00', &(0x7f0000000580), 0x12288b8, &(0x7f0000000a00)=ANY=[]) socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8936, &(0x7f0000000080)={@ipv4={'\x00', '\xff\xff', @empty}, 0x43, r6}) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=@newlink={0xc8, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x242b8, 0x42a0a}, [@IFLA_LINKINFO={0x98, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x88, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_INGRESS_QOS={0x70, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x200004, 0x1f}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7, 0x10001}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3fc, 0x39e4}}, @IFLA_VLAN_QOS_MAPPING={0x2c, 0x1, {0x8, 0x49}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7ff, 0xc73}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xd1e7, 0x5}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xcaa3, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xfffffffc}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xa1ae}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1, 0x8}}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0xc8}}, 0x0) 05:03:33 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x8, 0x0, 0x6) 05:03:33 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x2c9}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000033c0)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x84) openat$cgroup_freezer_state(r1, &(0x7f0000000ec0), 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000f00)='cpuacct.usage_sys\x00', 0x0, 0x0) tkill(0x0, 0x34) prlimit64(0x0, 0x0, &(0x7f0000000380)={0x3, 0x6}, &(0x7f00000003c0)) 05:03:33 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x1c6}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:03:33 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x9c00, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:03:33 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), r0) [ 1491.313689][ T1270] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 05:03:33 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x8a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB="94000000000401030000000000000000000000007d39391a8bdf079f9f495a1fda171e3158f5c79ff5a4dfa267f9065b81eaa585529b1ed154c2e4de9fc975eb2bc712fe039df1a80dfb5986112b3f864dd6be18f185f6af53a91ef29a364869c075e208738464d03e023ce658bc45e51d0cd92f13dd19bed44b18c890ed907be58e2f0bcb02e3c1edb68f44d0d2c95d075a7ceddb3c8a0b063f62856a88e3e03f757467a06cf67105344eb3831130485e90b0e7d8317b2cdf3de6ff9b2c0307dc8d02d485923047d57b31d22a61abcc56"], 0x14}}, 0x0) r2 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x100000, 0x0) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000600)={0xc0, 0x464, 0x20, 0x70bd2b, 0x25dfdbff, "973f9703e43681c987947af3c1c8083de32ea8c59e17bb66fa1131bb71f62feb9d0e2d30dd5e0b3412958e5fe0cceec4126aac730f0637bbd5800c45a7540643c9c2c37aec0fd2421ecaab72641bc72be3958a965740c910b05431206b3784e1f84519555df72fc585d1fe8bc9c7edb156ad0efe2e5af3837edfddc3b7b14e00cda27aef1b0cbdee00e73a16858db80462c0721e260eb71762c36d071ce2212930ef26fbad80c57ca5f20663efbd6221", ["", "", ""]}, 0xc0}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000000) fcntl$setstatus(r2, 0x4, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x100) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x48, 0x80, 0x3f, 0x1, 0x0, 0xc4, 0x4, 0x5, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f00000004c0)}, 0x880, 0x8, 0x4, 0x222db880e1fb0bed, 0x9, 0x8228, 0x3, 0x0, 0xfffffff8, 0x0, 0x7f}, 0xffffffffffffffff, 0x10, r0, 0xa) r4 = open(&(0x7f0000000140)='./file0\x00', 0x501400, 0x1e2) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x40, 0x9, 0x7, 0xf4, 0x0, 0x6, 0x8002, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f00000000c0), 0xe}, 0x800, 0x935, 0x2, 0x3, 0xc23, 0xff, 0x7, 0x0, 0x8, 0x0, 0x6}, 0x0, 0x5, r4, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000840)={'veth0_macvtap\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) writev(r3, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) mount$9p_rdma(&(0x7f0000000880), &(0x7f0000000200)='./file0\x00', &(0x7f0000000580), 0x12288b8, &(0x7f0000000a00)=ANY=[]) socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8936, &(0x7f0000000080)={@ipv4={'\x00', '\xff\xff', @empty}, 0x43, r6}) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=@newlink={0xc8, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x242b8, 0x42a0a}, [@IFLA_LINKINFO={0x98, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x88, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_INGRESS_QOS={0x70, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x200004, 0x1f}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7, 0x10001}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3fc, 0x39e4}}, @IFLA_VLAN_QOS_MAPPING={0x2c, 0x1, {0x8, 0x49}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7ff, 0xc73}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xd1e7, 0x5}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xcaa3, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xfffffffc}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xa1ae}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1, 0x8}}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0xc8}}, 0x0) 05:03:33 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000005a80)={&(0x7f0000000040), 0xc, &(0x7f0000005a40)={&(0x7f00000045c0)={0xec4, 0x0, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_DEBUG_HEADER={0x78, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_DEBUG_HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vxcan1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_DEBUG_MSGMASK={0xdd8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x49, 0x4, "28d7d1e615338b91bb923ba74eee79cc2b59a9741703f6cc2793bfa98654677e066a0d73ffb95ae8ada66cbbf274105786b531369ca3a9308f77b2e2c3a9885b1ff4989d69"}, @ETHTOOL_A_BITSET_VALUE={0xd88, 0x4, "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"}]}]}, 0xec4}, 0x1, 0x0, 0x0, 0x810}, 0x44010) 05:03:33 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x2d5}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000033c0)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x84) openat$cgroup_freezer_state(r1, &(0x7f0000000ec0), 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000f00)='cpuacct.usage_sys\x00', 0x0, 0x0) tkill(0x0, 0x34) prlimit64(0x0, 0x0, &(0x7f0000000380)={0x3, 0x6}, &(0x7f00000003c0)) 05:03:33 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x9d01, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:03:33 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x1c9}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:03:34 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000012680)={0x11, 0x7, &(0x7f0000011580)=@raw=[@map_val, @initr0, @ldst, @initr0], &(0x7f00000115c0)='syzkaller\x00', 0x2, 0x1000, &(0x7f0000011600)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 05:03:34 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x9d02, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:03:34 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x8a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB="94000000000401030000000000000000000000007d39391a8bdf079f9f495a1fda171e3158f5c79ff5a4dfa267f9065b81eaa585529b1ed154c2e4de9fc975eb2bc712fe039df1a80dfb5986112b3f864dd6be18f185f6af53a91ef29a364869c075e208738464d03e023ce658bc45e51d0cd92f13dd19bed44b18c890ed907be58e2f0bcb02e3c1edb68f44d0d2c95d075a7ceddb3c8a0b063f62856a88e3e03f757467a06cf67105344eb3831130485e90b0e7d8317b2cdf3de6ff9b2c0307dc8d02d485923047d57b31d22a61abcc56"], 0x14}}, 0x0) r2 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x100000, 0x0) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000600)={0xc0, 0x464, 0x20, 0x70bd2b, 0x25dfdbff, "973f9703e43681c987947af3c1c8083de32ea8c59e17bb66fa1131bb71f62feb9d0e2d30dd5e0b3412958e5fe0cceec4126aac730f0637bbd5800c45a7540643c9c2c37aec0fd2421ecaab72641bc72be3958a965740c910b05431206b3784e1f84519555df72fc585d1fe8bc9c7edb156ad0efe2e5af3837edfddc3b7b14e00cda27aef1b0cbdee00e73a16858db80462c0721e260eb71762c36d071ce2212930ef26fbad80c57ca5f20663efbd6221", ["", "", ""]}, 0xc0}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000000) fcntl$setstatus(r2, 0x4, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x100) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x48, 0x80, 0x3f, 0x1, 0x0, 0xc4, 0x4, 0x5, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f00000004c0)}, 0x880, 0x8, 0x4, 0x222db880e1fb0bed, 0x9, 0x8228, 0x3, 0x0, 0xfffffff8, 0x0, 0x7f}, 0xffffffffffffffff, 0x10, r0, 0xa) r4 = open(&(0x7f0000000140)='./file0\x00', 0x501400, 0x1e2) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x40, 0x9, 0x7, 0xf4, 0x0, 0x6, 0x8002, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f00000000c0), 0xe}, 0x800, 0x935, 0x2, 0x3, 0xc23, 0xff, 0x7, 0x0, 0x8, 0x0, 0x6}, 0x0, 0x5, r4, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000840)={'veth0_macvtap\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) writev(r3, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) mount$9p_rdma(&(0x7f0000000880), &(0x7f0000000200)='./file0\x00', &(0x7f0000000580), 0x12288b8, &(0x7f0000000a00)=ANY=[]) socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8936, &(0x7f0000000080)={@ipv4={'\x00', '\xff\xff', @empty}, 0x43, r6}) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=@newlink={0xc8, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x242b8, 0x42a0a}, [@IFLA_LINKINFO={0x98, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x88, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_INGRESS_QOS={0x70, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x200004, 0x1f}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7, 0x10001}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3fc, 0x39e4}}, @IFLA_VLAN_QOS_MAPPING={0x2c, 0x1, {0x8, 0x49}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7ff, 0xc73}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xd1e7, 0x5}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xcaa3, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xfffffffc}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xa1ae}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1, 0x8}}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0xc8}}, 0x0) 05:03:34 executing program 2: syz_open_dev$dri(&(0x7f0000000480), 0xff, 0xfc97e9c95113432d) 05:03:34 executing program 1: openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0x141202, 0x0) 05:03:34 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x1fd}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:03:34 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x300}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000033c0)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x84) openat$cgroup_freezer_state(r1, &(0x7f0000000ec0), 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000f00)='cpuacct.usage_sys\x00', 0x0, 0x0) tkill(0x0, 0x34) prlimit64(0x0, 0x0, &(0x7f0000000380)={0x3, 0x6}, &(0x7f00000003c0)) [ 1492.119565][ T1337] __nla_validate_parse: 1 callbacks suppressed [ 1492.119582][ T1337] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 05:03:34 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0xa402, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:03:34 executing program 2: syz_mount_image$nfs(0x0, &(0x7f0000000600)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0, 0x0) 05:03:34 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x8a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB="94000000000401030000000000000000000000007d39391a8bdf079f9f495a1fda171e3158f5c79ff5a4dfa267f9065b81eaa585529b1ed154c2e4de9fc975eb2bc712fe039df1a80dfb5986112b3f864dd6be18f185f6af53a91ef29a364869c075e208738464d03e023ce658bc45e51d0cd92f13dd19bed44b18c890ed907be58e2f0bcb02e3c1edb68f44d0d2c95d075a7ceddb3c8a0b063f62856a88e3e03f757467a06cf67105344eb3831130485e90b0e7d8317b2cdf3de6ff9b2c0307dc8d02d485923047d57b31d22a61abcc56"], 0x14}}, 0x0) r2 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x100000, 0x0) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000600)={0xc0, 0x464, 0x20, 0x70bd2b, 0x25dfdbff, "973f9703e43681c987947af3c1c8083de32ea8c59e17bb66fa1131bb71f62feb9d0e2d30dd5e0b3412958e5fe0cceec4126aac730f0637bbd5800c45a7540643c9c2c37aec0fd2421ecaab72641bc72be3958a965740c910b05431206b3784e1f84519555df72fc585d1fe8bc9c7edb156ad0efe2e5af3837edfddc3b7b14e00cda27aef1b0cbdee00e73a16858db80462c0721e260eb71762c36d071ce2212930ef26fbad80c57ca5f20663efbd6221", ["", "", ""]}, 0xc0}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000000) fcntl$setstatus(r2, 0x4, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x100) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x48, 0x80, 0x3f, 0x1, 0x0, 0xc4, 0x4, 0x5, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f00000004c0)}, 0x880, 0x8, 0x4, 0x222db880e1fb0bed, 0x9, 0x8228, 0x3, 0x0, 0xfffffff8, 0x0, 0x7f}, 0xffffffffffffffff, 0x10, r0, 0xa) r4 = open(&(0x7f0000000140)='./file0\x00', 0x501400, 0x1e2) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x40, 0x9, 0x7, 0xf4, 0x0, 0x6, 0x8002, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f00000000c0), 0xe}, 0x800, 0x935, 0x2, 0x3, 0xc23, 0xff, 0x7, 0x0, 0x8, 0x0, 0x6}, 0x0, 0x5, r4, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000840)={'veth0_macvtap\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) writev(r3, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) mount$9p_rdma(&(0x7f0000000880), &(0x7f0000000200)='./file0\x00', &(0x7f0000000580), 0x12288b8, &(0x7f0000000a00)=ANY=[]) socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8936, &(0x7f0000000080)={@ipv4={'\x00', '\xff\xff', @empty}, 0x43, r6}) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=@newlink={0xc8, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x242b8, 0x42a0a}, [@IFLA_LINKINFO={0x98, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x88, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_INGRESS_QOS={0x70, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x200004, 0x1f}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7, 0x10001}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3fc, 0x39e4}}, @IFLA_VLAN_QOS_MAPPING={0x2c, 0x1, {0x8, 0x49}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7ff, 0xc73}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xd1e7, 0x5}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xcaa3, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xfffffffc}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xa1ae}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1, 0x8}}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0xc8}}, 0x0) 05:03:34 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x204}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:03:34 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x301}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000033c0)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x84) openat$cgroup_freezer_state(r1, &(0x7f0000000ec0), 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000f00)='cpuacct.usage_sys\x00', 0x0, 0x0) tkill(0x0, 0x34) prlimit64(0x0, 0x0, &(0x7f0000000380)={0x3, 0x6}, &(0x7f00000003c0)) 05:03:34 executing program 1: clock_gettime(0x0, &(0x7f0000000400)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000340), 0x0, &(0x7f00000003c0)={0x2}, &(0x7f0000000440)={0x0, r0+60000000}, 0x0) 05:03:35 executing program 2: syz_mount_image$nfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x101004, &(0x7f0000000280)) 05:03:35 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0xa903, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() [ 1492.657373][ T1373] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 05:03:35 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x3a9}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000033c0)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x84) openat$cgroup_freezer_state(r1, &(0x7f0000000ec0), 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000f00)='cpuacct.usage_sys\x00', 0x0, 0x0) tkill(0x0, 0x34) prlimit64(0x0, 0x0, &(0x7f0000000380)={0x3, 0x6}, &(0x7f00000003c0)) 05:03:35 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x8a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB="94000000000401030000000000000000000000007d39391a8bdf079f9f495a1fda171e3158f5c79ff5a4dfa267f9065b81eaa585529b1ed154c2e4de9fc975eb2bc712fe039df1a80dfb5986112b3f864dd6be18f185f6af53a91ef29a364869c075e208738464d03e023ce658bc45e51d0cd92f13dd19bed44b18c890ed907be58e2f0bcb02e3c1edb68f44d0d2c95d075a7ceddb3c8a0b063f62856a88e3e03f757467a06cf67105344eb3831130485e90b0e7d8317b2cdf3de6ff9b2c0307dc8d02d485923047d57b31d22a61abcc56"], 0x14}}, 0x0) r2 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x100000, 0x0) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000600)={0xc0, 0x464, 0x20, 0x70bd2b, 0x25dfdbff, "973f9703e43681c987947af3c1c8083de32ea8c59e17bb66fa1131bb71f62feb9d0e2d30dd5e0b3412958e5fe0cceec4126aac730f0637bbd5800c45a7540643c9c2c37aec0fd2421ecaab72641bc72be3958a965740c910b05431206b3784e1f84519555df72fc585d1fe8bc9c7edb156ad0efe2e5af3837edfddc3b7b14e00cda27aef1b0cbdee00e73a16858db80462c0721e260eb71762c36d071ce2212930ef26fbad80c57ca5f20663efbd6221", ["", "", ""]}, 0xc0}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000000) fcntl$setstatus(r2, 0x4, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x100) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x48, 0x80, 0x3f, 0x1, 0x0, 0xc4, 0x4, 0x5, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f00000004c0)}, 0x880, 0x8, 0x4, 0x222db880e1fb0bed, 0x9, 0x8228, 0x3, 0x0, 0xfffffff8, 0x0, 0x7f}, 0xffffffffffffffff, 0x10, r0, 0xa) r4 = open(&(0x7f0000000140)='./file0\x00', 0x501400, 0x1e2) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x40, 0x9, 0x7, 0xf4, 0x0, 0x6, 0x8002, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f00000000c0), 0xe}, 0x800, 0x935, 0x2, 0x3, 0xc23, 0xff, 0x7, 0x0, 0x8, 0x0, 0x6}, 0x0, 0x5, r4, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000840)={'veth0_macvtap\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) writev(r3, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) mount$9p_rdma(&(0x7f0000000880), &(0x7f0000000200)='./file0\x00', &(0x7f0000000580), 0x12288b8, &(0x7f0000000a00)=ANY=[]) socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8936, &(0x7f0000000080)={@ipv4={'\x00', '\xff\xff', @empty}, 0x43, r6}) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=@newlink={0xc8, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x242b8, 0x42a0a}, [@IFLA_LINKINFO={0x98, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x88, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_INGRESS_QOS={0x70, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x200004, 0x1f}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7, 0x10001}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3fc, 0x39e4}}, @IFLA_VLAN_QOS_MAPPING={0x2c, 0x1, {0x8, 0x49}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7ff, 0xc73}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xd1e7, 0x5}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xcaa3, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xfffffffc}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xa1ae}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1, 0x8}}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0xc8}}, 0x0) 05:03:35 executing program 1: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f0000000100)={0x20, 0x0, 0x0, 'queue1\x00'}) 05:03:35 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x265}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() [ 1493.020533][ T1394] set_target_v0_checkentry: 37 callbacks suppressed [ 1493.020569][ T1394] Cannot find add_set index 0 as target [ 1493.086702][ T1405] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 05:03:35 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0xac02, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() [ 1493.185565][ T1409] Cannot find add_set index 0 as target 05:03:35 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x3f8}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000033c0)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x84) openat$cgroup_freezer_state(r1, &(0x7f0000000ec0), 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000f00)='cpuacct.usage_sys\x00', 0x0, 0x0) tkill(0x0, 0x34) prlimit64(0x0, 0x0, &(0x7f0000000380)={0x3, 0x6}, &(0x7f00000003c0)) 05:03:35 executing program 1: clock_gettime(0x0, &(0x7f0000000c40)) 05:03:35 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000cc0), r0) syz_genetlink_get_family_id$ethtool(&(0x7f000000a540), r0) 05:03:35 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x8a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB="94000000000401030000000000000000000000007d39391a8bdf079f9f495a1fda171e3158f5c79ff5a4dfa267f9065b81eaa585529b1ed154c2e4de9fc975eb2bc712fe039df1a80dfb5986112b3f864dd6be18f185f6af53a91ef29a364869c075e208738464d03e023ce658bc45e51d0cd92f13dd19bed44b18c890ed907be58e2f0bcb02e3c1edb68f44d0d2c95d075a7ceddb3c8a0b063f62856a88e3e03f757467a06cf67105344eb3831130485e90b0e7d8317b2cdf3de6ff9b2c0307dc8d02d485923047d57b31d22a61abcc56"], 0x14}}, 0x0) r2 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x100000, 0x0) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000600)={0xc0, 0x464, 0x20, 0x70bd2b, 0x25dfdbff, "973f9703e43681c987947af3c1c8083de32ea8c59e17bb66fa1131bb71f62feb9d0e2d30dd5e0b3412958e5fe0cceec4126aac730f0637bbd5800c45a7540643c9c2c37aec0fd2421ecaab72641bc72be3958a965740c910b05431206b3784e1f84519555df72fc585d1fe8bc9c7edb156ad0efe2e5af3837edfddc3b7b14e00cda27aef1b0cbdee00e73a16858db80462c0721e260eb71762c36d071ce2212930ef26fbad80c57ca5f20663efbd6221", ["", "", ""]}, 0xc0}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000000) fcntl$setstatus(r2, 0x4, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x100) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x48, 0x80, 0x3f, 0x1, 0x0, 0xc4, 0x4, 0x5, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f00000004c0)}, 0x880, 0x8, 0x4, 0x222db880e1fb0bed, 0x9, 0x8228, 0x3, 0x0, 0xfffffff8, 0x0, 0x7f}, 0xffffffffffffffff, 0x10, r0, 0xa) r4 = open(&(0x7f0000000140)='./file0\x00', 0x501400, 0x1e2) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x40, 0x9, 0x7, 0xf4, 0x0, 0x6, 0x8002, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f00000000c0), 0xe}, 0x800, 0x935, 0x2, 0x3, 0xc23, 0xff, 0x7, 0x0, 0x8, 0x0, 0x6}, 0x0, 0x5, r4, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000840)={'veth0_macvtap\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) writev(r3, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) mount$9p_rdma(&(0x7f0000000880), &(0x7f0000000200)='./file0\x00', &(0x7f0000000580), 0x12288b8, &(0x7f0000000a00)=ANY=[]) socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8936, &(0x7f0000000080)={@ipv4={'\x00', '\xff\xff', @empty}, 0x43, r6}) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=@newlink={0xc8, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x242b8, 0x42a0a}, [@IFLA_LINKINFO={0x98, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x88, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_INGRESS_QOS={0x70, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x200004, 0x1f}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7, 0x10001}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3fc, 0x39e4}}, @IFLA_VLAN_QOS_MAPPING={0x2c, 0x1, {0x8, 0x49}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7ff, 0xc73}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xd1e7, 0x5}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xcaa3, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xfffffffc}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xa1ae}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1, 0x8}}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0xc8}}, 0x0) [ 1493.409967][ T1424] Cannot find add_set index 0 as target 05:03:35 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x288}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() [ 1493.508516][ T1432] Cannot find add_set index 0 as target 05:03:35 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x402}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000033c0)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x84) openat$cgroup_freezer_state(r1, &(0x7f0000000ec0), 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000f00)='cpuacct.usage_sys\x00', 0x0, 0x0) tkill(0x0, 0x34) prlimit64(0x0, 0x0, &(0x7f0000000380)={0x3, 0x6}, &(0x7f00000003c0)) [ 1493.572369][ T1439] Cannot find add_set index 0 as target [ 1493.630385][ T1443] Cannot find add_set index 0 as target [ 1493.665765][ T1445] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 05:03:36 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000003e80)={0x0, 0x0, &(0x7f0000003e40)={&(0x7f0000003ec0)=ANY=[], 0x254c}}, 0x0) 05:03:36 executing program 2: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0xc0bc5310, &(0x7f0000000040)={0x3f, 0x0, 'client1\x00', 0x0, "21c57bf1e2459575", "c0824a3e9c2bdde12c12b00b16254cdd99beb1914651f41f68defd09632b769d"}) 05:03:36 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0xc601, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() [ 1493.830895][ T1451] Cannot find add_set index 0 as target 05:03:36 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x8a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB="94000000000401030000000000000000000000007d39391a8bdf079f9f495a1fda171e3158f5c79ff5a4dfa267f9065b81eaa585529b1ed154c2e4de9fc975eb2bc712fe039df1a80dfb5986112b3f864dd6be18f185f6af53a91ef29a364869c075e208738464d03e023ce658bc45e51d0cd92f13dd19bed44b18c890ed907be58e2f0bcb02e3c1edb68f44d0d2c95d075a7ceddb3c8a0b063f62856a88e3e03f757467a06cf67105344eb3831130485e90b0e7d8317b2cdf3de6ff9b2c0307dc8d02d485923047d57b31d22a61abcc56"], 0x14}}, 0x0) r2 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x100000, 0x0) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000600)={0xc0, 0x464, 0x20, 0x70bd2b, 0x25dfdbff, "973f9703e43681c987947af3c1c8083de32ea8c59e17bb66fa1131bb71f62feb9d0e2d30dd5e0b3412958e5fe0cceec4126aac730f0637bbd5800c45a7540643c9c2c37aec0fd2421ecaab72641bc72be3958a965740c910b05431206b3784e1f84519555df72fc585d1fe8bc9c7edb156ad0efe2e5af3837edfddc3b7b14e00cda27aef1b0cbdee00e73a16858db80462c0721e260eb71762c36d071ce2212930ef26fbad80c57ca5f20663efbd6221", ["", "", ""]}, 0xc0}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000000) fcntl$setstatus(r2, 0x4, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x100) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x48, 0x80, 0x3f, 0x1, 0x0, 0xc4, 0x4, 0x5, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f00000004c0)}, 0x880, 0x8, 0x4, 0x222db880e1fb0bed, 0x9, 0x8228, 0x3, 0x0, 0xfffffff8, 0x0, 0x7f}, 0xffffffffffffffff, 0x10, r0, 0xa) r4 = open(&(0x7f0000000140)='./file0\x00', 0x501400, 0x1e2) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x40, 0x9, 0x7, 0xf4, 0x0, 0x6, 0x8002, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f00000000c0), 0xe}, 0x800, 0x935, 0x2, 0x3, 0xc23, 0xff, 0x7, 0x0, 0x8, 0x0, 0x6}, 0x0, 0x5, r4, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000840)={'veth0_macvtap\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) writev(r3, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) mount$9p_rdma(&(0x7f0000000880), &(0x7f0000000200)='./file0\x00', &(0x7f0000000580), 0x12288b8, &(0x7f0000000a00)=ANY=[]) socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8936, &(0x7f0000000080)={@ipv4={'\x00', '\xff\xff', @empty}, 0x43, r6}) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=@newlink={0xc8, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x242b8, 0x42a0a}, [@IFLA_LINKINFO={0x98, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x88, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_INGRESS_QOS={0x70, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x200004, 0x1f}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7, 0x10001}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3fc, 0x39e4}}, @IFLA_VLAN_QOS_MAPPING={0x2c, 0x1, {0x8, 0x49}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7ff, 0xc73}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xd1e7, 0x5}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xcaa3, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xfffffffc}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xa1ae}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1, 0x8}}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0xc8}}, 0x0) 05:03:36 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x29d}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:03:36 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x500}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000033c0)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x84) openat$cgroup_freezer_state(r1, &(0x7f0000000ec0), 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000f00)='cpuacct.usage_sys\x00', 0x0, 0x0) tkill(0x0, 0x34) prlimit64(0x0, 0x0, &(0x7f0000000380)={0x3, 0x6}, &(0x7f00000003c0)) [ 1493.963826][ T1457] Cannot find add_set index 0 as target 05:03:36 executing program 1: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0x40505331, &(0x7f0000000040)={0x0, 0x0, 'client1\x00', 0x0, "cda33c7f90aa0fc1", "300b70da2bdee387baca12f4b7100489874d0d3e555f5f86e539c9e4bb6a36fe"}) 05:03:36 executing program 2: clock_gettime(0x0, &(0x7f0000000400)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000340), &(0x7f0000000380)={0xffff}, 0x0, &(0x7f0000000440)={0x0, r0+60000000}, 0x0) [ 1494.161655][ T1473] Cannot find add_set index 0 as target [ 1494.175044][ T1471] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1494.266464][ T1474] Cannot find add_set index 0 as target 05:03:36 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0xc901, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:03:36 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x8a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB="94000000000401030000000000000000000000007d39391a8bdf079f9f495a1fda171e3158f5c79ff5a4dfa267f9065b81eaa585529b1ed154c2e4de9fc975eb2bc712fe039df1a80dfb5986112b3f864dd6be18f185f6af53a91ef29a364869c075e208738464d03e023ce658bc45e51d0cd92f13dd19bed44b18c890ed907be58e2f0bcb02e3c1edb68f44d0d2c95d075a7ceddb3c8a0b063f62856a88e3e03f757467a06cf67105344eb3831130485e90b0e7d8317b2cdf3de6ff9b2c0307dc8d02d485923047d57b31d22a61abcc56"], 0x14}}, 0x0) r2 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x100000, 0x0) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000600)={0xc0, 0x464, 0x20, 0x70bd2b, 0x25dfdbff, "973f9703e43681c987947af3c1c8083de32ea8c59e17bb66fa1131bb71f62feb9d0e2d30dd5e0b3412958e5fe0cceec4126aac730f0637bbd5800c45a7540643c9c2c37aec0fd2421ecaab72641bc72be3958a965740c910b05431206b3784e1f84519555df72fc585d1fe8bc9c7edb156ad0efe2e5af3837edfddc3b7b14e00cda27aef1b0cbdee00e73a16858db80462c0721e260eb71762c36d071ce2212930ef26fbad80c57ca5f20663efbd6221", ["", "", ""]}, 0xc0}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000000) fcntl$setstatus(r2, 0x4, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x100) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x48, 0x80, 0x3f, 0x1, 0x0, 0xc4, 0x4, 0x5, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f00000004c0)}, 0x880, 0x8, 0x4, 0x222db880e1fb0bed, 0x9, 0x8228, 0x3, 0x0, 0xfffffff8, 0x0, 0x7f}, 0xffffffffffffffff, 0x10, r0, 0xa) r4 = open(&(0x7f0000000140)='./file0\x00', 0x501400, 0x1e2) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x40, 0x9, 0x7, 0xf4, 0x0, 0x6, 0x8002, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f00000000c0), 0xe}, 0x800, 0x935, 0x2, 0x3, 0xc23, 0xff, 0x7, 0x0, 0x8, 0x0, 0x6}, 0x0, 0x5, r4, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000840)={'veth0_macvtap\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) writev(r3, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) mount$9p_rdma(&(0x7f0000000880), &(0x7f0000000200)='./file0\x00', &(0x7f0000000580), 0x12288b8, &(0x7f0000000a00)=ANY=[]) socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8936, &(0x7f0000000080)={@ipv4={'\x00', '\xff\xff', @empty}, 0x43, r6}) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=@newlink={0xc8, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x242b8, 0x42a0a}, [@IFLA_LINKINFO={0x98, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x88, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_INGRESS_QOS={0x70, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x200004, 0x1f}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7, 0x10001}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3fc, 0x39e4}}, @IFLA_VLAN_QOS_MAPPING={0x2c, 0x1, {0x8, 0x49}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7ff, 0xc73}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xd1e7, 0x5}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xcaa3, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xfffffffc}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xa1ae}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1, 0x8}}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0xc8}}, 0x0) 05:03:36 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x2a4}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:03:36 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x600}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000033c0)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x84) openat$cgroup_freezer_state(r1, &(0x7f0000000ec0), 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000f00)='cpuacct.usage_sys\x00', 0x0, 0x0) tkill(0x0, 0x34) prlimit64(0x0, 0x0, &(0x7f0000000380)={0x3, 0x6}, &(0x7f00000003c0)) 05:03:36 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0xf0400, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000180), 0x2, 0x0) pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000280), &(0x7f0000000300)={&(0x7f00000002c0)={[0x5b]}, 0x8}) clock_gettime(0x0, &(0x7f0000000340)) read$char_usb(r0, &(0x7f0000000380)=""/111, 0x6f) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000680), 0xffffffffffffffff) ioctl$SNDRV_PCM_IOCTL_START(0xffffffffffffffff, 0x4142, 0x0) pselect6(0x0, 0x0, 0x0, &(0x7f0000000880)={0x0, 0x800}, 0x0, &(0x7f0000000940)={0x0}) syz_genetlink_get_family_id$batadv(&(0x7f0000000980), 0xffffffffffffffff) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000a80), 0xffffffffffffffff) 05:03:36 executing program 1: clock_gettime(0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 05:03:37 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x2ac}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() [ 1494.697514][ T1505] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 05:03:37 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0xc902, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:03:37 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x700}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000033c0)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x84) openat$cgroup_freezer_state(r1, &(0x7f0000000ec0), 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000f00)='cpuacct.usage_sys\x00', 0x0, 0x0) tkill(0x0, 0x34) prlimit64(0x0, 0x0, &(0x7f0000000380)={0x3, 0x6}, &(0x7f00000003c0)) 05:03:37 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x8a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB="94000000000401030000000000000000000000007d39391a8bdf079f9f495a1fda171e3158f5c79ff5a4dfa267f9065b81eaa585529b1ed154c2e4de9fc975eb2bc712fe039df1a80dfb5986112b3f864dd6be18f185f6af53a91ef29a364869c075e208738464d03e023ce658bc45e51d0cd92f13dd19bed44b18c890ed907be58e2f0bcb02e3c1edb68f44d0d2c95d075a7ceddb3c8a0b063f62856a88e3e03f757467a06cf67105344eb3831130485e90b0e7d8317b2cdf3de6ff9b2c0307dc8d02d485923047d57b31d22a61abcc56"], 0x14}}, 0x0) r2 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x100000, 0x0) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000600)={0xc0, 0x464, 0x20, 0x70bd2b, 0x25dfdbff, "973f9703e43681c987947af3c1c8083de32ea8c59e17bb66fa1131bb71f62feb9d0e2d30dd5e0b3412958e5fe0cceec4126aac730f0637bbd5800c45a7540643c9c2c37aec0fd2421ecaab72641bc72be3958a965740c910b05431206b3784e1f84519555df72fc585d1fe8bc9c7edb156ad0efe2e5af3837edfddc3b7b14e00cda27aef1b0cbdee00e73a16858db80462c0721e260eb71762c36d071ce2212930ef26fbad80c57ca5f20663efbd6221", ["", "", ""]}, 0xc0}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000000) fcntl$setstatus(r2, 0x4, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x100) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x48, 0x80, 0x3f, 0x1, 0x0, 0xc4, 0x4, 0x5, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f00000004c0)}, 0x880, 0x8, 0x4, 0x222db880e1fb0bed, 0x9, 0x8228, 0x3, 0x0, 0xfffffff8, 0x0, 0x7f}, 0xffffffffffffffff, 0x10, r0, 0xa) r4 = open(&(0x7f0000000140)='./file0\x00', 0x501400, 0x1e2) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x40, 0x9, 0x7, 0xf4, 0x0, 0x6, 0x8002, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f00000000c0), 0xe}, 0x800, 0x935, 0x2, 0x3, 0xc23, 0xff, 0x7, 0x0, 0x8, 0x0, 0x6}, 0x0, 0x5, r4, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000840)={'veth0_macvtap\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) writev(r3, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) mount$9p_rdma(&(0x7f0000000880), &(0x7f0000000200)='./file0\x00', &(0x7f0000000580), 0x12288b8, &(0x7f0000000a00)=ANY=[]) socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8936, &(0x7f0000000080)={@ipv4={'\x00', '\xff\xff', @empty}, 0x43, r6}) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=@newlink={0xc8, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x242b8, 0x42a0a}, [@IFLA_LINKINFO={0x98, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x88, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_INGRESS_QOS={0x70, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x200004, 0x1f}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7, 0x10001}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3fc, 0x39e4}}, @IFLA_VLAN_QOS_MAPPING={0x2c, 0x1, {0x8, 0x49}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7ff, 0xc73}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xd1e7, 0x5}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xcaa3, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xfffffffc}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xa1ae}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1, 0x8}}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0xc8}}, 0x0) 05:03:37 executing program 1: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000240)='./file0\x00'}, 0x10) [ 1495.106236][ T1537] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 05:03:37 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x801}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000033c0)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x84) openat$cgroup_freezer_state(r1, &(0x7f0000000ec0), 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000f00)='cpuacct.usage_sys\x00', 0x0, 0x0) tkill(0x0, 0x34) prlimit64(0x0, 0x0, &(0x7f0000000380)={0x3, 0x6}, &(0x7f00000003c0)) 05:03:37 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0xd502, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:03:37 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x2c9}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:03:37 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x8a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB="94000000000401030000000000000000000000007d39391a8bdf079f9f495a1fda171e3158f5c79ff5a4dfa267f9065b81eaa585529b1ed154c2e4de9fc975eb2bc712fe039df1a80dfb5986112b3f864dd6be18f185f6af53a91ef29a364869c075e208738464d03e023ce658bc45e51d0cd92f13dd19bed44b18c890ed907be58e2f0bcb02e3c1edb68f44d0d2c95d075a7ceddb3c8a0b063f62856a88e3e03f757467a06cf67105344eb3831130485e90b0e7d8317b2cdf3de6ff9b2c0307dc8d02d485923047d57b31d22a61abcc56"], 0x14}}, 0x0) r2 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x100000, 0x0) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000600)={0xc0, 0x464, 0x20, 0x70bd2b, 0x25dfdbff, "973f9703e43681c987947af3c1c8083de32ea8c59e17bb66fa1131bb71f62feb9d0e2d30dd5e0b3412958e5fe0cceec4126aac730f0637bbd5800c45a7540643c9c2c37aec0fd2421ecaab72641bc72be3958a965740c910b05431206b3784e1f84519555df72fc585d1fe8bc9c7edb156ad0efe2e5af3837edfddc3b7b14e00cda27aef1b0cbdee00e73a16858db80462c0721e260eb71762c36d071ce2212930ef26fbad80c57ca5f20663efbd6221", ["", "", ""]}, 0xc0}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000000) fcntl$setstatus(r2, 0x4, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x100) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x48, 0x80, 0x3f, 0x1, 0x0, 0xc4, 0x4, 0x5, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f00000004c0)}, 0x880, 0x8, 0x4, 0x222db880e1fb0bed, 0x9, 0x8228, 0x3, 0x0, 0xfffffff8, 0x0, 0x7f}, 0xffffffffffffffff, 0x10, r0, 0xa) r4 = open(&(0x7f0000000140)='./file0\x00', 0x501400, 0x1e2) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x40, 0x9, 0x7, 0xf4, 0x0, 0x6, 0x8002, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f00000000c0), 0xe}, 0x800, 0x935, 0x2, 0x3, 0xc23, 0xff, 0x7, 0x0, 0x8, 0x0, 0x6}, 0x0, 0x5, r4, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000840)={'veth0_macvtap\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) writev(r3, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) mount$9p_rdma(&(0x7f0000000880), &(0x7f0000000200)='./file0\x00', &(0x7f0000000580), 0x12288b8, &(0x7f0000000a00)=ANY=[]) socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8936, &(0x7f0000000080)={@ipv4={'\x00', '\xff\xff', @empty}, 0x43, r6}) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=@newlink={0xc8, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x242b8, 0x42a0a}, [@IFLA_LINKINFO={0x98, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x88, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_INGRESS_QOS={0x70, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x200004, 0x1f}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7, 0x10001}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3fc, 0x39e4}}, @IFLA_VLAN_QOS_MAPPING={0x2c, 0x1, {0x8, 0x49}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7ff, 0xc73}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xd1e7, 0x5}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xcaa3, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xfffffffc}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xa1ae}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1, 0x8}}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0xc8}}, 0x0) 05:03:37 executing program 1: pselect6(0x40, &(0x7f0000000800), &(0x7f0000000840)={0xffffffff}, 0x0, 0x0, 0x0) [ 1495.469285][ T1560] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 05:03:38 executing program 2: socket(0x0, 0x0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000100), 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000004540)) 05:03:38 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0xa00}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000033c0)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x84) openat$cgroup_freezer_state(r1, &(0x7f0000000ec0), 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000f00)='cpuacct.usage_sys\x00', 0x0, 0x0) tkill(0x0, 0x34) prlimit64(0x0, 0x0, &(0x7f0000000380)={0x3, 0x6}, &(0x7f00000003c0)) 05:03:38 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0xf803, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:03:38 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x2d5}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:03:38 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x8a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB="94000000000401030000000000000000000000007d39391a8bdf079f9f495a1fda171e3158f5c79ff5a4dfa267f9065b81eaa585529b1ed154c2e4de9fc975eb2bc712fe039df1a80dfb5986112b3f864dd6be18f185f6af53a91ef29a364869c075e208738464d03e023ce658bc45e51d0cd92f13dd19bed44b18c890ed907be58e2f0bcb02e3c1edb68f44d0d2c95d075a7ceddb3c8a0b063f62856a88e3e03f757467a06cf67105344eb3831130485e90b0e7d8317b2cdf3de6ff9b2c0307dc8d02d485923047d57b31d22a61abcc56"], 0x14}}, 0x0) r2 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x100000, 0x0) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000600)={0xc0, 0x464, 0x20, 0x70bd2b, 0x25dfdbff, "973f9703e43681c987947af3c1c8083de32ea8c59e17bb66fa1131bb71f62feb9d0e2d30dd5e0b3412958e5fe0cceec4126aac730f0637bbd5800c45a7540643c9c2c37aec0fd2421ecaab72641bc72be3958a965740c910b05431206b3784e1f84519555df72fc585d1fe8bc9c7edb156ad0efe2e5af3837edfddc3b7b14e00cda27aef1b0cbdee00e73a16858db80462c0721e260eb71762c36d071ce2212930ef26fbad80c57ca5f20663efbd6221", ["", "", ""]}, 0xc0}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000000) fcntl$setstatus(r2, 0x4, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x100) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x48, 0x80, 0x3f, 0x1, 0x0, 0xc4, 0x4, 0x5, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f00000004c0)}, 0x880, 0x8, 0x4, 0x222db880e1fb0bed, 0x9, 0x8228, 0x3, 0x0, 0xfffffff8, 0x0, 0x7f}, 0xffffffffffffffff, 0x10, r0, 0xa) r4 = open(&(0x7f0000000140)='./file0\x00', 0x501400, 0x1e2) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x40, 0x9, 0x7, 0xf4, 0x0, 0x6, 0x8002, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f00000000c0), 0xe}, 0x800, 0x935, 0x2, 0x3, 0xc23, 0xff, 0x7, 0x0, 0x8, 0x0, 0x6}, 0x0, 0x5, r4, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000840)={'veth0_macvtap\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) writev(r3, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) mount$9p_rdma(&(0x7f0000000880), &(0x7f0000000200)='./file0\x00', &(0x7f0000000580), 0x12288b8, &(0x7f0000000a00)=ANY=[]) socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8936, &(0x7f0000000080)={@ipv4={'\x00', '\xff\xff', @empty}, 0x43, r6}) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=@newlink={0xc8, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x242b8, 0x42a0a}, [@IFLA_LINKINFO={0x98, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x88, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_INGRESS_QOS={0x70, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x200004, 0x1f}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7, 0x10001}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3fc, 0x39e4}}, @IFLA_VLAN_QOS_MAPPING={0x2c, 0x1, {0x8, 0x49}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7ff, 0xc73}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xd1e7, 0x5}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xcaa3, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xfffffffc}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xa1ae}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1, 0x8}}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0xc8}}, 0x0) 05:03:38 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x20, 0x0, 0x8, 0x3, 0x0, 0x0, {}, [@CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x20}}, 0x0) 05:03:38 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0xfb00, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:03:38 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x300}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:03:38 executing program 1: openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000980), 0xffffffffffffffff) syz_genetlink_get_family_id$ieee802154(0x0, 0xffffffffffffffff) [ 1495.990091][ T1596] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 05:03:38 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0xe2d}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000033c0)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x84) openat$cgroup_freezer_state(r1, &(0x7f0000000ec0), 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000f00)='cpuacct.usage_sys\x00', 0x0, 0x0) tkill(0x0, 0x34) prlimit64(0x0, 0x0, &(0x7f0000000380)={0x3, 0x6}, &(0x7f00000003c0)) 05:03:38 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x8a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB="94000000000401030000000000000000000000007d39391a8bdf079f9f495a1fda171e3158f5c79ff5a4dfa267f9065b81eaa585529b1ed154c2e4de9fc975eb2bc712fe039df1a80dfb5986112b3f864dd6be18f185f6af53a91ef29a364869c075e208738464d03e023ce658bc45e51d0cd92f13dd19bed44b18c890ed907be58e2f0bcb02e3c1edb68f44d0d2c95d075a7ceddb3c8a0b063f62856a88e3e03f757467a06cf67105344eb3831130485e90b0e7d8317b2cdf3de6ff9b2c0307dc8d02d485923047d57b31d22a61abcc56"], 0x14}}, 0x0) r2 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x100000, 0x0) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000600)={0xc0, 0x464, 0x20, 0x70bd2b, 0x25dfdbff, "973f9703e43681c987947af3c1c8083de32ea8c59e17bb66fa1131bb71f62feb9d0e2d30dd5e0b3412958e5fe0cceec4126aac730f0637bbd5800c45a7540643c9c2c37aec0fd2421ecaab72641bc72be3958a965740c910b05431206b3784e1f84519555df72fc585d1fe8bc9c7edb156ad0efe2e5af3837edfddc3b7b14e00cda27aef1b0cbdee00e73a16858db80462c0721e260eb71762c36d071ce2212930ef26fbad80c57ca5f20663efbd6221", ["", "", ""]}, 0xc0}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000000) fcntl$setstatus(r2, 0x4, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x100) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x48, 0x80, 0x3f, 0x1, 0x0, 0xc4, 0x4, 0x5, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f00000004c0)}, 0x880, 0x8, 0x4, 0x222db880e1fb0bed, 0x9, 0x8228, 0x3, 0x0, 0xfffffff8, 0x0, 0x7f}, 0xffffffffffffffff, 0x10, r0, 0xa) r4 = open(&(0x7f0000000140)='./file0\x00', 0x501400, 0x1e2) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x40, 0x9, 0x7, 0xf4, 0x0, 0x6, 0x8002, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f00000000c0), 0xe}, 0x800, 0x935, 0x2, 0x3, 0xc23, 0xff, 0x7, 0x0, 0x8, 0x0, 0x6}, 0x0, 0x5, r4, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000840)={'veth0_macvtap\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) writev(r3, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) mount$9p_rdma(&(0x7f0000000880), &(0x7f0000000200)='./file0\x00', &(0x7f0000000580), 0x12288b8, &(0x7f0000000a00)=ANY=[]) socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8936, &(0x7f0000000080)={@ipv4={'\x00', '\xff\xff', @empty}, 0x43, r6}) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=@newlink={0xc8, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x242b8, 0x42a0a}, [@IFLA_LINKINFO={0x98, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x88, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_INGRESS_QOS={0x70, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x200004, 0x1f}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7, 0x10001}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3fc, 0x39e4}}, @IFLA_VLAN_QOS_MAPPING={0x2c, 0x1, {0x8, 0x49}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7ff, 0xc73}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xd1e7, 0x5}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xcaa3, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xfffffffc}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xa1ae}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1, 0x8}}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0xc8}}, 0x0) 05:03:38 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0xfd01, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:03:38 executing program 2: ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0x5, 0xdd, 0x4, 0x8000, 0x1, 0xffffffffffffffff, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5}, 0x40) sendmsg$BATADV_CMD_SET_MESH(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast2, @in=@empty}}, {{@in=@broadcast}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) 05:03:38 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x301}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:03:38 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000001680)={0x0, 0x0, 0x0}, 0x200000c3) [ 1496.471622][ T1624] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 05:03:38 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x1100}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000033c0)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x84) openat$cgroup_freezer_state(r1, &(0x7f0000000ec0), 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000f00)='cpuacct.usage_sys\x00', 0x0, 0x0) tkill(0x0, 0x34) prlimit64(0x0, 0x0, &(0x7f0000000380)={0x3, 0x6}, &(0x7f00000003c0)) 05:03:39 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x20000, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:03:39 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x8a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB="94000000000401030000000000000000000000007d39391a8bdf079f9f495a1fda171e3158f5c79ff5a4dfa267f9065b81eaa585529b1ed154c2e4de9fc975eb2bc712fe039df1a80dfb5986112b3f864dd6be18f185f6af53a91ef29a364869c075e208738464d03e023ce658bc45e51d0cd92f13dd19bed44b18c890ed907be58e2f0bcb02e3c1edb68f44d0d2c95d075a7ceddb3c8a0b063f62856a88e3e03f757467a06cf67105344eb3831130485e90b0e7d8317b2cdf3de6ff9b2c0307dc8d02d485923047d57b31d22a61abcc56"], 0x14}}, 0x0) r2 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x100000, 0x0) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000600)={0xc0, 0x464, 0x20, 0x70bd2b, 0x25dfdbff, "973f9703e43681c987947af3c1c8083de32ea8c59e17bb66fa1131bb71f62feb9d0e2d30dd5e0b3412958e5fe0cceec4126aac730f0637bbd5800c45a7540643c9c2c37aec0fd2421ecaab72641bc72be3958a965740c910b05431206b3784e1f84519555df72fc585d1fe8bc9c7edb156ad0efe2e5af3837edfddc3b7b14e00cda27aef1b0cbdee00e73a16858db80462c0721e260eb71762c36d071ce2212930ef26fbad80c57ca5f20663efbd6221", ["", "", ""]}, 0xc0}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000000) fcntl$setstatus(r2, 0x4, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x100) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x48, 0x80, 0x3f, 0x1, 0x0, 0xc4, 0x4, 0x5, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f00000004c0)}, 0x880, 0x8, 0x4, 0x222db880e1fb0bed, 0x9, 0x8228, 0x3, 0x0, 0xfffffff8, 0x0, 0x7f}, 0xffffffffffffffff, 0x10, r0, 0xa) r4 = open(&(0x7f0000000140)='./file0\x00', 0x501400, 0x1e2) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x40, 0x9, 0x7, 0xf4, 0x0, 0x6, 0x8002, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f00000000c0), 0xe}, 0x800, 0x935, 0x2, 0x3, 0xc23, 0xff, 0x7, 0x0, 0x8, 0x0, 0x6}, 0x0, 0x5, r4, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000840)={'veth0_macvtap\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) writev(r3, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) mount$9p_rdma(&(0x7f0000000880), &(0x7f0000000200)='./file0\x00', &(0x7f0000000580), 0x12288b8, &(0x7f0000000a00)=ANY=[]) socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8936, &(0x7f0000000080)={@ipv4={'\x00', '\xff\xff', @empty}, 0x43, r6}) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=@newlink={0xc8, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x242b8, 0x42a0a}, [@IFLA_LINKINFO={0x98, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x88, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_INGRESS_QOS={0x70, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x200004, 0x1f}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7, 0x10001}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3fc, 0x39e4}}, @IFLA_VLAN_QOS_MAPPING={0x2c, 0x1, {0x8, 0x49}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7ff, 0xc73}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xd1e7, 0x5}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xcaa3, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xfffffffc}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xa1ae}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1, 0x8}}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0xc8}}, 0x0) 05:03:39 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x3a9}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:03:39 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x1901}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000033c0)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x84) openat$cgroup_freezer_state(r1, &(0x7f0000000ec0), 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000f00)='cpuacct.usage_sys\x00', 0x0, 0x0) tkill(0x0, 0x34) prlimit64(0x0, 0x0, &(0x7f0000000380)={0x3, 0x6}, &(0x7f00000003c0)) 05:03:39 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x40000, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:03:39 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000005a80)={0x0, 0x0, &(0x7f0000005a40)={&(0x7f00000045c0)={0xec4, 0x0, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_DEBUG_HEADER={0x78, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_DEBUG_HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vxcan1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}]}, @ETHTOOL_A_DEBUG_MSGMASK={0xde0, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x49, 0x4, "28d7d1e615338b91bb923ba74eee79cc2b59a9741703f6cc2793bfa98654677e066a0d73ffb95ae8ada66cbbf274105786b531369ca3a9308f77b2e2c3a9885b1ff4989d69"}, @ETHTOOL_A_BITSET_VALUE={0xd8d, 0x4, "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"}]}]}, 0xec4}, 0x1, 0x0, 0x0, 0x810}, 0x44010) 05:03:39 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x8a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB="94000000000401030000000000000000000000007d39391a8bdf079f9f495a1fda171e3158f5c79ff5a4dfa267f9065b81eaa585529b1ed154c2e4de9fc975eb2bc712fe039df1a80dfb5986112b3f864dd6be18f185f6af53a91ef29a364869c075e208738464d03e023ce658bc45e51d0cd92f13dd19bed44b18c890ed907be58e2f0bcb02e3c1edb68f44d0d2c95d075a7ceddb3c8a0b063f62856a88e3e03f757467a06cf67105344eb3831130485e90b0e7d8317b2cdf3de6ff9b2c0307dc8d02d485923047d57b31d22a61abcc56"], 0x14}}, 0x0) r2 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x100000, 0x0) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000600)={0xc0, 0x464, 0x20, 0x70bd2b, 0x25dfdbff, "973f9703e43681c987947af3c1c8083de32ea8c59e17bb66fa1131bb71f62feb9d0e2d30dd5e0b3412958e5fe0cceec4126aac730f0637bbd5800c45a7540643c9c2c37aec0fd2421ecaab72641bc72be3958a965740c910b05431206b3784e1f84519555df72fc585d1fe8bc9c7edb156ad0efe2e5af3837edfddc3b7b14e00cda27aef1b0cbdee00e73a16858db80462c0721e260eb71762c36d071ce2212930ef26fbad80c57ca5f20663efbd6221", ["", "", ""]}, 0xc0}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000000) fcntl$setstatus(r2, 0x4, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x100) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x48, 0x80, 0x3f, 0x1, 0x0, 0xc4, 0x4, 0x5, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f00000004c0)}, 0x880, 0x8, 0x4, 0x222db880e1fb0bed, 0x9, 0x8228, 0x3, 0x0, 0xfffffff8, 0x0, 0x7f}, 0xffffffffffffffff, 0x10, r0, 0xa) r4 = open(&(0x7f0000000140)='./file0\x00', 0x501400, 0x1e2) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x40, 0x9, 0x7, 0xf4, 0x0, 0x6, 0x8002, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f00000000c0), 0xe}, 0x800, 0x935, 0x2, 0x3, 0xc23, 0xff, 0x7, 0x0, 0x8, 0x0, 0x6}, 0x0, 0x5, r4, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000840)={'veth0_macvtap\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) writev(r3, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) mount$9p_rdma(&(0x7f0000000880), &(0x7f0000000200)='./file0\x00', &(0x7f0000000580), 0x12288b8, &(0x7f0000000a00)=ANY=[]) socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8936, &(0x7f0000000080)={@ipv4={'\x00', '\xff\xff', @empty}, 0x43, r6}) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=@newlink={0xc8, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x242b8, 0x42a0a}, [@IFLA_LINKINFO={0x98, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x88, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_INGRESS_QOS={0x70, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x200004, 0x1f}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7, 0x10001}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3fc, 0x39e4}}, @IFLA_VLAN_QOS_MAPPING={0x2c, 0x1, {0x8, 0x49}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7ff, 0xc73}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xd1e7, 0x5}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xcaa3, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xfffffffc}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xa1ae}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1, 0x8}}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0xc8}}, 0x0) 05:03:39 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x3f8}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() [ 1497.490407][ T1694] __nla_validate_parse: 1 callbacks suppressed [ 1497.490424][ T1694] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 05:03:40 executing program 2: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000000180)={{}, {0x10}}) 05:03:40 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x1f00}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000033c0)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x84) openat$cgroup_freezer_state(r1, &(0x7f0000000ec0), 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000f00)='cpuacct.usage_sys\x00', 0x0, 0x0) tkill(0x0, 0x34) prlimit64(0x0, 0x0, &(0x7f0000000380)={0x3, 0x6}, &(0x7f00000003c0)) 05:03:40 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x1000000, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:03:40 executing program 1: clock_gettime(0x0, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) pselect6(0x0, 0x0, 0x0, &(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000940)={&(0x7f0000000900)={[0x9]}, 0x8}) 05:03:40 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x8a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB="94000000000401030000000000000000000000007d39391a8bdf079f9f495a1fda171e3158f5c79ff5a4dfa267f9065b81eaa585529b1ed154c2e4de9fc975eb2bc712fe039df1a80dfb5986112b3f864dd6be18f185f6af53a91ef29a364869c075e208738464d03e023ce658bc45e51d0cd92f13dd19bed44b18c890ed907be58e2f0bcb02e3c1edb68f44d0d2c95d075a7ceddb3c8a0b063f62856a88e3e03f757467a06cf67105344eb3831130485e90b0e7d8317b2cdf3de6ff9b2c0307dc8d02d485923047d57b31d22a61abcc56"], 0x14}}, 0x0) r2 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x100000, 0x0) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000600)={0xc0, 0x464, 0x20, 0x70bd2b, 0x25dfdbff, "973f9703e43681c987947af3c1c8083de32ea8c59e17bb66fa1131bb71f62feb9d0e2d30dd5e0b3412958e5fe0cceec4126aac730f0637bbd5800c45a7540643c9c2c37aec0fd2421ecaab72641bc72be3958a965740c910b05431206b3784e1f84519555df72fc585d1fe8bc9c7edb156ad0efe2e5af3837edfddc3b7b14e00cda27aef1b0cbdee00e73a16858db80462c0721e260eb71762c36d071ce2212930ef26fbad80c57ca5f20663efbd6221", ["", "", ""]}, 0xc0}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000000) fcntl$setstatus(r2, 0x4, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x100) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x48, 0x80, 0x3f, 0x1, 0x0, 0xc4, 0x4, 0x5, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f00000004c0)}, 0x880, 0x8, 0x4, 0x222db880e1fb0bed, 0x9, 0x8228, 0x3, 0x0, 0xfffffff8, 0x0, 0x7f}, 0xffffffffffffffff, 0x10, r0, 0xa) r4 = open(&(0x7f0000000140)='./file0\x00', 0x501400, 0x1e2) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x40, 0x9, 0x7, 0xf4, 0x0, 0x6, 0x8002, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f00000000c0), 0xe}, 0x800, 0x935, 0x2, 0x3, 0xc23, 0xff, 0x7, 0x0, 0x8, 0x0, 0x6}, 0x0, 0x5, r4, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000840)={'veth0_macvtap\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) writev(r3, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) mount$9p_rdma(&(0x7f0000000880), &(0x7f0000000200)='./file0\x00', &(0x7f0000000580), 0x12288b8, &(0x7f0000000a00)=ANY=[]) socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8936, &(0x7f0000000080)={@ipv4={'\x00', '\xff\xff', @empty}, 0x43, r6}) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=@newlink={0xc8, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x242b8, 0x42a0a}, [@IFLA_LINKINFO={0x98, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x88, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_INGRESS_QOS={0x70, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x200004, 0x1f}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7, 0x10001}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3fc, 0x39e4}}, @IFLA_VLAN_QOS_MAPPING={0x2c, 0x1, {0x8, 0x49}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7ff, 0xc73}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xd1e7, 0x5}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xcaa3, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xfffffffc}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xa1ae}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1, 0x8}}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0xc8}}, 0x0) 05:03:40 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x402}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() [ 1497.844456][ T1706] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1497.907080][ T1704] cgroup: fork rejected by pids controller in /system.slice/ssh.service 05:03:40 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x8a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB="94000000000401030000000000000000000000007d39391a8bdf079f9f495a1fda171e3158f5c79ff5a4dfa267f9065b81eaa585529b1ed154c2e4de9fc975eb2bc712fe039df1a80dfb5986112b3f864dd6be18f185f6af53a91ef29a364869c075e208738464d03e023ce658bc45e51d0cd92f13dd19bed44b18c890ed907be58e2f0bcb02e3c1edb68f44d0d2c95d075a7ceddb3c8a0b063f62856a88e3e03f757467a06cf67105344eb3831130485e90b0e7d8317b2cdf3de6ff9b2c0307dc8d02d485923047d57b31d22a61abcc56"], 0x14}}, 0x0) r2 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x100000, 0x0) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000600)={0xc0, 0x464, 0x20, 0x70bd2b, 0x25dfdbff, "973f9703e43681c987947af3c1c8083de32ea8c59e17bb66fa1131bb71f62feb9d0e2d30dd5e0b3412958e5fe0cceec4126aac730f0637bbd5800c45a7540643c9c2c37aec0fd2421ecaab72641bc72be3958a965740c910b05431206b3784e1f84519555df72fc585d1fe8bc9c7edb156ad0efe2e5af3837edfddc3b7b14e00cda27aef1b0cbdee00e73a16858db80462c0721e260eb71762c36d071ce2212930ef26fbad80c57ca5f20663efbd6221", ["", "", ""]}, 0xc0}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000000) fcntl$setstatus(r2, 0x4, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x100) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x48, 0x80, 0x3f, 0x1, 0x0, 0xc4, 0x4, 0x5, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f00000004c0)}, 0x880, 0x8, 0x4, 0x222db880e1fb0bed, 0x9, 0x8228, 0x3, 0x0, 0xfffffff8, 0x0, 0x7f}, 0xffffffffffffffff, 0x10, r0, 0xa) r4 = open(&(0x7f0000000140)='./file0\x00', 0x501400, 0x1e2) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x40, 0x9, 0x7, 0xf4, 0x0, 0x6, 0x8002, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f00000000c0), 0xe}, 0x800, 0x935, 0x2, 0x3, 0xc23, 0xff, 0x7, 0x0, 0x8, 0x0, 0x6}, 0x0, 0x5, r4, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000840)={'veth0_macvtap\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) writev(r3, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) mount$9p_rdma(&(0x7f0000000880), &(0x7f0000000200)='./file0\x00', &(0x7f0000000580), 0x12288b8, &(0x7f0000000a00)=ANY=[]) socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8936, &(0x7f0000000080)={@ipv4={'\x00', '\xff\xff', @empty}, 0x43, r6}) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=@newlink={0xc8, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x242b8, 0x42a0a}, [@IFLA_LINKINFO={0x98, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x88, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_INGRESS_QOS={0x70, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x200004, 0x1f}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7, 0x10001}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3fc, 0x39e4}}, @IFLA_VLAN_QOS_MAPPING={0x2c, 0x1, {0x8, 0x49}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7ff, 0xc73}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xd1e7, 0x5}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xcaa3, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xfffffffc}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xa1ae}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1, 0x8}}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0xc8}}, 0x0) [ 1498.101775][ T1710] set_target_v0_checkentry: 36 callbacks suppressed [ 1498.101821][ T1710] Cannot find add_set index 0 as target 05:03:40 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x500}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:03:40 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x2000}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000033c0)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x84) openat$cgroup_freezer_state(r1, &(0x7f0000000ec0), 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000f00)='cpuacct.usage_sys\x00', 0x0, 0x0) tkill(0x0, 0x34) prlimit64(0x0, 0x0, &(0x7f0000000380)={0x3, 0x6}, &(0x7f00000003c0)) 05:03:40 executing program 1: syz_mount_image$nfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000880)={[], [{@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}]}) 05:03:40 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x1030000, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:03:40 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000005a80)={0x0, 0x0, &(0x7f0000005a40)={&(0x7f00000045c0)={0xec8, 0x0, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_DEBUG_HEADER={0x78, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_DEBUG_HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vxcan1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_DEBUG_MSGMASK={0xddc, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x49, 0x4, "28d7d1e615338b91bb923ba74eee79cc2b59a9741703f6cc2793bfa98654677e066a0d73ffb95ae8ada66cbbf274105786b531369ca3a9308f77b2e2c3a9885b1ff4989d69"}, @ETHTOOL_A_BITSET_VALUE={0xd8c, 0x4, "c9674f07287a4a592fceb05054871f63f4f395b3d8231c63b2e14e8aee14c55e4e219c7424d7f0b8243ba1eb9c9e82b6c9ab1944d36513df1a367f6d0283054615c76d99fee1f3b05a0b8c1d3074d47c0890b49616b63c143037716aafcab8ecaa5fd164128d6372ba71319cf284335ef07c4b6d8a60f3c8443272dacbdb89e6e50d6ac9e2d59855a7f37fee52bf27df86cc32d0c1b3c359bf87e3db381f23ec605ce05c599db800fd3e930f82f6691a291fa30a6bd553abd58d45e449e3bc27887a2a5903ae0a6c93298313f5eb192de53468bc52416ea364e88c99e056ea8ac13b3bd97d33b8feb42f803a73449006673a3ef6956c6bdc461930c78f15d691e95ca2df5378aadca1bd8a2c41c2091a73499d742805cda2633f8d500273969f18e52922d02f62de9a437a6b3a50fb0e79c426cf7edfeab9d249d00457981ad489c0e019758fd0d6183fa67fc0660cd6f915f109310a75eab3022c93354b281187aca9c3ea1202e8875d071a67aad1c1ddc9bc239fc77644171c289c12a484bb351ccbc32a594bf679d6909c92d099b87faec18cf04d4e6baca5185419b8594d3d766025ee7d655de62363280a7e49b2de7bed9b65147ff3443b2ab52643b416e28e75207bdf687af1e7c4ba7654c046140983606ef92117ecf3c5b26aa356620285ebd5eb9b6cdb827be40d2c2069ab37e86d1a8f350933720a29fd7f60471c18ba410cf615d04fc81a1ec7e9c8ee94c1ee30e8082b4a91f2d4491ce7d4feb06861c3699f82ae41ba67355a78953240266d4da8293a3cd6dd549d6319e1bdb600eed57d553411205676f30194cf4bfc9733493b3869276d3fc7b9311f9bd8d53e481d19837c64a5b96453811a55ae1c041d6082e60775b4c9d5e7f62f2c091fe37a3de0fa8f7f9b80b908c53b945a4d664e609e293d39652df843931f9716af80ec47c06de3fea87638c248c8ed3461def20c76db2a929694588e12f3c36bf412b0e0ff28c8873a6475d71d3a59a2a4932efb00806ea7adad63c19095ff3aa6547ed26535074ec90a6be217729182dd2e3455ac89aef52c6265561c2c500cc9071845c6b7483507720619acf4e97a713cbcc5ace24ac0a5dd0dfe68aaa5ef760eec4734961297ddbb76e83e070101e3e5d11d16ab0e261229460016b16320f47c6147cadce139f0055e8e11a8aae724f03fe56ae9c110573a873e83176b6035583a129cb4e346c82bcaf3fbf428b54c1edbbc461f501ec7e446b455f5b1f5c6022d3f30b149e60ff7444122472a3a83e40949bcc0e54952e450be605e5568e40e4768d52dfa1351a5d37704fa2b6e10c471f679cae3ceb1aaa3ccf893f1febc0e88b5f788de1219f39c72f5bdc48449bdced37fc79f0d9f578c12e9c2be14d8c05ef22559cc6520833d0054602eb8b954160bc2b38373fa6e22c0fbcfccdfc0538e5a442aee0bdb4fc58e619b7602eb44f5b3aadb363b7a429dbc3ff0a8ff5dffb1dc418b4ac5b28da1c874bc6bec0380914cb62db72983d1802952e15e630468d0a608b118e9a88d0d532d371a0e57dce97bd6ffe514abfb2f5b0e71f0c600df324cdc7fb911d871594e284b06ff212389231bc7fe74399d74e6dbcff2d91eade2445cc8cd92d82f1aa12deb27f11b344fd6686aed20c46395a75b0304e03b72b9869ff0d106a0c9d752532faa5100175783a03f556753185e0597a0d200ac58e18b7af52f888716fd25e74e410e02d96e0a9cfffe93dcefda92a122c6e468c3fbafcd0f463a8d595f514d7e1c0c7b2621fd1c6392319219c7d11feb77de38a69cd679a6b12be933316b88e9032dbeb26004366fbd84a034ddd88124076a159b24f5dc7362719fef19baf699924d928bfbb25cb033f872164f325d74f711418253f781be7c8134efb3979ce4643c9139bd7d30b7a7444c0ee42a807d44e3167021b0331f35ec86b114db50f7eb6102bca5de2e27405feee670c1f8cd3a7d0e0e6bbeb92e5fdb2faf85b3eeddd1d5bfefcbf8f06aeee0bb1f2f3152900b1c6d7d7b1ab249a3de2622f2a65005eb29d17a5723706100294127075b69be90dfaa3b2af43784861e931e0c59f9c0561f1f871527abcb13f66dcecb531a9843081030189ebbe6e60d8a2030fdd9cc5c49c8710db770b359981fde18c0afa2e7011ac38ff62b1677e4d76691cbcb4a5987a2aa9d15a15c7463d68d002aff79e7c03c4667588d1481d7783da6d39545a95027e46ea4bc7b8102c82c02037cb4ad6b0ef17e210b2915537bb016a3938c2db166578e15aa053177ef57afaf6668c4248f209302a71fc38294129c45c6f6802f280c24cc8b6a5aaf2e236d54ccf8f64861b498e76a79ecf2ec90aee57e64ba3efd9f5a21eb7158e3acafd9d8954d40d53d8f96d3aa0854976ec9725d686c9f63f956f85219985d4fd9567e011740cceb0903c633a32972d99b9a752fa66fbdb203345e45bc35f8bfbc0705e728eb9974cc02cc71f0785dec26886ff83e42895e3d60068008a906aa7120c88c01dead97bc81f8ada742baf961f6316bef59f4e71872462f36807ecbfc356b286c9e4b05e08436180bd0e5fb79d4b2e7784087ea99aa5104588ba85ec653d048f55b29111422933cb303b50f5b277e4f8199c129922fee9a859e5aa86d4281358f0a6b6658022e07bc5c311baa21c238986a9682d7f024ca7164a363b771ea1d69cd6095cb4d02003feedbfa9f48de64ed5e4689d45d66f5979d715e083cc30c5a7575fbc15096dcdf68f28cd2604775bdf989d20efb0cc68b514da0a553f3f3daad50b6d31b072c714f84e400ee32cef803a2cfa8aee2f55ae48960bf0b5c6efde0eccbc06ef218741b11286f42bbf4c4f9c0586497fabcdbdf59190b55b9c289495ef7dcb97ab9c9ac882dcc64c61891ec077e1213a5680ea86bfb2069519a2980399f2343667eb4bc9f11ea088f64e9c2bd6b8df5ace1e31fc753ca4527cc80bb49981ab1490cea3e99337ef750a91552a5f28221d904f00c9cd4ed74e82df2689adbec212619b1fc82320efe0e4c80e8920d10f518cf6430bf07a8ab4bc1b1802ad2c93f48b1dff33b1ca15d457f63131d88793af1be7cc1f1a326a14b5b199bca547b527e721eacf1ed0e1ee056998727dc534f6641e111dfe2e48110adde811e19f2a2fdb4e54ed4e1b24198b9ea5add78c2f7e79296ccffb3076e42fec7ef4c038341954c6e46d676f16ef0dad3b71eea6b1b90de89ccfebed8491a504105cffee8fb6ba4c53076c8e27eb3222e28ac574ed40c945127fb61834b65de585ed81082d9464991808106969699f80ae7323cd3818923b4ac7c5b19eff0b85082378a6d59669d5a410beddb393e660e0a1a87f8213152b6f1e80b5347835187c2ea61737ace8146aa05fecb1fdfd787e750b34e33515c9a2fc87f6779277aeaccee7292470d239f4a2c39db5a92c302396ac37d1a43a03d8751026f71a63bdb8d2432aa0d77a4c232d04ccba4f1ccf5dac45c836aec031179555e2f90546f6104ed7fdf8157239d122c8a03a7b9a8187403f609176d6e1989b28b539c5f02864bf0a8c5c4f8278171c69ffce6d2305d0d782060ea362deae0a5dfb2b47b4a5048b3e03b02f770467c59d11f1fbed74acad8def9f5c2f6f512d01c1bd5718dcf7fde807255007de3d60bfc50b61a5ee1fa2d80bf64cea12d1ae14011f20596d8f7b3f3abc599fd3ec6d4ec9dd5e3b5b210db9b216815427cb45a174394fbc7af6c01f64073dafbfe3e1eb56f195f153e8f40fc7519e2dd29b1a626671db90958c18673f7b4b105193a41b288f7de103da7387b673f28f142679df67f0326137e4cd18575c6272dded6bad0fac01bbb8d807fa753841167b15e06bec1b3d2e33590b6b17da9849e0094ab635d3edcd458f312fe74f750bc535d19d4354e696b294247cd3552c84c6154a653e9981cc316a4d369e3b68374e87214ec404741eccc2761f473df5d55dadbcdb4fe920a15d27725062fa244d881265f3e532fcc9d5868e4ca81f7a9a844c9f3835eb48f5ce8acf7a1775ae79749e38a136b93b4e24d2efeb1c155b13de80490d2af02ccd84ef7e11f0e3ba323ca3d84ad35b82524ba810ec4978d0dda72f37c3c95f6b62aef5cc44fcb4c072c22faa0a200d5f8b87316a0c2d5bb62745daab83cbc0116c3f18bfe5af580d765b295965ba278af2e937431a5d5cedc83334e547830bd69351d99d3caa7a719dd1ec7e10d177e11a37d77e2f32122055712b65cd2dda18b59ca864404e4ce061ecec81313dd85b9c7a14765a546821bf0068097f52ec8126ca59306c5e778f205d3b25715c58fd3f7503ad67d765a5b45a6b8bfdf90321436c69083e55e60e26ecf2f3afd4453016b1abff6048786c5e2ebaeb063e50dd8e5115c5eede1ee65c232f754461fbeb716a7d855bd66708168080f8286f93ec311f0c64e5f9bf8829c1e8ee443872b4d1d2101d81d2106aceaa0240fa3ccf4906fef925f08b95a8302ec43109812078485a9cedd37a4cccaeb022ef7f0581b34dab3a0975f27a45d908f3febc92fc298efbaa57ea91f8e7e162b87823330852d613f6f10530eea1159378e65980c2c8419a11e8f143d82a2171c3d7c512777934f32be73570c04ff2e09b8dcc4f096abe31b51fa3bb996d31f590f7b9b0bbb96f66ed9c3cde46e745e57a37717f855db90b876197c8c0fa6d1dc8d8252d5e04b6178d0e12a0288c10ca4ad768092621549c77d42008ee2fee2037a92983b21285a5e2cbe6bfcd84219400582e6b14e790128592a943faa3ac717d84a3ede3c81cdbb7a423874eae469da1dfcc3cd3b2a8f3851bac13ef84e5c77eb42e2d592401f94460807bf66df2d10ff6262d29991e9d8d35de1ff6302c8cce0c66e4c"}]}]}, 0xec8}, 0x1, 0x0, 0x0, 0x810}, 0x44010) [ 1498.411031][ T2189] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1498.520592][ T2197] Cannot find add_set index 0 as target 05:03:41 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x2900}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000033c0)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x84) openat$cgroup_freezer_state(r1, &(0x7f0000000ec0), 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000f00)='cpuacct.usage_sys\x00', 0x0, 0x0) tkill(0x0, 0x34) prlimit64(0x0, 0x0, &(0x7f0000000380)={0x3, 0x6}, &(0x7f00000003c0)) 05:03:41 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x8a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB="94000000000401030000000000000000000000007d39391a8bdf079f9f495a1fda171e3158f5c79ff5a4dfa267f9065b81eaa585529b1ed154c2e4de9fc975eb2bc712fe039df1a80dfb5986112b3f864dd6be18f185f6af53a91ef29a364869c075e208738464d03e023ce658bc45e51d0cd92f13dd19bed44b18c890ed907be58e2f0bcb02e3c1edb68f44d0d2c95d075a7ceddb3c8a0b063f62856a88e3e03f757467a06cf67105344eb3831130485e90b0e7d8317b2cdf3de6ff9b2c0307dc8d02d485923047d57b31d22a61abcc56"], 0x14}}, 0x0) r2 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x100000, 0x0) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000600)={0xc0, 0x464, 0x20, 0x70bd2b, 0x25dfdbff, "973f9703e43681c987947af3c1c8083de32ea8c59e17bb66fa1131bb71f62feb9d0e2d30dd5e0b3412958e5fe0cceec4126aac730f0637bbd5800c45a7540643c9c2c37aec0fd2421ecaab72641bc72be3958a965740c910b05431206b3784e1f84519555df72fc585d1fe8bc9c7edb156ad0efe2e5af3837edfddc3b7b14e00cda27aef1b0cbdee00e73a16858db80462c0721e260eb71762c36d071ce2212930ef26fbad80c57ca5f20663efbd6221", ["", "", ""]}, 0xc0}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000000) fcntl$setstatus(r2, 0x4, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x100) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x48, 0x80, 0x3f, 0x1, 0x0, 0xc4, 0x4, 0x5, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f00000004c0)}, 0x880, 0x8, 0x4, 0x222db880e1fb0bed, 0x9, 0x8228, 0x3, 0x0, 0xfffffff8, 0x0, 0x7f}, 0xffffffffffffffff, 0x10, r0, 0xa) r4 = open(&(0x7f0000000140)='./file0\x00', 0x501400, 0x1e2) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x40, 0x9, 0x7, 0xf4, 0x0, 0x6, 0x8002, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f00000000c0), 0xe}, 0x800, 0x935, 0x2, 0x3, 0xc23, 0xff, 0x7, 0x0, 0x8, 0x0, 0x6}, 0x0, 0x5, r4, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000840)={'veth0_macvtap\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) writev(r3, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) mount$9p_rdma(&(0x7f0000000880), &(0x7f0000000200)='./file0\x00', &(0x7f0000000580), 0x12288b8, &(0x7f0000000a00)=ANY=[]) socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8936, &(0x7f0000000080)={@ipv4={'\x00', '\xff\xff', @empty}, 0x43, r6}) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=@newlink={0xc8, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x242b8, 0x42a0a}, [@IFLA_LINKINFO={0x98, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x88, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_INGRESS_QOS={0x70, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x200004, 0x1f}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7, 0x10001}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3fc, 0x39e4}}, @IFLA_VLAN_QOS_MAPPING={0x2c, 0x1, {0x8, 0x49}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7ff, 0xc73}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xd1e7, 0x5}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xcaa3, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xfffffffc}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xa1ae}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1, 0x8}}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0xc8}}, 0x0) [ 1498.578073][ T2201] Cannot find add_set index 0 as target [ 1498.594451][ T2200] nfs: Unknown parameter 'rootcontext' [ 1498.600390][ T2215] Cannot find add_set index 0 as target 05:03:41 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x2000000, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:03:41 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) gettid() sendmsg$unix(r0, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRES32, @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="0000000000000003"], 0x38}, 0x0) [ 1498.682652][ T2222] Cannot find add_set index 0 as target [ 1498.685338][ T2200] nfs: Unknown parameter 'rootcontext' 05:03:41 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x600}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:03:41 executing program 1: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0x4058534c, &(0x7f0000000040)={0x0, 0x0, 'client1\x00', 0x0, "cda33c7f90aa0fc1", "300b70da2bdee387baca12f4b7100489874d0d3e555f5f86e539c9e4bb6a36fe"}) 05:03:41 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x2d0e}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000033c0)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x84) openat$cgroup_freezer_state(r1, &(0x7f0000000ec0), 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000f00)='cpuacct.usage_sys\x00', 0x0, 0x0) tkill(0x0, 0x34) prlimit64(0x0, 0x0, &(0x7f0000000380)={0x3, 0x6}, &(0x7f00000003c0)) [ 1498.905628][ T2235] Cannot find add_set index 0 as target [ 1498.971057][ T2246] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1499.009085][ T2240] Cannot find add_set index 0 as target 05:03:41 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x8a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB="94000000000401030000000000000000000000007d39391a8bdf079f9f495a1fda171e3158f5c79ff5a4dfa267f9065b81eaa585529b1ed154c2e4de9fc975eb2bc712fe039df1a80dfb5986112b3f864dd6be18f185f6af53a91ef29a364869c075e208738464d03e023ce658bc45e51d0cd92f13dd19bed44b18c890ed907be58e2f0bcb02e3c1edb68f44d0d2c95d075a7ceddb3c8a0b063f62856a88e3e03f757467a06cf67105344eb3831130485e90b0e7d8317b2cdf3de6ff9b2c0307dc8d02d485923047d57b31d22a61abcc56"], 0x14}}, 0x0) r2 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x100000, 0x0) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000600)={0xc0, 0x464, 0x20, 0x70bd2b, 0x25dfdbff, "973f9703e43681c987947af3c1c8083de32ea8c59e17bb66fa1131bb71f62feb9d0e2d30dd5e0b3412958e5fe0cceec4126aac730f0637bbd5800c45a7540643c9c2c37aec0fd2421ecaab72641bc72be3958a965740c910b05431206b3784e1f84519555df72fc585d1fe8bc9c7edb156ad0efe2e5af3837edfddc3b7b14e00cda27aef1b0cbdee00e73a16858db80462c0721e260eb71762c36d071ce2212930ef26fbad80c57ca5f20663efbd6221", ["", "", ""]}, 0xc0}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000000) fcntl$setstatus(r2, 0x4, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x100) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x48, 0x80, 0x3f, 0x1, 0x0, 0xc4, 0x4, 0x5, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f00000004c0)}, 0x880, 0x8, 0x4, 0x222db880e1fb0bed, 0x9, 0x8228, 0x3, 0x0, 0xfffffff8, 0x0, 0x7f}, 0xffffffffffffffff, 0x10, r0, 0xa) r4 = open(&(0x7f0000000140)='./file0\x00', 0x501400, 0x1e2) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x40, 0x9, 0x7, 0xf4, 0x0, 0x6, 0x8002, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f00000000c0), 0xe}, 0x800, 0x935, 0x2, 0x3, 0xc23, 0xff, 0x7, 0x0, 0x8, 0x0, 0x6}, 0x0, 0x5, r4, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000840)={'veth0_macvtap\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) writev(r3, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) mount$9p_rdma(&(0x7f0000000880), &(0x7f0000000200)='./file0\x00', &(0x7f0000000580), 0x12288b8, &(0x7f0000000a00)=ANY=[]) socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8936, &(0x7f0000000080)={@ipv4={'\x00', '\xff\xff', @empty}, 0x43, r6}) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=@newlink={0xc8, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x242b8, 0x42a0a}, [@IFLA_LINKINFO={0x98, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x88, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_INGRESS_QOS={0x70, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x200004, 0x1f}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7, 0x10001}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3fc, 0x39e4}}, @IFLA_VLAN_QOS_MAPPING={0x2c, 0x1, {0x8, 0x49}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7ff, 0xc73}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xd1e7, 0x5}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xcaa3, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xfffffffc}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xa1ae}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1, 0x8}}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0xc8}}, 0x0) [ 1499.078789][ T2262] Cannot find add_set index 0 as target 05:03:41 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0}}, 0x0) 05:03:41 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x700}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() [ 1499.168454][ T2302] Cannot find add_set index 0 as target 05:03:41 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x3000000, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() [ 1499.300558][ T2313] Cannot find add_set index 0 as target 05:03:43 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x3800}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000033c0)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x84) openat$cgroup_freezer_state(r1, &(0x7f0000000ec0), 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000f00)='cpuacct.usage_sys\x00', 0x0, 0x0) tkill(0x0, 0x34) prlimit64(0x0, 0x0, &(0x7f0000000380)={0x3, 0x6}, &(0x7f00000003c0)) 05:03:43 executing program 1: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0xc0189436, &(0x7f0000000040)={0x0, 0x0, 'client1\x00', 0x0, "cda33c7f90aa0fc1", "300b70da2bdee387baca12f4b7100489874d0d3e555f5f86e539c9e4bb6a36fe"}) 05:03:44 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) read$char_usb(r0, &(0x7f0000000140)=""/4096, 0x1000) 05:03:44 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x801}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:03:44 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x4020000, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:03:44 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmsg(r0, &(0x7f0000001440)={&(0x7f0000000000)=@pppoe={0x18, 0x0, {0x0, @multicast}}, 0x80, &(0x7f00000012c0)=[{&(0x7f0000001580)=""/4096, 0x1000}, {&(0x7f0000001080)}, {&(0x7f00000010c0)=""/61, 0xffffffffffffff1f}, {&(0x7f0000001100)=""/23, 0x17}, {&(0x7f0000001140)=""/87, 0x59}, {&(0x7f00000011c0)=""/210, 0xd2}], 0x6, &(0x7f0000001480)=""/247, 0xf7}, 0x0) 05:03:44 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x4800}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000033c0)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x84) openat$cgroup_freezer_state(r1, &(0x7f0000000ec0), 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000f00)='cpuacct.usage_sys\x00', 0x0, 0x0) tkill(0x0, 0x34) prlimit64(0x0, 0x0, &(0x7f0000000380)={0x3, 0x6}, &(0x7f00000003c0)) 05:03:44 executing program 2: syz_open_dev$sndpcmp(&(0x7f0000000280), 0x8b45, 0x0) [ 1503.060799][ T6608] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1503.715722][ T6608] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1504.304753][ T6608] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1504.664626][ T6608] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1507.638013][ T6608] device hsr_slave_0 left promiscuous mode [ 1507.646460][ T6608] device hsr_slave_1 left promiscuous mode [ 1507.653825][ T6608] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1507.661291][ T6608] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1507.673173][ T6608] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1507.680613][ T6608] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1507.690767][ T6608] device bridge_slave_1 left promiscuous mode [ 1507.699863][ T6608] bridge0: port 2(bridge_slave_1) entered disabled state [ 1507.714069][ T6608] device bridge_slave_0 left promiscuous mode [ 1507.720280][ T6608] bridge0: port 1(bridge_slave_0) entered disabled state [ 1507.740349][ T6608] device veth1_macvtap left promiscuous mode [ 1507.746936][ T6608] device veth0_macvtap left promiscuous mode [ 1507.754476][ T6608] device veth1_vlan left promiscuous mode [ 1507.760520][ T6608] device veth0_vlan left promiscuous mode [ 1511.371810][ T2354] Bluetooth: hci4: command 0x0409 tx timeout [ 1512.311514][ T6608] team0 (unregistering): Port device team_slave_1 removed [ 1512.328638][ T6608] team0 (unregistering): Port device team_slave_0 removed [ 1512.348042][ T6608] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1512.363959][ T6608] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1512.434272][ T6608] bond0 (unregistering): Released all slaves [ 1512.668140][ T2483] chnl_net:caif_netlink_parms(): no params data found [ 1512.762776][ T2483] bridge0: port 1(bridge_slave_0) entered blocking state [ 1512.769916][ T2483] bridge0: port 1(bridge_slave_0) entered disabled state [ 1512.780077][ T2483] device bridge_slave_0 entered promiscuous mode [ 1512.790802][ T2483] bridge0: port 2(bridge_slave_1) entered blocking state [ 1512.798746][ T2483] bridge0: port 2(bridge_slave_1) entered disabled state [ 1512.806944][ T2483] device bridge_slave_1 entered promiscuous mode [ 1512.851119][ T2483] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1512.866625][ T2483] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1512.910626][ T2483] team0: Port device team_slave_0 added [ 1512.928262][ T2483] team0: Port device team_slave_1 added [ 1512.995192][ T2483] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1513.010710][ T2483] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1513.046802][ T2483] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1513.066147][ T2483] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1513.082393][ T2483] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1513.121402][ T2483] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1513.185103][ T2483] device hsr_slave_0 entered promiscuous mode [ 1513.200892][ T2483] device hsr_slave_1 entered promiscuous mode [ 1513.218929][ T2483] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1513.228274][ T2483] Cannot create hsr debugfs directory [ 1513.411765][ T2483] bridge0: port 2(bridge_slave_1) entered blocking state [ 1513.418850][ T2483] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1513.426278][ T2483] bridge0: port 1(bridge_slave_0) entered blocking state [ 1513.433869][ T2483] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1513.463306][ T8571] Bluetooth: hci4: command 0x041b tx timeout [ 1513.500787][ T2483] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1513.520308][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1513.530692][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 1513.555320][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1513.582353][ T2483] 8021q: adding VLAN 0 to HW filter on device team0 [ 1513.596608][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1513.606628][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1513.617138][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 1513.624275][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1513.644654][ T2354] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1513.654401][ T2354] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1513.664258][ T2354] bridge0: port 2(bridge_slave_1) entered blocking state [ 1513.671314][ T2354] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1513.680860][ T2354] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1513.703531][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1513.712721][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1513.725281][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1513.745618][ T2354] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1513.754661][ T2354] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1513.764865][ T2354] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1513.774396][ T2354] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1513.783740][ T2354] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1513.798186][ T2483] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1513.811446][ T2483] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1513.824204][T31583] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1513.834019][T31583] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1513.871123][ T2483] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1513.880640][ T2354] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1513.890578][ T2354] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1514.002158][ T2354] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1514.010929][ T2354] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1514.041783][ T2354] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1514.050098][ T2354] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1514.064579][ T2483] device veth0_vlan entered promiscuous mode [ 1514.073103][ T2354] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1514.082588][ T2354] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1514.098227][ T2483] device veth1_vlan entered promiscuous mode [ 1514.145130][ T2354] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1514.155322][ T2354] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1514.163514][ T2354] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1514.172187][ T2354] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1514.184454][ T2483] device veth0_macvtap entered promiscuous mode [ 1514.198967][ T2483] device veth1_macvtap entered promiscuous mode [ 1514.227669][ T2483] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1514.247033][ T2483] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1514.259771][ T2483] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1514.271723][ T2483] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1514.282155][ T2483] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1514.293446][ T2483] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1514.304124][ T2483] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1514.315760][ T2483] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1514.326615][ T2483] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1514.338550][ T2483] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1514.350498][ T2483] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1514.360372][T31583] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1514.379397][T31583] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1514.388293][T31583] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1514.397847][T31583] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1514.409785][ T2483] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1514.424832][ T2483] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1514.435203][ T2483] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1514.462092][ T2483] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1514.482026][ T2483] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1514.511582][ T2483] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1514.521407][ T2483] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1514.551068][ T2483] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1514.572800][ T2483] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1514.584707][ T2483] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1514.595966][ T2483] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1514.606788][ T2354] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1514.617341][ T2354] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1514.725272][ T2331] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1514.744979][ T2331] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1514.792175][ T8571] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1514.819492][ T150] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1514.840450][ T150] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1514.861758][ T2354] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 1515.046245][ T2905] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 05:03:57 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x8a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB="94000000000401030000000000000000000000007d39391a8bdf079f9f495a1fda171e3158f5c79ff5a4dfa267f9065b81eaa585529b1ed154c2e4de9fc975eb2bc712fe039df1a80dfb5986112b3f864dd6be18f185f6af53a91ef29a364869c075e208738464d03e023ce658bc45e51d0cd92f13dd19bed44b18c890ed907be58e2f0bcb02e3c1edb68f44d0d2c95d075a7ceddb3c8a0b063f62856a88e3e03f757467a06cf67105344eb3831130485e90b0e7d8317b2cdf3de6ff9b2c0307dc8d02d485923047d57b31d22a61abcc56"], 0x14}}, 0x0) r2 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x100000, 0x0) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000600)={0xc0, 0x464, 0x20, 0x70bd2b, 0x25dfdbff, "973f9703e43681c987947af3c1c8083de32ea8c59e17bb66fa1131bb71f62feb9d0e2d30dd5e0b3412958e5fe0cceec4126aac730f0637bbd5800c45a7540643c9c2c37aec0fd2421ecaab72641bc72be3958a965740c910b05431206b3784e1f84519555df72fc585d1fe8bc9c7edb156ad0efe2e5af3837edfddc3b7b14e00cda27aef1b0cbdee00e73a16858db80462c0721e260eb71762c36d071ce2212930ef26fbad80c57ca5f20663efbd6221", ["", "", ""]}, 0xc0}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000000) fcntl$setstatus(r2, 0x4, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x100) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x48, 0x80, 0x3f, 0x1, 0x0, 0xc4, 0x4, 0x5, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f00000004c0)}, 0x880, 0x8, 0x4, 0x222db880e1fb0bed, 0x9, 0x8228, 0x3, 0x0, 0xfffffff8, 0x0, 0x7f}, 0xffffffffffffffff, 0x10, r0, 0xa) r4 = open(&(0x7f0000000140)='./file0\x00', 0x501400, 0x1e2) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x40, 0x9, 0x7, 0xf4, 0x0, 0x6, 0x8002, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f00000000c0), 0xe}, 0x800, 0x935, 0x2, 0x3, 0xc23, 0xff, 0x7, 0x0, 0x8, 0x0, 0x6}, 0x0, 0x5, r4, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000840)={'veth0_macvtap\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) writev(r3, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) mount$9p_rdma(&(0x7f0000000880), &(0x7f0000000200)='./file0\x00', &(0x7f0000000580), 0x12288b8, &(0x7f0000000a00)=ANY=[]) socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8936, &(0x7f0000000080)={@ipv4={'\x00', '\xff\xff', @empty}, 0x43, r6}) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=@newlink={0xc8, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x242b8, 0x42a0a}, [@IFLA_LINKINFO={0x98, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x88, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_INGRESS_QOS={0x70, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x200004, 0x1f}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7, 0x10001}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3fc, 0x39e4}}, @IFLA_VLAN_QOS_MAPPING={0x2c, 0x1, {0x8, 0x49}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7ff, 0xc73}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xd1e7, 0x5}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xcaa3, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xfffffffc}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xa1ae}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1, 0x8}}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0xc8}}, 0x0) 05:03:57 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0xa00}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:03:57 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x6000000, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:03:57 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000005a80)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000005a40)={&(0x7f00000045c0)={0xec4, 0x0, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_DEBUG_HEADER={0x78, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_DEBUG_HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vxcan1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_DEBUG_MSGMASK={0xdd8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x49, 0x4, "28d7d1e615338b91bb923ba74eee79cc2b59a9741703f6cc2793bfa98654677e066a0d73ffb95ae8ada66cbbf274105786b531369ca3a9308f77b2e2c3a9885b1ff4989d69"}, @ETHTOOL_A_BITSET_VALUE={0xd85, 0x4, "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"}]}]}, 0xec4}}, 0x0) 05:03:57 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x4c00}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000033c0)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x84) openat$cgroup_freezer_state(r1, &(0x7f0000000ec0), 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000f00)='cpuacct.usage_sys\x00', 0x0, 0x0) tkill(0x0, 0x34) prlimit64(0x0, 0x0, &(0x7f0000000380)={0x3, 0x6}, &(0x7f00000003c0)) 05:03:57 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)={0x9, 0x3, 0x20, 0xf1a}, 0x40) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000000), &(0x7f0000000040)=@udp6}, 0x20) 05:03:57 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0xc00}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() [ 1515.337322][ T2922] set_target_v0_checkentry: 8 callbacks suppressed [ 1515.337383][ T2922] Cannot find add_set index 0 as target 05:03:57 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x4c01}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000033c0)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x84) openat$cgroup_freezer_state(r1, &(0x7f0000000ec0), 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000f00)='cpuacct.usage_sys\x00', 0x0, 0x0) tkill(0x0, 0x34) prlimit64(0x0, 0x0, &(0x7f0000000380)={0x3, 0x6}, &(0x7f00000003c0)) 05:03:57 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x18, 0x1, &(0x7f0000000300)=@raw=[@alu={0x3}], &(0x7f0000000340)='syzkaller\x00', 0x3, 0xfa, &(0x7f0000000380)=""/250, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 1515.439114][ T2949] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 05:03:57 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x7000000, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:03:57 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000005a80)={0x0, 0x0, 0x0}, 0x0) [ 1515.542223][T20449] Bluetooth: hci4: command 0x040f tx timeout 05:03:58 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x8a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB="94000000000401030000000000000000000000007d39391a8bdf079f9f495a1fda171e3158f5c79ff5a4dfa267f9065b81eaa585529b1ed154c2e4de9fc975eb2bc712fe039df1a80dfb5986112b3f864dd6be18f185f6af53a91ef29a364869c075e208738464d03e023ce658bc45e51d0cd92f13dd19bed44b18c890ed907be58e2f0bcb02e3c1edb68f44d0d2c95d075a7ceddb3c8a0b063f62856a88e3e03f757467a06cf67105344eb3831130485e90b0e7d8317b2cdf3de6ff9b2c0307dc8d02d485923047d57b31d22a61abcc56"], 0x14}}, 0x0) r2 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x100000, 0x0) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000600)={0xc0, 0x464, 0x20, 0x70bd2b, 0x25dfdbff, "973f9703e43681c987947af3c1c8083de32ea8c59e17bb66fa1131bb71f62feb9d0e2d30dd5e0b3412958e5fe0cceec4126aac730f0637bbd5800c45a7540643c9c2c37aec0fd2421ecaab72641bc72be3958a965740c910b05431206b3784e1f84519555df72fc585d1fe8bc9c7edb156ad0efe2e5af3837edfddc3b7b14e00cda27aef1b0cbdee00e73a16858db80462c0721e260eb71762c36d071ce2212930ef26fbad80c57ca5f20663efbd6221", ["", "", ""]}, 0xc0}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000000) fcntl$setstatus(r2, 0x4, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x100) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x48, 0x80, 0x3f, 0x1, 0x0, 0xc4, 0x4, 0x5, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f00000004c0)}, 0x880, 0x8, 0x4, 0x222db880e1fb0bed, 0x9, 0x8228, 0x3, 0x0, 0xfffffff8, 0x0, 0x7f}, 0xffffffffffffffff, 0x10, r0, 0xa) r4 = open(&(0x7f0000000140)='./file0\x00', 0x501400, 0x1e2) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x40, 0x9, 0x7, 0xf4, 0x0, 0x6, 0x8002, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f00000000c0), 0xe}, 0x800, 0x935, 0x2, 0x3, 0xc23, 0xff, 0x7, 0x0, 0x8, 0x0, 0x6}, 0x0, 0x5, r4, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000840)={'veth0_macvtap\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) writev(r3, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) mount$9p_rdma(&(0x7f0000000880), &(0x7f0000000200)='./file0\x00', &(0x7f0000000580), 0x12288b8, &(0x7f0000000a00)=ANY=[]) socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8936, &(0x7f0000000080)={@ipv4={'\x00', '\xff\xff', @empty}, 0x43, r6}) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=@newlink={0xc8, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x242b8, 0x42a0a}, [@IFLA_LINKINFO={0x98, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x88, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_INGRESS_QOS={0x70, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x200004, 0x1f}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7, 0x10001}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3fc, 0x39e4}}, @IFLA_VLAN_QOS_MAPPING={0x2c, 0x1, {0x8, 0x49}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7ff, 0xc73}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xd1e7, 0x5}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xcaa3, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xfffffffc}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xa1ae}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1, 0x8}}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0xc8}}, 0x0) [ 1515.639659][ T2955] Cannot find add_set index 0 as target [ 1515.669232][ T2956] Cannot find add_set index 0 as target 05:03:58 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0xe2c}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:03:58 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x6000}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000033c0)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x84) openat$cgroup_freezer_state(r1, &(0x7f0000000ec0), 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000f00)='cpuacct.usage_sys\x00', 0x0, 0x0) tkill(0x0, 0x34) prlimit64(0x0, 0x0, &(0x7f0000000380)={0x3, 0x6}, &(0x7f00000003c0)) 05:03:58 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000005a80)={0x0, 0x0, &(0x7f0000005a40)={&(0x7f00000045c0)={0xee0, 0x0, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_DEBUG_HEADER={0x78, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_DEBUG_HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vxcan1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_DEBUG_MSGMASK={0xdf4, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x49, 0x4, "28d7d1e615338b91bb923ba74eee79cc2b59a9741703f6cc2793bfa98654677e066a0d73ffb95ae8ada66cbbf274105786b531369ca3a9308f77b2e2c3a9885b1ff4989d69"}, @ETHTOOL_A_BITSET_VALUE={0xda4, 0x4, "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"}]}]}, 0xee0}, 0x1, 0x0, 0x0, 0x810}, 0x44010) 05:03:58 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x8010000, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() [ 1515.849939][ T2975] Cannot find add_set index 0 as target [ 1515.934464][ T2981] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 05:03:58 executing program 2: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0xc0bc5351, &(0x7f0000000040)={0x3f, 0x0, 'client1\x00', 0x0, "21c57bf1e2459575", "c0824a3e9c2bdde12c12b00b16254cdd99beb1914651f41f68defd09632b769d"}) [ 1516.023844][ T2989] Cannot find add_set index 0 as target [ 1516.040134][ T2987] Cannot find add_set index 0 as target 05:03:58 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x6001}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000033c0)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x84) openat$cgroup_freezer_state(r1, &(0x7f0000000ec0), 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000f00)='cpuacct.usage_sys\x00', 0x0, 0x0) tkill(0x0, 0x34) prlimit64(0x0, 0x0, &(0x7f0000000380)={0x3, 0x6}, &(0x7f00000003c0)) 05:03:58 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x1100}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:03:58 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x8a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB="94000000000401030000000000000000000000007d39391a8bdf079f9f495a1fda171e3158f5c79ff5a4dfa267f9065b81eaa585529b1ed154c2e4de9fc975eb2bc712fe039df1a80dfb5986112b3f864dd6be18f185f6af53a91ef29a364869c075e208738464d03e023ce658bc45e51d0cd92f13dd19bed44b18c890ed907be58e2f0bcb02e3c1edb68f44d0d2c95d075a7ceddb3c8a0b063f62856a88e3e03f757467a06cf67105344eb3831130485e90b0e7d8317b2cdf3de6ff9b2c0307dc8d02d485923047d57b31d22a61abcc56"], 0x14}}, 0x0) r2 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x100000, 0x0) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000600)={0xc0, 0x464, 0x20, 0x70bd2b, 0x25dfdbff, "973f9703e43681c987947af3c1c8083de32ea8c59e17bb66fa1131bb71f62feb9d0e2d30dd5e0b3412958e5fe0cceec4126aac730f0637bbd5800c45a7540643c9c2c37aec0fd2421ecaab72641bc72be3958a965740c910b05431206b3784e1f84519555df72fc585d1fe8bc9c7edb156ad0efe2e5af3837edfddc3b7b14e00cda27aef1b0cbdee00e73a16858db80462c0721e260eb71762c36d071ce2212930ef26fbad80c57ca5f20663efbd6221", ["", "", ""]}, 0xc0}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000000) fcntl$setstatus(r2, 0x4, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x100) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x48, 0x80, 0x3f, 0x1, 0x0, 0xc4, 0x4, 0x5, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f00000004c0)}, 0x880, 0x8, 0x4, 0x222db880e1fb0bed, 0x9, 0x8228, 0x3, 0x0, 0xfffffff8, 0x0, 0x7f}, 0xffffffffffffffff, 0x10, r0, 0xa) r4 = open(&(0x7f0000000140)='./file0\x00', 0x501400, 0x1e2) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x40, 0x9, 0x7, 0xf4, 0x0, 0x6, 0x8002, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f00000000c0), 0xe}, 0x800, 0x935, 0x2, 0x3, 0xc23, 0xff, 0x7, 0x0, 0x8, 0x0, 0x6}, 0x0, 0x5, r4, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000840)={'veth0_macvtap\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) writev(r3, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) mount$9p_rdma(&(0x7f0000000880), &(0x7f0000000200)='./file0\x00', &(0x7f0000000580), 0x12288b8, &(0x7f0000000a00)=ANY=[]) socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8936, &(0x7f0000000080)={@ipv4={'\x00', '\xff\xff', @empty}, 0x43, r6}) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=@newlink={0xc8, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x242b8, 0x42a0a}, [@IFLA_LINKINFO={0x98, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x88, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_INGRESS_QOS={0x70, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x200004, 0x1f}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7, 0x10001}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3fc, 0x39e4}}, @IFLA_VLAN_QOS_MAPPING={0x2c, 0x1, {0x8, 0x49}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7ff, 0xc73}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xd1e7, 0x5}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xcaa3, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xfffffffc}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xa1ae}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1, 0x8}}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0xc8}}, 0x0) 05:03:58 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0xc000000, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() [ 1516.186136][ T3004] Cannot find add_set index 0 as target 05:03:58 executing program 1: openat$full(0xffffffffffffff9c, &(0x7f000000acc0), 0x240000, 0x0) 05:03:58 executing program 2: pselect6(0x40, &(0x7f0000000340), 0x0, &(0x7f00000003c0)={0x2}, &(0x7f0000000440), 0x0) [ 1516.373174][ T3013] Cannot find add_set index 0 as target 05:03:58 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x1901}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() [ 1516.423344][ T3020] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1516.424090][ T3016] Cannot find add_set index 0 as target 05:03:58 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x11000000, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() [ 1516.523905][ T3023] Cannot find add_set index 0 as target 05:03:59 executing program 2: r0 = eventfd(0x0) read$eventfd(r0, &(0x7f0000000080), 0x8) 05:03:59 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, 0x0, 0x8, 0x3}, 0x14}}, 0x0) 05:03:59 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x8a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB="94000000000401030000000000000000000000007d39391a8bdf079f9f495a1fda171e3158f5c79ff5a4dfa267f9065b81eaa585529b1ed154c2e4de9fc975eb2bc712fe039df1a80dfb5986112b3f864dd6be18f185f6af53a91ef29a364869c075e208738464d03e023ce658bc45e51d0cd92f13dd19bed44b18c890ed907be58e2f0bcb02e3c1edb68f44d0d2c95d075a7ceddb3c8a0b063f62856a88e3e03f757467a06cf67105344eb3831130485e90b0e7d8317b2cdf3de6ff9b2c0307dc8d02d485923047d57b31d22a61abcc56"], 0x14}}, 0x0) r2 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x100000, 0x0) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000600)={0xc0, 0x464, 0x20, 0x70bd2b, 0x25dfdbff, "973f9703e43681c987947af3c1c8083de32ea8c59e17bb66fa1131bb71f62feb9d0e2d30dd5e0b3412958e5fe0cceec4126aac730f0637bbd5800c45a7540643c9c2c37aec0fd2421ecaab72641bc72be3958a965740c910b05431206b3784e1f84519555df72fc585d1fe8bc9c7edb156ad0efe2e5af3837edfddc3b7b14e00cda27aef1b0cbdee00e73a16858db80462c0721e260eb71762c36d071ce2212930ef26fbad80c57ca5f20663efbd6221", ["", "", ""]}, 0xc0}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000000) fcntl$setstatus(r2, 0x4, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x100) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x48, 0x80, 0x3f, 0x1, 0x0, 0xc4, 0x4, 0x5, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f00000004c0)}, 0x880, 0x8, 0x4, 0x222db880e1fb0bed, 0x9, 0x8228, 0x3, 0x0, 0xfffffff8, 0x0, 0x7f}, 0xffffffffffffffff, 0x10, r0, 0xa) r4 = open(&(0x7f0000000140)='./file0\x00', 0x501400, 0x1e2) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x40, 0x9, 0x7, 0xf4, 0x0, 0x6, 0x8002, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f00000000c0), 0xe}, 0x800, 0x935, 0x2, 0x3, 0xc23, 0xff, 0x7, 0x0, 0x8, 0x0, 0x6}, 0x0, 0x5, r4, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000840)={'veth0_macvtap\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) writev(r3, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) mount$9p_rdma(&(0x7f0000000880), &(0x7f0000000200)='./file0\x00', &(0x7f0000000580), 0x12288b8, &(0x7f0000000a00)=ANY=[]) socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8936, &(0x7f0000000080)={@ipv4={'\x00', '\xff\xff', @empty}, 0x43, r6}) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=@newlink={0xc8, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x242b8, 0x42a0a}, [@IFLA_LINKINFO={0x98, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x88, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_INGRESS_QOS={0x70, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x200004, 0x1f}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7, 0x10001}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3fc, 0x39e4}}, @IFLA_VLAN_QOS_MAPPING={0x2c, 0x1, {0x8, 0x49}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7ff, 0xc73}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xd1e7, 0x5}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xcaa3, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xfffffffc}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xa1ae}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1, 0x8}}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0xc8}}, 0x0) 05:03:59 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x6502}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000033c0)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x84) openat$cgroup_freezer_state(r1, &(0x7f0000000ec0), 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000f00)='cpuacct.usage_sys\x00', 0x0, 0x0) tkill(0x0, 0x34) prlimit64(0x0, 0x0, &(0x7f0000000380)={0x3, 0x6}, &(0x7f00000003c0)) 05:03:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x19010000, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:03:59 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x1f00}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() [ 1516.904783][ T3052] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 05:03:59 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x6800}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000033c0)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x84) openat$cgroup_freezer_state(r1, &(0x7f0000000ec0), 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000f00)='cpuacct.usage_sys\x00', 0x0, 0x0) tkill(0x0, 0x34) prlimit64(0x0, 0x0, &(0x7f0000000380)={0x3, 0x6}, &(0x7f00000003c0)) 05:03:59 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, 0x0, 0x8, 0x3}, 0x14}}, 0x0) 05:03:59 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x8a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB="94000000000401030000000000000000000000007d39391a8bdf079f9f495a1fda171e3158f5c79ff5a4dfa267f9065b81eaa585529b1ed154c2e4de9fc975eb2bc712fe039df1a80dfb5986112b3f864dd6be18f185f6af53a91ef29a364869c075e208738464d03e023ce658bc45e51d0cd92f13dd19bed44b18c890ed907be58e2f0bcb02e3c1edb68f44d0d2c95d075a7ceddb3c8a0b063f62856a88e3e03f757467a06cf67105344eb3831130485e90b0e7d8317b2cdf3de6ff9b2c0307dc8d02d485923047d57b31d22a61abcc56"], 0x14}}, 0x0) r2 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x100000, 0x0) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000600)={0xc0, 0x464, 0x20, 0x70bd2b, 0x25dfdbff, "973f9703e43681c987947af3c1c8083de32ea8c59e17bb66fa1131bb71f62feb9d0e2d30dd5e0b3412958e5fe0cceec4126aac730f0637bbd5800c45a7540643c9c2c37aec0fd2421ecaab72641bc72be3958a965740c910b05431206b3784e1f84519555df72fc585d1fe8bc9c7edb156ad0efe2e5af3837edfddc3b7b14e00cda27aef1b0cbdee00e73a16858db80462c0721e260eb71762c36d071ce2212930ef26fbad80c57ca5f20663efbd6221", ["", "", ""]}, 0xc0}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000000) fcntl$setstatus(r2, 0x4, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x100) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x48, 0x80, 0x3f, 0x1, 0x0, 0xc4, 0x4, 0x5, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f00000004c0)}, 0x880, 0x8, 0x4, 0x222db880e1fb0bed, 0x9, 0x8228, 0x3, 0x0, 0xfffffff8, 0x0, 0x7f}, 0xffffffffffffffff, 0x10, r0, 0xa) r4 = open(&(0x7f0000000140)='./file0\x00', 0x501400, 0x1e2) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x40, 0x9, 0x7, 0xf4, 0x0, 0x6, 0x8002, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f00000000c0), 0xe}, 0x800, 0x935, 0x2, 0x3, 0xc23, 0xff, 0x7, 0x0, 0x8, 0x0, 0x6}, 0x0, 0x5, r4, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000840)={'veth0_macvtap\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) writev(r3, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) mount$9p_rdma(&(0x7f0000000880), &(0x7f0000000200)='./file0\x00', &(0x7f0000000580), 0x12288b8, &(0x7f0000000a00)=ANY=[]) socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8936, &(0x7f0000000080)={@ipv4={'\x00', '\xff\xff', @empty}, 0x43, r6}) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=@newlink={0xc8, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x242b8, 0x42a0a}, [@IFLA_LINKINFO={0x98, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x88, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_INGRESS_QOS={0x70, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x200004, 0x1f}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7, 0x10001}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3fc, 0x39e4}}, @IFLA_VLAN_QOS_MAPPING={0x2c, 0x1, {0x8, 0x49}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7ff, 0xc73}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xd1e7, 0x5}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xcaa3, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xfffffffc}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xa1ae}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1, 0x8}}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0xc8}}, 0x0) 05:03:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x29000000, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:03:59 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x2000}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:03:59 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x6801}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000033c0)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x84) openat$cgroup_freezer_state(r1, &(0x7f0000000ec0), 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000f00)='cpuacct.usage_sys\x00', 0x0, 0x0) tkill(0x0, 0x34) prlimit64(0x0, 0x0, &(0x7f0000000380)={0x3, 0x6}, &(0x7f00000003c0)) [ 1517.433277][ T3088] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1517.621520][T20449] Bluetooth: hci4: command 0x0419 tx timeout 05:04:00 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000005a80)={0x0, 0x0, &(0x7f0000005a40)={&(0x7f00000045c0)={0xec4, 0x0, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_DEBUG_HEADER={0x70, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan1\x00'}]}, @ETHTOOL_A_DEBUG_HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vxcan1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_DEBUG_MSGMASK={0xde0, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x49, 0x4, "28d7d1e615338b91bb923ba74eee79cc2b59a9741703f6cc2793bfa98654677e066a0d73ffb95ae8ada66cbbf274105786b531369ca3a9308f77b2e2c3a9885b1ff4989d69"}, @ETHTOOL_A_BITSET_VALUE={0xd8d, 0x4, "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"}]}]}, 0xec4}, 0x1, 0x0, 0x0, 0x810}, 0x44010) 05:04:00 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, 0x0, 0x8, 0x3}, 0x14}}, 0x0) 05:04:00 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x38000000, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:04:00 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x2900}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:04:00 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x6c00}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000033c0)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x84) openat$cgroup_freezer_state(r1, &(0x7f0000000ec0), 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000f00)='cpuacct.usage_sys\x00', 0x0, 0x0) tkill(0x0, 0x34) prlimit64(0x0, 0x0, &(0x7f0000000380)={0x3, 0x6}, &(0x7f00000003c0)) 05:04:00 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x8a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB="94000000000401030000000000000000000000007d39391a8bdf079f9f495a1fda171e3158f5c79ff5a4dfa267f9065b81eaa585529b1ed154c2e4de9fc975eb2bc712fe039df1a80dfb5986112b3f864dd6be18f185f6af53a91ef29a364869c075e208738464d03e023ce658bc45e51d0cd92f13dd19bed44b18c890ed907be58e2f0bcb02e3c1edb68f44d0d2c95d075a7ceddb3c8a0b063f62856a88e3e03f757467a06cf67105344eb3831130485e90b0e7d8317b2cdf3de6ff9b2c0307dc8d02d485923047d57b31d22a61abcc56"], 0x14}}, 0x0) r2 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x100000, 0x0) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000600)={0xc0, 0x464, 0x20, 0x70bd2b, 0x25dfdbff, "973f9703e43681c987947af3c1c8083de32ea8c59e17bb66fa1131bb71f62feb9d0e2d30dd5e0b3412958e5fe0cceec4126aac730f0637bbd5800c45a7540643c9c2c37aec0fd2421ecaab72641bc72be3958a965740c910b05431206b3784e1f84519555df72fc585d1fe8bc9c7edb156ad0efe2e5af3837edfddc3b7b14e00cda27aef1b0cbdee00e73a16858db80462c0721e260eb71762c36d071ce2212930ef26fbad80c57ca5f20663efbd6221", ["", "", ""]}, 0xc0}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000000) fcntl$setstatus(r2, 0x4, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x100) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x48, 0x80, 0x3f, 0x1, 0x0, 0xc4, 0x4, 0x5, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f00000004c0)}, 0x880, 0x8, 0x4, 0x222db880e1fb0bed, 0x9, 0x8228, 0x3, 0x0, 0xfffffff8, 0x0, 0x7f}, 0xffffffffffffffff, 0x10, r0, 0xa) r4 = open(&(0x7f0000000140)='./file0\x00', 0x501400, 0x1e2) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x40, 0x9, 0x7, 0xf4, 0x0, 0x6, 0x8002, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f00000000c0), 0xe}, 0x800, 0x935, 0x2, 0x3, 0xc23, 0xff, 0x7, 0x0, 0x8, 0x0, 0x6}, 0x0, 0x5, r4, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000840)={'veth0_macvtap\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) writev(r3, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) mount$9p_rdma(&(0x7f0000000880), &(0x7f0000000200)='./file0\x00', &(0x7f0000000580), 0x12288b8, &(0x7f0000000a00)=ANY=[]) socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8936, &(0x7f0000000080)={@ipv4={'\x00', '\xff\xff', @empty}, 0x43, r6}) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=@newlink={0xc8, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x242b8, 0x42a0a}, [@IFLA_LINKINFO={0x98, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x88, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_INGRESS_QOS={0x70, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x200004, 0x1f}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7, 0x10001}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3fc, 0x39e4}}, @IFLA_VLAN_QOS_MAPPING={0x2c, 0x1, {0x8, 0x49}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7ff, 0xc73}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xd1e7, 0x5}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xcaa3, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xfffffffc}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xa1ae}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1, 0x8}}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0xc8}}, 0x0) 05:04:00 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x2c0e}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() [ 1517.908553][ T3120] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 05:04:00 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x7400}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000033c0)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x84) openat$cgroup_freezer_state(r1, &(0x7f0000000ec0), 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000f00)='cpuacct.usage_sys\x00', 0x0, 0x0) tkill(0x0, 0x34) prlimit64(0x0, 0x0, &(0x7f0000000380)={0x3, 0x6}, &(0x7f00000003c0)) 05:04:00 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, 0x0, 0x8, 0x3}, 0x14}}, 0x0) 05:04:00 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x8a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB="94000000000401030000000000000000000000007d39391a8bdf079f9f495a1fda171e3158f5c79ff5a4dfa267f9065b81eaa585529b1ed154c2e4de9fc975eb2bc712fe039df1a80dfb5986112b3f864dd6be18f185f6af53a91ef29a364869c075e208738464d03e023ce658bc45e51d0cd92f13dd19bed44b18c890ed907be58e2f0bcb02e3c1edb68f44d0d2c95d075a7ceddb3c8a0b063f62856a88e3e03f757467a06cf67105344eb3831130485e90b0e7d8317b2cdf3de6ff9b2c0307dc8d02d485923047d57b31d22a61abcc56"], 0x14}}, 0x0) r2 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x100000, 0x0) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000600)={0xc0, 0x464, 0x20, 0x70bd2b, 0x25dfdbff, "973f9703e43681c987947af3c1c8083de32ea8c59e17bb66fa1131bb71f62feb9d0e2d30dd5e0b3412958e5fe0cceec4126aac730f0637bbd5800c45a7540643c9c2c37aec0fd2421ecaab72641bc72be3958a965740c910b05431206b3784e1f84519555df72fc585d1fe8bc9c7edb156ad0efe2e5af3837edfddc3b7b14e00cda27aef1b0cbdee00e73a16858db80462c0721e260eb71762c36d071ce2212930ef26fbad80c57ca5f20663efbd6221", ["", "", ""]}, 0xc0}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000000) fcntl$setstatus(r2, 0x4, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x100) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x48, 0x80, 0x3f, 0x1, 0x0, 0xc4, 0x4, 0x5, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f00000004c0)}, 0x880, 0x8, 0x4, 0x222db880e1fb0bed, 0x9, 0x8228, 0x3, 0x0, 0xfffffff8, 0x0, 0x7f}, 0xffffffffffffffff, 0x10, r0, 0xa) r4 = open(&(0x7f0000000140)='./file0\x00', 0x501400, 0x1e2) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x40, 0x9, 0x7, 0xf4, 0x0, 0x6, 0x8002, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_bp={&(0x7f00000000c0), 0xe}, 0x800, 0x935, 0x2, 0x3, 0xc23, 0xff, 0x7, 0x0, 0x8, 0x0, 0x6}, 0x0, 0x5, r4, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000840)={'veth0_macvtap\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) writev(r3, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) mount$9p_rdma(&(0x7f0000000880), &(0x7f0000000200)='./file0\x00', &(0x7f0000000580), 0x12288b8, &(0x7f0000000a00)=ANY=[]) socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8936, &(0x7f0000000080)={@ipv4={'\x00', '\xff\xff', @empty}, 0x43, r6}) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=@newlink={0xc8, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x242b8, 0x42a0a}, [@IFLA_LINKINFO={0x98, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x88, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_INGRESS_QOS={0x70, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x200004, 0x1f}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7, 0x10001}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3fc, 0x39e4}}, @IFLA_VLAN_QOS_MAPPING={0x2c, 0x1, {0x8, 0x49}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7ff, 0xc73}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xd1e7, 0x5}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xcaa3, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xfffffffc}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xa1ae}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1, 0x8}}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0xc8}}, 0x0) 05:04:00 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x4c010000, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:04:00 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000003e80)={0x0, 0x0, &(0x7f0000003e40)={&(0x7f0000003ec0)=ANY=[], 0x254c}}, 0x20008012) 05:04:00 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x7a00}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000033c0)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x84) openat$cgroup_freezer_state(r1, &(0x7f0000000ec0), 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000f00)='cpuacct.usage_sys\x00', 0x0, 0x0) tkill(0x0, 0x34) prlimit64(0x0, 0x0, &(0x7f0000000380)={0x3, 0x6}, &(0x7f00000003c0)) 05:04:00 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x3800}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:04:00 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000)={0x3000}}, 0x48) [ 1518.347315][ T3162] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 05:04:00 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x30, 0x0, 0x8, 0x3, 0x0, 0x0, {}, [@CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}, @CTA_TIMEOUT_L4PROTO={0x5}, @CTA_TIMEOUT_L3PROTO={0x6}]}, 0x30}}, 0x0) 05:04:00 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x8a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB="94000000000401030000000000000000000000007d39391a8bdf079f9f495a1fda171e3158f5c79ff5a4dfa267f9065b81eaa585529b1ed154c2e4de9fc975eb2bc712fe039df1a80dfb5986112b3f864dd6be18f185f6af53a91ef29a364869c075e208738464d03e023ce658bc45e51d0cd92f13dd19bed44b18c890ed907be58e2f0bcb02e3c1edb68f44d0d2c95d075a7ceddb3c8a0b063f62856a88e3e03f757467a06cf67105344eb3831130485e90b0e7d8317b2cdf3de6ff9b2c0307dc8d02d485923047d57b31d22a61abcc56"], 0x14}}, 0x0) r2 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x100000, 0x0) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000600)={0xc0, 0x464, 0x20, 0x70bd2b, 0x25dfdbff, "973f9703e43681c987947af3c1c8083de32ea8c59e17bb66fa1131bb71f62feb9d0e2d30dd5e0b3412958e5fe0cceec4126aac730f0637bbd5800c45a7540643c9c2c37aec0fd2421ecaab72641bc72be3958a965740c910b05431206b3784e1f84519555df72fc585d1fe8bc9c7edb156ad0efe2e5af3837edfddc3b7b14e00cda27aef1b0cbdee00e73a16858db80462c0721e260eb71762c36d071ce2212930ef26fbad80c57ca5f20663efbd6221", ["", "", ""]}, 0xc0}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000000) fcntl$setstatus(r2, 0x4, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x100) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x48, 0x80, 0x3f, 0x1, 0x0, 0xc4, 0x4, 0x5, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f00000004c0)}, 0x880, 0x8, 0x4, 0x222db880e1fb0bed, 0x9, 0x8228, 0x3, 0x0, 0xfffffff8, 0x0, 0x7f}, 0xffffffffffffffff, 0x10, r0, 0xa) r4 = open(&(0x7f0000000140)='./file0\x00', 0x501400, 0x1e2) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x40, 0x9, 0x7, 0xf4, 0x0, 0x6, 0x8002, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_bp={&(0x7f00000000c0), 0xe}, 0x800, 0x935, 0x2, 0x3, 0xc23, 0xff, 0x7, 0x0, 0x8, 0x0, 0x6}, 0x0, 0x5, r4, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000840)={'veth0_macvtap\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) writev(r3, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) mount$9p_rdma(&(0x7f0000000880), &(0x7f0000000200)='./file0\x00', &(0x7f0000000580), 0x12288b8, &(0x7f0000000a00)=ANY=[]) socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8936, &(0x7f0000000080)={@ipv4={'\x00', '\xff\xff', @empty}, 0x43, r6}) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=@newlink={0xc8, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x242b8, 0x42a0a}, [@IFLA_LINKINFO={0x98, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x88, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_INGRESS_QOS={0x70, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x200004, 0x1f}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7, 0x10001}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3fc, 0x39e4}}, @IFLA_VLAN_QOS_MAPPING={0x2c, 0x1, {0x8, 0x49}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7ff, 0xc73}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xd1e7, 0x5}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xcaa3, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xfffffffc}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xa1ae}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1, 0x8}}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0xc8}}, 0x0) 05:04:00 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x60010000, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:04:01 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x4800}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:04:01 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x8800}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000033c0)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x84) openat$cgroup_freezer_state(r1, &(0x7f0000000ec0), 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000f00)='cpuacct.usage_sys\x00', 0x0, 0x0) tkill(0x0, 0x34) prlimit64(0x0, 0x0, &(0x7f0000000380)={0x3, 0x6}, &(0x7f00000003c0)) [ 1518.792264][ T3192] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 05:04:01 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x65020000, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:04:01 executing program 2: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0x5421, &(0x7f0000000040)={0x3f, 0x0, 'client1\x00', 0x0, "21c57bf1e2459575", "c0824a3e9c2bdde12c12b00b16254cdd99beb1914651f41f68defd09632b769d"}) 05:04:01 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x4c00}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:04:01 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x8a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB="94000000000401030000000000000000000000007d39391a8bdf079f9f495a1fda171e3158f5c79ff5a4dfa267f9065b81eaa585529b1ed154c2e4de9fc975eb2bc712fe039df1a80dfb5986112b3f864dd6be18f185f6af53a91ef29a364869c075e208738464d03e023ce658bc45e51d0cd92f13dd19bed44b18c890ed907be58e2f0bcb02e3c1edb68f44d0d2c95d075a7ceddb3c8a0b063f62856a88e3e03f757467a06cf67105344eb3831130485e90b0e7d8317b2cdf3de6ff9b2c0307dc8d02d485923047d57b31d22a61abcc56"], 0x14}}, 0x0) r2 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x100000, 0x0) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000600)={0xc0, 0x464, 0x20, 0x70bd2b, 0x25dfdbff, "973f9703e43681c987947af3c1c8083de32ea8c59e17bb66fa1131bb71f62feb9d0e2d30dd5e0b3412958e5fe0cceec4126aac730f0637bbd5800c45a7540643c9c2c37aec0fd2421ecaab72641bc72be3958a965740c910b05431206b3784e1f84519555df72fc585d1fe8bc9c7edb156ad0efe2e5af3837edfddc3b7b14e00cda27aef1b0cbdee00e73a16858db80462c0721e260eb71762c36d071ce2212930ef26fbad80c57ca5f20663efbd6221", ["", "", ""]}, 0xc0}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000000) fcntl$setstatus(r2, 0x4, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x100) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x48, 0x80, 0x3f, 0x1, 0x0, 0xc4, 0x4, 0x5, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f00000004c0)}, 0x880, 0x8, 0x4, 0x222db880e1fb0bed, 0x9, 0x8228, 0x3, 0x0, 0xfffffff8, 0x0, 0x7f}, 0xffffffffffffffff, 0x10, r0, 0xa) r4 = open(&(0x7f0000000140)='./file0\x00', 0x501400, 0x1e2) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x40, 0x9, 0x7, 0xf4, 0x0, 0x6, 0x8002, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_bp={&(0x7f00000000c0), 0xe}, 0x800, 0x935, 0x2, 0x3, 0xc23, 0xff, 0x7, 0x0, 0x8, 0x0, 0x6}, 0x0, 0x5, r4, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000840)={'veth0_macvtap\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) writev(r3, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) mount$9p_rdma(&(0x7f0000000880), &(0x7f0000000200)='./file0\x00', &(0x7f0000000580), 0x12288b8, &(0x7f0000000a00)=ANY=[]) socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8936, &(0x7f0000000080)={@ipv4={'\x00', '\xff\xff', @empty}, 0x43, r6}) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=@newlink={0xc8, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x242b8, 0x42a0a}, [@IFLA_LINKINFO={0x98, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x88, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_INGRESS_QOS={0x70, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x200004, 0x1f}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7, 0x10001}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3fc, 0x39e4}}, @IFLA_VLAN_QOS_MAPPING={0x2c, 0x1, {0x8, 0x49}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7ff, 0xc73}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xd1e7, 0x5}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xcaa3, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xfffffffc}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xa1ae}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1, 0x8}}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0xc8}}, 0x0) 05:04:01 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="b702000000400400bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000812d6405000000000025040000ffffff7f1704000009000a40b7040000000100006a0a00fe00000000850000001a000000b7000000000000009500000000000000a93e90832ff9d40a409f01f6147c8f6fd267bf410e76c540106f89ec68823ce3c4bcc4ce81e97719ea969f2a019a6137ad1efc966f1cfdd2f673efc20c07ec082bc6de68ab0a5ebf4ee60253516cc871311ab25868e1d9a014263697ca83c505c2ead0d85a2bcd922a3aa71489fa0000c1a6ec9aa2e28000004bcff56cf5a84cefb43ea72351190a711fd2b83a3596d80729476ab7140606791e81960ea313ea74c2cde2dedd424a4596f98e3e70a6f1d8abce75f01dbb60bdf7316a4fed35f16ae8b3aa4c6dd4880c76e5837f39a161b050abc5a34588ea19114caebb799d1084e7113c77ae25998e1e3c55707a209412cba0121de52e5e8cceddf2cb4b9895c0738fda3ea38c09e75b1f39be8af2c746fbb43e3530767d8ae296487c0e650ead9003d032008fee9b2b62fc202240219f497e89548a2977f86137ecb5753dfc87f148ed2392ef113cbe241a98b4e8f3bf878f1dc0e115dd1c328f54369bc8dfd3a4ea21259ed518ae80606ef83d69b9d0d972b2211d05b2e31d61bf49ca69bdb0f57d5f16769d1605e8045c6880b425f8575f863a7e1b7174281ab87fba93555853010000800000000068217230eabfaf7ff9b0146acffea06f3b0ba7b7357ba84c953523e92ee8cc4d8be00500000095e31139b76417432c305d59cb68bff089979504c71418bd62ec60cfb07d75ce2adc8d4b2eabae5937b47e0700000000170ac03c7ae91659fc79fc36c84dd1b2b8972c5c2544e3b50acd3b00000000000d62fae930c2308e2401bb761565ac4eda4ca118ebbe000000000000000000000000000000a52d598dbcfeb90dd310175435c84362ef27f7d55431a5756e4be9698bcd550c104b738233c292dd016e1f21b5999e1448f8784db6a9d4f36ec14cc67fcdd41c8ba146dc7d3fb07df9687b95efcd74ad8dfd14234dab4da83f91a2925b49f6040087cfaa9f83a6cdb0e031d9eb6cbff6eba616992f3ba67394a543c3210d8def880b2c071cf7268ec32ac38db9d3062571ec8eb3290bb4a823674e89cf1716d4bc9fac0c47d854632a1d943a9dc58e6f4d0b687a055983a46fdd52f3c87506ae419c604f62b56ad1420eca5484ee0092563332124c612f4b79f2763a2288644bbe0d29c4d4cb1da9b7f9ded12465ed5ba385d6be8843ee4f48c9c913c00f1869c7d815313aa70815a00d00002a4e044e76d8cd4c3ee7460ec713f1048c453393734b3b4f9b972c7e85dbf2fff1ef1ad15024f9439039dc00000071e5625602305932578c519affeff3d71a670c20ada03667ddca98a674da2476440a934954d1075b6de86cf32c8bf3b97204ebd277f73c411072bb3de1508f6a721c93907dff5be99e13a2a9998639d67db9d8cfaf891e394c1049934c0c232ddc69c070d07fa57d404eb34822228df58776a214e986af2b88d38c9d4b46e4aed6dccd80b96417c7d82769e7fd3779ebda2aa366783afd5c4691e4f3a0a3e82d2e53d0c75d7421e3f98543ec13059db243692aa45195e1146a6aa125e1e5a9bf5044ca795ba1497f8c68ceb79a221d011e26410c858727c375dffd5741eb68413014942ead4dab1cb9d1e84a491a841679d5ef2b50bc69fffe11afaf02ef200c79aa1cfb720b26b1428a884563d7d8e3bd78fee850db17e79ebdaea3904703c69c18186c00000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000)={0x3000}}, 0x48) 05:04:01 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x8802}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000033c0)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x84) openat$cgroup_freezer_state(r1, &(0x7f0000000ec0), 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000f00)='cpuacct.usage_sys\x00', 0x0, 0x0) tkill(0x0, 0x34) prlimit64(0x0, 0x0, &(0x7f0000000380)={0x3, 0x6}, &(0x7f00000003c0)) 05:04:01 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x4c01}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:04:01 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x68010000, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:04:01 executing program 2: ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={'team0\x00', @ifru_flags}) clock_gettime(0x0, &(0x7f0000000c40)={0x0, 0x0}) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000c80)={r0, r1+10000000}) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000cc0), r2) socket(0xa, 0x5, 0xfc6) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f000000a5c0)={{{@in=@multicast1, @in6=@ipv4={""/10, ""/2, @local}}}, {{@in=@empty}, 0x0, @in=@initdev}}, &(0x7f000000a6c0)=0xe8) sendmsg$NL80211_CMD_SET_MESH_CONFIG(0xffffffffffffffff, &(0x7f000000ac80)={0x0, 0x0, 0x0}, 0x0) openat$full(0xffffffffffffff9c, &(0x7f000000acc0), 0x240000, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, 0x0, 0x8001) socketpair(0x2a, 0xa, 0xfffffff7, &(0x7f000000af80)) syz_genetlink_get_family_id$tipc(&(0x7f000000af40), 0xffffffffffffffff) [ 1519.360590][ T3239] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 05:04:02 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x6000}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:04:02 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000)={0x3000}}, 0x48) 05:04:02 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x9101}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000033c0)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x84) openat$cgroup_freezer_state(r1, &(0x7f0000000ec0), 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000f00)='cpuacct.usage_sys\x00', 0x0, 0x0) tkill(0x0, 0x34) prlimit64(0x0, 0x0, &(0x7f0000000380)={0x3, 0x6}, &(0x7f00000003c0)) 05:04:02 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x8a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB="94000000000401030000000000000000000000007d39391a8bdf079f9f495a1fda171e3158f5c79ff5a4dfa267f9065b81eaa585529b1ed154c2e4de9fc975eb2bc712fe039df1a80dfb5986112b3f864dd6be18f185f6af53a91ef29a364869c075e208738464d03e023ce658bc45e51d0cd92f13dd19bed44b18c890ed907be58e2f0bcb02e3c1edb68f44d0d2c95d075a7ceddb3c8a0b063f62856a88e3e03f757467a06cf67105344eb3831130485e90b0e7d8317b2cdf3de6ff9b2c0307dc8d02d485923047d57b31d22a61abcc56"], 0x14}}, 0x0) r2 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x100000, 0x0) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000600)={0xc0, 0x464, 0x20, 0x70bd2b, 0x25dfdbff, "973f9703e43681c987947af3c1c8083de32ea8c59e17bb66fa1131bb71f62feb9d0e2d30dd5e0b3412958e5fe0cceec4126aac730f0637bbd5800c45a7540643c9c2c37aec0fd2421ecaab72641bc72be3958a965740c910b05431206b3784e1f84519555df72fc585d1fe8bc9c7edb156ad0efe2e5af3837edfddc3b7b14e00cda27aef1b0cbdee00e73a16858db80462c0721e260eb71762c36d071ce2212930ef26fbad80c57ca5f20663efbd6221", ["", "", ""]}, 0xc0}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000000) fcntl$setstatus(r2, 0x4, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x100) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x48, 0x80, 0x3f, 0x1, 0x0, 0xc4, 0x4, 0x5, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f00000004c0)}, 0x880, 0x8, 0x4, 0x222db880e1fb0bed, 0x9, 0x8228, 0x3, 0x0, 0xfffffff8, 0x0, 0x7f}, 0xffffffffffffffff, 0x10, r0, 0xa) r4 = open(&(0x7f0000000140)='./file0\x00', 0x501400, 0x1e2) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x40, 0x9, 0x7, 0xf4, 0x0, 0x6, 0x8002, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000000c0), 0xe}, 0x800, 0x935, 0x2, 0x3, 0xc23, 0xff, 0x7, 0x0, 0x8, 0x0, 0x6}, 0x0, 0x5, r4, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000840)={'veth0_macvtap\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) writev(r3, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) mount$9p_rdma(&(0x7f0000000880), &(0x7f0000000200)='./file0\x00', &(0x7f0000000580), 0x12288b8, &(0x7f0000000a00)=ANY=[]) socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8936, &(0x7f0000000080)={@ipv4={'\x00', '\xff\xff', @empty}, 0x43, r6}) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=@newlink={0xc8, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x242b8, 0x42a0a}, [@IFLA_LINKINFO={0x98, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x88, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_INGRESS_QOS={0x70, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x200004, 0x1f}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7, 0x10001}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3fc, 0x39e4}}, @IFLA_VLAN_QOS_MAPPING={0x2c, 0x1, {0x8, 0x49}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7ff, 0xc73}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xd1e7, 0x5}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xcaa3, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xfffffffc}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xa1ae}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1, 0x8}}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0xc8}}, 0x0) 05:04:02 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x88000000, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:04:02 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x6001}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:04:02 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) recvmmsg(r0, &(0x7f0000005700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x3020, 0x0) 05:04:02 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x88020000, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:04:02 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000)={0x3000}}, 0x48) 05:04:02 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x8a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB="94000000000401030000000000000000000000007d39391a8bdf079f9f495a1fda171e3158f5c79ff5a4dfa267f9065b81eaa585529b1ed154c2e4de9fc975eb2bc712fe039df1a80dfb5986112b3f864dd6be18f185f6af53a91ef29a364869c075e208738464d03e023ce658bc45e51d0cd92f13dd19bed44b18c890ed907be58e2f0bcb02e3c1edb68f44d0d2c95d075a7ceddb3c8a0b063f62856a88e3e03f757467a06cf67105344eb3831130485e90b0e7d8317b2cdf3de6ff9b2c0307dc8d02d485923047d57b31d22a61abcc56"], 0x14}}, 0x0) r2 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x100000, 0x0) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000600)={0xc0, 0x464, 0x20, 0x70bd2b, 0x25dfdbff, "973f9703e43681c987947af3c1c8083de32ea8c59e17bb66fa1131bb71f62feb9d0e2d30dd5e0b3412958e5fe0cceec4126aac730f0637bbd5800c45a7540643c9c2c37aec0fd2421ecaab72641bc72be3958a965740c910b05431206b3784e1f84519555df72fc585d1fe8bc9c7edb156ad0efe2e5af3837edfddc3b7b14e00cda27aef1b0cbdee00e73a16858db80462c0721e260eb71762c36d071ce2212930ef26fbad80c57ca5f20663efbd6221", ["", "", ""]}, 0xc0}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000000) fcntl$setstatus(r2, 0x4, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x100) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x48, 0x80, 0x3f, 0x1, 0x0, 0xc4, 0x4, 0x5, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f00000004c0)}, 0x880, 0x8, 0x4, 0x222db880e1fb0bed, 0x9, 0x8228, 0x3, 0x0, 0xfffffff8, 0x0, 0x7f}, 0xffffffffffffffff, 0x10, r0, 0xa) r4 = open(&(0x7f0000000140)='./file0\x00', 0x501400, 0x1e2) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x40, 0x9, 0x7, 0xf4, 0x0, 0x6, 0x8002, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000000c0), 0xe}, 0x800, 0x935, 0x2, 0x3, 0xc23, 0xff, 0x7, 0x0, 0x8, 0x0, 0x6}, 0x0, 0x5, r4, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000840)={'veth0_macvtap\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) writev(r3, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) mount$9p_rdma(&(0x7f0000000880), &(0x7f0000000200)='./file0\x00', &(0x7f0000000580), 0x12288b8, &(0x7f0000000a00)=ANY=[]) socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8936, &(0x7f0000000080)={@ipv4={'\x00', '\xff\xff', @empty}, 0x43, r6}) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=@newlink={0xc8, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x242b8, 0x42a0a}, [@IFLA_LINKINFO={0x98, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x88, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_INGRESS_QOS={0x70, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x200004, 0x1f}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7, 0x10001}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3fc, 0x39e4}}, @IFLA_VLAN_QOS_MAPPING={0x2c, 0x1, {0x8, 0x49}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7ff, 0xc73}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xd1e7, 0x5}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xcaa3, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xfffffffc}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xa1ae}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1, 0x8}}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0xc8}}, 0x0) 05:04:02 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x6502}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:04:02 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x91010000, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:04:02 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x9c00}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000033c0)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x84) openat$cgroup_freezer_state(r1, &(0x7f0000000ec0), 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000f00)='cpuacct.usage_sys\x00', 0x0, 0x0) tkill(0x0, 0x34) prlimit64(0x0, 0x0, &(0x7f0000000380)={0x3, 0x6}, &(0x7f00000003c0)) 05:04:02 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0x5, 0xdd, 0x0, 0x8000}, 0x40) [ 1520.414237][ T3315] __nla_validate_parse: 1 callbacks suppressed [ 1520.414256][ T3315] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1520.440608][ T3320] set_target_v0_checkentry: 39 callbacks suppressed [ 1520.440627][ T3320] Cannot find add_set index 0 as target 05:04:02 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x6800}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() [ 1520.576440][ T3328] Cannot find add_set index 0 as target 05:04:03 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x9d01}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000033c0)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x84) openat$cgroup_freezer_state(r1, &(0x7f0000000ec0), 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000f00)='cpuacct.usage_sys\x00', 0x0, 0x0) tkill(0x0, 0x34) prlimit64(0x0, 0x0, &(0x7f0000000380)={0x3, 0x6}, &(0x7f00000003c0)) [ 1520.644241][ T3333] Cannot find add_set index 0 as target 05:04:03 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x9c000000, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:04:03 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x8a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB="94000000000401030000000000000000000000007d39391a8bdf079f9f495a1fda171e3158f5c79ff5a4dfa267f9065b81eaa585529b1ed154c2e4de9fc975eb2bc712fe039df1a80dfb5986112b3f864dd6be18f185f6af53a91ef29a364869c075e208738464d03e023ce658bc45e51d0cd92f13dd19bed44b18c890ed907be58e2f0bcb02e3c1edb68f44d0d2c95d075a7ceddb3c8a0b063f62856a88e3e03f757467a06cf67105344eb3831130485e90b0e7d8317b2cdf3de6ff9b2c0307dc8d02d485923047d57b31d22a61abcc56"], 0x14}}, 0x0) r2 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x100000, 0x0) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000600)={0xc0, 0x464, 0x20, 0x70bd2b, 0x25dfdbff, "973f9703e43681c987947af3c1c8083de32ea8c59e17bb66fa1131bb71f62feb9d0e2d30dd5e0b3412958e5fe0cceec4126aac730f0637bbd5800c45a7540643c9c2c37aec0fd2421ecaab72641bc72be3958a965740c910b05431206b3784e1f84519555df72fc585d1fe8bc9c7edb156ad0efe2e5af3837edfddc3b7b14e00cda27aef1b0cbdee00e73a16858db80462c0721e260eb71762c36d071ce2212930ef26fbad80c57ca5f20663efbd6221", ["", "", ""]}, 0xc0}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000000) fcntl$setstatus(r2, 0x4, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x100) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x48, 0x80, 0x3f, 0x1, 0x0, 0xc4, 0x4, 0x5, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f00000004c0)}, 0x880, 0x8, 0x4, 0x222db880e1fb0bed, 0x9, 0x8228, 0x3, 0x0, 0xfffffff8, 0x0, 0x7f}, 0xffffffffffffffff, 0x10, r0, 0xa) r4 = open(&(0x7f0000000140)='./file0\x00', 0x501400, 0x1e2) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x40, 0x9, 0x7, 0xf4, 0x0, 0x6, 0x8002, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000000c0), 0xe}, 0x800, 0x935, 0x2, 0x3, 0xc23, 0xff, 0x7, 0x0, 0x8, 0x0, 0x6}, 0x0, 0x5, r4, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000840)={'veth0_macvtap\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) writev(r3, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) mount$9p_rdma(&(0x7f0000000880), &(0x7f0000000200)='./file0\x00', &(0x7f0000000580), 0x12288b8, &(0x7f0000000a00)=ANY=[]) socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8936, &(0x7f0000000080)={@ipv4={'\x00', '\xff\xff', @empty}, 0x43, r6}) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=@newlink={0xc8, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x242b8, 0x42a0a}, [@IFLA_LINKINFO={0x98, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x88, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_INGRESS_QOS={0x70, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x200004, 0x1f}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7, 0x10001}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3fc, 0x39e4}}, @IFLA_VLAN_QOS_MAPPING={0x2c, 0x1, {0x8, 0x49}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7ff, 0xc73}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xd1e7, 0x5}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xcaa3, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xfffffffc}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xa1ae}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1, 0x8}}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0xc8}}, 0x0) 05:04:03 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x0) 05:04:03 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0x25}, 0x40) [ 1520.831887][ T3342] Cannot find add_set index 0 as target 05:04:03 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x6801}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() [ 1520.921766][ T3358] Cannot find add_set index 0 as target [ 1520.952831][ T3359] Cannot find add_set index 0 as target 05:04:03 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x9d010000, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() [ 1521.001957][ T3363] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 05:04:03 executing program 1: r0 = syz_open_dev$sndctrl(0x0, 0x0, 0x10b01) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) tee(r0, r1, 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') r2 = memfd_create(&(0x7f0000000140)='\xedr!QY\x88=Vx\xa1\xd1<\xdeb\x17\xd3\xe2i\x1d5\x17\xa4\x00\xd8\x02\x9f\x11\xfa\t\x13]\f\xcbo\xc4X\x00\x94/\x96h\xef~Ms\"\x00\x00', 0x0) write$eventfd(r2, &(0x7f0000000080)=0x20000100000094, 0x8) write(r2, &(0x7f0000000040)="0600", 0x2) sendfile(r2, r2, &(0x7f00000001c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x50200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) signalfd(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f000002eff0)={0x133, &(0x7f0000000000)=[{0x35, 0x0, 0x5, 0x33010000}]}, 0x10) 05:04:03 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x9d02}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000033c0)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x84) openat$cgroup_freezer_state(r1, &(0x7f0000000ec0), 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000f00)='cpuacct.usage_sys\x00', 0x0, 0x0) tkill(0x0, 0x34) prlimit64(0x0, 0x0, &(0x7f0000000380)={0x3, 0x6}, &(0x7f00000003c0)) 05:04:03 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000700)={&(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0xa, 0x0}, 0x0) 05:04:03 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x8a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB="94000000000401030000000000000000000000007d39391a8bdf079f9f495a1fda171e3158f5c79ff5a4dfa267f9065b81eaa585529b1ed154c2e4de9fc975eb2bc712fe039df1a80dfb5986112b3f864dd6be18f185f6af53a91ef29a364869c075e208738464d03e023ce658bc45e51d0cd92f13dd19bed44b18c890ed907be58e2f0bcb02e3c1edb68f44d0d2c95d075a7ceddb3c8a0b063f62856a88e3e03f757467a06cf67105344eb3831130485e90b0e7d8317b2cdf3de6ff9b2c0307dc8d02d485923047d57b31d22a61abcc56"], 0x14}}, 0x0) r2 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x100000, 0x0) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000600)={0xc0, 0x464, 0x20, 0x70bd2b, 0x25dfdbff, "973f9703e43681c987947af3c1c8083de32ea8c59e17bb66fa1131bb71f62feb9d0e2d30dd5e0b3412958e5fe0cceec4126aac730f0637bbd5800c45a7540643c9c2c37aec0fd2421ecaab72641bc72be3958a965740c910b05431206b3784e1f84519555df72fc585d1fe8bc9c7edb156ad0efe2e5af3837edfddc3b7b14e00cda27aef1b0cbdee00e73a16858db80462c0721e260eb71762c36d071ce2212930ef26fbad80c57ca5f20663efbd6221", ["", "", ""]}, 0xc0}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000000) fcntl$setstatus(r2, 0x4, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x100) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x48, 0x80, 0x3f, 0x1, 0x0, 0xc4, 0x4, 0x5, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f00000004c0)}, 0x880, 0x8, 0x4, 0x222db880e1fb0bed, 0x9, 0x8228, 0x3, 0x0, 0xfffffff8, 0x0, 0x7f}, 0xffffffffffffffff, 0x10, r0, 0xa) r4 = open(&(0x7f0000000140)='./file0\x00', 0x501400, 0x1e2) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x40, 0x9, 0x7, 0xf4, 0x0, 0x6, 0x8002, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xe}, 0x800, 0x935, 0x2, 0x3, 0xc23, 0xff, 0x7, 0x0, 0x8, 0x0, 0x6}, 0x0, 0x5, r4, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000840)={'veth0_macvtap\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) writev(r3, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) mount$9p_rdma(&(0x7f0000000880), &(0x7f0000000200)='./file0\x00', &(0x7f0000000580), 0x12288b8, &(0x7f0000000a00)=ANY=[]) socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8936, &(0x7f0000000080)={@ipv4={'\x00', '\xff\xff', @empty}, 0x43, r6}) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=@newlink={0xc8, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x242b8, 0x42a0a}, [@IFLA_LINKINFO={0x98, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x88, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_INGRESS_QOS={0x70, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x200004, 0x1f}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7, 0x10001}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3fc, 0x39e4}}, @IFLA_VLAN_QOS_MAPPING={0x2c, 0x1, {0x8, 0x49}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7ff, 0xc73}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xd1e7, 0x5}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xcaa3, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xfffffffc}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xa1ae}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1, 0x8}}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0xc8}}, 0x0) [ 1521.171030][ T3369] Cannot find add_set index 0 as target 05:04:03 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x6c00}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() [ 1521.243423][ T3378] Cannot find add_set index 0 as target 05:04:03 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x9d020000, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() [ 1521.363685][ T3388] Cannot find add_set index 0 as target 05:04:03 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0xa402}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000033c0)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x84) openat$cgroup_freezer_state(r1, &(0x7f0000000ec0), 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000f00)='cpuacct.usage_sys\x00', 0x0, 0x0) tkill(0x0, 0x34) prlimit64(0x0, 0x0, &(0x7f0000000380)={0x3, 0x6}, &(0x7f00000003c0)) 05:04:03 executing program 2: mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x1012, 0xffffffffffffffff, 0x0) [ 1521.500778][ T3409] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 05:04:04 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0xa4020000, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() [ 1521.609173][ T3411] Cannot find add_set index 0 as target 05:04:04 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x8a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB="94000000000401030000000000000000000000007d39391a8bdf079f9f495a1fda171e3158f5c79ff5a4dfa267f9065b81eaa585529b1ed154c2e4de9fc975eb2bc712fe039df1a80dfb5986112b3f864dd6be18f185f6af53a91ef29a364869c075e208738464d03e023ce658bc45e51d0cd92f13dd19bed44b18c890ed907be58e2f0bcb02e3c1edb68f44d0d2c95d075a7ceddb3c8a0b063f62856a88e3e03f757467a06cf67105344eb3831130485e90b0e7d8317b2cdf3de6ff9b2c0307dc8d02d485923047d57b31d22a61abcc56"], 0x14}}, 0x0) r2 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x100000, 0x0) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000600)={0xc0, 0x464, 0x20, 0x70bd2b, 0x25dfdbff, "973f9703e43681c987947af3c1c8083de32ea8c59e17bb66fa1131bb71f62feb9d0e2d30dd5e0b3412958e5fe0cceec4126aac730f0637bbd5800c45a7540643c9c2c37aec0fd2421ecaab72641bc72be3958a965740c910b05431206b3784e1f84519555df72fc585d1fe8bc9c7edb156ad0efe2e5af3837edfddc3b7b14e00cda27aef1b0cbdee00e73a16858db80462c0721e260eb71762c36d071ce2212930ef26fbad80c57ca5f20663efbd6221", ["", "", ""]}, 0xc0}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000000) fcntl$setstatus(r2, 0x4, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x100) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x48, 0x80, 0x3f, 0x1, 0x0, 0xc4, 0x4, 0x5, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f00000004c0)}, 0x880, 0x8, 0x4, 0x222db880e1fb0bed, 0x9, 0x8228, 0x3, 0x0, 0xfffffff8, 0x0, 0x7f}, 0xffffffffffffffff, 0x10, r0, 0xa) r4 = open(&(0x7f0000000140)='./file0\x00', 0x501400, 0x1e2) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x40, 0x9, 0x7, 0xf4, 0x0, 0x6, 0x8002, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xe}, 0x800, 0x935, 0x2, 0x3, 0xc23, 0xff, 0x7, 0x0, 0x8, 0x0, 0x6}, 0x0, 0x5, r4, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000840)={'veth0_macvtap\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) writev(r3, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) mount$9p_rdma(&(0x7f0000000880), &(0x7f0000000200)='./file0\x00', &(0x7f0000000580), 0x12288b8, &(0x7f0000000a00)=ANY=[]) socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8936, &(0x7f0000000080)={@ipv4={'\x00', '\xff\xff', @empty}, 0x43, r6}) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=@newlink={0xc8, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x242b8, 0x42a0a}, [@IFLA_LINKINFO={0x98, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x88, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_INGRESS_QOS={0x70, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x200004, 0x1f}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7, 0x10001}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3fc, 0x39e4}}, @IFLA_VLAN_QOS_MAPPING={0x2c, 0x1, {0x8, 0x49}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7ff, 0xc73}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xd1e7, 0x5}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xcaa3, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xfffffffc}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xa1ae}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1, 0x8}}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0xc8}}, 0x0) 05:04:04 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x7400}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:04:04 executing program 2: r0 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCGWINSZ(r0, 0x40087468, &(0x7f0000000000)) [ 1521.994055][ T3437] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 05:04:04 executing program 1: r0 = syz_open_dev$sndctrl(0x0, 0x0, 0x10b01) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) tee(r0, r1, 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') r2 = memfd_create(&(0x7f0000000140)='\xedr!QY\x88=Vx\xa1\xd1<\xdeb\x17\xd3\xe2i\x1d5\x17\xa4\x00\xd8\x02\x9f\x11\xfa\t\x13]\f\xcbo\xc4X\x00\x94/\x96h\xef~Ms\"\x00\x00', 0x0) write$eventfd(r2, &(0x7f0000000080)=0x20000100000094, 0x8) write(r2, &(0x7f0000000040)="0600", 0x2) sendfile(r2, r2, &(0x7f00000001c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x50200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) signalfd(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f000002eff0)={0x133, &(0x7f0000000000)=[{0x35, 0x0, 0x5, 0x33010000}]}, 0x10) 05:04:04 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0xa9030000, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:04:04 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x7a00}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:04:04 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0xa903}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000033c0)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x84) openat$cgroup_freezer_state(r1, &(0x7f0000000ec0), 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000f00)='cpuacct.usage_sys\x00', 0x0, 0x0) tkill(0x0, 0x34) prlimit64(0x0, 0x0, &(0x7f0000000380)={0x3, 0x6}, &(0x7f00000003c0)) 05:04:04 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x8a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB="94000000000401030000000000000000000000007d39391a8bdf079f9f495a1fda171e3158f5c79ff5a4dfa267f9065b81eaa585529b1ed154c2e4de9fc975eb2bc712fe039df1a80dfb5986112b3f864dd6be18f185f6af53a91ef29a364869c075e208738464d03e023ce658bc45e51d0cd92f13dd19bed44b18c890ed907be58e2f0bcb02e3c1edb68f44d0d2c95d075a7ceddb3c8a0b063f62856a88e3e03f757467a06cf67105344eb3831130485e90b0e7d8317b2cdf3de6ff9b2c0307dc8d02d485923047d57b31d22a61abcc56"], 0x14}}, 0x0) r2 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x100000, 0x0) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000600)={0xc0, 0x464, 0x20, 0x70bd2b, 0x25dfdbff, "973f9703e43681c987947af3c1c8083de32ea8c59e17bb66fa1131bb71f62feb9d0e2d30dd5e0b3412958e5fe0cceec4126aac730f0637bbd5800c45a7540643c9c2c37aec0fd2421ecaab72641bc72be3958a965740c910b05431206b3784e1f84519555df72fc585d1fe8bc9c7edb156ad0efe2e5af3837edfddc3b7b14e00cda27aef1b0cbdee00e73a16858db80462c0721e260eb71762c36d071ce2212930ef26fbad80c57ca5f20663efbd6221", ["", "", ""]}, 0xc0}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000000) fcntl$setstatus(r2, 0x4, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x100) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x48, 0x80, 0x3f, 0x1, 0x0, 0xc4, 0x4, 0x5, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f00000004c0)}, 0x880, 0x8, 0x4, 0x222db880e1fb0bed, 0x9, 0x8228, 0x3, 0x0, 0xfffffff8, 0x0, 0x7f}, 0xffffffffffffffff, 0x10, r0, 0xa) r4 = open(&(0x7f0000000140)='./file0\x00', 0x501400, 0x1e2) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x40, 0x9, 0x7, 0xf4, 0x0, 0x6, 0x8002, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xe}, 0x800, 0x935, 0x2, 0x3, 0xc23, 0xff, 0x7, 0x0, 0x8, 0x0, 0x6}, 0x0, 0x5, r4, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000840)={'veth0_macvtap\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) writev(r3, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) mount$9p_rdma(&(0x7f0000000880), &(0x7f0000000200)='./file0\x00', &(0x7f0000000580), 0x12288b8, &(0x7f0000000a00)=ANY=[]) socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8936, &(0x7f0000000080)={@ipv4={'\x00', '\xff\xff', @empty}, 0x43, r6}) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=@newlink={0xc8, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x242b8, 0x42a0a}, [@IFLA_LINKINFO={0x98, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x88, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_INGRESS_QOS={0x70, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x200004, 0x1f}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7, 0x10001}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3fc, 0x39e4}}, @IFLA_VLAN_QOS_MAPPING={0x2c, 0x1, {0x8, 0x49}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7ff, 0xc73}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xd1e7, 0x5}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xcaa3, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xfffffffc}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xa1ae}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1, 0x8}}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0xc8}}, 0x0) 05:04:04 executing program 2: r0 = syz_open_pts(0xffffffffffffffff, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCSBRK(r0, 0x2000747b) 05:04:04 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0xac02}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000033c0)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x84) openat$cgroup_freezer_state(r1, &(0x7f0000000ec0), 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000f00)='cpuacct.usage_sys\x00', 0x0, 0x0) tkill(0x0, 0x34) prlimit64(0x0, 0x0, &(0x7f0000000380)={0x3, 0x6}, &(0x7f00000003c0)) 05:04:04 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0xac020000, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:04:04 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x8800}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() [ 1522.377633][ T3459] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 05:04:04 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) sendmsg(r0, &(0x7f0000001bc0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)=[{0x88, 0x0, 0x0, "76e592fcd89ed6fd9e918308833cb6ee884864449603c16f280194896a2c4173d9e87f949046d582d23786a72fe65c42fa284ce1575a37d0834ee72d51e804d28a9f8ec37665596f34df9e1207d9c505e111b0b462762c1def1e957df039cefb25ce1151f429877206ff07d8a806de52b4"}, {0x780, 0x0, 0x0, "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"}], 0x808}, 0x0) 05:04:05 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x8a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB="94000000000401030000000000000000000000007d39391a8bdf079f9f495a1fda171e3158f5c79ff5a4dfa267f9065b81eaa585529b1ed154c2e4de9fc975eb2bc712fe039df1a80dfb5986112b3f864dd6be18f185f6af53a91ef29a364869c075e208738464d03e023ce658bc45e51d0cd92f13dd19bed44b18c890ed907be58e2f0bcb02e3c1edb68f44d0d2c95d075a7ceddb3c8a0b063f62856a88e3e03f757467a06cf67105344eb3831130485e90b0e7d8317b2cdf3de6ff9b2c0307dc8d02d485923047d57b31d22a61abcc56"], 0x14}}, 0x0) r2 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x100000, 0x0) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000600)={0xc0, 0x464, 0x20, 0x70bd2b, 0x25dfdbff, "973f9703e43681c987947af3c1c8083de32ea8c59e17bb66fa1131bb71f62feb9d0e2d30dd5e0b3412958e5fe0cceec4126aac730f0637bbd5800c45a7540643c9c2c37aec0fd2421ecaab72641bc72be3958a965740c910b05431206b3784e1f84519555df72fc585d1fe8bc9c7edb156ad0efe2e5af3837edfddc3b7b14e00cda27aef1b0cbdee00e73a16858db80462c0721e260eb71762c36d071ce2212930ef26fbad80c57ca5f20663efbd6221", ["", "", ""]}, 0xc0}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000000) fcntl$setstatus(r2, 0x4, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x100) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x48, 0x80, 0x3f, 0x1, 0x0, 0xc4, 0x4, 0x5, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f00000004c0)}, 0x880, 0x8, 0x4, 0x222db880e1fb0bed, 0x9, 0x8228, 0x3, 0x0, 0xfffffff8, 0x0, 0x7f}, 0xffffffffffffffff, 0x10, r0, 0xa) r4 = open(&(0x7f0000000140)='./file0\x00', 0x501400, 0x1e2) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x40, 0x9, 0x7, 0xf4, 0x0, 0x6, 0x8002, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={0x0, 0xe}, 0x800, 0x935, 0x2, 0x3, 0xc23, 0xff, 0x7, 0x0, 0x8, 0x0, 0x6}, 0x0, 0x5, r4, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000840)={'veth0_macvtap\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) writev(r3, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) mount$9p_rdma(&(0x7f0000000880), &(0x7f0000000200)='./file0\x00', &(0x7f0000000580), 0x12288b8, &(0x7f0000000a00)=ANY=[]) socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8936, &(0x7f0000000080)={@ipv4={'\x00', '\xff\xff', @empty}, 0x43, r6}) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=@newlink={0xc8, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x242b8, 0x42a0a}, [@IFLA_LINKINFO={0x98, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x88, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_INGRESS_QOS={0x70, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x200004, 0x1f}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7, 0x10001}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3fc, 0x39e4}}, @IFLA_VLAN_QOS_MAPPING={0x2c, 0x1, {0x8, 0x49}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7ff, 0xc73}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xd1e7, 0x5}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xcaa3, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xfffffffc}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xa1ae}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1, 0x8}}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0xc8}}, 0x0) 05:04:05 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0xc601}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000033c0)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x84) openat$cgroup_freezer_state(r1, &(0x7f0000000ec0), 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000f00)='cpuacct.usage_sys\x00', 0x0, 0x0) tkill(0x0, 0x34) prlimit64(0x0, 0x0, &(0x7f0000000380)={0x3, 0x6}, &(0x7f00000003c0)) [ 1522.909169][ T3496] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 05:04:05 executing program 1: r0 = syz_open_dev$sndctrl(0x0, 0x0, 0x10b01) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) tee(r0, r1, 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') r2 = memfd_create(&(0x7f0000000140)='\xedr!QY\x88=Vx\xa1\xd1<\xdeb\x17\xd3\xe2i\x1d5\x17\xa4\x00\xd8\x02\x9f\x11\xfa\t\x13]\f\xcbo\xc4X\x00\x94/\x96h\xef~Ms\"\x00\x00', 0x0) write$eventfd(r2, &(0x7f0000000080)=0x20000100000094, 0x8) write(r2, &(0x7f0000000040)="0600", 0x2) sendfile(r2, r2, &(0x7f00000001c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x50200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) signalfd(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f000002eff0)={0x133, &(0x7f0000000000)=[{0x35, 0x0, 0x5, 0x33010000}]}, 0x10) 05:04:05 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x8802}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:04:05 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0xc6010000, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:04:05 executing program 2: r0 = syz_open_pts(0xffffffffffffffff, 0x0) r1 = dup(r0) ioctl$TIOCSWINSZ(r1, 0x80087467, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x7}) 05:04:05 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0xc901}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000033c0)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x84) openat$cgroup_freezer_state(r1, &(0x7f0000000ec0), 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000f00)='cpuacct.usage_sys\x00', 0x0, 0x0) tkill(0x0, 0x34) prlimit64(0x0, 0x0, &(0x7f0000000380)={0x3, 0x6}, &(0x7f00000003c0)) 05:04:05 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x8a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB="94000000000401030000000000000000000000007d39391a8bdf079f9f495a1fda171e3158f5c79ff5a4dfa267f9065b81eaa585529b1ed154c2e4de9fc975eb2bc712fe039df1a80dfb5986112b3f864dd6be18f185f6af53a91ef29a364869c075e208738464d03e023ce658bc45e51d0cd92f13dd19bed44b18c890ed907be58e2f0bcb02e3c1edb68f44d0d2c95d075a7ceddb3c8a0b063f62856a88e3e03f757467a06cf67105344eb3831130485e90b0e7d8317b2cdf3de6ff9b2c0307dc8d02d485923047d57b31d22a61abcc56"], 0x14}}, 0x0) r2 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x100000, 0x0) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000600)={0xc0, 0x464, 0x20, 0x70bd2b, 0x25dfdbff, "973f9703e43681c987947af3c1c8083de32ea8c59e17bb66fa1131bb71f62feb9d0e2d30dd5e0b3412958e5fe0cceec4126aac730f0637bbd5800c45a7540643c9c2c37aec0fd2421ecaab72641bc72be3958a965740c910b05431206b3784e1f84519555df72fc585d1fe8bc9c7edb156ad0efe2e5af3837edfddc3b7b14e00cda27aef1b0cbdee00e73a16858db80462c0721e260eb71762c36d071ce2212930ef26fbad80c57ca5f20663efbd6221", ["", "", ""]}, 0xc0}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000000) fcntl$setstatus(r2, 0x4, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x100) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x48, 0x80, 0x3f, 0x1, 0x0, 0xc4, 0x4, 0x5, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f00000004c0)}, 0x880, 0x8, 0x4, 0x222db880e1fb0bed, 0x9, 0x8228, 0x3, 0x0, 0xfffffff8, 0x0, 0x7f}, 0xffffffffffffffff, 0x10, r0, 0xa) r4 = open(&(0x7f0000000140)='./file0\x00', 0x501400, 0x1e2) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x40, 0x9, 0x7, 0xf4, 0x0, 0x6, 0x8002, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={0x0, 0xe}, 0x800, 0x935, 0x2, 0x3, 0xc23, 0xff, 0x7, 0x0, 0x8, 0x0, 0x6}, 0x0, 0x5, r4, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000840)={'veth0_macvtap\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) writev(r3, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) mount$9p_rdma(&(0x7f0000000880), &(0x7f0000000200)='./file0\x00', &(0x7f0000000580), 0x12288b8, &(0x7f0000000a00)=ANY=[]) socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8936, &(0x7f0000000080)={@ipv4={'\x00', '\xff\xff', @empty}, 0x43, r6}) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=@newlink={0xc8, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x242b8, 0x42a0a}, [@IFLA_LINKINFO={0x98, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x88, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_INGRESS_QOS={0x70, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x200004, 0x1f}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7, 0x10001}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3fc, 0x39e4}}, @IFLA_VLAN_QOS_MAPPING={0x2c, 0x1, {0x8, 0x49}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7ff, 0xc73}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xd1e7, 0x5}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xcaa3, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xfffffffc}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xa1ae}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1, 0x8}}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0xc8}}, 0x0) 05:04:05 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0xc902}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000033c0)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x84) openat$cgroup_freezer_state(r1, &(0x7f0000000ec0), 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000f00)='cpuacct.usage_sys\x00', 0x0, 0x0) tkill(0x0, 0x34) prlimit64(0x0, 0x0, &(0x7f0000000380)={0x3, 0x6}, &(0x7f00000003c0)) [ 1523.448667][ T3514] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 05:04:05 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x9101}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:04:06 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ftruncate(r1, 0x0) 05:04:06 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0xc9010000, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:04:06 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x8a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB="94000000000401030000000000000000000000007d39391a8bdf079f9f495a1fda171e3158f5c79ff5a4dfa267f9065b81eaa585529b1ed154c2e4de9fc975eb2bc712fe039df1a80dfb5986112b3f864dd6be18f185f6af53a91ef29a364869c075e208738464d03e023ce658bc45e51d0cd92f13dd19bed44b18c890ed907be58e2f0bcb02e3c1edb68f44d0d2c95d075a7ceddb3c8a0b063f62856a88e3e03f757467a06cf67105344eb3831130485e90b0e7d8317b2cdf3de6ff9b2c0307dc8d02d485923047d57b31d22a61abcc56"], 0x14}}, 0x0) r2 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x100000, 0x0) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000600)={0xc0, 0x464, 0x20, 0x70bd2b, 0x25dfdbff, "973f9703e43681c987947af3c1c8083de32ea8c59e17bb66fa1131bb71f62feb9d0e2d30dd5e0b3412958e5fe0cceec4126aac730f0637bbd5800c45a7540643c9c2c37aec0fd2421ecaab72641bc72be3958a965740c910b05431206b3784e1f84519555df72fc585d1fe8bc9c7edb156ad0efe2e5af3837edfddc3b7b14e00cda27aef1b0cbdee00e73a16858db80462c0721e260eb71762c36d071ce2212930ef26fbad80c57ca5f20663efbd6221", ["", "", ""]}, 0xc0}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000000) fcntl$setstatus(r2, 0x4, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x100) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x48, 0x80, 0x3f, 0x1, 0x0, 0xc4, 0x4, 0x5, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f00000004c0)}, 0x880, 0x8, 0x4, 0x222db880e1fb0bed, 0x9, 0x8228, 0x3, 0x0, 0xfffffff8, 0x0, 0x7f}, 0xffffffffffffffff, 0x10, r0, 0xa) r4 = open(&(0x7f0000000140)='./file0\x00', 0x501400, 0x1e2) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x40, 0x9, 0x7, 0xf4, 0x0, 0x6, 0x8002, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={0x0, 0xe}, 0x800, 0x935, 0x2, 0x3, 0xc23, 0xff, 0x7, 0x0, 0x8, 0x0, 0x6}, 0x0, 0x5, r4, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000840)={'veth0_macvtap\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) writev(r3, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) mount$9p_rdma(&(0x7f0000000880), &(0x7f0000000200)='./file0\x00', &(0x7f0000000580), 0x12288b8, &(0x7f0000000a00)=ANY=[]) socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8936, &(0x7f0000000080)={@ipv4={'\x00', '\xff\xff', @empty}, 0x43, r6}) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=@newlink={0xc8, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x242b8, 0x42a0a}, [@IFLA_LINKINFO={0x98, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x88, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_INGRESS_QOS={0x70, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x200004, 0x1f}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7, 0x10001}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3fc, 0x39e4}}, @IFLA_VLAN_QOS_MAPPING={0x2c, 0x1, {0x8, 0x49}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7ff, 0xc73}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xd1e7, 0x5}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xcaa3, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xfffffffc}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xa1ae}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1, 0x8}}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0xc8}}, 0x0) 05:04:06 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0xd502}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000033c0)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x84) openat$cgroup_freezer_state(r1, &(0x7f0000000ec0), 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000f00)='cpuacct.usage_sys\x00', 0x0, 0x0) tkill(0x0, 0x34) prlimit64(0x0, 0x0, &(0x7f0000000380)={0x3, 0x6}, &(0x7f00000003c0)) [ 1523.894366][ T3551] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 05:04:06 executing program 1: r0 = syz_open_dev$sndctrl(0x0, 0x0, 0x10b01) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) tee(r0, r1, 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') r2 = memfd_create(&(0x7f0000000140)='\xedr!QY\x88=Vx\xa1\xd1<\xdeb\x17\xd3\xe2i\x1d5\x17\xa4\x00\xd8\x02\x9f\x11\xfa\t\x13]\f\xcbo\xc4X\x00\x94/\x96h\xef~Ms\"\x00\x00', 0x0) write$eventfd(r2, &(0x7f0000000080)=0x20000100000094, 0x8) write(r2, &(0x7f0000000040)="0600", 0x2) sendfile(r2, r2, &(0x7f00000001c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x50200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) signalfd(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f000002eff0)={0x133, &(0x7f0000000000)=[{0x35, 0x0, 0x5, 0x33010000}]}, 0x10) 05:04:06 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x9c00}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:04:06 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000080), &(0x7f00000000c0)=0x8) 05:04:06 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0xc9020000, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:04:06 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0xf803}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000033c0)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x84) openat$cgroup_freezer_state(r1, &(0x7f0000000ec0), 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000f00)='cpuacct.usage_sys\x00', 0x0, 0x0) tkill(0x0, 0x34) prlimit64(0x0, 0x0, &(0x7f0000000380)={0x3, 0x6}, &(0x7f00000003c0)) 05:04:06 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x8a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB="94000000000401030000000000000000000000007d39391a8bdf079f9f495a1fda171e3158f5c79ff5a4dfa267f9065b81eaa585529b1ed154c2e4de9fc975eb2bc712fe039df1a80dfb5986112b3f864dd6be18f185f6af53a91ef29a364869c075e208738464d03e023ce658bc45e51d0cd92f13dd19bed44b18c890ed907be58e2f0bcb02e3c1edb68f44d0d2c95d075a7ceddb3c8a0b063f62856a88e3e03f757467a06cf67105344eb3831130485e90b0e7d8317b2cdf3de6ff9b2c0307dc8d02d485923047d57b31d22a61abcc56"], 0x14}}, 0x0) r2 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x100000, 0x0) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000600)={0xc0, 0x464, 0x20, 0x70bd2b, 0x25dfdbff, "973f9703e43681c987947af3c1c8083de32ea8c59e17bb66fa1131bb71f62feb9d0e2d30dd5e0b3412958e5fe0cceec4126aac730f0637bbd5800c45a7540643c9c2c37aec0fd2421ecaab72641bc72be3958a965740c910b05431206b3784e1f84519555df72fc585d1fe8bc9c7edb156ad0efe2e5af3837edfddc3b7b14e00cda27aef1b0cbdee00e73a16858db80462c0721e260eb71762c36d071ce2212930ef26fbad80c57ca5f20663efbd6221", ["", "", ""]}, 0xc0}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000000) fcntl$setstatus(r2, 0x4, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x100) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x48, 0x80, 0x3f, 0x1, 0x0, 0xc4, 0x4, 0x5, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f00000004c0)}, 0x880, 0x8, 0x4, 0x222db880e1fb0bed, 0x9, 0x8228, 0x3, 0x0, 0xfffffff8, 0x0, 0x7f}, 0xffffffffffffffff, 0x10, r0, 0xa) r4 = open(&(0x7f0000000140)='./file0\x00', 0x501400, 0x1e2) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x40, 0x9, 0x7, 0xf4, 0x0, 0x6, 0x8002, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f00000000c0)}, 0x800, 0x935, 0x2, 0x3, 0xc23, 0xff, 0x7, 0x0, 0x8, 0x0, 0x6}, 0x0, 0x5, r4, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000840)={'veth0_macvtap\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) writev(r3, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) mount$9p_rdma(&(0x7f0000000880), &(0x7f0000000200)='./file0\x00', &(0x7f0000000580), 0x12288b8, &(0x7f0000000a00)=ANY=[]) socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8936, &(0x7f0000000080)={@ipv4={'\x00', '\xff\xff', @empty}, 0x43, r6}) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=@newlink={0xc8, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x242b8, 0x42a0a}, [@IFLA_LINKINFO={0x98, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x88, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_INGRESS_QOS={0x70, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x200004, 0x1f}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7, 0x10001}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3fc, 0x39e4}}, @IFLA_VLAN_QOS_MAPPING={0x2c, 0x1, {0x8, 0x49}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7ff, 0xc73}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xd1e7, 0x5}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xcaa3, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xfffffffc}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xa1ae}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1, 0x8}}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0xc8}}, 0x0) 05:04:07 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0xfb00}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000033c0)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x84) openat$cgroup_freezer_state(r1, &(0x7f0000000ec0), 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000f00)='cpuacct.usage_sys\x00', 0x0, 0x0) tkill(0x0, 0x34) prlimit64(0x0, 0x0, &(0x7f0000000380)={0x3, 0x6}, &(0x7f00000003c0)) 05:04:07 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x9d01}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() [ 1524.567978][ T3575] sctp: [Deprecated]: syz-executor.2 (pid 3575) Use of struct sctp_assoc_value in delayed_ack socket option. [ 1524.567978][ T3575] Use struct sctp_sack_info instead 05:04:07 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0xd5020000, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() [ 1524.633118][ T3580] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 05:04:07 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x8a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB="94000000000401030000000000000000000000007d39391a8bdf079f9f495a1fda171e3158f5c79ff5a4dfa267f9065b81eaa585529b1ed154c2e4de9fc975eb2bc712fe039df1a80dfb5986112b3f864dd6be18f185f6af53a91ef29a364869c075e208738464d03e023ce658bc45e51d0cd92f13dd19bed44b18c890ed907be58e2f0bcb02e3c1edb68f44d0d2c95d075a7ceddb3c8a0b063f62856a88e3e03f757467a06cf67105344eb3831130485e90b0e7d8317b2cdf3de6ff9b2c0307dc8d02d485923047d57b31d22a61abcc56"], 0x14}}, 0x0) r2 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x100000, 0x0) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000600)={0xc0, 0x464, 0x20, 0x70bd2b, 0x25dfdbff, "973f9703e43681c987947af3c1c8083de32ea8c59e17bb66fa1131bb71f62feb9d0e2d30dd5e0b3412958e5fe0cceec4126aac730f0637bbd5800c45a7540643c9c2c37aec0fd2421ecaab72641bc72be3958a965740c910b05431206b3784e1f84519555df72fc585d1fe8bc9c7edb156ad0efe2e5af3837edfddc3b7b14e00cda27aef1b0cbdee00e73a16858db80462c0721e260eb71762c36d071ce2212930ef26fbad80c57ca5f20663efbd6221", ["", "", ""]}, 0xc0}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000000) fcntl$setstatus(r2, 0x4, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x100) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x48, 0x80, 0x3f, 0x1, 0x0, 0xc4, 0x4, 0x5, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f00000004c0)}, 0x880, 0x8, 0x4, 0x222db880e1fb0bed, 0x9, 0x8228, 0x3, 0x0, 0xfffffff8, 0x0, 0x7f}, 0xffffffffffffffff, 0x10, r0, 0xa) r4 = open(&(0x7f0000000140)='./file0\x00', 0x501400, 0x1e2) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x40, 0x9, 0x7, 0xf4, 0x0, 0x6, 0x8002, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f00000000c0)}, 0x800, 0x935, 0x2, 0x3, 0xc23, 0xff, 0x7, 0x0, 0x8, 0x0, 0x6}, 0x0, 0x5, r4, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000840)={'veth0_macvtap\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) writev(r3, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) mount$9p_rdma(&(0x7f0000000880), &(0x7f0000000200)='./file0\x00', &(0x7f0000000580), 0x12288b8, &(0x7f0000000a00)=ANY=[]) socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8936, &(0x7f0000000080)={@ipv4={'\x00', '\xff\xff', @empty}, 0x43, r6}) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=@newlink={0xc8, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x242b8, 0x42a0a}, [@IFLA_LINKINFO={0x98, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x88, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_INGRESS_QOS={0x70, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x200004, 0x1f}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7, 0x10001}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3fc, 0x39e4}}, @IFLA_VLAN_QOS_MAPPING={0x2c, 0x1, {0x8, 0x49}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7ff, 0xc73}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xd1e7, 0x5}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xcaa3, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xfffffffc}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xa1ae}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1, 0x8}}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0xc8}}, 0x0) 05:04:07 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f00000027c0)={&(0x7f0000001580), 0x10, &(0x7f00000026c0)=[{&(0x7f00000015c0)='-', 0x1}], 0x1}, 0x0) 05:04:07 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0xfd01}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000033c0)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x84) openat$cgroup_freezer_state(r1, &(0x7f0000000ec0), 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000f00)='cpuacct.usage_sys\x00', 0x0, 0x0) tkill(0x0, 0x34) prlimit64(0x0, 0x0, &(0x7f0000000380)={0x3, 0x6}, &(0x7f00000003c0)) [ 1525.136859][ T3622] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 05:04:07 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x8a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB="94000000000401030000000000000000000000007d39391a8bdf079f9f495a1fda171e3158f5c79ff5a4dfa267f9065b81eaa585529b1ed154c2e4de9fc975eb2bc712fe039df1a80dfb5986112b3f864dd6be18f185f6af53a91ef29a364869c075e208738464d03e023ce658bc45e51d0cd92f13dd19bed44b18c890ed907be58e2f0bcb02e3c1edb68f44d0d2c95d075a7ceddb3c8a0b063f62856a88e3e03f757467a06cf67105344eb3831130485e90b0e7d8317b2cdf3de6ff9b2c0307dc8d02d485923047d57b31d22a61abcc56"], 0x14}}, 0x0) r2 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x100000, 0x0) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000600)={0xc0, 0x464, 0x20, 0x70bd2b, 0x25dfdbff, "973f9703e43681c987947af3c1c8083de32ea8c59e17bb66fa1131bb71f62feb9d0e2d30dd5e0b3412958e5fe0cceec4126aac730f0637bbd5800c45a7540643c9c2c37aec0fd2421ecaab72641bc72be3958a965740c910b05431206b3784e1f84519555df72fc585d1fe8bc9c7edb156ad0efe2e5af3837edfddc3b7b14e00cda27aef1b0cbdee00e73a16858db80462c0721e260eb71762c36d071ce2212930ef26fbad80c57ca5f20663efbd6221", ["", "", ""]}, 0xc0}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000000) fcntl$setstatus(r2, 0x4, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x100) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x48, 0x80, 0x3f, 0x1, 0x0, 0xc4, 0x4, 0x5, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f00000004c0)}, 0x880, 0x8, 0x4, 0x222db880e1fb0bed, 0x9, 0x8228, 0x3, 0x0, 0xfffffff8, 0x0, 0x7f}, 0xffffffffffffffff, 0x10, r0, 0xa) r4 = open(&(0x7f0000000140)='./file0\x00', 0x501400, 0x1e2) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x40, 0x9, 0x7, 0xf4, 0x0, 0x6, 0x8002, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f00000000c0)}, 0x800, 0x935, 0x2, 0x3, 0xc23, 0xff, 0x7, 0x0, 0x8, 0x0, 0x6}, 0x0, 0x5, r4, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000840)={'veth0_macvtap\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) writev(r3, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) mount$9p_rdma(&(0x7f0000000880), &(0x7f0000000200)='./file0\x00', &(0x7f0000000580), 0x12288b8, &(0x7f0000000a00)=ANY=[]) socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8936, &(0x7f0000000080)={@ipv4={'\x00', '\xff\xff', @empty}, 0x43, r6}) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=@newlink={0xc8, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x242b8, 0x42a0a}, [@IFLA_LINKINFO={0x98, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x88, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_INGRESS_QOS={0x70, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x200004, 0x1f}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7, 0x10001}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3fc, 0x39e4}}, @IFLA_VLAN_QOS_MAPPING={0x2c, 0x1, {0x8, 0x49}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7ff, 0xc73}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xd1e7, 0x5}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xcaa3, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xfffffffc}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xa1ae}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1, 0x8}}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0xc8}}, 0x0) 05:04:07 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x9d02}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:04:07 executing program 1: syz_emit_ethernet(0x4a, &(0x7f0000000040)={@local, @empty, @val, {@ipv4={0x8035}}}, 0x0) 05:04:07 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000004000), 0x8) 05:04:07 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0xf8030000, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:04:07 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x20000}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000033c0)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x84) openat$cgroup_freezer_state(r1, &(0x7f0000000ec0), 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000f00)='cpuacct.usage_sys\x00', 0x0, 0x0) tkill(0x0, 0x34) prlimit64(0x0, 0x0, &(0x7f0000000380)={0x3, 0x6}, &(0x7f00000003c0)) [ 1525.750194][ T3642] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1525.766720][ T3641] set_target_v0_checkentry: 29 callbacks suppressed [ 1525.766764][ T3641] Cannot find add_set index 0 as target [ 1525.766949][ T3640] Cannot find add_set index 0 as target [ 1525.795736][ T3643] Cannot find add_set index 0 as target 05:04:08 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0xa402}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() [ 1525.840440][ T3657] Cannot find add_set index 0 as target 05:04:08 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f00000027c0)={&(0x7f0000001580), 0x10, &(0x7f00000026c0)=[{&(0x7f00000015c0)='-', 0x1}], 0x1, &(0x7f0000002780)=[@prinfo={0x18}], 0x18}, 0x0) 05:04:08 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x8a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB="94000000000401030000000000000000000000007d39391a8bdf079f9f495a1fda171e3158f5c79ff5a4dfa267f9065b81eaa585529b1ed154c2e4de9fc975eb2bc712fe039df1a80dfb5986112b3f864dd6be18f185f6af53a91ef29a364869c075e208738464d03e023ce658bc45e51d0cd92f13dd19bed44b18c890ed907be58e2f0bcb02e3c1edb68f44d0d2c95d075a7ceddb3c8a0b063f62856a88e3e03f757467a06cf67105344eb3831130485e90b0e7d8317b2cdf3de6ff9b2c0307dc8d02d485923047d57b31d22a61abcc56"], 0x14}}, 0x0) r2 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x100000, 0x0) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000600)={0xc0, 0x464, 0x20, 0x70bd2b, 0x25dfdbff, "973f9703e43681c987947af3c1c8083de32ea8c59e17bb66fa1131bb71f62feb9d0e2d30dd5e0b3412958e5fe0cceec4126aac730f0637bbd5800c45a7540643c9c2c37aec0fd2421ecaab72641bc72be3958a965740c910b05431206b3784e1f84519555df72fc585d1fe8bc9c7edb156ad0efe2e5af3837edfddc3b7b14e00cda27aef1b0cbdee00e73a16858db80462c0721e260eb71762c36d071ce2212930ef26fbad80c57ca5f20663efbd6221", ["", "", ""]}, 0xc0}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000000) fcntl$setstatus(r2, 0x4, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x100) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x48, 0x80, 0x3f, 0x1, 0x0, 0xc4, 0x4, 0x5, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f00000004c0)}, 0x880, 0x8, 0x4, 0x222db880e1fb0bed, 0x9, 0x8228, 0x3, 0x0, 0xfffffff8, 0x0, 0x7f}, 0xffffffffffffffff, 0x10, r0, 0xa) r4 = open(&(0x7f0000000140)='./file0\x00', 0x501400, 0x1e2) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x40, 0x9, 0x7, 0xf4, 0x0, 0x6, 0x8002, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f00000000c0), 0xe}, 0x0, 0x935, 0x2, 0x3, 0xc23, 0xff, 0x7, 0x0, 0x8, 0x0, 0x6}, 0x0, 0x5, r4, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000840)={'veth0_macvtap\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) writev(r3, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) mount$9p_rdma(&(0x7f0000000880), &(0x7f0000000200)='./file0\x00', &(0x7f0000000580), 0x12288b8, &(0x7f0000000a00)=ANY=[]) socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8936, &(0x7f0000000080)={@ipv4={'\x00', '\xff\xff', @empty}, 0x43, r6}) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=@newlink={0xc8, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x242b8, 0x42a0a}, [@IFLA_LINKINFO={0x98, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x88, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_INGRESS_QOS={0x70, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x200004, 0x1f}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7, 0x10001}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3fc, 0x39e4}}, @IFLA_VLAN_QOS_MAPPING={0x2c, 0x1, {0x8, 0x49}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7ff, 0xc73}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xd1e7, 0x5}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xcaa3, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xfffffffc}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xa1ae}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1, 0x8}}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0xc8}}, 0x0) [ 1525.926358][ T3654] Cannot find add_set index 0 as target 05:04:08 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x40000}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000033c0)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x84) openat$cgroup_freezer_state(r1, &(0x7f0000000ec0), 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000f00)='cpuacct.usage_sys\x00', 0x0, 0x0) tkill(0x0, 0x34) prlimit64(0x0, 0x0, &(0x7f0000000380)={0x3, 0x6}, &(0x7f00000003c0)) 05:04:08 executing program 1: pipe(&(0x7f0000000080)={0xffffffffffffffff}) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) 05:04:08 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0xfb000000, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() [ 1526.087916][ T3668] Cannot find add_set index 0 as target 05:04:08 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0xa903}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() [ 1526.168797][ T3680] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 05:04:08 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f0000000480), 0x101000, 0x0) [ 1526.280821][ T3684] Cannot find add_set index 0 as target 05:04:08 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0xe0ffff}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000033c0)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x84) openat$cgroup_freezer_state(r1, &(0x7f0000000ec0), 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000f00)='cpuacct.usage_sys\x00', 0x0, 0x0) tkill(0x0, 0x34) prlimit64(0x0, 0x0, &(0x7f0000000380)={0x3, 0x6}, &(0x7f00000003c0)) 05:04:08 executing program 1: pipe(&(0x7f0000000080)={0xffffffffffffffff}) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, 0x0, 0x0) 05:04:08 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x8a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB="94000000000401030000000000000000000000007d39391a8bdf079f9f495a1fda171e3158f5c79ff5a4dfa267f9065b81eaa585529b1ed154c2e4de9fc975eb2bc712fe039df1a80dfb5986112b3f864dd6be18f185f6af53a91ef29a364869c075e208738464d03e023ce658bc45e51d0cd92f13dd19bed44b18c890ed907be58e2f0bcb02e3c1edb68f44d0d2c95d075a7ceddb3c8a0b063f62856a88e3e03f757467a06cf67105344eb3831130485e90b0e7d8317b2cdf3de6ff9b2c0307dc8d02d485923047d57b31d22a61abcc56"], 0x14}}, 0x0) r2 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x100000, 0x0) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000600)={0xc0, 0x464, 0x20, 0x70bd2b, 0x25dfdbff, "973f9703e43681c987947af3c1c8083de32ea8c59e17bb66fa1131bb71f62feb9d0e2d30dd5e0b3412958e5fe0cceec4126aac730f0637bbd5800c45a7540643c9c2c37aec0fd2421ecaab72641bc72be3958a965740c910b05431206b3784e1f84519555df72fc585d1fe8bc9c7edb156ad0efe2e5af3837edfddc3b7b14e00cda27aef1b0cbdee00e73a16858db80462c0721e260eb71762c36d071ce2212930ef26fbad80c57ca5f20663efbd6221", ["", "", ""]}, 0xc0}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000000) fcntl$setstatus(r2, 0x4, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x100) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x48, 0x80, 0x3f, 0x1, 0x0, 0xc4, 0x4, 0x5, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f00000004c0)}, 0x880, 0x8, 0x4, 0x222db880e1fb0bed, 0x9, 0x8228, 0x3, 0x0, 0xfffffff8, 0x0, 0x7f}, 0xffffffffffffffff, 0x10, r0, 0xa) r4 = open(&(0x7f0000000140)='./file0\x00', 0x501400, 0x1e2) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x40, 0x9, 0x7, 0xf4, 0x0, 0x6, 0x8002, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f00000000c0), 0xe}, 0x0, 0x935, 0x2, 0x3, 0xc23, 0xff, 0x7, 0x0, 0x8, 0x0, 0x6}, 0x0, 0x5, r4, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000840)={'veth0_macvtap\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) writev(r3, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) mount$9p_rdma(&(0x7f0000000880), &(0x7f0000000200)='./file0\x00', &(0x7f0000000580), 0x12288b8, &(0x7f0000000a00)=ANY=[]) socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8936, &(0x7f0000000080)={@ipv4={'\x00', '\xff\xff', @empty}, 0x43, r6}) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=@newlink={0xc8, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x242b8, 0x42a0a}, [@IFLA_LINKINFO={0x98, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x88, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_INGRESS_QOS={0x70, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x200004, 0x1f}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7, 0x10001}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3fc, 0x39e4}}, @IFLA_VLAN_QOS_MAPPING={0x2c, 0x1, {0x8, 0x49}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7ff, 0xc73}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xd1e7, 0x5}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xcaa3, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xfffffffc}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xa1ae}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1, 0x8}}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0xc8}}, 0x0) 05:04:08 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0xfd010000, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() [ 1526.373406][ T3689] Cannot find add_set index 0 as target [ 1526.373559][ T3687] Cannot find add_set index 0 as target [ 1526.389616][ T3697] Cannot find add_set index 0 as target 05:04:08 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0xac02}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:04:09 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x1000000}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000033c0)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x84) openat$cgroup_freezer_state(r1, &(0x7f0000000ec0), 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000f00)='cpuacct.usage_sys\x00', 0x0, 0x0) tkill(0x0, 0x34) prlimit64(0x0, 0x0, &(0x7f0000000380)={0x3, 0x6}, &(0x7f00000003c0)) 05:04:09 executing program 2: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, 0x0, 0x0) [ 1526.625908][ T3717] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 05:04:09 executing program 1: r0 = semget$private(0x0, 0x4, 0x0) semop(r0, &(0x7f0000000140)=[{0x4}], 0x1) 05:04:09 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {0x2}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:04:09 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0xc601}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:04:09 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x8a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB="94000000000401030000000000000000000000007d39391a8bdf079f9f495a1fda171e3158f5c79ff5a4dfa267f9065b81eaa585529b1ed154c2e4de9fc975eb2bc712fe039df1a80dfb5986112b3f864dd6be18f185f6af53a91ef29a364869c075e208738464d03e023ce658bc45e51d0cd92f13dd19bed44b18c890ed907be58e2f0bcb02e3c1edb68f44d0d2c95d075a7ceddb3c8a0b063f62856a88e3e03f757467a06cf67105344eb3831130485e90b0e7d8317b2cdf3de6ff9b2c0307dc8d02d485923047d57b31d22a61abcc56"], 0x14}}, 0x0) r2 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x100000, 0x0) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000600)={0xc0, 0x464, 0x20, 0x70bd2b, 0x25dfdbff, "973f9703e43681c987947af3c1c8083de32ea8c59e17bb66fa1131bb71f62feb9d0e2d30dd5e0b3412958e5fe0cceec4126aac730f0637bbd5800c45a7540643c9c2c37aec0fd2421ecaab72641bc72be3958a965740c910b05431206b3784e1f84519555df72fc585d1fe8bc9c7edb156ad0efe2e5af3837edfddc3b7b14e00cda27aef1b0cbdee00e73a16858db80462c0721e260eb71762c36d071ce2212930ef26fbad80c57ca5f20663efbd6221", ["", "", ""]}, 0xc0}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000000) fcntl$setstatus(r2, 0x4, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x100) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x48, 0x80, 0x3f, 0x1, 0x0, 0xc4, 0x4, 0x5, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f00000004c0)}, 0x880, 0x8, 0x4, 0x222db880e1fb0bed, 0x9, 0x8228, 0x3, 0x0, 0xfffffff8, 0x0, 0x7f}, 0xffffffffffffffff, 0x10, r0, 0xa) r4 = open(&(0x7f0000000140)='./file0\x00', 0x501400, 0x1e2) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x40, 0x9, 0x7, 0xf4, 0x0, 0x6, 0x8002, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f00000000c0), 0xe}, 0x0, 0x935, 0x2, 0x3, 0xc23, 0xff, 0x7, 0x0, 0x8, 0x0, 0x6}, 0x0, 0x5, r4, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000840)={'veth0_macvtap\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) writev(r3, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) mount$9p_rdma(&(0x7f0000000880), &(0x7f0000000200)='./file0\x00', &(0x7f0000000580), 0x12288b8, &(0x7f0000000a00)=ANY=[]) socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8936, &(0x7f0000000080)={@ipv4={'\x00', '\xff\xff', @empty}, 0x43, r6}) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=@newlink={0xc8, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x242b8, 0x42a0a}, [@IFLA_LINKINFO={0x98, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x88, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_INGRESS_QOS={0x70, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x200004, 0x1f}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7, 0x10001}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3fc, 0x39e4}}, @IFLA_VLAN_QOS_MAPPING={0x2c, 0x1, {0x8, 0x49}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7ff, 0xc73}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xd1e7, 0x5}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xcaa3, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xfffffffc}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xa1ae}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1, 0x8}}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0xc8}}, 0x0) 05:04:09 executing program 2: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, 0x0, 0x0) 05:04:09 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {0x3}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:04:09 executing program 1: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$netlink(r0, 0x0, 0x0) 05:04:09 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0xc901}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:04:09 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x1030000}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000033c0)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x84) openat$cgroup_freezer_state(r1, &(0x7f0000000ec0), 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000f00)='cpuacct.usage_sys\x00', 0x0, 0x0) tkill(0x0, 0x34) prlimit64(0x0, 0x0, &(0x7f0000000380)={0x3, 0x6}, &(0x7f00000003c0)) [ 1527.247898][ T3766] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 05:04:09 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {0x4}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:04:09 executing program 2: pipe(&(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) 05:04:09 executing program 1: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, 0x0, 0x0) 05:04:09 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x8a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB="94000000000401030000000000000000000000007d39391a8bdf079f9f495a1fda171e3158f5c79ff5a4dfa267f9065b81eaa585529b1ed154c2e4de9fc975eb2bc712fe039df1a80dfb5986112b3f864dd6be18f185f6af53a91ef29a364869c075e208738464d03e023ce658bc45e51d0cd92f13dd19bed44b18c890ed907be58e2f0bcb02e3c1edb68f44d0d2c95d075a7ceddb3c8a0b063f62856a88e3e03f757467a06cf67105344eb3831130485e90b0e7d8317b2cdf3de6ff9b2c0307dc8d02d485923047d57b31d22a61abcc56"], 0x14}}, 0x0) r2 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x100000, 0x0) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000600)={0xc0, 0x464, 0x20, 0x70bd2b, 0x25dfdbff, "973f9703e43681c987947af3c1c8083de32ea8c59e17bb66fa1131bb71f62feb9d0e2d30dd5e0b3412958e5fe0cceec4126aac730f0637bbd5800c45a7540643c9c2c37aec0fd2421ecaab72641bc72be3958a965740c910b05431206b3784e1f84519555df72fc585d1fe8bc9c7edb156ad0efe2e5af3837edfddc3b7b14e00cda27aef1b0cbdee00e73a16858db80462c0721e260eb71762c36d071ce2212930ef26fbad80c57ca5f20663efbd6221", ["", "", ""]}, 0xc0}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000000) fcntl$setstatus(r2, 0x4, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x100) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x48, 0x80, 0x3f, 0x1, 0x0, 0xc4, 0x4, 0x5, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f00000004c0)}, 0x880, 0x8, 0x4, 0x222db880e1fb0bed, 0x9, 0x8228, 0x3, 0x0, 0xfffffff8, 0x0, 0x7f}, 0xffffffffffffffff, 0x10, r0, 0xa) r4 = open(&(0x7f0000000140)='./file0\x00', 0x501400, 0x1e2) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x40, 0x9, 0x7, 0xf4, 0x0, 0x6, 0x8002, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f00000000c0), 0xe}, 0x800, 0x0, 0x2, 0x3, 0xc23, 0xff, 0x7, 0x0, 0x8, 0x0, 0x6}, 0x0, 0x5, r4, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000840)={'veth0_macvtap\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) writev(r3, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) mount$9p_rdma(&(0x7f0000000880), &(0x7f0000000200)='./file0\x00', &(0x7f0000000580), 0x12288b8, &(0x7f0000000a00)=ANY=[]) socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8936, &(0x7f0000000080)={@ipv4={'\x00', '\xff\xff', @empty}, 0x43, r6}) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=@newlink={0xc8, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x242b8, 0x42a0a}, [@IFLA_LINKINFO={0x98, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x88, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_INGRESS_QOS={0x70, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x200004, 0x1f}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7, 0x10001}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3fc, 0x39e4}}, @IFLA_VLAN_QOS_MAPPING={0x2c, 0x1, {0x8, 0x49}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7ff, 0xc73}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xd1e7, 0x5}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xcaa3, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xfffffffc}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xa1ae}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1, 0x8}}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0xc8}}, 0x0) 05:04:09 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0xc902}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:04:10 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x2000000}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000033c0)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x84) openat$cgroup_freezer_state(r1, &(0x7f0000000ec0), 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000f00)='cpuacct.usage_sys\x00', 0x0, 0x0) tkill(0x0, 0x34) prlimit64(0x0, 0x0, &(0x7f0000000380)={0x3, 0x6}, &(0x7f00000003c0)) 05:04:10 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {0x6}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:04:10 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) getsockname$netlink(r0, 0x0, &(0x7f00000019c0)) 05:04:10 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0xd502}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() [ 1527.761896][ T3808] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 05:04:10 executing program 2: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, 0x0) 05:04:10 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x3000000}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000033c0)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x84) openat$cgroup_freezer_state(r1, &(0x7f0000000ec0), 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000f00)='cpuacct.usage_sys\x00', 0x0, 0x0) tkill(0x0, 0x34) prlimit64(0x0, 0x0, &(0x7f0000000380)={0x3, 0x6}, &(0x7f00000003c0)) 05:04:10 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {0x7}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:04:10 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x8a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB="94000000000401030000000000000000000000007d39391a8bdf079f9f495a1fda171e3158f5c79ff5a4dfa267f9065b81eaa585529b1ed154c2e4de9fc975eb2bc712fe039df1a80dfb5986112b3f864dd6be18f185f6af53a91ef29a364869c075e208738464d03e023ce658bc45e51d0cd92f13dd19bed44b18c890ed907be58e2f0bcb02e3c1edb68f44d0d2c95d075a7ceddb3c8a0b063f62856a88e3e03f757467a06cf67105344eb3831130485e90b0e7d8317b2cdf3de6ff9b2c0307dc8d02d485923047d57b31d22a61abcc56"], 0x14}}, 0x0) r2 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x100000, 0x0) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000600)={0xc0, 0x464, 0x20, 0x70bd2b, 0x25dfdbff, "973f9703e43681c987947af3c1c8083de32ea8c59e17bb66fa1131bb71f62feb9d0e2d30dd5e0b3412958e5fe0cceec4126aac730f0637bbd5800c45a7540643c9c2c37aec0fd2421ecaab72641bc72be3958a965740c910b05431206b3784e1f84519555df72fc585d1fe8bc9c7edb156ad0efe2e5af3837edfddc3b7b14e00cda27aef1b0cbdee00e73a16858db80462c0721e260eb71762c36d071ce2212930ef26fbad80c57ca5f20663efbd6221", ["", "", ""]}, 0xc0}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000000) fcntl$setstatus(r2, 0x4, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x100) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x48, 0x80, 0x3f, 0x1, 0x0, 0xc4, 0x4, 0x5, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f00000004c0)}, 0x880, 0x8, 0x4, 0x222db880e1fb0bed, 0x9, 0x8228, 0x3, 0x0, 0xfffffff8, 0x0, 0x7f}, 0xffffffffffffffff, 0x10, r0, 0xa) r4 = open(&(0x7f0000000140)='./file0\x00', 0x501400, 0x1e2) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x40, 0x9, 0x7, 0xf4, 0x0, 0x6, 0x8002, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f00000000c0), 0xe}, 0x800, 0x0, 0x2, 0x3, 0xc23, 0xff, 0x7, 0x0, 0x8, 0x0, 0x6}, 0x0, 0x5, r4, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000840)={'veth0_macvtap\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) writev(r3, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) mount$9p_rdma(&(0x7f0000000880), &(0x7f0000000200)='./file0\x00', &(0x7f0000000580), 0x12288b8, &(0x7f0000000a00)=ANY=[]) socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8936, &(0x7f0000000080)={@ipv4={'\x00', '\xff\xff', @empty}, 0x43, r6}) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=@newlink={0xc8, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x242b8, 0x42a0a}, [@IFLA_LINKINFO={0x98, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x88, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_INGRESS_QOS={0x70, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x200004, 0x1f}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7, 0x10001}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3fc, 0x39e4}}, @IFLA_VLAN_QOS_MAPPING={0x2c, 0x1, {0x8, 0x49}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7ff, 0xc73}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xd1e7, 0x5}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xcaa3, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xfffffffc}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xa1ae}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1, 0x8}}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0xc8}}, 0x0) 05:04:10 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0xf803}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:04:10 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x4000000}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000033c0)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x84) openat$cgroup_freezer_state(r1, &(0x7f0000000ec0), 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000f00)='cpuacct.usage_sys\x00', 0x0, 0x0) tkill(0x0, 0x34) prlimit64(0x0, 0x0, &(0x7f0000000380)={0x3, 0x6}, &(0x7f00000003c0)) 05:04:10 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000009340), 0x40000, 0x0) 05:04:10 executing program 2: semctl$IPC_RMID(0x0, 0x0, 0x0) semop(0x0, 0x0, 0x0) 05:04:10 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {0xc}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() [ 1528.301261][ T3854] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 05:04:10 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0xfb00}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:04:10 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x4020000}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000033c0)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x84) openat$cgroup_freezer_state(r1, &(0x7f0000000ec0), 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000f00)='cpuacct.usage_sys\x00', 0x0, 0x0) tkill(0x0, 0x34) prlimit64(0x0, 0x0, &(0x7f0000000380)={0x3, 0x6}, &(0x7f00000003c0)) 05:04:10 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x8a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB="94000000000401030000000000000000000000007d39391a8bdf079f9f495a1fda171e3158f5c79ff5a4dfa267f9065b81eaa585529b1ed154c2e4de9fc975eb2bc712fe039df1a80dfb5986112b3f864dd6be18f185f6af53a91ef29a364869c075e208738464d03e023ce658bc45e51d0cd92f13dd19bed44b18c890ed907be58e2f0bcb02e3c1edb68f44d0d2c95d075a7ceddb3c8a0b063f62856a88e3e03f757467a06cf67105344eb3831130485e90b0e7d8317b2cdf3de6ff9b2c0307dc8d02d485923047d57b31d22a61abcc56"], 0x14}}, 0x0) r2 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x100000, 0x0) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000600)={0xc0, 0x464, 0x20, 0x70bd2b, 0x25dfdbff, "973f9703e43681c987947af3c1c8083de32ea8c59e17bb66fa1131bb71f62feb9d0e2d30dd5e0b3412958e5fe0cceec4126aac730f0637bbd5800c45a7540643c9c2c37aec0fd2421ecaab72641bc72be3958a965740c910b05431206b3784e1f84519555df72fc585d1fe8bc9c7edb156ad0efe2e5af3837edfddc3b7b14e00cda27aef1b0cbdee00e73a16858db80462c0721e260eb71762c36d071ce2212930ef26fbad80c57ca5f20663efbd6221", ["", "", ""]}, 0xc0}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000000) fcntl$setstatus(r2, 0x4, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x100) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x48, 0x80, 0x3f, 0x1, 0x0, 0xc4, 0x4, 0x5, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f00000004c0)}, 0x880, 0x8, 0x4, 0x222db880e1fb0bed, 0x9, 0x8228, 0x3, 0x0, 0xfffffff8, 0x0, 0x7f}, 0xffffffffffffffff, 0x10, r0, 0xa) r4 = open(&(0x7f0000000140)='./file0\x00', 0x501400, 0x1e2) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x40, 0x9, 0x7, 0xf4, 0x0, 0x6, 0x8002, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f00000000c0), 0xe}, 0x800, 0x0, 0x2, 0x3, 0xc23, 0xff, 0x7, 0x0, 0x8, 0x0, 0x6}, 0x0, 0x5, r4, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000840)={'veth0_macvtap\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) writev(r3, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) mount$9p_rdma(&(0x7f0000000880), &(0x7f0000000200)='./file0\x00', &(0x7f0000000580), 0x12288b8, &(0x7f0000000a00)=ANY=[]) socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8936, &(0x7f0000000080)={@ipv4={'\x00', '\xff\xff', @empty}, 0x43, r6}) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=@newlink={0xc8, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x242b8, 0x42a0a}, [@IFLA_LINKINFO={0x98, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x88, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_INGRESS_QOS={0x70, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x200004, 0x1f}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7, 0x10001}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3fc, 0x39e4}}, @IFLA_VLAN_QOS_MAPPING={0x2c, 0x1, {0x8, 0x49}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7ff, 0xc73}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xd1e7, 0x5}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xcaa3, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xfffffffc}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xa1ae}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1, 0x8}}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0xc8}}, 0x0) 05:04:11 executing program 2: pipe(&(0x7f0000000080)={0xffffffffffffffff}) openat$cgroup_freezer_state(r0, &(0x7f0000000040), 0x2, 0x0) 05:04:11 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {0x11}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:04:11 executing program 1: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_tcp_int(r0, 0x6, 0x0, 0x0, 0x0) 05:04:11 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0xfd01}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:04:11 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x5000000}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000033c0)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x84) openat$cgroup_freezer_state(r1, &(0x7f0000000ec0), 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000f00)='cpuacct.usage_sys\x00', 0x0, 0x0) tkill(0x0, 0x34) prlimit64(0x0, 0x0, &(0x7f0000000380)={0x3, 0x6}, &(0x7f00000003c0)) [ 1528.828624][ T3894] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 05:04:11 executing program 2: pipe(&(0x7f0000000080)={0xffffffffffffffff}) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, 0x0, 0x0) 05:04:11 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {0x29}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:04:11 executing program 1: timer_create(0x1, &(0x7f0000000000)={0x0, 0x33}, &(0x7f0000000040)) 05:04:11 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x8a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB="94000000000401030000000000000000000000007d39391a8bdf079f9f495a1fda171e3158f5c79ff5a4dfa267f9065b81eaa585529b1ed154c2e4de9fc975eb2bc712fe039df1a80dfb5986112b3f864dd6be18f185f6af53a91ef29a364869c075e208738464d03e023ce658bc45e51d0cd92f13dd19bed44b18c890ed907be58e2f0bcb02e3c1edb68f44d0d2c95d075a7ceddb3c8a0b063f62856a88e3e03f757467a06cf67105344eb3831130485e90b0e7d8317b2cdf3de6ff9b2c0307dc8d02d485923047d57b31d22a61abcc56"], 0x14}}, 0x0) r2 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x100000, 0x0) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000600)={0xc0, 0x464, 0x20, 0x70bd2b, 0x25dfdbff, "973f9703e43681c987947af3c1c8083de32ea8c59e17bb66fa1131bb71f62feb9d0e2d30dd5e0b3412958e5fe0cceec4126aac730f0637bbd5800c45a7540643c9c2c37aec0fd2421ecaab72641bc72be3958a965740c910b05431206b3784e1f84519555df72fc585d1fe8bc9c7edb156ad0efe2e5af3837edfddc3b7b14e00cda27aef1b0cbdee00e73a16858db80462c0721e260eb71762c36d071ce2212930ef26fbad80c57ca5f20663efbd6221", ["", "", ""]}, 0xc0}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000000) fcntl$setstatus(r2, 0x4, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x100) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x48, 0x80, 0x3f, 0x1, 0x0, 0xc4, 0x4, 0x5, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f00000004c0)}, 0x880, 0x8, 0x4, 0x222db880e1fb0bed, 0x9, 0x8228, 0x3, 0x0, 0xfffffff8, 0x0, 0x7f}, 0xffffffffffffffff, 0x10, r0, 0xa) r4 = open(&(0x7f0000000140)='./file0\x00', 0x501400, 0x1e2) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x40, 0x9, 0x7, 0xf4, 0x0, 0x6, 0x8002, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f00000000c0), 0xe}, 0x800, 0x935, 0x0, 0x3, 0xc23, 0xff, 0x7, 0x0, 0x8, 0x0, 0x6}, 0x0, 0x5, r4, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000840)={'veth0_macvtap\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) writev(r3, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) mount$9p_rdma(&(0x7f0000000880), &(0x7f0000000200)='./file0\x00', &(0x7f0000000580), 0x12288b8, &(0x7f0000000a00)=ANY=[]) socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8936, &(0x7f0000000080)={@ipv4={'\x00', '\xff\xff', @empty}, 0x43, r6}) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=@newlink={0xc8, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x242b8, 0x42a0a}, [@IFLA_LINKINFO={0x98, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x88, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_INGRESS_QOS={0x70, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x200004, 0x1f}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7, 0x10001}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3fc, 0x39e4}}, @IFLA_VLAN_QOS_MAPPING={0x2c, 0x1, {0x8, 0x49}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7ff, 0xc73}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xd1e7, 0x5}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xcaa3, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xfffffffc}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xa1ae}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1, 0x8}}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0xc8}}, 0x0) 05:04:11 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x20000}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:04:11 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x6000000}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000033c0)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x84) openat$cgroup_freezer_state(r1, &(0x7f0000000ec0), 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000f00)='cpuacct.usage_sys\x00', 0x0, 0x0) tkill(0x0, 0x34) prlimit64(0x0, 0x0, &(0x7f0000000380)={0x3, 0x6}, &(0x7f00000003c0)) 05:04:11 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {0x38}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:04:11 executing program 2: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, 0x0) [ 1529.346740][ T3930] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 05:04:11 executing program 1: pipe(&(0x7f0000002040)={0xffffffffffffffff, 0xffffffffffffffff}) write$FUSE_LK(r0, 0x0, 0x0) 05:04:11 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x40000}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:04:12 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x7000000}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000033c0)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x84) openat$cgroup_freezer_state(r1, &(0x7f0000000ec0), 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000f00)='cpuacct.usage_sys\x00', 0x0, 0x0) tkill(0x0, 0x34) prlimit64(0x0, 0x0, &(0x7f0000000380)={0x3, 0x6}, &(0x7f00000003c0)) 05:04:12 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {0x88}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:04:12 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x8a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB="94000000000401030000000000000000000000007d39391a8bdf079f9f495a1fda171e3158f5c79ff5a4dfa267f9065b81eaa585529b1ed154c2e4de9fc975eb2bc712fe039df1a80dfb5986112b3f864dd6be18f185f6af53a91ef29a364869c075e208738464d03e023ce658bc45e51d0cd92f13dd19bed44b18c890ed907be58e2f0bcb02e3c1edb68f44d0d2c95d075a7ceddb3c8a0b063f62856a88e3e03f757467a06cf67105344eb3831130485e90b0e7d8317b2cdf3de6ff9b2c0307dc8d02d485923047d57b31d22a61abcc56"], 0x14}}, 0x0) r2 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x100000, 0x0) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000600)={0xc0, 0x464, 0x20, 0x70bd2b, 0x25dfdbff, "973f9703e43681c987947af3c1c8083de32ea8c59e17bb66fa1131bb71f62feb9d0e2d30dd5e0b3412958e5fe0cceec4126aac730f0637bbd5800c45a7540643c9c2c37aec0fd2421ecaab72641bc72be3958a965740c910b05431206b3784e1f84519555df72fc585d1fe8bc9c7edb156ad0efe2e5af3837edfddc3b7b14e00cda27aef1b0cbdee00e73a16858db80462c0721e260eb71762c36d071ce2212930ef26fbad80c57ca5f20663efbd6221", ["", "", ""]}, 0xc0}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000000) fcntl$setstatus(r2, 0x4, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x100) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x48, 0x80, 0x3f, 0x1, 0x0, 0xc4, 0x4, 0x5, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f00000004c0)}, 0x880, 0x8, 0x4, 0x222db880e1fb0bed, 0x9, 0x8228, 0x3, 0x0, 0xfffffff8, 0x0, 0x7f}, 0xffffffffffffffff, 0x10, r0, 0xa) r4 = open(&(0x7f0000000140)='./file0\x00', 0x501400, 0x1e2) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x40, 0x9, 0x7, 0xf4, 0x0, 0x6, 0x8002, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f00000000c0), 0xe}, 0x800, 0x935, 0x0, 0x3, 0xc23, 0xff, 0x7, 0x0, 0x8, 0x0, 0x6}, 0x0, 0x5, r4, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000840)={'veth0_macvtap\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) writev(r3, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) mount$9p_rdma(&(0x7f0000000880), &(0x7f0000000200)='./file0\x00', &(0x7f0000000580), 0x12288b8, &(0x7f0000000a00)=ANY=[]) socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8936, &(0x7f0000000080)={@ipv4={'\x00', '\xff\xff', @empty}, 0x43, r6}) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=@newlink={0xc8, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x242b8, 0x42a0a}, [@IFLA_LINKINFO={0x98, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x88, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_INGRESS_QOS={0x70, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x200004, 0x1f}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7, 0x10001}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3fc, 0x39e4}}, @IFLA_VLAN_QOS_MAPPING={0x2c, 0x1, {0x8, 0x49}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7ff, 0xc73}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xd1e7, 0x5}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xcaa3, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xfffffffc}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xa1ae}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1, 0x8}}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0xc8}}, 0x0) 05:04:12 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) recvmmsg(r0, 0x0, 0x0, 0x0, 0x0) 05:04:12 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x8010000}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000033c0)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x84) openat$cgroup_freezer_state(r1, &(0x7f0000000ec0), 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000f00)='cpuacct.usage_sys\x00', 0x0, 0x0) tkill(0x0, 0x34) prlimit64(0x0, 0x0, &(0x7f0000000380)={0x3, 0x6}, &(0x7f00000003c0)) [ 1530.066247][ T3961] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 05:04:12 executing program 1: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) 05:04:12 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0xe0ffff}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:04:12 executing program 2: openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000640), 0x2, 0x0) 05:04:12 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {0x9c}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:04:12 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x8a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB="94000000000401030000000000000000000000007d39391a8bdf079f9f495a1fda171e3158f5c79ff5a4dfa267f9065b81eaa585529b1ed154c2e4de9fc975eb2bc712fe039df1a80dfb5986112b3f864dd6be18f185f6af53a91ef29a364869c075e208738464d03e023ce658bc45e51d0cd92f13dd19bed44b18c890ed907be58e2f0bcb02e3c1edb68f44d0d2c95d075a7ceddb3c8a0b063f62856a88e3e03f757467a06cf67105344eb3831130485e90b0e7d8317b2cdf3de6ff9b2c0307dc8d02d485923047d57b31d22a61abcc56"], 0x14}}, 0x0) r2 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x100000, 0x0) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000600)={0xc0, 0x464, 0x20, 0x70bd2b, 0x25dfdbff, "973f9703e43681c987947af3c1c8083de32ea8c59e17bb66fa1131bb71f62feb9d0e2d30dd5e0b3412958e5fe0cceec4126aac730f0637bbd5800c45a7540643c9c2c37aec0fd2421ecaab72641bc72be3958a965740c910b05431206b3784e1f84519555df72fc585d1fe8bc9c7edb156ad0efe2e5af3837edfddc3b7b14e00cda27aef1b0cbdee00e73a16858db80462c0721e260eb71762c36d071ce2212930ef26fbad80c57ca5f20663efbd6221", ["", "", ""]}, 0xc0}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000000) fcntl$setstatus(r2, 0x4, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x100) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x48, 0x80, 0x3f, 0x1, 0x0, 0xc4, 0x4, 0x5, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f00000004c0)}, 0x880, 0x8, 0x4, 0x222db880e1fb0bed, 0x9, 0x8228, 0x3, 0x0, 0xfffffff8, 0x0, 0x7f}, 0xffffffffffffffff, 0x10, r0, 0xa) r4 = open(&(0x7f0000000140)='./file0\x00', 0x501400, 0x1e2) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x40, 0x9, 0x7, 0xf4, 0x0, 0x6, 0x8002, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f00000000c0), 0xe}, 0x800, 0x935, 0x0, 0x3, 0xc23, 0xff, 0x7, 0x0, 0x8, 0x0, 0x6}, 0x0, 0x5, r4, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000840)={'veth0_macvtap\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) writev(r3, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) mount$9p_rdma(&(0x7f0000000880), &(0x7f0000000200)='./file0\x00', &(0x7f0000000580), 0x12288b8, &(0x7f0000000a00)=ANY=[]) socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8936, &(0x7f0000000080)={@ipv4={'\x00', '\xff\xff', @empty}, 0x43, r6}) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=@newlink={0xc8, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x242b8, 0x42a0a}, [@IFLA_LINKINFO={0x98, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x88, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_INGRESS_QOS={0x70, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x200004, 0x1f}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7, 0x10001}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3fc, 0x39e4}}, @IFLA_VLAN_QOS_MAPPING={0x2c, 0x1, {0x8, 0x49}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7ff, 0xc73}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xd1e7, 0x5}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xcaa3, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xfffffffc}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xa1ae}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1, 0x8}}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0xc8}}, 0x0) 05:04:12 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0xa000000}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000033c0)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x84) openat$cgroup_freezer_state(r1, &(0x7f0000000ec0), 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000f00)='cpuacct.usage_sys\x00', 0x0, 0x0) tkill(0x0, 0x34) prlimit64(0x0, 0x0, &(0x7f0000000380)={0x3, 0x6}, &(0x7f00000003c0)) 05:04:12 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, 0x0, 0x0) 05:04:12 executing program 2: pipe(&(0x7f0000000080)={0xffffffffffffffff}) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, 0x0, 0x0) 05:04:12 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x1000000}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:04:13 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {0xfb}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() [ 1530.582845][ T3997] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 05:04:13 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x11000000}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000033c0)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x84) openat$cgroup_freezer_state(r1, &(0x7f0000000ec0), 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000f00)='cpuacct.usage_sys\x00', 0x0, 0x0) tkill(0x0, 0x34) prlimit64(0x0, 0x0, &(0x7f0000000380)={0x3, 0x6}, &(0x7f00000003c0)) 05:04:13 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, 0x0, 0x129, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x20000009) ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f00000004c0)) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000500)='ns/time\x00') sendmsg$BATADV_CMD_GET_MESH(r0, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x2c, 0x0, 0x100, 0x70bd2d, 0x25dfdbfd, {}, [@BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40010}, 0x80000) syz_open_dev$sg(&(0x7f0000000680), 0x100, 0x2) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f0000000880)={0x0, "7094d2b0e515299f6d4cf04cebb892c4"}) socket$inet_dccp(0x2, 0x6, 0x0) 05:04:13 executing program 1: clock_gettime(0x0, 0x0) mknodat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) faccessat(0xffffffffffffffff, 0x0, 0x0) 05:04:13 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x8a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB="94000000000401030000000000000000000000007d39391a8bdf079f9f495a1fda171e3158f5c79ff5a4dfa267f9065b81eaa585529b1ed154c2e4de9fc975eb2bc712fe039df1a80dfb5986112b3f864dd6be18f185f6af53a91ef29a364869c075e208738464d03e023ce658bc45e51d0cd92f13dd19bed44b18c890ed907be58e2f0bcb02e3c1edb68f44d0d2c95d075a7ceddb3c8a0b063f62856a88e3e03f757467a06cf67105344eb3831130485e90b0e7d8317b2cdf3de6ff9b2c0307dc8d02d485923047d57b31d22a61abcc56"], 0x14}}, 0x0) r2 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x100000, 0x0) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000600)={0xc0, 0x464, 0x20, 0x70bd2b, 0x25dfdbff, "973f9703e43681c987947af3c1c8083de32ea8c59e17bb66fa1131bb71f62feb9d0e2d30dd5e0b3412958e5fe0cceec4126aac730f0637bbd5800c45a7540643c9c2c37aec0fd2421ecaab72641bc72be3958a965740c910b05431206b3784e1f84519555df72fc585d1fe8bc9c7edb156ad0efe2e5af3837edfddc3b7b14e00cda27aef1b0cbdee00e73a16858db80462c0721e260eb71762c36d071ce2212930ef26fbad80c57ca5f20663efbd6221", ["", "", ""]}, 0xc0}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000000) fcntl$setstatus(r2, 0x4, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x100) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x48, 0x80, 0x3f, 0x1, 0x0, 0xc4, 0x4, 0x5, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f00000004c0)}, 0x880, 0x8, 0x4, 0x222db880e1fb0bed, 0x9, 0x8228, 0x3, 0x0, 0xfffffff8, 0x0, 0x7f}, 0xffffffffffffffff, 0x10, r0, 0xa) r4 = open(&(0x7f0000000140)='./file0\x00', 0x501400, 0x1e2) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x40, 0x9, 0x7, 0xf4, 0x0, 0x6, 0x8002, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f00000000c0), 0xe}, 0x800, 0x935, 0x2, 0x0, 0xc23, 0xff, 0x7, 0x0, 0x8, 0x0, 0x6}, 0x0, 0x5, r4, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000840)={'veth0_macvtap\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) writev(r3, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) mount$9p_rdma(&(0x7f0000000880), &(0x7f0000000200)='./file0\x00', &(0x7f0000000580), 0x12288b8, &(0x7f0000000a00)=ANY=[]) socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8936, &(0x7f0000000080)={@ipv4={'\x00', '\xff\xff', @empty}, 0x43, r6}) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=@newlink={0xc8, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x242b8, 0x42a0a}, [@IFLA_LINKINFO={0x98, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x88, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_INGRESS_QOS={0x70, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x200004, 0x1f}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7, 0x10001}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3fc, 0x39e4}}, @IFLA_VLAN_QOS_MAPPING={0x2c, 0x1, {0x8, 0x49}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7ff, 0xc73}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xd1e7, 0x5}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xcaa3, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xfffffffc}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xa1ae}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1, 0x8}}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0xc8}}, 0x0) 05:04:13 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {0x103}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() [ 1530.834197][ T4022] set_target_v0_checkentry: 40 callbacks suppressed [ 1530.834243][ T4022] Cannot find add_set index 0 as target [ 1530.870966][ T4020] Cannot find add_set index 0 as target 05:04:13 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x1030000}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:04:13 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x19010000}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000033c0)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x84) openat$cgroup_freezer_state(r1, &(0x7f0000000ec0), 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000f00)='cpuacct.usage_sys\x00', 0x0, 0x0) tkill(0x0, 0x34) prlimit64(0x0, 0x0, &(0x7f0000000380)={0x3, 0x6}, &(0x7f00000003c0)) [ 1531.029439][ T4040] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 05:04:13 executing program 1: setsockopt$bt_l2cap_L2CAP_CONNINFO(0xffffffffffffffff, 0x6, 0x2, 0x0, 0x0) [ 1531.136229][ T4046] Cannot find add_set index 0 as target 05:04:13 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x2000000}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:04:13 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {0x108}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:04:13 executing program 2: r0 = syz_mount_image$cramfs(&(0x7f0000000000), 0x0, 0x9, 0x3, &(0x7f00000015c0)=[{&(0x7f0000000140)="f6d9d95aef8208dd2b8b909ef80e90", 0xf}, {&(0x7f00000003c0)}, {0x0, 0x0, 0x7}], 0x1090, &(0x7f0000001b80)=ANY=[@ANYBLOB="626174616476002c2f6465762f6175746f6673002c2f6465762f6175746f6652002c62619403647620edfe283fa3eba37181baed458ef0dcb2236bae9d57debc491e4074ff8c724d000000000000000641217cd3eb38b7fc51764cb8b71d03a1adf1c6b9ade32dafe4adeb947205afea6d8fbda1c7637e03bb2c2f6465762f6c6f6f702d636f6e74726f6c002c5b235d2e2c5b2d402f292c6f626a5f757365723d2d26642c6f626a5f747970653d212f5e5d215e2c66736e616d653d2a2c7569643e", @ANYRESDEC, @ANYBLOB, @ANYRESDEC, @ANYRESDEC=0xee00, @ANYBLOB=',\x00']) mount_setattr(r0, 0x0, 0x9100, &(0x7f00000017c0)={0x74, 0x4}, 0x20) ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f00000002c0)) 05:04:13 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x8a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB="94000000000401030000000000000000000000007d39391a8bdf079f9f495a1fda171e3158f5c79ff5a4dfa267f9065b81eaa585529b1ed154c2e4de9fc975eb2bc712fe039df1a80dfb5986112b3f864dd6be18f185f6af53a91ef29a364869c075e208738464d03e023ce658bc45e51d0cd92f13dd19bed44b18c890ed907be58e2f0bcb02e3c1edb68f44d0d2c95d075a7ceddb3c8a0b063f62856a88e3e03f757467a06cf67105344eb3831130485e90b0e7d8317b2cdf3de6ff9b2c0307dc8d02d485923047d57b31d22a61abcc56"], 0x14}}, 0x0) r2 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x100000, 0x0) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000600)={0xc0, 0x464, 0x20, 0x70bd2b, 0x25dfdbff, "973f9703e43681c987947af3c1c8083de32ea8c59e17bb66fa1131bb71f62feb9d0e2d30dd5e0b3412958e5fe0cceec4126aac730f0637bbd5800c45a7540643c9c2c37aec0fd2421ecaab72641bc72be3958a965740c910b05431206b3784e1f84519555df72fc585d1fe8bc9c7edb156ad0efe2e5af3837edfddc3b7b14e00cda27aef1b0cbdee00e73a16858db80462c0721e260eb71762c36d071ce2212930ef26fbad80c57ca5f20663efbd6221", ["", "", ""]}, 0xc0}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000000) fcntl$setstatus(r2, 0x4, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x100) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x48, 0x80, 0x3f, 0x1, 0x0, 0xc4, 0x4, 0x5, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f00000004c0)}, 0x880, 0x8, 0x4, 0x222db880e1fb0bed, 0x9, 0x8228, 0x3, 0x0, 0xfffffff8, 0x0, 0x7f}, 0xffffffffffffffff, 0x10, r0, 0xa) r4 = open(&(0x7f0000000140)='./file0\x00', 0x501400, 0x1e2) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x40, 0x9, 0x7, 0xf4, 0x0, 0x6, 0x8002, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f00000000c0), 0xe}, 0x800, 0x935, 0x2, 0x0, 0xc23, 0xff, 0x7, 0x0, 0x8, 0x0, 0x6}, 0x0, 0x5, r4, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000840)={'veth0_macvtap\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) writev(r3, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) mount$9p_rdma(&(0x7f0000000880), &(0x7f0000000200)='./file0\x00', &(0x7f0000000580), 0x12288b8, &(0x7f0000000a00)=ANY=[]) socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8936, &(0x7f0000000080)={@ipv4={'\x00', '\xff\xff', @empty}, 0x43, r6}) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=@newlink={0xc8, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x242b8, 0x42a0a}, [@IFLA_LINKINFO={0x98, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x88, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_INGRESS_QOS={0x70, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x200004, 0x1f}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7, 0x10001}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3fc, 0x39e4}}, @IFLA_VLAN_QOS_MAPPING={0x2c, 0x1, {0x8, 0x49}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7ff, 0xc73}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xd1e7, 0x5}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xcaa3, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xfffffffc}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xa1ae}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1, 0x8}}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0xc8}}, 0x0) 05:04:13 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x1f000000}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000033c0)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x84) openat$cgroup_freezer_state(r1, &(0x7f0000000ec0), 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000f00)='cpuacct.usage_sys\x00', 0x0, 0x0) tkill(0x0, 0x34) prlimit64(0x0, 0x0, &(0x7f0000000380)={0x3, 0x6}, &(0x7f00000003c0)) [ 1531.276010][ T4057] Cannot find add_set index 0 as target [ 1531.369683][ T4075] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1531.417986][ T4079] Cannot find add_set index 0 as target 05:04:13 executing program 1: bpf$BPF_PROG_TEST_RUN(0xb, &(0x7f0000001c40)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000c40)}, 0x48) 05:04:13 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x3000000}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() [ 1531.518136][ T4086] Cannot find add_set index 0 as target [ 1531.522572][ T4097] Cannot find add_set index 0 as target 05:04:14 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {0x119}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:04:14 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x8a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB="94000000000401030000000000000000000000007d39391a8bdf079f9f495a1fda171e3158f5c79ff5a4dfa267f9065b81eaa585529b1ed154c2e4de9fc975eb2bc712fe039df1a80dfb5986112b3f864dd6be18f185f6af53a91ef29a364869c075e208738464d03e023ce658bc45e51d0cd92f13dd19bed44b18c890ed907be58e2f0bcb02e3c1edb68f44d0d2c95d075a7ceddb3c8a0b063f62856a88e3e03f757467a06cf67105344eb3831130485e90b0e7d8317b2cdf3de6ff9b2c0307dc8d02d485923047d57b31d22a61abcc56"], 0x14}}, 0x0) r2 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x100000, 0x0) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000600)={0xc0, 0x464, 0x20, 0x70bd2b, 0x25dfdbff, "973f9703e43681c987947af3c1c8083de32ea8c59e17bb66fa1131bb71f62feb9d0e2d30dd5e0b3412958e5fe0cceec4126aac730f0637bbd5800c45a7540643c9c2c37aec0fd2421ecaab72641bc72be3958a965740c910b05431206b3784e1f84519555df72fc585d1fe8bc9c7edb156ad0efe2e5af3837edfddc3b7b14e00cda27aef1b0cbdee00e73a16858db80462c0721e260eb71762c36d071ce2212930ef26fbad80c57ca5f20663efbd6221", ["", "", ""]}, 0xc0}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000000) fcntl$setstatus(r2, 0x4, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x100) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x48, 0x80, 0x3f, 0x1, 0x0, 0xc4, 0x4, 0x5, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f00000004c0)}, 0x880, 0x8, 0x4, 0x222db880e1fb0bed, 0x9, 0x8228, 0x3, 0x0, 0xfffffff8, 0x0, 0x7f}, 0xffffffffffffffff, 0x10, r0, 0xa) r4 = open(&(0x7f0000000140)='./file0\x00', 0x501400, 0x1e2) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x40, 0x9, 0x7, 0xf4, 0x0, 0x6, 0x8002, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f00000000c0), 0xe}, 0x800, 0x935, 0x2, 0x0, 0xc23, 0xff, 0x7, 0x0, 0x8, 0x0, 0x6}, 0x0, 0x5, r4, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000840)={'veth0_macvtap\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) writev(r3, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) mount$9p_rdma(&(0x7f0000000880), &(0x7f0000000200)='./file0\x00', &(0x7f0000000580), 0x12288b8, &(0x7f0000000a00)=ANY=[]) socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8936, &(0x7f0000000080)={@ipv4={'\x00', '\xff\xff', @empty}, 0x43, r6}) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=@newlink={0xc8, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x242b8, 0x42a0a}, [@IFLA_LINKINFO={0x98, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x88, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_INGRESS_QOS={0x70, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x200004, 0x1f}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7, 0x10001}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3fc, 0x39e4}}, @IFLA_VLAN_QOS_MAPPING={0x2c, 0x1, {0x8, 0x49}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7ff, 0xc73}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xd1e7, 0x5}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xcaa3, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xfffffffc}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xa1ae}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1, 0x8}}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0xc8}}, 0x0) [ 1531.629189][ T4101] Cannot find add_set index 0 as target 05:04:14 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_SEC_DEVKEY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={0x0}}, 0x0) [ 1531.708372][ T4112] Cannot find add_set index 0 as target [ 1531.725397][ T4110] Cannot find add_set index 0 as target 05:04:14 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x4000000}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() [ 1531.842833][ T4120] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 05:04:14 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000006c0), r0) 05:04:14 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x20000000}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000033c0)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x84) openat$cgroup_freezer_state(r1, &(0x7f0000000ec0), 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000f00)='cpuacct.usage_sys\x00', 0x0, 0x0) tkill(0x0, 0x34) prlimit64(0x0, 0x0, &(0x7f0000000380)={0x3, 0x6}, &(0x7f00000003c0)) 05:04:14 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {0x14c}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:04:14 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x8a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB="94000000000401030000000000000000000000007d39391a8bdf079f9f495a1fda171e3158f5c79ff5a4dfa267f9065b81eaa585529b1ed154c2e4de9fc975eb2bc712fe039df1a80dfb5986112b3f864dd6be18f185f6af53a91ef29a364869c075e208738464d03e023ce658bc45e51d0cd92f13dd19bed44b18c890ed907be58e2f0bcb02e3c1edb68f44d0d2c95d075a7ceddb3c8a0b063f62856a88e3e03f757467a06cf67105344eb3831130485e90b0e7d8317b2cdf3de6ff9b2c0307dc8d02d485923047d57b31d22a61abcc56"], 0x14}}, 0x0) r2 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x100000, 0x0) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000600)={0xc0, 0x464, 0x20, 0x70bd2b, 0x25dfdbff, "973f9703e43681c987947af3c1c8083de32ea8c59e17bb66fa1131bb71f62feb9d0e2d30dd5e0b3412958e5fe0cceec4126aac730f0637bbd5800c45a7540643c9c2c37aec0fd2421ecaab72641bc72be3958a965740c910b05431206b3784e1f84519555df72fc585d1fe8bc9c7edb156ad0efe2e5af3837edfddc3b7b14e00cda27aef1b0cbdee00e73a16858db80462c0721e260eb71762c36d071ce2212930ef26fbad80c57ca5f20663efbd6221", ["", "", ""]}, 0xc0}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000000) fcntl$setstatus(r2, 0x4, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x100) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x48, 0x80, 0x3f, 0x1, 0x0, 0xc4, 0x4, 0x5, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f00000004c0)}, 0x880, 0x8, 0x4, 0x222db880e1fb0bed, 0x9, 0x8228, 0x3, 0x0, 0xfffffff8, 0x0, 0x7f}, 0xffffffffffffffff, 0x10, r0, 0xa) r4 = open(&(0x7f0000000140)='./file0\x00', 0x501400, 0x1e2) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x40, 0x9, 0x7, 0xf4, 0x0, 0x6, 0x8002, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f00000000c0), 0xe}, 0x800, 0x935, 0x2, 0x3, 0x0, 0xff, 0x7, 0x0, 0x8, 0x0, 0x6}, 0x0, 0x5, r4, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000840)={'veth0_macvtap\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) writev(r3, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) mount$9p_rdma(&(0x7f0000000880), &(0x7f0000000200)='./file0\x00', &(0x7f0000000580), 0x12288b8, &(0x7f0000000a00)=ANY=[]) socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8936, &(0x7f0000000080)={@ipv4={'\x00', '\xff\xff', @empty}, 0x43, r6}) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=@newlink={0xc8, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x242b8, 0x42a0a}, [@IFLA_LINKINFO={0x98, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x88, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_INGRESS_QOS={0x70, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x200004, 0x1f}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7, 0x10001}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3fc, 0x39e4}}, @IFLA_VLAN_QOS_MAPPING={0x2c, 0x1, {0x8, 0x49}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7ff, 0xc73}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xd1e7, 0x5}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xcaa3, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xfffffffc}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xa1ae}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1, 0x8}}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0xc8}}, 0x0) 05:04:14 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x4020000}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:04:14 executing program 2: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x1, &(0x7f0000001780)=[{&(0x7f0000000340)="6d8e820fac9c77", 0x7}], 0x0, 0x0) [ 1532.219191][ T4143] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 05:04:14 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {0x160}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:04:14 executing program 1: ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wpan0\x00'}) clock_gettime(0x2, &(0x7f0000002000)) 05:04:14 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x5000000}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:04:14 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x29000000}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000033c0)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x84) openat$cgroup_freezer_state(r1, &(0x7f0000000ec0), 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000f00)='cpuacct.usage_sys\x00', 0x0, 0x0) tkill(0x0, 0x34) prlimit64(0x0, 0x0, &(0x7f0000000380)={0x3, 0x6}, &(0x7f00000003c0)) 05:04:14 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x8a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB="94000000000401030000000000000000000000007d39391a8bdf079f9f495a1fda171e3158f5c79ff5a4dfa267f9065b81eaa585529b1ed154c2e4de9fc975eb2bc712fe039df1a80dfb5986112b3f864dd6be18f185f6af53a91ef29a364869c075e208738464d03e023ce658bc45e51d0cd92f13dd19bed44b18c890ed907be58e2f0bcb02e3c1edb68f44d0d2c95d075a7ceddb3c8a0b063f62856a88e3e03f757467a06cf67105344eb3831130485e90b0e7d8317b2cdf3de6ff9b2c0307dc8d02d485923047d57b31d22a61abcc56"], 0x14}}, 0x0) r2 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x100000, 0x0) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000600)={0xc0, 0x464, 0x20, 0x70bd2b, 0x25dfdbff, "973f9703e43681c987947af3c1c8083de32ea8c59e17bb66fa1131bb71f62feb9d0e2d30dd5e0b3412958e5fe0cceec4126aac730f0637bbd5800c45a7540643c9c2c37aec0fd2421ecaab72641bc72be3958a965740c910b05431206b3784e1f84519555df72fc585d1fe8bc9c7edb156ad0efe2e5af3837edfddc3b7b14e00cda27aef1b0cbdee00e73a16858db80462c0721e260eb71762c36d071ce2212930ef26fbad80c57ca5f20663efbd6221", ["", "", ""]}, 0xc0}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000000) fcntl$setstatus(r2, 0x4, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x100) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x48, 0x80, 0x3f, 0x1, 0x0, 0xc4, 0x4, 0x5, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f00000004c0)}, 0x880, 0x8, 0x4, 0x222db880e1fb0bed, 0x9, 0x8228, 0x3, 0x0, 0xfffffff8, 0x0, 0x7f}, 0xffffffffffffffff, 0x10, r0, 0xa) r4 = open(&(0x7f0000000140)='./file0\x00', 0x501400, 0x1e2) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x40, 0x9, 0x7, 0xf4, 0x0, 0x6, 0x8002, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f00000000c0), 0xe}, 0x800, 0x935, 0x2, 0x3, 0x0, 0xff, 0x7, 0x0, 0x8, 0x0, 0x6}, 0x0, 0x5, r4, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000840)={'veth0_macvtap\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) writev(r3, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) mount$9p_rdma(&(0x7f0000000880), &(0x7f0000000200)='./file0\x00', &(0x7f0000000580), 0x12288b8, &(0x7f0000000a00)=ANY=[]) socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8936, &(0x7f0000000080)={@ipv4={'\x00', '\xff\xff', @empty}, 0x43, r6}) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=@newlink={0xc8, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x242b8, 0x42a0a}, [@IFLA_LINKINFO={0x98, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x88, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_INGRESS_QOS={0x70, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x200004, 0x1f}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7, 0x10001}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3fc, 0x39e4}}, @IFLA_VLAN_QOS_MAPPING={0x2c, 0x1, {0x8, 0x49}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7ff, 0xc73}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xd1e7, 0x5}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xcaa3, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xfffffffc}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xa1ae}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1, 0x8}}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0xc8}}, 0x0) 05:04:14 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x6000000}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:04:15 executing program 2: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$BLKALIGNOFF(r0, 0x127a, 0x0) 05:04:15 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {0x168}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:04:15 executing program 1: syz_mount_image$cramfs(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f00000004c0)="d1e93bc604f6acf46bfe9a387bf2b64c6e93707b49eb43a9958bed4e3be67c7c17e5e05aa6c41f943b88c18d485a33dade02d7a07ee5d1d416e6e32ff139f59b2bdea47907b769929f0c0a7a80f132beb40f12810490bf16ec48b43288abde9ad9108969c554aa4f7baea71b11497cde04af7ca0d04aa30135cc1162a9478cbfffc3a6ab0217c0ee76c3025a75a1db872e5905834a9e4c54ca562f9b707f3bd1358ff66d29f38c6a8d11f29c6bf9afc0d6f1970b469faf91412e221a29f1e64c5541f30477b22d635f2b62622e9e34d25f1a4070f51e97e61a5f90c44f4d6b5e985ce998354c59ac43b06639e9098f14b68a780b1257a34ec03777ec6386ad9e7cf091199461593efa83f6e7c5beff4462d85d1fb3384dcfceaaaf7a1758125738b1fc82d2c791cfc7284be4752c514d243c804a2d76e7a6c6f380ece65bb38bbdd3a66225656f94db1ca9d3170d4882d7edcf6a659d7d54090aa29230b1874ae825394d5f32092dd6e10173944cb6e1e7113b97966d0432d1524d0255bdeae0e63ca4974a5526f92b86429207bd15cbe0821305dc28efcac303318e3e1b25b1ac2a41e2b96d76bd615cb7d360269c963649a6e6651c6f15078c51ec72f9d2864b06948c03a0e4891675cdb45d228fc87f48d21abe597f2df9cc5b9ff529625ce2a4a9dd3918d60d002c6d4fe5b91a772f8e82ca2891e2f4ce2e24539905e04115908a86de45d1adf5cfcfd5fabb03ed1ceca0a1198c02c07e9e0ac441640d262d69725383dd42bb27798687fd735e6a0f0932fc5520b756e6fafd2c52e61f9bacd22e62295c39dfbb6439f6d50d256fa61722745c4adb218b077ffcf0afb61a6c13b4d4601291e852a3421e85e6fdf6de59a08338a3db9fb8c32f3c5a10c8cec6c86ce25bb50140ba92df955c8897c8e3bddd227c1c2a3de00eb633ccfc5840aa84fc1bbc46bb8ed6cd7db28070d9dac0bfac457279836206168f407f3ec076a6c0b36c3b0f6ceac4aea76236eed8d736c7a664d7a7a1195627d877fbeae28e8c25f3d5317e48f5f0fc26d141d0b090b6e728f37b866ca1642fc7ddcf208a4f0725fcabbeb4fb6f06c1ca8f4d49c6b733ad9bd0268ed612db18e9f8c6e007582f0ff1185446ef61ebe001386275366c406dd968711ac45c1ab73dd5d469d2f7c7f8a16849afccfb064c34e735e1fad52524dd41b9ccaaf91732509d7c82aba2603830b6d6b688d6a581ef45bbeff319f2c932670daee16093011e5a77983e36a7dbdb724aca72a3c704a7a569ab5dec0b47129a59435cc8343b7fc6f10f14559c8a200388ebb0065989e1cd41147f302e7aef61b93a9ac498795fae6407bbc2fffa0d0b777ca65943078a238c3620a888e25849d940423e3c11b0fc1f20cfbe13da5ff1bafea1cca098b9df3410b6c211a02bd0fd20490bf9228a64ec66815dbbf7c9e160f144cefd1b0328036bb7c199ad0c61c82dca03fc57ad3c8820cf11bdc73a9f700b17ec87a9cc471b56a987a00129af72d474e92e477ff661c5d21911e94a13804828c4898807238eeee1018549c3caf92ba39b292aa0cded16230f65afabbc868a7aa0c9e6084b587f70c78e01d94a43d8760675af4530a9c8162183651db5454f6909d919881ccdd5024d3fdad730920220599dc430fa8b884709be3aa93bf69223172c6e3154d3177fba6cbefe7c4d640d3b0dd986d27df72fec43e24f4f744a22ec68db98e59461fd991ca07e45af531b5f1d7344e4335405e770f5c4b3fedb80fcd11ca70d85b7e8b27cf1fcdc0de43b81db57cc85dc8d5160470dbce817b8af20d977d40bd5c641421c673d3c5ae4544ae48c5c8366c4e25e824c1a477135178eb1a3b9e32b61f706d9642c114611256d145f20c832fde535ad94d65b2ebac964e55418c1c71256880139ddc69aede98cf35165d643193ee82782f5817ff59ba95cf4b9ee16b3cd56bd0180d24a5d9c56b8b3dfce2b5fd79fd77f192e91323a62e677e8a8a6e035568f5dcd8ed009ac84c017ee5d85a0cdc945e14220e05ffd27a6d2ac65db855d6c2e9c7b6307a18c3a497d0badd77fb9e0f39d75d533d53ab2bcfc1e41c2701121b6754a5cfe56aab5ee86360f7dd397a575f713c81022f6e263c519ad909141102f828f1ef65ba4b53851e3991d990c853c9df484c7bdea940abc250d9a5cbd80db366f7522b17d4899392538129088413d2973b5b8003e97516eafe8b9876c6a40da95f487b37354a061a0d904fa200be03955e60fe7dec505ce3e55d9e8c0f6d6d864d47c78c6c38770b90528486f1180cb1a3db8debbe6a8f7796942fadad79633e3bdae49f897010a31420ee6c58a1ef7a0f1de614a24ff84fafb25d5e678a1012f8b02051b68a9666d496e78fa4640da704ed6f8cd350cc83a7d4c67a1531308ab3c4c83fa2751469f997bff95c31cda5801ee8241562151c8632d474648e1cce7b8ada9dcaf62022dc80ad8919586d32b8fab675f84cf77a204e57f20d77f4c28a5ca317b94a793bfa435d79bff4ad9bd85b11a72d12369a6b7b09c5478443b1a41e8d5f8f86d908fa205ca4801632a85e3c0459ee523321eba9a102aa4e1bb6f2208d4605b0b9653e33dbf6fdd5f058e94cf08b04571486f2690edad9dfcdd1562cb4a68b91dd1541be22b49070492c17b8d2b989f3a5c7b8ecb698b8c79bd0775220c299f73047ae02d24595c23b07a54f2c6d8aa3bbbee5da306ec9eef4a08e60303ce5e84204d2cf80a0a940c775d5e45cc6900bdc228345bc401fb7f1da00b3bbf85c186729e7d968a4fc8d5088a2a31e72d571c0b34b64c485553c49dada25e8bd8fa090120f4c304e71dc8fafb78eae80cc3274aaad3a93f2f21f25461fb9857ec209bbed428a4b34966b8c16d0805c858216653f99b2a9344c99cc63cc5273d55bc4e2e177d366a7c4716b9104d172388b5f48cd2511216ebfe77ad86833a6afa8d6c5a429b8e32b69f9cf4847f44ffb7c3202443e4747ecf9e5fef2385ef74bde89654e18cc09d72ea3af161dc1fb5de737642deee77a0ab243d7408e42d0b7332d960948e1e54aac8b5ec72c07660a47b0e23ed34679a8f9936b8a40208661b790bdb94f257c412cdd7443117cee1c9d42cc3752615b801e16d714cd9d60b8ff07176c7507dcbd582c69a5b58e9f6a62eb9ffdbe1787061e6fbb8c539732a7e2e614e4d439d12d3734a658e8b04a9afd87f03fc45c9aa7c881ff886fd7d0650b62a9493194ca3856ffb63a238f4668df9e8d53b208f45065d6f63feba8cfff0a96806ec749ac05661a4f5c72b486993760e179244c57db25e14fe72bef7f3d3eab72255dc29a4ac72d2a23d32eb99efca040f5e281bae0a35ecc59a4fb1c0945e57e0c979bb0f7e1a771d75d49f6245e0523c0b92281415b62554324ab218ae4b0405e4e4b8bfa10f4ec358c829ccf19764f71b2f9f49f98b83250f7b95d6bcaf1161062af3d677ef9fc44d740ab8ab8cc17a0125df05610eaaeda6fc62379ae6a680de57515ebf05732eedda056eabca4ded0493b908574f3fce0f7d651296193333e00906d1cd8496760db8ff4cd4b9ea50abf14989b0c3be534c918ed30734f8cc30f550d43e89007c56cbcae7070d7852c9efdd4e9f058c9c6edef77a28136b8753d2abdf0edb65fa8d2fa1b9570db49cbd39bdef131bfe519726b620639d782f0b5649ac9b7b5810775da603b6fa3462f5fe1c58c59ec6349ed689d8b98a88d93703db6515c2f75acd9f1709e1fab1507bf30c00d91ae0b4e39c12f41e940f6ab942fca55c2c7036a14a6d3acda3d8d656f7fba4be19bdd547923324595df2a693a96255e9958007a5547a4c9addd454467aa8c375d7dfc2493de8c8a141e1a207c2c252ef9b000bc9c6b240ab1128856f55f7fd83fd7a7b121ae579a1842be27b23e763d10d3cb18f85de098da43c216847a3966b033d3b78151e1ac5e0957e4203b55b568807f06b1a7258a734f76ef345ae51b5abfa4c562cd75ad8788340a247bbb3d0669fe8f558d59da9e1134768cc430cc50a942b33015a20e8b95b02e05a4b91635e808cdd9ccf66f9e2a07575d500c634ba73de0ef563f7b9e18fc87c42a2a1c8c101696c933c16d1a260c4fac749e1c28425f5145a9f08b249019ec515b363617e0fa8df2b05a66b2daba2af7fbfaf03712ae2f5983e412485c52db3809ba71690bcfa07322c22ee5e6c50ceaf586c8bd55a1a5756140eaaf1bd9dcd028a26deedf45497e89f2da9f47eed352fd6d80915ef33567cdf608caf160d692815990dd2c0d2443be6d611057c46111a6ce1ef55334b2c245c9ab99e06424b5c1e1a860ac88ab083cdcaa7865b97a42208166a0076aeeccd510d3e4eb5d6c644a46e5729dae7265b9b8324256588d35b5013020f34af665a6a6bb7dd15f3506f9e10905c81a1e3334e2fdad20906f429e4fc5422b1cc1d6b6fd79af2aed16bc5a93f4f3536c9aad8dc6b05313358b8599042a7555d7047630d652a3d2ab397a5a757bd287eb325b514f61667e6bed88205c77e5fcfa7cf964c6943e35cb7f8f82b5a2a5c81a1409b9bf53b59e8bb2ccfd96145ddc55ad0910be6ac7737a454aa146d2e822f28ba6f5ff6095c423891da026441bfa2d8f0aadcbec1b85e372f31d53304794b917dc4b6ad0364866d0464cdd4b3caa70764775f403304ac10f0747055766f5dd89fa770f6788ef34cbdf32094f165cd12c7984b6f0c882962596675", 0xd1d, 0xffffffffffff7fff}, {0x0, 0x0, 0x2}], 0x800000, &(0x7f0000000180)={[{'/dev/autofs\x00'}, {'-'}, {'/dev/autofs\x00'}, {'/dev/autofs\x00'}, {}, {'/dev/autofs\x00'}, {'/dev/autofs\x00'}], [{@uid_eq={'uid', 0x3d, 0xee01}}, {@context={'context', 0x3d, 'staff_u'}}, {@context={'context', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'system_u'}}, {@smackfshat={'smackfshat', 0x3d, '\\\x9c!!'}}]}) 05:04:15 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x2d0e0000}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000033c0)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x84) openat$cgroup_freezer_state(r1, &(0x7f0000000ec0), 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000f00)='cpuacct.usage_sys\x00', 0x0, 0x0) tkill(0x0, 0x34) prlimit64(0x0, 0x0, &(0x7f0000000380)={0x3, 0x6}, &(0x7f00000003c0)) 05:04:15 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x7000000}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() [ 1532.732689][ T4187] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1532.789858][ T4196] loop1: detected capacity change from 0 to 16255 05:04:15 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {0x191}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:04:15 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x8a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB="94000000000401030000000000000000000000007d39391a8bdf079f9f495a1fda171e3158f5c79ff5a4dfa267f9065b81eaa585529b1ed154c2e4de9fc975eb2bc712fe039df1a80dfb5986112b3f864dd6be18f185f6af53a91ef29a364869c075e208738464d03e023ce658bc45e51d0cd92f13dd19bed44b18c890ed907be58e2f0bcb02e3c1edb68f44d0d2c95d075a7ceddb3c8a0b063f62856a88e3e03f757467a06cf67105344eb3831130485e90b0e7d8317b2cdf3de6ff9b2c0307dc8d02d485923047d57b31d22a61abcc56"], 0x14}}, 0x0) r2 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x100000, 0x0) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000600)={0xc0, 0x464, 0x20, 0x70bd2b, 0x25dfdbff, "973f9703e43681c987947af3c1c8083de32ea8c59e17bb66fa1131bb71f62feb9d0e2d30dd5e0b3412958e5fe0cceec4126aac730f0637bbd5800c45a7540643c9c2c37aec0fd2421ecaab72641bc72be3958a965740c910b05431206b3784e1f84519555df72fc585d1fe8bc9c7edb156ad0efe2e5af3837edfddc3b7b14e00cda27aef1b0cbdee00e73a16858db80462c0721e260eb71762c36d071ce2212930ef26fbad80c57ca5f20663efbd6221", ["", "", ""]}, 0xc0}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000000) fcntl$setstatus(r2, 0x4, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x100) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x48, 0x80, 0x3f, 0x1, 0x0, 0xc4, 0x4, 0x5, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f00000004c0)}, 0x880, 0x8, 0x4, 0x222db880e1fb0bed, 0x9, 0x8228, 0x3, 0x0, 0xfffffff8, 0x0, 0x7f}, 0xffffffffffffffff, 0x10, r0, 0xa) r4 = open(&(0x7f0000000140)='./file0\x00', 0x501400, 0x1e2) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x40, 0x9, 0x7, 0xf4, 0x0, 0x6, 0x8002, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f00000000c0), 0xe}, 0x800, 0x935, 0x2, 0x3, 0x0, 0xff, 0x7, 0x0, 0x8, 0x0, 0x6}, 0x0, 0x5, r4, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000840)={'veth0_macvtap\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) writev(r3, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) mount$9p_rdma(&(0x7f0000000880), &(0x7f0000000200)='./file0\x00', &(0x7f0000000580), 0x12288b8, &(0x7f0000000a00)=ANY=[]) socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8936, &(0x7f0000000080)={@ipv4={'\x00', '\xff\xff', @empty}, 0x43, r6}) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=@newlink={0xc8, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x242b8, 0x42a0a}, [@IFLA_LINKINFO={0x98, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x88, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_INGRESS_QOS={0x70, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x200004, 0x1f}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7, 0x10001}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3fc, 0x39e4}}, @IFLA_VLAN_QOS_MAPPING={0x2c, 0x1, {0x8, 0x49}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7ff, 0xc73}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xd1e7, 0x5}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xcaa3, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xfffffffc}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xa1ae}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1, 0x8}}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0xc8}}, 0x0) 05:04:15 executing program 2: setsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, 0x0) 05:04:15 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x38000000}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000033c0)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x84) openat$cgroup_freezer_state(r1, &(0x7f0000000ec0), 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000f00)='cpuacct.usage_sys\x00', 0x0, 0x0) tkill(0x0, 0x34) prlimit64(0x0, 0x0, &(0x7f0000000380)={0x3, 0x6}, &(0x7f00000003c0)) [ 1532.940129][ T4196] loop1: detected capacity change from 0 to 16255 05:04:15 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x8010000}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:04:15 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_LISTALL(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) 05:04:15 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x48000000}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000033c0)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x84) openat$cgroup_freezer_state(r1, &(0x7f0000000ec0), 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000f00)='cpuacct.usage_sys\x00', 0x0, 0x0) tkill(0x0, 0x34) prlimit64(0x0, 0x0, &(0x7f0000000380)={0x3, 0x6}, &(0x7f00000003c0)) [ 1533.192617][ T4232] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 05:04:15 executing program 2: openat$autofs(0xffffffffffffff9c, 0x0, 0x400000, 0x0) 05:04:15 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {0x19d}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:04:15 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x8a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB="94000000000401030000000000000000000000007d39391a8bdf079f9f495a1fda171e3158f5c79ff5a4dfa267f9065b81eaa585529b1ed154c2e4de9fc975eb2bc712fe039df1a80dfb5986112b3f864dd6be18f185f6af53a91ef29a364869c075e208738464d03e023ce658bc45e51d0cd92f13dd19bed44b18c890ed907be58e2f0bcb02e3c1edb68f44d0d2c95d075a7ceddb3c8a0b063f62856a88e3e03f757467a06cf67105344eb3831130485e90b0e7d8317b2cdf3de6ff9b2c0307dc8d02d485923047d57b31d22a61abcc56"], 0x14}}, 0x0) r2 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x100000, 0x0) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000600)={0xc0, 0x464, 0x20, 0x70bd2b, 0x25dfdbff, "973f9703e43681c987947af3c1c8083de32ea8c59e17bb66fa1131bb71f62feb9d0e2d30dd5e0b3412958e5fe0cceec4126aac730f0637bbd5800c45a7540643c9c2c37aec0fd2421ecaab72641bc72be3958a965740c910b05431206b3784e1f84519555df72fc585d1fe8bc9c7edb156ad0efe2e5af3837edfddc3b7b14e00cda27aef1b0cbdee00e73a16858db80462c0721e260eb71762c36d071ce2212930ef26fbad80c57ca5f20663efbd6221", ["", "", ""]}, 0xc0}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000000) fcntl$setstatus(r2, 0x4, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x100) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x48, 0x80, 0x3f, 0x1, 0x0, 0xc4, 0x4, 0x5, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f00000004c0)}, 0x880, 0x8, 0x4, 0x222db880e1fb0bed, 0x9, 0x8228, 0x3, 0x0, 0xfffffff8, 0x0, 0x7f}, 0xffffffffffffffff, 0x10, r0, 0xa) r4 = open(&(0x7f0000000140)='./file0\x00', 0x501400, 0x1e2) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x40, 0x9, 0x7, 0xf4, 0x0, 0x6, 0x8002, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f00000000c0), 0xe}, 0x800, 0x935, 0x2, 0x3, 0xc23, 0x0, 0x7, 0x0, 0x8, 0x0, 0x6}, 0x0, 0x5, r4, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000840)={'veth0_macvtap\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) writev(r3, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) mount$9p_rdma(&(0x7f0000000880), &(0x7f0000000200)='./file0\x00', &(0x7f0000000580), 0x12288b8, &(0x7f0000000a00)=ANY=[]) socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8936, &(0x7f0000000080)={@ipv4={'\x00', '\xff\xff', @empty}, 0x43, r6}) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=@newlink={0xc8, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x242b8, 0x42a0a}, [@IFLA_LINKINFO={0x98, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x88, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_INGRESS_QOS={0x70, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x200004, 0x1f}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7, 0x10001}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3fc, 0x39e4}}, @IFLA_VLAN_QOS_MAPPING={0x2c, 0x1, {0x8, 0x49}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7ff, 0xc73}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xd1e7, 0x5}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xcaa3, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xfffffffc}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xa1ae}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1, 0x8}}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0xc8}}, 0x0) 05:04:15 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0xa000000}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:04:15 executing program 1: syz_open_dev$loop(&(0x7f0000000000), 0x0, 0xa0000) 05:04:15 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {0x1c6}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:04:16 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000280), 0x0, 0x0) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 1533.586530][ T4266] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 05:04:16 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x4c000000}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000033c0)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x84) openat$cgroup_freezer_state(r1, &(0x7f0000000ec0), 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000f00)='cpuacct.usage_sys\x00', 0x0, 0x0) tkill(0x0, 0x34) prlimit64(0x0, 0x0, &(0x7f0000000380)={0x3, 0x6}, &(0x7f00000003c0)) 05:04:16 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0xc000000}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:04:16 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x8a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB="94000000000401030000000000000000000000007d39391a8bdf079f9f495a1fda171e3158f5c79ff5a4dfa267f9065b81eaa585529b1ed154c2e4de9fc975eb2bc712fe039df1a80dfb5986112b3f864dd6be18f185f6af53a91ef29a364869c075e208738464d03e023ce658bc45e51d0cd92f13dd19bed44b18c890ed907be58e2f0bcb02e3c1edb68f44d0d2c95d075a7ceddb3c8a0b063f62856a88e3e03f757467a06cf67105344eb3831130485e90b0e7d8317b2cdf3de6ff9b2c0307dc8d02d485923047d57b31d22a61abcc56"], 0x14}}, 0x0) r2 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x100000, 0x0) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000600)={0xc0, 0x464, 0x20, 0x70bd2b, 0x25dfdbff, "973f9703e43681c987947af3c1c8083de32ea8c59e17bb66fa1131bb71f62feb9d0e2d30dd5e0b3412958e5fe0cceec4126aac730f0637bbd5800c45a7540643c9c2c37aec0fd2421ecaab72641bc72be3958a965740c910b05431206b3784e1f84519555df72fc585d1fe8bc9c7edb156ad0efe2e5af3837edfddc3b7b14e00cda27aef1b0cbdee00e73a16858db80462c0721e260eb71762c36d071ce2212930ef26fbad80c57ca5f20663efbd6221", ["", "", ""]}, 0xc0}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000000) fcntl$setstatus(r2, 0x4, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x100) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x48, 0x80, 0x3f, 0x1, 0x0, 0xc4, 0x4, 0x5, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f00000004c0)}, 0x880, 0x8, 0x4, 0x222db880e1fb0bed, 0x9, 0x8228, 0x3, 0x0, 0xfffffff8, 0x0, 0x7f}, 0xffffffffffffffff, 0x10, r0, 0xa) r4 = open(&(0x7f0000000140)='./file0\x00', 0x501400, 0x1e2) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x40, 0x9, 0x7, 0xf4, 0x0, 0x6, 0x8002, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f00000000c0), 0xe}, 0x800, 0x935, 0x2, 0x3, 0xc23, 0x0, 0x7, 0x0, 0x8, 0x0, 0x6}, 0x0, 0x5, r4, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000840)={'veth0_macvtap\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) writev(r3, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) mount$9p_rdma(&(0x7f0000000880), &(0x7f0000000200)='./file0\x00', &(0x7f0000000580), 0x12288b8, &(0x7f0000000a00)=ANY=[]) socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8936, &(0x7f0000000080)={@ipv4={'\x00', '\xff\xff', @empty}, 0x43, r6}) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=@newlink={0xc8, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x242b8, 0x42a0a}, [@IFLA_LINKINFO={0x98, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x88, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_INGRESS_QOS={0x70, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x200004, 0x1f}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7, 0x10001}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3fc, 0x39e4}}, @IFLA_VLAN_QOS_MAPPING={0x2c, 0x1, {0x8, 0x49}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7ff, 0xc73}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xd1e7, 0x5}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xcaa3, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xfffffffc}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xa1ae}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1, 0x8}}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0xc8}}, 0x0) 05:04:16 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {0x1c9}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:04:16 executing program 1: r0 = syz_open_dev$vim2m(&(0x7f0000000200), 0x0, 0x2) ioctl$F2FS_IOC_GET_FEATURES(r0, 0x8004f50c, 0x0) 05:04:16 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x4c010000}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000033c0)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x84) openat$cgroup_freezer_state(r1, &(0x7f0000000ec0), 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000f00)='cpuacct.usage_sys\x00', 0x0, 0x0) tkill(0x0, 0x34) prlimit64(0x0, 0x0, &(0x7f0000000380)={0x3, 0x6}, &(0x7f00000003c0)) 05:04:16 executing program 2: syz_mount_image$reiserfs(&(0x7f00000016c0), &(0x7f0000001700)='./file0\x00', 0x0, 0x1, &(0x7f0000001980)=[{&(0x7f0000001740)}], 0x0, &(0x7f0000001b40)={[{@commit}], [{@audit}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@seclabel}]}) 05:04:16 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {0x1fd}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:04:16 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x11000000}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() [ 1533.995465][ T4298] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 05:04:16 executing program 1: syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) syz_open_dev$loop(&(0x7f0000000280), 0x0, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/module/dvb_usb_ce6230', 0x10040, 0x0) [ 1534.155626][ T4312] REISERFS warning (device loop2): super-6502 reiserfs_getopt: unknown mount option "audit" 05:04:16 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x60000000}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000033c0)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x84) openat$cgroup_freezer_state(r1, &(0x7f0000000ec0), 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000f00)='cpuacct.usage_sys\x00', 0x0, 0x0) tkill(0x0, 0x34) prlimit64(0x0, 0x0, &(0x7f0000000380)={0x3, 0x6}, &(0x7f00000003c0)) 05:04:16 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x8a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB="94000000000401030000000000000000000000007d39391a8bdf079f9f495a1fda171e3158f5c79ff5a4dfa267f9065b81eaa585529b1ed154c2e4de9fc975eb2bc712fe039df1a80dfb5986112b3f864dd6be18f185f6af53a91ef29a364869c075e208738464d03e023ce658bc45e51d0cd92f13dd19bed44b18c890ed907be58e2f0bcb02e3c1edb68f44d0d2c95d075a7ceddb3c8a0b063f62856a88e3e03f757467a06cf67105344eb3831130485e90b0e7d8317b2cdf3de6ff9b2c0307dc8d02d485923047d57b31d22a61abcc56"], 0x14}}, 0x0) r2 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x100000, 0x0) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000600)={0xc0, 0x464, 0x20, 0x70bd2b, 0x25dfdbff, "973f9703e43681c987947af3c1c8083de32ea8c59e17bb66fa1131bb71f62feb9d0e2d30dd5e0b3412958e5fe0cceec4126aac730f0637bbd5800c45a7540643c9c2c37aec0fd2421ecaab72641bc72be3958a965740c910b05431206b3784e1f84519555df72fc585d1fe8bc9c7edb156ad0efe2e5af3837edfddc3b7b14e00cda27aef1b0cbdee00e73a16858db80462c0721e260eb71762c36d071ce2212930ef26fbad80c57ca5f20663efbd6221", ["", "", ""]}, 0xc0}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000000) fcntl$setstatus(r2, 0x4, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x100) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x48, 0x80, 0x3f, 0x1, 0x0, 0xc4, 0x4, 0x5, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f00000004c0)}, 0x880, 0x8, 0x4, 0x222db880e1fb0bed, 0x9, 0x8228, 0x3, 0x0, 0xfffffff8, 0x0, 0x7f}, 0xffffffffffffffff, 0x10, r0, 0xa) r4 = open(&(0x7f0000000140)='./file0\x00', 0x501400, 0x1e2) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x40, 0x9, 0x7, 0xf4, 0x0, 0x6, 0x8002, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f00000000c0), 0xe}, 0x800, 0x935, 0x2, 0x3, 0xc23, 0x0, 0x7, 0x0, 0x8, 0x0, 0x6}, 0x0, 0x5, r4, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000840)={'veth0_macvtap\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) writev(r3, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) mount$9p_rdma(&(0x7f0000000880), &(0x7f0000000200)='./file0\x00', &(0x7f0000000580), 0x12288b8, &(0x7f0000000a00)=ANY=[]) socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8936, &(0x7f0000000080)={@ipv4={'\x00', '\xff\xff', @empty}, 0x43, r6}) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=@newlink={0xc8, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x242b8, 0x42a0a}, [@IFLA_LINKINFO={0x98, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x88, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_INGRESS_QOS={0x70, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x200004, 0x1f}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7, 0x10001}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3fc, 0x39e4}}, @IFLA_VLAN_QOS_MAPPING={0x2c, 0x1, {0x8, 0x49}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7ff, 0xc73}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xd1e7, 0x5}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xcaa3, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xfffffffc}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xa1ae}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1, 0x8}}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0xc8}}, 0x0) [ 1534.258567][ T4312] REISERFS warning (device loop2): super-6502 reiserfs_getopt: unknown mount option "audit" 05:04:16 executing program 1: r0 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/time\x00') syz_genetlink_get_family_id$batadv(&(0x7f0000000240), r0) 05:04:16 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x19010000}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:04:16 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {0x204}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:04:16 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x60010000}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000033c0)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x84) openat$cgroup_freezer_state(r1, &(0x7f0000000ec0), 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000f00)='cpuacct.usage_sys\x00', 0x0, 0x0) tkill(0x0, 0x34) prlimit64(0x0, 0x0, &(0x7f0000000380)={0x3, 0x6}, &(0x7f00000003c0)) [ 1534.512002][ T4353] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 05:04:17 executing program 2: syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000900)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:04:17 executing program 1: syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000440)) 05:04:17 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x8a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB="94000000000401030000000000000000000000007d39391a8bdf079f9f495a1fda171e3158f5c79ff5a4dfa267f9065b81eaa585529b1ed154c2e4de9fc975eb2bc712fe039df1a80dfb5986112b3f864dd6be18f185f6af53a91ef29a364869c075e208738464d03e023ce658bc45e51d0cd92f13dd19bed44b18c890ed907be58e2f0bcb02e3c1edb68f44d0d2c95d075a7ceddb3c8a0b063f62856a88e3e03f757467a06cf67105344eb3831130485e90b0e7d8317b2cdf3de6ff9b2c0307dc8d02d485923047d57b31d22a61abcc56"], 0x14}}, 0x0) r2 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x100000, 0x0) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000600)={0xc0, 0x464, 0x20, 0x70bd2b, 0x25dfdbff, "973f9703e43681c987947af3c1c8083de32ea8c59e17bb66fa1131bb71f62feb9d0e2d30dd5e0b3412958e5fe0cceec4126aac730f0637bbd5800c45a7540643c9c2c37aec0fd2421ecaab72641bc72be3958a965740c910b05431206b3784e1f84519555df72fc585d1fe8bc9c7edb156ad0efe2e5af3837edfddc3b7b14e00cda27aef1b0cbdee00e73a16858db80462c0721e260eb71762c36d071ce2212930ef26fbad80c57ca5f20663efbd6221", ["", "", ""]}, 0xc0}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000000) fcntl$setstatus(r2, 0x4, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x100) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x48, 0x80, 0x3f, 0x1, 0x0, 0xc4, 0x4, 0x5, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f00000004c0)}, 0x880, 0x8, 0x4, 0x222db880e1fb0bed, 0x9, 0x8228, 0x3, 0x0, 0xfffffff8, 0x0, 0x7f}, 0xffffffffffffffff, 0x10, r0, 0xa) r4 = open(&(0x7f0000000140)='./file0\x00', 0x501400, 0x1e2) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x40, 0x9, 0x7, 0xf4, 0x0, 0x6, 0x8002, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f00000000c0), 0xe}, 0x800, 0x935, 0x2, 0x3, 0xc23, 0xff, 0x0, 0x0, 0x8, 0x0, 0x6}, 0x0, 0x5, r4, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000840)={'veth0_macvtap\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) writev(r3, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) mount$9p_rdma(&(0x7f0000000880), &(0x7f0000000200)='./file0\x00', &(0x7f0000000580), 0x12288b8, &(0x7f0000000a00)=ANY=[]) socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8936, &(0x7f0000000080)={@ipv4={'\x00', '\xff\xff', @empty}, 0x43, r6}) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=@newlink={0xc8, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x242b8, 0x42a0a}, [@IFLA_LINKINFO={0x98, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x88, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_INGRESS_QOS={0x70, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x200004, 0x1f}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7, 0x10001}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3fc, 0x39e4}}, @IFLA_VLAN_QOS_MAPPING={0x2c, 0x1, {0x8, 0x49}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7ff, 0xc73}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xd1e7, 0x5}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xcaa3, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xfffffffc}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xa1ae}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1, 0x8}}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0xc8}}, 0x0) 05:04:17 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x1f000000}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:04:17 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x65020000}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000033c0)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x84) openat$cgroup_freezer_state(r1, &(0x7f0000000ec0), 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000f00)='cpuacct.usage_sys\x00', 0x0, 0x0) tkill(0x0, 0x34) prlimit64(0x0, 0x0, &(0x7f0000000380)={0x3, 0x6}, &(0x7f00000003c0)) 05:04:17 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {0x265}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() [ 1534.956326][ T4383] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 05:04:17 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000012c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x40) 05:04:17 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x20000000}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:04:17 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x68000000}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000033c0)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x84) openat$cgroup_freezer_state(r1, &(0x7f0000000ec0), 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000f00)='cpuacct.usage_sys\x00', 0x0, 0x0) tkill(0x0, 0x34) prlimit64(0x0, 0x0, &(0x7f0000000380)={0x3, 0x6}, &(0x7f00000003c0)) 05:04:17 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1ff, 0x8, &(0x7f0000001540)=[{&(0x7f0000000080)="93fedfa5971cac3fa68f1f6c95c9d43cd9e50b2306acb75a7f3597804de4ce68a27154a4efd3537655be0c7d05eb498972c67b03826bdb91438533433bb5e9a6122204e6e5123b5906d97f92a10bf9f50269e861e797f2e6b511415a7d5a43efe9a709f4cf4cc4f7ce2b45858f65ad7b9c905431ef54b8a0c9891be0fb82dff2517497d46160364cb49c8e1cbfd120d4b1e40e1e478ae2a0232b305e748c06418dd8e8ccf8b35d5bda62760ee5f3c3ff49619a185ed7b7f7f03ebf2f1897887536afe04b42f73b0f9905fca12e4e800518298638056dd83ffddbcad7472dc1e2549311e5c89ecbe3f5aef5603b38d7", 0xef, 0x6}, {&(0x7f0000000180)="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", 0x1000}, {&(0x7f0000001180)="04335840cfd778a22fbaf1424d7ea5b92f79e2158a73a16dcc7fad61fece6a089ee9c14af660ca0dd1b3f048aee4631534dcf30b59837188ef4368ea10d374704231bd351fc1bf5ae6", 0x49, 0xfffffffffffff801}, {&(0x7f0000001200)="02e089291146cd200204bac6ba0a25a02332dd57bf9bbd30113c53c550ecd4ee6cd127ac9876b45a0c29af0c2d1fefe806cd51a4bb3851892068f1b958dee97b4306de5c8ad34c1c7700feba5dd5d3aa263396f4c7483b944e1155f56d39645d495d16d51a3a0e982678cec727100259c4277bb71e49db993aa486c9c0ecd6b43b16ba29380a8b8205a369f38d4a026b06945eb7e8fac78d86f1847220223ac932bc789e414dd261f94aedc44588daf5e7a6", 0xb2, 0x1}, {&(0x7f00000012c0)="c410c7b1062e6d6bbc572b036f4109a2266c249de656cf397e88c68fb1978fd2659039a17610973663cec3784e44069c21a287700dc85472e15195b241bdce5ac03b1c5ee850539446096c8d6f14367816f19660b17a1a0a8c49b6baf7cf6d0bd9d7fd0e9bb0532d35edfcc56651de87af9e26f6f456fac108dc7a61d966cb924c71d892c19e3beaa9c279ae237feb493a329a2c7d62bb5f3b5103ad1182a3dc091ad1b26011ce8937ccf056d00d5075998a224587bc7ccf86bb204a3d4eb0952994cabdc2a2e9940fcc629f391c0f1adea0004fb246a9d60cb5925b6b8afbb345ea02c08ecbcf8244", 0xe9, 0x7fffffff}, {&(0x7f00000013c0)="a07fbd7db0e97cd186a03367ef8c7cfcc8c6afdcd13dc792121be24794013209953fa9ae4b0afbed8aa93dc1f5afbc944f30b73f0e942bfaf0d0f5d95edb040bb158ead284fe8512db878d580c991081ffb7646b839be8bb3c3abc2e0a462c2a8521914091226cbeac9c47605683f7bbabc6da938fa47e2db78239a5306cd943e09cf85dfa4a8d00face78569a8c6c12b45ad3e86153457a656aa54150db66c0e11ac37e", 0xa4, 0x4}, {&(0x7f0000001480)="1d6f8bcda67a1c6630659be864624a7b3185a897d0d4dcd7003500678f8b8c14001f8dc85edb0e1975294df7325497ff985bd94535c2eaacaaa9b7e6b3889bf1c2", 0x41, 0x3}, {&(0x7f0000001500)="2d89b0b5683f66a78702fbb1ff47d89338f10218394c7635186fd5237112dae31ac60d0051ecc1afcb8d675a4323d8c908a1f9b87fb15bf67b", 0x39, 0x8}], 0x1c804, &(0x7f0000001600)={[{@noquota}, {@noinline_xattr}, {@background_gc_on}], [{@obj_role}, {@subj_role={'subj_role', 0x3d, '\'v'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '^'}}, {@audit}, {@smackfstransmute={'smackfstransmute', 0x3d, '][\\'}}, {@uid_lt={'uid<', 0xee01}}, {@smackfsdef}, {@fsname={'fsname', 0x3d, '-'}}]}) openat$vim2m(0xffffffffffffff9c, &(0x7f00000016c0), 0x2, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001780), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000001700), &(0x7f0000001740)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2064012, &(0x7f00000017c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x1400}}, {@allow_other}, {@blksize}, {@max_read={'max_read', 0x3d, 0x3}}, {@max_read={'max_read', 0x3d, 0x3}}, {@max_read={'max_read', 0x3d, 0x2}}, {@blksize={'blksize', 0x3d, 0xc00}}, {@allow_other}, {@blksize={'blksize', 0x3d, 0x800}}], [{@obj_user={'obj_user', 0x3d, 'background_gc=on'}}, {@obj_user={'obj_user', 0x3d, '*[(+'}}]}}) pipe(&(0x7f0000001940)={0xffffffffffffffff, 0xffffffffffffffff}) read$FUSE(r2, &(0x7f0000001980)={0x2020, 0x0, 0x0, 0x0}, 0x2020) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r2) ioctl$EVIOCGPROP(r1, 0x80404509, &(0x7f00000039c0)=""/4096) write$FUSE_NOTIFY_INVAL_INODE(r1, &(0x7f00000049c0)={0x28, 0x2, 0x0, {0x1, 0x1, 0x7}}, 0x28) syz_mount_image$f2fs(&(0x7f0000004ac0), &(0x7f0000004b00)='./file0\x00', 0x6, 0x2, &(0x7f0000004c40)=[{&(0x7f0000004b40)="cd48777ef3e1e04929b9c6677dac8fdc3a6f4da591682c388b025b4241bb97c0a3c98968d91d24c32ba7a690742964029081", 0x32, 0x8}, {&(0x7f0000004b80)="a91f622ab85b95a31da31356673b54d00fc0ade2801db89bc26c39a7ecbe0fad90236a84644eb610adb37da1f9d36685a95171ea5e56be2818222b250bcaf203e95504bec47597117f7a31754d06dad90418519ed3febe74531eb0d5117727657e075d4f996da0d3454f9e3046a26c49e324fdcecd619a75c0a36c186f33d87e3417ce30daeb08ae", 0x88, 0x5}], 0x2000, &(0x7f0000004c80)={[{@discard}, {@nodiscard}], [{@euid_lt={'euid<', r3}}]}) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000004d00)) r4 = syz_open_dev$vivid(&(0x7f0000004dc0), 0x0, 0x2) ioctl$VIDIOC_SUBDEV_QUERY_DV_TIMINGS(r4, 0x80845663, &(0x7f0000004e00)) 05:04:17 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x8a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB="94000000000401030000000000000000000000007d39391a8bdf079f9f495a1fda171e3158f5c79ff5a4dfa267f9065b81eaa585529b1ed154c2e4de9fc975eb2bc712fe039df1a80dfb5986112b3f864dd6be18f185f6af53a91ef29a364869c075e208738464d03e023ce658bc45e51d0cd92f13dd19bed44b18c890ed907be58e2f0bcb02e3c1edb68f44d0d2c95d075a7ceddb3c8a0b063f62856a88e3e03f757467a06cf67105344eb3831130485e90b0e7d8317b2cdf3de6ff9b2c0307dc8d02d485923047d57b31d22a61abcc56"], 0x14}}, 0x0) r2 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x100000, 0x0) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000600)={0xc0, 0x464, 0x20, 0x70bd2b, 0x25dfdbff, "973f9703e43681c987947af3c1c8083de32ea8c59e17bb66fa1131bb71f62feb9d0e2d30dd5e0b3412958e5fe0cceec4126aac730f0637bbd5800c45a7540643c9c2c37aec0fd2421ecaab72641bc72be3958a965740c910b05431206b3784e1f84519555df72fc585d1fe8bc9c7edb156ad0efe2e5af3837edfddc3b7b14e00cda27aef1b0cbdee00e73a16858db80462c0721e260eb71762c36d071ce2212930ef26fbad80c57ca5f20663efbd6221", ["", "", ""]}, 0xc0}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000000) fcntl$setstatus(r2, 0x4, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x100) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x48, 0x80, 0x3f, 0x1, 0x0, 0xc4, 0x4, 0x5, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f00000004c0)}, 0x880, 0x8, 0x4, 0x222db880e1fb0bed, 0x9, 0x8228, 0x3, 0x0, 0xfffffff8, 0x0, 0x7f}, 0xffffffffffffffff, 0x10, r0, 0xa) r4 = open(&(0x7f0000000140)='./file0\x00', 0x501400, 0x1e2) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x40, 0x9, 0x7, 0xf4, 0x0, 0x6, 0x8002, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f00000000c0), 0xe}, 0x800, 0x935, 0x2, 0x3, 0xc23, 0xff, 0x0, 0x0, 0x8, 0x0, 0x6}, 0x0, 0x5, r4, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000840)={'veth0_macvtap\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) writev(r3, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) mount$9p_rdma(&(0x7f0000000880), &(0x7f0000000200)='./file0\x00', &(0x7f0000000580), 0x12288b8, &(0x7f0000000a00)=ANY=[]) socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8936, &(0x7f0000000080)={@ipv4={'\x00', '\xff\xff', @empty}, 0x43, r6}) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=@newlink={0xc8, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x242b8, 0x42a0a}, [@IFLA_LINKINFO={0x98, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x88, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_INGRESS_QOS={0x70, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x200004, 0x1f}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7, 0x10001}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3fc, 0x39e4}}, @IFLA_VLAN_QOS_MAPPING={0x2c, 0x1, {0x8, 0x49}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7ff, 0xc73}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xd1e7, 0x5}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xcaa3, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xfffffffc}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xa1ae}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1, 0x8}}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0xc8}}, 0x0) 05:04:17 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {0x288}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:04:17 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x700) [ 1535.448818][ T4412] loop1: detected capacity change from 0 to 264192 05:04:17 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x29000000}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() [ 1535.586205][ T4412] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x600250f7) 05:04:18 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x68010000}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000033c0)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x84) openat$cgroup_freezer_state(r1, &(0x7f0000000ec0), 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000f00)='cpuacct.usage_sys\x00', 0x0, 0x0) tkill(0x0, 0x34) prlimit64(0x0, 0x0, &(0x7f0000000380)={0x3, 0x6}, &(0x7f00000003c0)) [ 1535.631871][ T4412] F2FS-fs (loop1): Can't find valid F2FS filesystem in 1th superblock 05:04:18 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {0x29d}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:04:18 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x8a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB="94000000000401030000000000000000000000007d39391a8bdf079f9f495a1fda171e3158f5c79ff5a4dfa267f9065b81eaa585529b1ed154c2e4de9fc975eb2bc712fe039df1a80dfb5986112b3f864dd6be18f185f6af53a91ef29a364869c075e208738464d03e023ce658bc45e51d0cd92f13dd19bed44b18c890ed907be58e2f0bcb02e3c1edb68f44d0d2c95d075a7ceddb3c8a0b063f62856a88e3e03f757467a06cf67105344eb3831130485e90b0e7d8317b2cdf3de6ff9b2c0307dc8d02d485923047d57b31d22a61abcc56"], 0x14}}, 0x0) r2 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x100000, 0x0) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000600)={0xc0, 0x464, 0x20, 0x70bd2b, 0x25dfdbff, "973f9703e43681c987947af3c1c8083de32ea8c59e17bb66fa1131bb71f62feb9d0e2d30dd5e0b3412958e5fe0cceec4126aac730f0637bbd5800c45a7540643c9c2c37aec0fd2421ecaab72641bc72be3958a965740c910b05431206b3784e1f84519555df72fc585d1fe8bc9c7edb156ad0efe2e5af3837edfddc3b7b14e00cda27aef1b0cbdee00e73a16858db80462c0721e260eb71762c36d071ce2212930ef26fbad80c57ca5f20663efbd6221", ["", "", ""]}, 0xc0}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000000) fcntl$setstatus(r2, 0x4, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x100) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x48, 0x80, 0x3f, 0x1, 0x0, 0xc4, 0x4, 0x5, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f00000004c0)}, 0x880, 0x8, 0x4, 0x222db880e1fb0bed, 0x9, 0x8228, 0x3, 0x0, 0xfffffff8, 0x0, 0x7f}, 0xffffffffffffffff, 0x10, r0, 0xa) r4 = open(&(0x7f0000000140)='./file0\x00', 0x501400, 0x1e2) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x40, 0x9, 0x7, 0xf4, 0x0, 0x6, 0x8002, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f00000000c0), 0xe}, 0x800, 0x935, 0x2, 0x3, 0xc23, 0xff, 0x0, 0x0, 0x8, 0x0, 0x6}, 0x0, 0x5, r4, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000840)={'veth0_macvtap\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) writev(r3, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) mount$9p_rdma(&(0x7f0000000880), &(0x7f0000000200)='./file0\x00', &(0x7f0000000580), 0x12288b8, &(0x7f0000000a00)=ANY=[]) socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8936, &(0x7f0000000080)={@ipv4={'\x00', '\xff\xff', @empty}, 0x43, r6}) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=@newlink={0xc8, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x242b8, 0x42a0a}, [@IFLA_LINKINFO={0x98, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x88, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_INGRESS_QOS={0x70, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x200004, 0x1f}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7, 0x10001}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3fc, 0x39e4}}, @IFLA_VLAN_QOS_MAPPING={0x2c, 0x1, {0x8, 0x49}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7ff, 0xc73}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xd1e7, 0x5}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xcaa3, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xfffffffc}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xa1ae}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1, 0x8}}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0xc8}}, 0x0) [ 1535.773362][ T4412] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1535.802196][ T4412] F2FS-fs (loop1): Can't find valid F2FS filesystem in 2th superblock [ 1535.850085][ T4436] set_target_v0_checkentry: 45 callbacks suppressed [ 1535.850129][ T4436] Cannot find add_set index 0 as target 05:04:18 executing program 2: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000001f80)) 05:04:18 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x2c0e0000}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() [ 1536.005582][ T4446] Cannot find add_set index 0 as target [ 1536.017632][ T4412] loop1: detected capacity change from 0 to 264192 05:04:18 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {0x2a4}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:04:18 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x6c000000}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000033c0)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x84) openat$cgroup_freezer_state(r1, &(0x7f0000000ec0), 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000f00)='cpuacct.usage_sys\x00', 0x0, 0x0) tkill(0x0, 0x34) prlimit64(0x0, 0x0, &(0x7f0000000380)={0x3, 0x6}, &(0x7f00000003c0)) [ 1536.115691][ T4412] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x600250f7) [ 1536.153922][ T4456] __nla_validate_parse: 1 callbacks suppressed [ 1536.153942][ T4456] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1536.184877][ T4412] F2FS-fs (loop1): Can't find valid F2FS filesystem in 1th superblock [ 1536.234853][ T4412] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1536.297742][ T4412] F2FS-fs (loop1): Can't find valid F2FS filesystem in 2th superblock [ 1536.318414][ T4475] Cannot find add_set index 0 as target [ 1536.397735][ T4478] Cannot find add_set index 0 as target [ 1536.471377][ T4482] Cannot find add_set index 0 as target 05:04:18 executing program 1: setsockopt$RXRPC_SECURITY_KEY(0xffffffffffffffff, 0x110, 0x1, 0x0, 0x0) 05:04:18 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x8a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB="94000000000401030000000000000000000000007d39391a8bdf079f9f495a1fda171e3158f5c79ff5a4dfa267f9065b81eaa585529b1ed154c2e4de9fc975eb2bc712fe039df1a80dfb5986112b3f864dd6be18f185f6af53a91ef29a364869c075e208738464d03e023ce658bc45e51d0cd92f13dd19bed44b18c890ed907be58e2f0bcb02e3c1edb68f44d0d2c95d075a7ceddb3c8a0b063f62856a88e3e03f757467a06cf67105344eb3831130485e90b0e7d8317b2cdf3de6ff9b2c0307dc8d02d485923047d57b31d22a61abcc56"], 0x14}}, 0x0) r2 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x100000, 0x0) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000600)={0xc0, 0x464, 0x20, 0x70bd2b, 0x25dfdbff, "973f9703e43681c987947af3c1c8083de32ea8c59e17bb66fa1131bb71f62feb9d0e2d30dd5e0b3412958e5fe0cceec4126aac730f0637bbd5800c45a7540643c9c2c37aec0fd2421ecaab72641bc72be3958a965740c910b05431206b3784e1f84519555df72fc585d1fe8bc9c7edb156ad0efe2e5af3837edfddc3b7b14e00cda27aef1b0cbdee00e73a16858db80462c0721e260eb71762c36d071ce2212930ef26fbad80c57ca5f20663efbd6221", ["", "", ""]}, 0xc0}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000000) fcntl$setstatus(r2, 0x4, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x100) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x48, 0x80, 0x3f, 0x1, 0x0, 0xc4, 0x4, 0x5, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f00000004c0)}, 0x880, 0x8, 0x4, 0x222db880e1fb0bed, 0x9, 0x8228, 0x3, 0x0, 0xfffffff8, 0x0, 0x7f}, 0xffffffffffffffff, 0x10, r0, 0xa) r4 = open(&(0x7f0000000140)='./file0\x00', 0x501400, 0x1e2) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x40, 0x9, 0x7, 0xf4, 0x0, 0x6, 0x8002, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f00000000c0), 0xe}, 0x800, 0x935, 0x2, 0x3, 0xc23, 0xff, 0x7, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x5, r4, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000840)={'veth0_macvtap\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) writev(r3, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) mount$9p_rdma(&(0x7f0000000880), &(0x7f0000000200)='./file0\x00', &(0x7f0000000580), 0x12288b8, &(0x7f0000000a00)=ANY=[]) socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8936, &(0x7f0000000080)={@ipv4={'\x00', '\xff\xff', @empty}, 0x43, r6}) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=@newlink={0xc8, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x242b8, 0x42a0a}, [@IFLA_LINKINFO={0x98, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x88, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_INGRESS_QOS={0x70, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x200004, 0x1f}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7, 0x10001}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3fc, 0x39e4}}, @IFLA_VLAN_QOS_MAPPING={0x2c, 0x1, {0x8, 0x49}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7ff, 0xc73}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xd1e7, 0x5}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xcaa3, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xfffffffc}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xa1ae}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1, 0x8}}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0xc8}}, 0x0) 05:04:18 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {0x2ac}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:04:18 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x38000000}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:04:18 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x74000000}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000033c0)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x84) openat$cgroup_freezer_state(r1, &(0x7f0000000ec0), 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000f00)='cpuacct.usage_sys\x00', 0x0, 0x0) tkill(0x0, 0x34) prlimit64(0x0, 0x0, &(0x7f0000000380)={0x3, 0x6}, &(0x7f00000003c0)) 05:04:18 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) [ 1536.687098][ T4509] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1536.697019][ T4508] Cannot find add_set index 0 as target [ 1536.705751][ T4507] Cannot find add_set index 0 as target 05:04:19 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x7a000000}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000033c0)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x84) openat$cgroup_freezer_state(r1, &(0x7f0000000ec0), 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000f00)='cpuacct.usage_sys\x00', 0x0, 0x0) tkill(0x0, 0x34) prlimit64(0x0, 0x0, &(0x7f0000000380)={0x3, 0x6}, &(0x7f00000003c0)) 05:04:19 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {0x2c9}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() [ 1536.818485][ T4505] Cannot find add_set index 0 as target 05:04:19 executing program 2: syz_mount_image$reiserfs(0x0, &(0x7f0000001700)='./file0\x00', 0x0, 0x1, &(0x7f0000001980)=[{0x0}], 0x4001000, 0x0) 05:04:19 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x8a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB="94000000000401030000000000000000000000007d39391a8bdf079f9f495a1fda171e3158f5c79ff5a4dfa267f9065b81eaa585529b1ed154c2e4de9fc975eb2bc712fe039df1a80dfb5986112b3f864dd6be18f185f6af53a91ef29a364869c075e208738464d03e023ce658bc45e51d0cd92f13dd19bed44b18c890ed907be58e2f0bcb02e3c1edb68f44d0d2c95d075a7ceddb3c8a0b063f62856a88e3e03f757467a06cf67105344eb3831130485e90b0e7d8317b2cdf3de6ff9b2c0307dc8d02d485923047d57b31d22a61abcc56"], 0x14}}, 0x0) r2 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x100000, 0x0) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000600)={0xc0, 0x464, 0x20, 0x70bd2b, 0x25dfdbff, "973f9703e43681c987947af3c1c8083de32ea8c59e17bb66fa1131bb71f62feb9d0e2d30dd5e0b3412958e5fe0cceec4126aac730f0637bbd5800c45a7540643c9c2c37aec0fd2421ecaab72641bc72be3958a965740c910b05431206b3784e1f84519555df72fc585d1fe8bc9c7edb156ad0efe2e5af3837edfddc3b7b14e00cda27aef1b0cbdee00e73a16858db80462c0721e260eb71762c36d071ce2212930ef26fbad80c57ca5f20663efbd6221", ["", "", ""]}, 0xc0}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000000) fcntl$setstatus(r2, 0x4, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x100) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x48, 0x80, 0x3f, 0x1, 0x0, 0xc4, 0x4, 0x5, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f00000004c0)}, 0x880, 0x8, 0x4, 0x222db880e1fb0bed, 0x9, 0x8228, 0x3, 0x0, 0xfffffff8, 0x0, 0x7f}, 0xffffffffffffffff, 0x10, r0, 0xa) r4 = open(&(0x7f0000000140)='./file0\x00', 0x501400, 0x1e2) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x40, 0x9, 0x7, 0xf4, 0x0, 0x6, 0x8002, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f00000000c0), 0xe}, 0x800, 0x935, 0x2, 0x3, 0xc23, 0xff, 0x7, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x5, r4, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000840)={'veth0_macvtap\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) writev(r3, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) mount$9p_rdma(&(0x7f0000000880), &(0x7f0000000200)='./file0\x00', &(0x7f0000000580), 0x12288b8, &(0x7f0000000a00)=ANY=[]) socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8936, &(0x7f0000000080)={@ipv4={'\x00', '\xff\xff', @empty}, 0x43, r6}) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=@newlink={0xc8, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x242b8, 0x42a0a}, [@IFLA_LINKINFO={0x98, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x88, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_INGRESS_QOS={0x70, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x200004, 0x1f}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7, 0x10001}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3fc, 0x39e4}}, @IFLA_VLAN_QOS_MAPPING={0x2c, 0x1, {0x8, 0x49}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7ff, 0xc73}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xd1e7, 0x5}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xcaa3, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xfffffffc}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xa1ae}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1, 0x8}}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0xc8}}, 0x0) [ 1536.868115][ T4534] Cannot find add_set index 0 as target 05:04:19 executing program 1: syz_mount_image$reiserfs(&(0x7f00000016c0), 0x0, 0x0, 0x0, &(0x7f0000001980), 0x0, &(0x7f0000001b40)={[], [{@uid_lt={'uid<', 0xee00}}]}) [ 1536.987015][ T4539] Cannot find add_set index 0 as target 05:04:19 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x88000000}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000033c0)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x84) openat$cgroup_freezer_state(r1, &(0x7f0000000ec0), 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000f00)='cpuacct.usage_sys\x00', 0x0, 0x0) tkill(0x0, 0x34) prlimit64(0x0, 0x0, &(0x7f0000000380)={0x3, 0x6}, &(0x7f00000003c0)) 05:04:19 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {0x2d5}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:04:19 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x48000000}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() [ 1537.115935][ T4554] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 05:04:19 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {0x300}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:04:19 executing program 1: syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x123842) 05:04:19 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x8a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB="94000000000401030000000000000000000000007d39391a8bdf079f9f495a1fda171e3158f5c79ff5a4dfa267f9065b81eaa585529b1ed154c2e4de9fc975eb2bc712fe039df1a80dfb5986112b3f864dd6be18f185f6af53a91ef29a364869c075e208738464d03e023ce658bc45e51d0cd92f13dd19bed44b18c890ed907be58e2f0bcb02e3c1edb68f44d0d2c95d075a7ceddb3c8a0b063f62856a88e3e03f757467a06cf67105344eb3831130485e90b0e7d8317b2cdf3de6ff9b2c0307dc8d02d485923047d57b31d22a61abcc56"], 0x14}}, 0x0) r2 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x100000, 0x0) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000600)={0xc0, 0x464, 0x20, 0x70bd2b, 0x25dfdbff, "973f9703e43681c987947af3c1c8083de32ea8c59e17bb66fa1131bb71f62feb9d0e2d30dd5e0b3412958e5fe0cceec4126aac730f0637bbd5800c45a7540643c9c2c37aec0fd2421ecaab72641bc72be3958a965740c910b05431206b3784e1f84519555df72fc585d1fe8bc9c7edb156ad0efe2e5af3837edfddc3b7b14e00cda27aef1b0cbdee00e73a16858db80462c0721e260eb71762c36d071ce2212930ef26fbad80c57ca5f20663efbd6221", ["", "", ""]}, 0xc0}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000000) fcntl$setstatus(r2, 0x4, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x100) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x48, 0x80, 0x3f, 0x1, 0x0, 0xc4, 0x4, 0x5, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f00000004c0)}, 0x880, 0x8, 0x4, 0x222db880e1fb0bed, 0x9, 0x8228, 0x3, 0x0, 0xfffffff8, 0x0, 0x7f}, 0xffffffffffffffff, 0x10, r0, 0xa) r4 = open(&(0x7f0000000140)='./file0\x00', 0x501400, 0x1e2) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x40, 0x9, 0x7, 0xf4, 0x0, 0x6, 0x8002, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f00000000c0), 0xe}, 0x800, 0x935, 0x2, 0x3, 0xc23, 0xff, 0x7, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x5, r4, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000840)={'veth0_macvtap\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) writev(r3, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) mount$9p_rdma(&(0x7f0000000880), &(0x7f0000000200)='./file0\x00', &(0x7f0000000580), 0x12288b8, &(0x7f0000000a00)=ANY=[]) socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8936, &(0x7f0000000080)={@ipv4={'\x00', '\xff\xff', @empty}, 0x43, r6}) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=@newlink={0xc8, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x242b8, 0x42a0a}, [@IFLA_LINKINFO={0x98, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x88, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_INGRESS_QOS={0x70, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x200004, 0x1f}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7, 0x10001}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3fc, 0x39e4}}, @IFLA_VLAN_QOS_MAPPING={0x2c, 0x1, {0x8, 0x49}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7ff, 0xc73}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xd1e7, 0x5}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xcaa3, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xfffffffc}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xa1ae}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1, 0x8}}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0xc8}}, 0x0) 05:04:19 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x4c000000}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:04:19 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x40) 05:04:19 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x88020000}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000033c0)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x84) openat$cgroup_freezer_state(r1, &(0x7f0000000ec0), 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000f00)='cpuacct.usage_sys\x00', 0x0, 0x0) tkill(0x0, 0x34) prlimit64(0x0, 0x0, &(0x7f0000000380)={0x3, 0x6}, &(0x7f00000003c0)) 05:04:20 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {0x301}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:04:20 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x4c010000}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:04:20 executing program 1: openat$autofs(0xffffffffffffff9c, 0x0, 0x200400, 0x0) [ 1537.693462][ T4606] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 05:04:20 executing program 2: r0 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000040)) ioctl$NS_GET_OWNER_UID(r0, 0xb704, 0x0) 05:04:20 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x60000000}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:04:20 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x8a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB="94000000000401030000000000000000000000007d39391a8bdf079f9f495a1fda171e3158f5c79ff5a4dfa267f9065b81eaa585529b1ed154c2e4de9fc975eb2bc712fe039df1a80dfb5986112b3f864dd6be18f185f6af53a91ef29a364869c075e208738464d03e023ce658bc45e51d0cd92f13dd19bed44b18c890ed907be58e2f0bcb02e3c1edb68f44d0d2c95d075a7ceddb3c8a0b063f62856a88e3e03f757467a06cf67105344eb3831130485e90b0e7d8317b2cdf3de6ff9b2c0307dc8d02d485923047d57b31d22a61abcc56"], 0x14}}, 0x0) r2 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x100000, 0x0) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000600)={0xc0, 0x464, 0x20, 0x70bd2b, 0x25dfdbff, "973f9703e43681c987947af3c1c8083de32ea8c59e17bb66fa1131bb71f62feb9d0e2d30dd5e0b3412958e5fe0cceec4126aac730f0637bbd5800c45a7540643c9c2c37aec0fd2421ecaab72641bc72be3958a965740c910b05431206b3784e1f84519555df72fc585d1fe8bc9c7edb156ad0efe2e5af3837edfddc3b7b14e00cda27aef1b0cbdee00e73a16858db80462c0721e260eb71762c36d071ce2212930ef26fbad80c57ca5f20663efbd6221", ["", "", ""]}, 0xc0}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000000) fcntl$setstatus(r2, 0x4, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x100) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x48, 0x80, 0x3f, 0x1, 0x0, 0xc4, 0x4, 0x5, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f00000004c0)}, 0x880, 0x8, 0x4, 0x222db880e1fb0bed, 0x9, 0x8228, 0x3, 0x0, 0xfffffff8, 0x0, 0x7f}, 0xffffffffffffffff, 0x10, r0, 0xa) r4 = open(&(0x7f0000000140)='./file0\x00', 0x501400, 0x1e2) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x40, 0x9, 0x7, 0xf4, 0x0, 0x6, 0x8002, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f00000000c0), 0xe}, 0x800, 0x935, 0x2, 0x3, 0xc23, 0xff, 0x7, 0x0, 0x8}, 0x0, 0x5, r4, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000840)={'veth0_macvtap\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) writev(r3, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) mount$9p_rdma(&(0x7f0000000880), &(0x7f0000000200)='./file0\x00', &(0x7f0000000580), 0x12288b8, &(0x7f0000000a00)=ANY=[]) socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8936, &(0x7f0000000080)={@ipv4={'\x00', '\xff\xff', @empty}, 0x43, r6}) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=@newlink={0xc8, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x242b8, 0x42a0a}, [@IFLA_LINKINFO={0x98, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x88, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_INGRESS_QOS={0x70, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x200004, 0x1f}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7, 0x10001}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3fc, 0x39e4}}, @IFLA_VLAN_QOS_MAPPING={0x2c, 0x1, {0x8, 0x49}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7ff, 0xc73}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xd1e7, 0x5}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xcaa3, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xfffffffc}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xa1ae}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1, 0x8}}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0xc8}}, 0x0) 05:04:20 executing program 1: syz_mount_image$f2fs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000001540), 0x0, &(0x7f0000001600)) 05:04:20 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x91010000}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000033c0)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x84) openat$cgroup_freezer_state(r1, &(0x7f0000000ec0), 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000f00)='cpuacct.usage_sys\x00', 0x0, 0x0) tkill(0x0, 0x34) prlimit64(0x0, 0x0, &(0x7f0000000380)={0x3, 0x6}, &(0x7f00000003c0)) 05:04:20 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {0x3a9}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() [ 1538.129879][ T4642] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1538.168737][ T4649] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0) 05:04:20 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x60010000}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:04:20 executing program 2: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000007c0), 0x0, 0x0) connect$bt_l2cap(r0, 0x0, 0x0) 05:04:20 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {0x3f8}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() [ 1538.213910][ T4649] F2FS-fs (loop1): Can't find valid F2FS filesystem in 1th superblock 05:04:20 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x9c000000}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000033c0)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x84) openat$cgroup_freezer_state(r1, &(0x7f0000000ec0), 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000f00)='cpuacct.usage_sys\x00', 0x0, 0x0) tkill(0x0, 0x34) prlimit64(0x0, 0x0, &(0x7f0000000380)={0x3, 0x6}, &(0x7f00000003c0)) 05:04:20 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x8a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB="94000000000401030000000000000000000000007d39391a8bdf079f9f495a1fda171e3158f5c79ff5a4dfa267f9065b81eaa585529b1ed154c2e4de9fc975eb2bc712fe039df1a80dfb5986112b3f864dd6be18f185f6af53a91ef29a364869c075e208738464d03e023ce658bc45e51d0cd92f13dd19bed44b18c890ed907be58e2f0bcb02e3c1edb68f44d0d2c95d075a7ceddb3c8a0b063f62856a88e3e03f757467a06cf67105344eb3831130485e90b0e7d8317b2cdf3de6ff9b2c0307dc8d02d485923047d57b31d22a61abcc56"], 0x14}}, 0x0) r2 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x100000, 0x0) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000600)={0xc0, 0x464, 0x20, 0x70bd2b, 0x25dfdbff, "973f9703e43681c987947af3c1c8083de32ea8c59e17bb66fa1131bb71f62feb9d0e2d30dd5e0b3412958e5fe0cceec4126aac730f0637bbd5800c45a7540643c9c2c37aec0fd2421ecaab72641bc72be3958a965740c910b05431206b3784e1f84519555df72fc585d1fe8bc9c7edb156ad0efe2e5af3837edfddc3b7b14e00cda27aef1b0cbdee00e73a16858db80462c0721e260eb71762c36d071ce2212930ef26fbad80c57ca5f20663efbd6221", ["", "", ""]}, 0xc0}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000000) fcntl$setstatus(r2, 0x4, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x100) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x48, 0x80, 0x3f, 0x1, 0x0, 0xc4, 0x4, 0x5, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f00000004c0)}, 0x880, 0x8, 0x4, 0x222db880e1fb0bed, 0x9, 0x8228, 0x3, 0x0, 0xfffffff8, 0x0, 0x7f}, 0xffffffffffffffff, 0x10, r0, 0xa) r4 = open(&(0x7f0000000140)='./file0\x00', 0x501400, 0x1e2) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x40, 0x9, 0x7, 0xf4, 0x0, 0x6, 0x8002, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f00000000c0), 0xe}, 0x800, 0x935, 0x2, 0x3, 0xc23, 0xff, 0x7, 0x0, 0x8}, 0x0, 0x5, r4, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000840)={'veth0_macvtap\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) writev(r3, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) mount$9p_rdma(&(0x7f0000000880), &(0x7f0000000200)='./file0\x00', &(0x7f0000000580), 0x12288b8, &(0x7f0000000a00)=ANY=[]) socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8936, &(0x7f0000000080)={@ipv4={'\x00', '\xff\xff', @empty}, 0x43, r6}) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=@newlink={0xc8, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x242b8, 0x42a0a}, [@IFLA_LINKINFO={0x98, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x88, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_INGRESS_QOS={0x70, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x200004, 0x1f}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7, 0x10001}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3fc, 0x39e4}}, @IFLA_VLAN_QOS_MAPPING={0x2c, 0x1, {0x8, 0x49}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7ff, 0xc73}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xd1e7, 0x5}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xcaa3, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xfffffffc}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xa1ae}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1, 0x8}}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0xc8}}, 0x0) [ 1538.284183][ T4649] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1538.320114][ T4649] F2FS-fs (loop1): Can't find valid F2FS filesystem in 2th superblock [ 1538.459029][ T4649] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0) 05:04:20 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {0x402}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() [ 1538.500698][ T4649] F2FS-fs (loop1): Can't find valid F2FS filesystem in 1th superblock 05:04:20 executing program 2: ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, 0x0) ioctl$IOC_PR_PREEMPT_ABORT(0xffffffffffffffff, 0x401870cc, &(0x7f0000000100)={0x533, 0x3f, 0x0, 0x7fff}) io_uring_setup(0x3392, &(0x7f0000000140)={0x0, 0xed40, 0x18, 0x2, 0x2a4}) recvfrom$rxrpc(0xffffffffffffffff, &(0x7f0000001b80)=""/180, 0xb4, 0x1, 0x0, 0x0) 05:04:21 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x65020000}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() [ 1538.562763][ T4649] F2FS-fs (loop1): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 1538.622518][ T4692] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1538.642307][ T4649] F2FS-fs (loop1): Can't find valid F2FS filesystem in 2th superblock 05:04:21 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {0x600}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:04:21 executing program 1: openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$reiserfs(&(0x7f00000016c0), &(0x7f0000001700)='./file0\x00', 0x0, 0x1, &(0x7f0000001980)=[{0x0}], 0x0, &(0x7f0000001b40)) 05:04:21 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x9d010000}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000033c0)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x84) openat$cgroup_freezer_state(r1, &(0x7f0000000ec0), 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000f00)='cpuacct.usage_sys\x00', 0x0, 0x0) tkill(0x0, 0x34) prlimit64(0x0, 0x0, &(0x7f0000000380)={0x3, 0x6}, &(0x7f00000003c0)) 05:04:21 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x8a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB="94000000000401030000000000000000000000007d39391a8bdf079f9f495a1fda171e3158f5c79ff5a4dfa267f9065b81eaa585529b1ed154c2e4de9fc975eb2bc712fe039df1a80dfb5986112b3f864dd6be18f185f6af53a91ef29a364869c075e208738464d03e023ce658bc45e51d0cd92f13dd19bed44b18c890ed907be58e2f0bcb02e3c1edb68f44d0d2c95d075a7ceddb3c8a0b063f62856a88e3e03f757467a06cf67105344eb3831130485e90b0e7d8317b2cdf3de6ff9b2c0307dc8d02d485923047d57b31d22a61abcc56"], 0x14}}, 0x0) r2 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x100000, 0x0) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000600)={0xc0, 0x464, 0x20, 0x70bd2b, 0x25dfdbff, "973f9703e43681c987947af3c1c8083de32ea8c59e17bb66fa1131bb71f62feb9d0e2d30dd5e0b3412958e5fe0cceec4126aac730f0637bbd5800c45a7540643c9c2c37aec0fd2421ecaab72641bc72be3958a965740c910b05431206b3784e1f84519555df72fc585d1fe8bc9c7edb156ad0efe2e5af3837edfddc3b7b14e00cda27aef1b0cbdee00e73a16858db80462c0721e260eb71762c36d071ce2212930ef26fbad80c57ca5f20663efbd6221", ["", "", ""]}, 0xc0}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000000) fcntl$setstatus(r2, 0x4, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x100) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x48, 0x80, 0x3f, 0x1, 0x0, 0xc4, 0x4, 0x5, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f00000004c0)}, 0x880, 0x8, 0x4, 0x222db880e1fb0bed, 0x9, 0x8228, 0x3, 0x0, 0xfffffff8, 0x0, 0x7f}, 0xffffffffffffffff, 0x10, r0, 0xa) r4 = open(&(0x7f0000000140)='./file0\x00', 0x501400, 0x1e2) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x40, 0x9, 0x7, 0xf4, 0x0, 0x6, 0x8002, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f00000000c0), 0xe}, 0x800, 0x935, 0x2, 0x3, 0xc23, 0xff, 0x7, 0x0, 0x8}, 0x0, 0x5, r4, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000840)={'veth0_macvtap\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) writev(r3, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) mount$9p_rdma(&(0x7f0000000880), &(0x7f0000000200)='./file0\x00', &(0x7f0000000580), 0x12288b8, &(0x7f0000000a00)=ANY=[]) socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8936, &(0x7f0000000080)={@ipv4={'\x00', '\xff\xff', @empty}, 0x43, r6}) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=@newlink={0xc8, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x242b8, 0x42a0a}, [@IFLA_LINKINFO={0x98, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x88, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_INGRESS_QOS={0x70, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x200004, 0x1f}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7, 0x10001}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3fc, 0x39e4}}, @IFLA_VLAN_QOS_MAPPING={0x2c, 0x1, {0x8, 0x49}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7ff, 0xc73}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xd1e7, 0x5}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xcaa3, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xfffffffc}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xa1ae}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1, 0x8}}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0xc8}}, 0x0) 05:04:21 executing program 2: r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000100)) 05:04:21 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {0x700}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() [ 1538.968578][ T4725] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 05:04:21 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x9d020000}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000033c0)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x84) openat$cgroup_freezer_state(r1, &(0x7f0000000ec0), 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000f00)='cpuacct.usage_sys\x00', 0x0, 0x0) tkill(0x0, 0x34) prlimit64(0x0, 0x0, &(0x7f0000000380)={0x3, 0x6}, &(0x7f00000003c0)) 05:04:21 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x8a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB="94000000000401030000000000000000000000007d39391a8bdf079f9f495a1fda171e3158f5c79ff5a4dfa267f9065b81eaa585529b1ed154c2e4de9fc975eb2bc712fe039df1a80dfb5986112b3f864dd6be18f185f6af53a91ef29a364869c075e208738464d03e023ce658bc45e51d0cd92f13dd19bed44b18c890ed907be58e2f0bcb02e3c1edb68f44d0d2c95d075a7ceddb3c8a0b063f62856a88e3e03f757467a06cf67105344eb3831130485e90b0e7d8317b2cdf3de6ff9b2c0307dc8d02d485923047d57b31d22a61abcc56"], 0x14}}, 0x0) r2 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x100000, 0x0) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000600)={0xc0, 0x464, 0x20, 0x70bd2b, 0x25dfdbff, "973f9703e43681c987947af3c1c8083de32ea8c59e17bb66fa1131bb71f62feb9d0e2d30dd5e0b3412958e5fe0cceec4126aac730f0637bbd5800c45a7540643c9c2c37aec0fd2421ecaab72641bc72be3958a965740c910b05431206b3784e1f84519555df72fc585d1fe8bc9c7edb156ad0efe2e5af3837edfddc3b7b14e00cda27aef1b0cbdee00e73a16858db80462c0721e260eb71762c36d071ce2212930ef26fbad80c57ca5f20663efbd6221", ["", "", ""]}, 0xc0}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000000) fcntl$setstatus(r2, 0x4, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x100) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x48, 0x80, 0x3f, 0x1, 0x0, 0xc4, 0x4, 0x5, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f00000004c0)}, 0x880, 0x8, 0x4, 0x222db880e1fb0bed, 0x9, 0x8228, 0x3, 0x0, 0xfffffff8, 0x0, 0x7f}, 0xffffffffffffffff, 0x10, r0, 0xa) r4 = open(&(0x7f0000000140)='./file0\x00', 0x501400, 0x1e2) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x40, 0x9, 0x7, 0xf4, 0x0, 0x6, 0x8002, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f00000000c0), 0xe}, 0x800, 0x935, 0x2, 0x3, 0xc23, 0xff, 0x7, 0x0, 0x8, 0x0, 0x6}, 0x0, 0x0, r4, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000840)={'veth0_macvtap\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) writev(r3, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) mount$9p_rdma(&(0x7f0000000880), &(0x7f0000000200)='./file0\x00', &(0x7f0000000580), 0x12288b8, &(0x7f0000000a00)=ANY=[]) socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8936, &(0x7f0000000080)={@ipv4={'\x00', '\xff\xff', @empty}, 0x43, r6}) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=@newlink={0xc8, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x242b8, 0x42a0a}, [@IFLA_LINKINFO={0x98, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x88, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_INGRESS_QOS={0x70, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x200004, 0x1f}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7, 0x10001}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3fc, 0x39e4}}, @IFLA_VLAN_QOS_MAPPING={0x2c, 0x1, {0x8, 0x49}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7ff, 0xc73}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xd1e7, 0x5}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xcaa3, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xfffffffc}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xa1ae}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1, 0x8}}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0xc8}}, 0x0) 05:04:21 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x68000000}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() [ 1539.122169][ T4733] REISERFS warning (device loop1): sh-2021 reiserfs_fill_super: can not find reiserfs on loop1 05:04:21 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x68010000}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() [ 1539.278142][ T4752] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 05:04:21 executing program 2: syz_mount_image$cramfs(0x0, 0x0, 0x0, 0x0, &(0x7f0000000140), 0x0, 0x0) 05:04:21 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x8a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB="94000000000401030000000000000000000000007d39391a8bdf079f9f495a1fda171e3158f5c79ff5a4dfa267f9065b81eaa585529b1ed154c2e4de9fc975eb2bc712fe039df1a80dfb5986112b3f864dd6be18f185f6af53a91ef29a364869c075e208738464d03e023ce658bc45e51d0cd92f13dd19bed44b18c890ed907be58e2f0bcb02e3c1edb68f44d0d2c95d075a7ceddb3c8a0b063f62856a88e3e03f757467a06cf67105344eb3831130485e90b0e7d8317b2cdf3de6ff9b2c0307dc8d02d485923047d57b31d22a61abcc56"], 0x14}}, 0x0) r2 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x100000, 0x0) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000600)={0xc0, 0x464, 0x20, 0x70bd2b, 0x25dfdbff, "973f9703e43681c987947af3c1c8083de32ea8c59e17bb66fa1131bb71f62feb9d0e2d30dd5e0b3412958e5fe0cceec4126aac730f0637bbd5800c45a7540643c9c2c37aec0fd2421ecaab72641bc72be3958a965740c910b05431206b3784e1f84519555df72fc585d1fe8bc9c7edb156ad0efe2e5af3837edfddc3b7b14e00cda27aef1b0cbdee00e73a16858db80462c0721e260eb71762c36d071ce2212930ef26fbad80c57ca5f20663efbd6221", ["", "", ""]}, 0xc0}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000000) fcntl$setstatus(r2, 0x4, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x100) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x48, 0x80, 0x3f, 0x1, 0x0, 0xc4, 0x4, 0x5, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f00000004c0)}, 0x880, 0x8, 0x4, 0x222db880e1fb0bed, 0x9, 0x8228, 0x3, 0x0, 0xfffffff8, 0x0, 0x7f}, 0xffffffffffffffff, 0x10, r0, 0xa) r4 = open(&(0x7f0000000140)='./file0\x00', 0x501400, 0x1e2) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x40, 0x9, 0x7, 0xf4, 0x0, 0x6, 0x8002, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f00000000c0), 0xe}, 0x800, 0x935, 0x2, 0x3, 0xc23, 0xff, 0x7, 0x0, 0x8, 0x0, 0x6}, 0x0, 0x0, r4, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000840)={'veth0_macvtap\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) writev(r3, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) mount$9p_rdma(&(0x7f0000000880), &(0x7f0000000200)='./file0\x00', &(0x7f0000000580), 0x12288b8, &(0x7f0000000a00)=ANY=[]) socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8936, &(0x7f0000000080)={@ipv4={'\x00', '\xff\xff', @empty}, 0x43, r6}) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=@newlink={0xc8, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x242b8, 0x42a0a}, [@IFLA_LINKINFO={0x98, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x88, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_INGRESS_QOS={0x70, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x200004, 0x1f}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7, 0x10001}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3fc, 0x39e4}}, @IFLA_VLAN_QOS_MAPPING={0x2c, 0x1, {0x8, 0x49}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7ff, 0xc73}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xd1e7, 0x5}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xcaa3, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xfffffffc}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xa1ae}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1, 0x8}}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0xc8}}, 0x0) 05:04:21 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {0x801}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:04:21 executing program 1: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000002640), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000002880), r0) 05:04:21 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x6c000000}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:04:21 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0xa4020000}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000033c0)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x84) openat$cgroup_freezer_state(r1, &(0x7f0000000ec0), 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000f00)='cpuacct.usage_sys\x00', 0x0, 0x0) tkill(0x0, 0x34) prlimit64(0x0, 0x0, &(0x7f0000000380)={0x3, 0x6}, &(0x7f00000003c0)) [ 1539.653528][ T4788] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 05:04:22 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {0xc00}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:04:22 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000800), 0x0, 0x0) ioctl$EVIOCGLED(r0, 0x80404519, &(0x7f0000000840)=""/234) 05:04:22 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0xa9030000}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000033c0)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x84) openat$cgroup_freezer_state(r1, &(0x7f0000000ec0), 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000f00)='cpuacct.usage_sys\x00', 0x0, 0x0) tkill(0x0, 0x34) prlimit64(0x0, 0x0, &(0x7f0000000380)={0x3, 0x6}, &(0x7f00000003c0)) 05:04:22 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x74000000}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:04:22 executing program 1: sendto$l2tp6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 05:04:22 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x8a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB="94000000000401030000000000000000000000007d39391a8bdf079f9f495a1fda171e3158f5c79ff5a4dfa267f9065b81eaa585529b1ed154c2e4de9fc975eb2bc712fe039df1a80dfb5986112b3f864dd6be18f185f6af53a91ef29a364869c075e208738464d03e023ce658bc45e51d0cd92f13dd19bed44b18c890ed907be58e2f0bcb02e3c1edb68f44d0d2c95d075a7ceddb3c8a0b063f62856a88e3e03f757467a06cf67105344eb3831130485e90b0e7d8317b2cdf3de6ff9b2c0307dc8d02d485923047d57b31d22a61abcc56"], 0x14}}, 0x0) r2 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x100000, 0x0) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000600)={0xc0, 0x464, 0x20, 0x70bd2b, 0x25dfdbff, "973f9703e43681c987947af3c1c8083de32ea8c59e17bb66fa1131bb71f62feb9d0e2d30dd5e0b3412958e5fe0cceec4126aac730f0637bbd5800c45a7540643c9c2c37aec0fd2421ecaab72641bc72be3958a965740c910b05431206b3784e1f84519555df72fc585d1fe8bc9c7edb156ad0efe2e5af3837edfddc3b7b14e00cda27aef1b0cbdee00e73a16858db80462c0721e260eb71762c36d071ce2212930ef26fbad80c57ca5f20663efbd6221", ["", "", ""]}, 0xc0}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000000) fcntl$setstatus(r2, 0x4, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x100) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x48, 0x80, 0x3f, 0x1, 0x0, 0xc4, 0x4, 0x5, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f00000004c0)}, 0x880, 0x8, 0x4, 0x222db880e1fb0bed, 0x9, 0x8228, 0x3, 0x0, 0xfffffff8, 0x0, 0x7f}, 0xffffffffffffffff, 0x10, r0, 0xa) r4 = open(&(0x7f0000000140)='./file0\x00', 0x501400, 0x1e2) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x40, 0x9, 0x7, 0xf4, 0x0, 0x6, 0x8002, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f00000000c0), 0xe}, 0x800, 0x935, 0x2, 0x3, 0xc23, 0xff, 0x7, 0x0, 0x8, 0x0, 0x6}, 0x0, 0x0, r4, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000840)={'veth0_macvtap\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) writev(r3, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) mount$9p_rdma(&(0x7f0000000880), &(0x7f0000000200)='./file0\x00', &(0x7f0000000580), 0x12288b8, &(0x7f0000000a00)=ANY=[]) socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8936, &(0x7f0000000080)={@ipv4={'\x00', '\xff\xff', @empty}, 0x43, r6}) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=@newlink={0xc8, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x242b8, 0x42a0a}, [@IFLA_LINKINFO={0x98, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x88, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_INGRESS_QOS={0x70, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x200004, 0x1f}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7, 0x10001}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3fc, 0x39e4}}, @IFLA_VLAN_QOS_MAPPING={0x2c, 0x1, {0x8, 0x49}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7ff, 0xc73}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xd1e7, 0x5}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xcaa3, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xfffffffc}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xa1ae}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1, 0x8}}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0xc8}}, 0x0) 05:04:22 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {0x1100}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:04:22 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0xac020000}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000033c0)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x84) openat$cgroup_freezer_state(r1, &(0x7f0000000ec0), 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000f00)='cpuacct.usage_sys\x00', 0x0, 0x0) tkill(0x0, 0x34) prlimit64(0x0, 0x0, &(0x7f0000000380)={0x3, 0x6}, &(0x7f00000003c0)) 05:04:22 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002400)={0x18, 0xd, &(0x7f00000022c0)=ANY=[@ANYRES32], &(0x7f0000002340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 05:04:22 executing program 2: keyctl$dh_compute(0x17, &(0x7f00000003c0), 0x0, 0x0, &(0x7f0000001500)={0x0, &(0x7f0000000500)="34c6b1610d85c9fedfdce35987df68059cb1a093499444416bc9b0c5402d8c7ea73936054d68aa2a9bf549a21570660b933843696dfc6fdf881d20fb8a7ead855c", 0x41}) 05:04:22 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x7a000000}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() [ 1540.166795][ T4833] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 05:04:22 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {0x1901}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:04:22 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0xc6010000}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000033c0)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x84) openat$cgroup_freezer_state(r1, &(0x7f0000000ec0), 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000f00)='cpuacct.usage_sys\x00', 0x0, 0x0) tkill(0x0, 0x34) prlimit64(0x0, 0x0, &(0x7f0000000380)={0x3, 0x6}, &(0x7f00000003c0)) 05:04:22 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x8a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB="94000000000401030000000000000000000000007d39391a8bdf079f9f495a1fda171e3158f5c79ff5a4dfa267f9065b81eaa585529b1ed154c2e4de9fc975eb2bc712fe039df1a80dfb5986112b3f864dd6be18f185f6af53a91ef29a364869c075e208738464d03e023ce658bc45e51d0cd92f13dd19bed44b18c890ed907be58e2f0bcb02e3c1edb68f44d0d2c95d075a7ceddb3c8a0b063f62856a88e3e03f757467a06cf67105344eb3831130485e90b0e7d8317b2cdf3de6ff9b2c0307dc8d02d485923047d57b31d22a61abcc56"], 0x14}}, 0x0) r2 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x100000, 0x0) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000600)={0xc0, 0x464, 0x20, 0x70bd2b, 0x25dfdbff, "973f9703e43681c987947af3c1c8083de32ea8c59e17bb66fa1131bb71f62feb9d0e2d30dd5e0b3412958e5fe0cceec4126aac730f0637bbd5800c45a7540643c9c2c37aec0fd2421ecaab72641bc72be3958a965740c910b05431206b3784e1f84519555df72fc585d1fe8bc9c7edb156ad0efe2e5af3837edfddc3b7b14e00cda27aef1b0cbdee00e73a16858db80462c0721e260eb71762c36d071ce2212930ef26fbad80c57ca5f20663efbd6221", ["", "", ""]}, 0xc0}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000000) fcntl$setstatus(r2, 0x4, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x100) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x48, 0x80, 0x3f, 0x1, 0x0, 0xc4, 0x4, 0x5, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f00000004c0)}, 0x880, 0x8, 0x4, 0x222db880e1fb0bed, 0x9, 0x8228, 0x3, 0x0, 0xfffffff8, 0x0, 0x7f}, 0xffffffffffffffff, 0x10, r0, 0xa) open(&(0x7f0000000140)='./file0\x00', 0x501400, 0x1e2) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x40, 0x9, 0x7, 0xf4, 0x0, 0x6, 0x8002, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f00000000c0), 0xe}, 0x800, 0x935, 0x2, 0x3, 0xc23, 0xff, 0x7, 0x0, 0x8, 0x0, 0x6}, 0x0, 0x5, 0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000840)={'veth0_macvtap\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @local}, 0x14) writev(r3, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) mount$9p_rdma(&(0x7f0000000880), &(0x7f0000000200)='./file0\x00', &(0x7f0000000580), 0x12288b8, &(0x7f0000000a00)=ANY=[]) socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8936, &(0x7f0000000080)={@ipv4={'\x00', '\xff\xff', @empty}, 0x43, r5}) r6 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=@newlink={0xc8, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x242b8, 0x42a0a}, [@IFLA_LINKINFO={0x98, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x88, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_INGRESS_QOS={0x70, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x200004, 0x1f}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7, 0x10001}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3fc, 0x39e4}}, @IFLA_VLAN_QOS_MAPPING={0x2c, 0x1, {0x8, 0x49}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7ff, 0xc73}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xd1e7, 0x5}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xcaa3, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xfffffffc}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xa1ae}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1, 0x8}}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8}]}, 0xc8}}, 0x0) 05:04:22 executing program 1: syz_mount_image$reiserfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000001980)=[{&(0x7f0000001740)="a7", 0x1}, {&(0x7f00000017c0)="f4", 0x1}], 0x0, 0x0) 05:04:22 executing program 2: perf_event_open(&(0x7f0000000900)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:04:23 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x88000000}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:04:23 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {0x2900}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:04:23 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x8a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB="94000000000401030000000000000000000000007d39391a8bdf079f9f495a1fda171e3158f5c79ff5a4dfa267f9065b81eaa585529b1ed154c2e4de9fc975eb2bc712fe039df1a80dfb5986112b3f864dd6be18f185f6af53a91ef29a364869c075e208738464d03e023ce658bc45e51d0cd92f13dd19bed44b18c890ed907be58e2f0bcb02e3c1edb68f44d0d2c95d075a7ceddb3c8a0b063f62856a88e3e03f757467a06cf67105344eb3831130485e90b0e7d8317b2cdf3de6ff9b2c0307dc8d02d485923047d57b31d22a61abcc56"], 0x14}}, 0x0) r2 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x100000, 0x0) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000600)={0xc0, 0x464, 0x20, 0x70bd2b, 0x25dfdbff, "973f9703e43681c987947af3c1c8083de32ea8c59e17bb66fa1131bb71f62feb9d0e2d30dd5e0b3412958e5fe0cceec4126aac730f0637bbd5800c45a7540643c9c2c37aec0fd2421ecaab72641bc72be3958a965740c910b05431206b3784e1f84519555df72fc585d1fe8bc9c7edb156ad0efe2e5af3837edfddc3b7b14e00cda27aef1b0cbdee00e73a16858db80462c0721e260eb71762c36d071ce2212930ef26fbad80c57ca5f20663efbd6221", ["", "", ""]}, 0xc0}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000000) fcntl$setstatus(r2, 0x4, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x100) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x48, 0x80, 0x3f, 0x1, 0x0, 0xc4, 0x4, 0x5, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f00000004c0)}, 0x880, 0x8, 0x4, 0x222db880e1fb0bed, 0x9, 0x8228, 0x3, 0x0, 0xfffffff8, 0x0, 0x7f}, 0xffffffffffffffff, 0x10, r0, 0xa) open(&(0x7f0000000140)='./file0\x00', 0x501400, 0x1e2) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x40, 0x9, 0x7, 0xf4, 0x0, 0x6, 0x8002, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f00000000c0), 0xe}, 0x800, 0x935, 0x2, 0x3, 0xc23, 0xff, 0x7, 0x0, 0x8, 0x0, 0x6}, 0x0, 0x5, 0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000840)={'veth0_macvtap\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @local}, 0x14) writev(r3, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) mount$9p_rdma(&(0x7f0000000880), &(0x7f0000000200)='./file0\x00', &(0x7f0000000580), 0x12288b8, &(0x7f0000000a00)=ANY=[]) socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8936, &(0x7f0000000080)={@ipv4={'\x00', '\xff\xff', @empty}, 0x43, r5}) r6 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=@newlink={0xc8, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x242b8, 0x42a0a}, [@IFLA_LINKINFO={0x98, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x88, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_INGRESS_QOS={0x70, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x200004, 0x1f}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7, 0x10001}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3fc, 0x39e4}}, @IFLA_VLAN_QOS_MAPPING={0x2c, 0x1, {0x8, 0x49}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7ff, 0xc73}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xd1e7, 0x5}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xcaa3, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xfffffffc}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xa1ae}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1, 0x8}}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8}]}, 0xc8}}, 0x0) 05:04:23 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0xc9010000}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000033c0)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x84) openat$cgroup_freezer_state(r1, &(0x7f0000000ec0), 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000f00)='cpuacct.usage_sys\x00', 0x0, 0x0) tkill(0x0, 0x34) prlimit64(0x0, 0x0, &(0x7f0000000380)={0x3, 0x6}, &(0x7f00000003c0)) 05:04:23 executing program 2: syz_mount_image$romfs(0x0, 0x0, 0x0, 0x3, &(0x7f0000000500)=[{&(0x7f0000000300)="f2", 0x1}, {&(0x7f00000003c0)="f4", 0x1}, {&(0x7f0000000440)='8', 0x1}], 0x0, 0x0) 05:04:23 executing program 1: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000500)='ns/time\x00') [ 1540.851017][ T4900] set_target_v0_checkentry: 43 callbacks suppressed [ 1540.851056][ T4900] Cannot find add_set index 0 as target [ 1540.879781][ T4905] Cannot find add_set index 0 as target 05:04:23 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {0x3800}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() [ 1540.951851][ T4915] Cannot find add_set index 0 as target 05:04:23 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x8a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB="94000000000401030000000000000000000000007d39391a8bdf079f9f495a1fda171e3158f5c79ff5a4dfa267f9065b81eaa585529b1ed154c2e4de9fc975eb2bc712fe039df1a80dfb5986112b3f864dd6be18f185f6af53a91ef29a364869c075e208738464d03e023ce658bc45e51d0cd92f13dd19bed44b18c890ed907be58e2f0bcb02e3c1edb68f44d0d2c95d075a7ceddb3c8a0b063f62856a88e3e03f757467a06cf67105344eb3831130485e90b0e7d8317b2cdf3de6ff9b2c0307dc8d02d485923047d57b31d22a61abcc56"], 0x14}}, 0x0) r2 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x100000, 0x0) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000600)={0xc0, 0x464, 0x20, 0x70bd2b, 0x25dfdbff, "973f9703e43681c987947af3c1c8083de32ea8c59e17bb66fa1131bb71f62feb9d0e2d30dd5e0b3412958e5fe0cceec4126aac730f0637bbd5800c45a7540643c9c2c37aec0fd2421ecaab72641bc72be3958a965740c910b05431206b3784e1f84519555df72fc585d1fe8bc9c7edb156ad0efe2e5af3837edfddc3b7b14e00cda27aef1b0cbdee00e73a16858db80462c0721e260eb71762c36d071ce2212930ef26fbad80c57ca5f20663efbd6221", ["", "", ""]}, 0xc0}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000000) fcntl$setstatus(r2, 0x4, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x100) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x48, 0x80, 0x3f, 0x1, 0x0, 0xc4, 0x4, 0x5, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f00000004c0)}, 0x880, 0x8, 0x4, 0x222db880e1fb0bed, 0x9, 0x8228, 0x3, 0x0, 0xfffffff8, 0x0, 0x7f}, 0xffffffffffffffff, 0x10, r0, 0xa) open(&(0x7f0000000140)='./file0\x00', 0x501400, 0x1e2) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x40, 0x9, 0x7, 0xf4, 0x0, 0x6, 0x8002, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f00000000c0), 0xe}, 0x800, 0x935, 0x2, 0x3, 0xc23, 0xff, 0x7, 0x0, 0x8, 0x0, 0x6}, 0x0, 0x5, 0xffffffffffffffff, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000840)={'veth0_macvtap\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @local}, 0x14) writev(r3, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) mount$9p_rdma(&(0x7f0000000880), &(0x7f0000000200)='./file0\x00', &(0x7f0000000580), 0x12288b8, &(0x7f0000000a00)=ANY=[]) socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8936, &(0x7f0000000080)={@ipv4={'\x00', '\xff\xff', @empty}, 0x43, r5}) r6 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=@newlink={0xc8, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x242b8, 0x42a0a}, [@IFLA_LINKINFO={0x98, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x88, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_INGRESS_QOS={0x70, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x200004, 0x1f}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7, 0x10001}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3fc, 0x39e4}}, @IFLA_VLAN_QOS_MAPPING={0x2c, 0x1, {0x8, 0x49}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7ff, 0xc73}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xd1e7, 0x5}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xcaa3, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xfffffffc}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xa1ae}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1, 0x8}}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8}]}, 0xc8}}, 0x0) [ 1541.008960][ T4917] Cannot find add_set index 0 as target 05:04:23 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0xc9020000}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000033c0)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x84) openat$cgroup_freezer_state(r1, &(0x7f0000000ec0), 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000f00)='cpuacct.usage_sys\x00', 0x0, 0x0) tkill(0x0, 0x34) prlimit64(0x0, 0x0, &(0x7f0000000380)={0x3, 0x6}, &(0x7f00000003c0)) 05:04:23 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {0x4c01}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() [ 1541.139286][ T4928] Cannot find add_set index 0 as target 05:04:23 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x88020000}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:04:23 executing program 2: keyctl$dh_compute(0x17, &(0x7f00000003c0), &(0x7f0000000400)=""/186, 0xba, 0x0) [ 1541.268162][ T4941] Cannot find add_set index 0 as target 05:04:23 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0xd5020000}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000033c0)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x84) openat$cgroup_freezer_state(r1, &(0x7f0000000ec0), 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000f00)='cpuacct.usage_sys\x00', 0x0, 0x0) tkill(0x0, 0x34) prlimit64(0x0, 0x0, &(0x7f0000000380)={0x3, 0x6}, &(0x7f00000003c0)) 05:04:23 executing program 1: syz_open_dev$sg(&(0x7f0000000680), 0x100, 0x0) 05:04:23 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x91010000}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() [ 1541.353288][ T4948] __nla_validate_parse: 2 callbacks suppressed [ 1541.353307][ T4948] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1541.372895][ T4957] Cannot find add_set index 0 as target 05:04:23 executing program 2: openat$nullb(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) [ 1541.501543][ T4964] Cannot find add_set index 0 as target 05:04:23 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {0x6001}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:04:23 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x8a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB="94000000000401030000000000000000000000007d39391a8bdf079f9f495a1fda171e3158f5c79ff5a4dfa267f9065b81eaa585529b1ed154c2e4de9fc975eb2bc712fe039df1a80dfb5986112b3f864dd6be18f185f6af53a91ef29a364869c075e208738464d03e023ce658bc45e51d0cd92f13dd19bed44b18c890ed907be58e2f0bcb02e3c1edb68f44d0d2c95d075a7ceddb3c8a0b063f62856a88e3e03f757467a06cf67105344eb3831130485e90b0e7d8317b2cdf3de6ff9b2c0307dc8d02d485923047d57b31d22a61abcc56"], 0x14}}, 0x0) r2 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x100000, 0x0) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000600)={0xc0, 0x464, 0x20, 0x70bd2b, 0x25dfdbff, "973f9703e43681c987947af3c1c8083de32ea8c59e17bb66fa1131bb71f62feb9d0e2d30dd5e0b3412958e5fe0cceec4126aac730f0637bbd5800c45a7540643c9c2c37aec0fd2421ecaab72641bc72be3958a965740c910b05431206b3784e1f84519555df72fc585d1fe8bc9c7edb156ad0efe2e5af3837edfddc3b7b14e00cda27aef1b0cbdee00e73a16858db80462c0721e260eb71762c36d071ce2212930ef26fbad80c57ca5f20663efbd6221", ["", "", ""]}, 0xc0}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000000) fcntl$setstatus(r2, 0x4, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x100) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x48, 0x80, 0x3f, 0x1, 0x0, 0xc4, 0x4, 0x5, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f00000004c0)}, 0x880, 0x8, 0x4, 0x222db880e1fb0bed, 0x9, 0x8228, 0x3, 0x0, 0xfffffff8, 0x0, 0x7f}, 0xffffffffffffffff, 0x10, r0, 0xa) r4 = open(&(0x7f0000000140)='./file0\x00', 0x501400, 0x1e2) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x40, 0x9, 0x7, 0xf4, 0x0, 0x6, 0x8002, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f00000000c0), 0xe}, 0x800, 0x935, 0x2, 0x3, 0xc23, 0xff, 0x7, 0x0, 0x8, 0x0, 0x6}, 0x0, 0x5, r4, 0x0) r5 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000840)={'veth0_macvtap\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) writev(r3, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) mount$9p_rdma(&(0x7f0000000880), &(0x7f0000000200)='./file0\x00', &(0x7f0000000580), 0x12288b8, &(0x7f0000000a00)=ANY=[]) socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8936, &(0x7f0000000080)={@ipv4={'\x00', '\xff\xff', @empty}, 0x43, r6}) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=@newlink={0xc8, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x242b8, 0x42a0a}, [@IFLA_LINKINFO={0x98, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x88, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_INGRESS_QOS={0x70, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x200004, 0x1f}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7, 0x10001}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3fc, 0x39e4}}, @IFLA_VLAN_QOS_MAPPING={0x2c, 0x1, {0x8, 0x49}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7ff, 0xc73}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xd1e7, 0x5}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xcaa3, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xfffffffc}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xa1ae}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1, 0x8}}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0xc8}}, 0x0) [ 1541.584283][ T4972] Cannot find add_set index 0 as target 05:04:24 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x9c000000}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:04:24 executing program 1: syz_mount_image$msdos(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$adfs(0x0, &(0x7f0000001d00)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 05:04:24 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0xf8030000}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000033c0)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x84) openat$cgroup_freezer_state(r1, &(0x7f0000000ec0), 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000f00)='cpuacct.usage_sys\x00', 0x0, 0x0) tkill(0x0, 0x34) prlimit64(0x0, 0x0, &(0x7f0000000380)={0x3, 0x6}, &(0x7f00000003c0)) [ 1541.713339][ T4974] Cannot find add_set index 0 as target [ 1541.799442][ T4986] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 05:04:24 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000180)) 05:04:24 executing program 1: openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) 05:04:24 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x8a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB="94000000000401030000000000000000000000007d39391a8bdf079f9f495a1fda171e3158f5c79ff5a4dfa267f9065b81eaa585529b1ed154c2e4de9fc975eb2bc712fe039df1a80dfb5986112b3f864dd6be18f185f6af53a91ef29a364869c075e208738464d03e023ce658bc45e51d0cd92f13dd19bed44b18c890ed907be58e2f0bcb02e3c1edb68f44d0d2c95d075a7ceddb3c8a0b063f62856a88e3e03f757467a06cf67105344eb3831130485e90b0e7d8317b2cdf3de6ff9b2c0307dc8d02d485923047d57b31d22a61abcc56"], 0x14}}, 0x0) r2 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x100000, 0x0) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000600)={0xc0, 0x464, 0x20, 0x70bd2b, 0x25dfdbff, "973f9703e43681c987947af3c1c8083de32ea8c59e17bb66fa1131bb71f62feb9d0e2d30dd5e0b3412958e5fe0cceec4126aac730f0637bbd5800c45a7540643c9c2c37aec0fd2421ecaab72641bc72be3958a965740c910b05431206b3784e1f84519555df72fc585d1fe8bc9c7edb156ad0efe2e5af3837edfddc3b7b14e00cda27aef1b0cbdee00e73a16858db80462c0721e260eb71762c36d071ce2212930ef26fbad80c57ca5f20663efbd6221", ["", "", ""]}, 0xc0}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000000) fcntl$setstatus(r2, 0x4, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x100) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x48, 0x80, 0x3f, 0x1, 0x0, 0xc4, 0x4, 0x5, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f00000004c0)}, 0x880, 0x8, 0x4, 0x222db880e1fb0bed, 0x9, 0x8228, 0x3, 0x0, 0xfffffff8, 0x0, 0x7f}, 0xffffffffffffffff, 0x10, r0, 0xa) r4 = open(&(0x7f0000000140)='./file0\x00', 0x501400, 0x1e2) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x40, 0x9, 0x7, 0xf4, 0x0, 0x6, 0x8002, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f00000000c0), 0xe}, 0x800, 0x935, 0x2, 0x3, 0xc23, 0xff, 0x7, 0x0, 0x8, 0x0, 0x6}, 0x0, 0x5, r4, 0x0) r5 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000840)={'veth0_macvtap\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) writev(r3, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) mount$9p_rdma(&(0x7f0000000880), &(0x7f0000000200)='./file0\x00', &(0x7f0000000580), 0x12288b8, &(0x7f0000000a00)=ANY=[]) socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8936, &(0x7f0000000080)={@ipv4={'\x00', '\xff\xff', @empty}, 0x43, r6}) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=@newlink={0xc8, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x242b8, 0x42a0a}, [@IFLA_LINKINFO={0x98, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x88, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_INGRESS_QOS={0x70, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x200004, 0x1f}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7, 0x10001}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3fc, 0x39e4}}, @IFLA_VLAN_QOS_MAPPING={0x2c, 0x1, {0x8, 0x49}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7ff, 0xc73}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xd1e7, 0x5}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xcaa3, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xfffffffc}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xa1ae}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1, 0x8}}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0xc8}}, 0x0) 05:04:24 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0xfb000000}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000033c0)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x84) openat$cgroup_freezer_state(r1, &(0x7f0000000ec0), 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000f00)='cpuacct.usage_sys\x00', 0x0, 0x0) tkill(0x0, 0x34) prlimit64(0x0, 0x0, &(0x7f0000000380)={0x3, 0x6}, &(0x7f00000003c0)) 05:04:24 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x9d010000}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:04:24 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {0x6502}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() [ 1542.092954][ T5004] MTD: Attempt to mount non-MTD device "/dev/loop2" [ 1542.149909][ T5013] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1542.150859][ T5004] cramfs: wrong magic 05:04:24 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x9d020000}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:04:24 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0xfd010000}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000033c0)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x84) openat$cgroup_freezer_state(r1, &(0x7f0000000ec0), 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000f00)='cpuacct.usage_sys\x00', 0x0, 0x0) tkill(0x0, 0x34) prlimit64(0x0, 0x0, &(0x7f0000000380)={0x3, 0x6}, &(0x7f00000003c0)) 05:04:24 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000003e40)={0x0, 0x0, &(0x7f0000003e00)={0x0}}, 0x0) 05:04:24 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {0x6801}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() [ 1542.343073][ T5004] MTD: Attempt to mount non-MTD device "/dev/loop2" 05:04:24 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x8a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB="94000000000401030000000000000000000000007d39391a8bdf079f9f495a1fda171e3158f5c79ff5a4dfa267f9065b81eaa585529b1ed154c2e4de9fc975eb2bc712fe039df1a80dfb5986112b3f864dd6be18f185f6af53a91ef29a364869c075e208738464d03e023ce658bc45e51d0cd92f13dd19bed44b18c890ed907be58e2f0bcb02e3c1edb68f44d0d2c95d075a7ceddb3c8a0b063f62856a88e3e03f757467a06cf67105344eb3831130485e90b0e7d8317b2cdf3de6ff9b2c0307dc8d02d485923047d57b31d22a61abcc56"], 0x14}}, 0x0) r2 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x100000, 0x0) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000600)={0xc0, 0x464, 0x20, 0x70bd2b, 0x25dfdbff, "973f9703e43681c987947af3c1c8083de32ea8c59e17bb66fa1131bb71f62feb9d0e2d30dd5e0b3412958e5fe0cceec4126aac730f0637bbd5800c45a7540643c9c2c37aec0fd2421ecaab72641bc72be3958a965740c910b05431206b3784e1f84519555df72fc585d1fe8bc9c7edb156ad0efe2e5af3837edfddc3b7b14e00cda27aef1b0cbdee00e73a16858db80462c0721e260eb71762c36d071ce2212930ef26fbad80c57ca5f20663efbd6221", ["", "", ""]}, 0xc0}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000000) fcntl$setstatus(r2, 0x4, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x100) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x48, 0x80, 0x3f, 0x1, 0x0, 0xc4, 0x4, 0x5, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f00000004c0)}, 0x880, 0x8, 0x4, 0x222db880e1fb0bed, 0x9, 0x8228, 0x3, 0x0, 0xfffffff8, 0x0, 0x7f}, 0xffffffffffffffff, 0x10, r0, 0xa) r4 = open(&(0x7f0000000140)='./file0\x00', 0x501400, 0x1e2) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x40, 0x9, 0x7, 0xf4, 0x0, 0x6, 0x8002, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f00000000c0), 0xe}, 0x800, 0x935, 0x2, 0x3, 0xc23, 0xff, 0x7, 0x0, 0x8, 0x0, 0x6}, 0x0, 0x5, r4, 0x0) r5 = socket$packet(0x11, 0x0, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000840)={'veth0_macvtap\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) writev(r3, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) mount$9p_rdma(&(0x7f0000000880), &(0x7f0000000200)='./file0\x00', &(0x7f0000000580), 0x12288b8, &(0x7f0000000a00)=ANY=[]) socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8936, &(0x7f0000000080)={@ipv4={'\x00', '\xff\xff', @empty}, 0x43, r6}) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=@newlink={0xc8, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x242b8, 0x42a0a}, [@IFLA_LINKINFO={0x98, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x88, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_INGRESS_QOS={0x70, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x200004, 0x1f}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7, 0x10001}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3fc, 0x39e4}}, @IFLA_VLAN_QOS_MAPPING={0x2c, 0x1, {0x8, 0x49}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7ff, 0xc73}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xd1e7, 0x5}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xcaa3, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xfffffffc}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xa1ae}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1, 0x8}}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0xc8}}, 0x0) [ 1542.395016][ T5004] cramfs: wrong magic [ 1542.513650][ T5046] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 05:04:25 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {0x8800}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:04:25 executing program 2: openat$nullb(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, &(0x7f0000000040)) 05:04:25 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0xffffe000}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000033c0)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x84) openat$cgroup_freezer_state(r1, &(0x7f0000000ec0), 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000f00)='cpuacct.usage_sys\x00', 0x0, 0x0) tkill(0x0, 0x34) prlimit64(0x0, 0x0, &(0x7f0000000380)={0x3, 0x6}, &(0x7f00000003c0)) 05:04:25 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_VLAN(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={0x0, 0x34}}, 0x0) 05:04:25 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x8a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB="94000000000401030000000000000000000000007d39391a8bdf079f9f495a1fda171e3158f5c79ff5a4dfa267f9065b81eaa585529b1ed154c2e4de9fc975eb2bc712fe039df1a80dfb5986112b3f864dd6be18f185f6af53a91ef29a364869c075e208738464d03e023ce658bc45e51d0cd92f13dd19bed44b18c890ed907be58e2f0bcb02e3c1edb68f44d0d2c95d075a7ceddb3c8a0b063f62856a88e3e03f757467a06cf67105344eb3831130485e90b0e7d8317b2cdf3de6ff9b2c0307dc8d02d485923047d57b31d22a61abcc56"], 0x14}}, 0x0) r2 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x100000, 0x0) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000600)={0xc0, 0x464, 0x20, 0x70bd2b, 0x25dfdbff, "973f9703e43681c987947af3c1c8083de32ea8c59e17bb66fa1131bb71f62feb9d0e2d30dd5e0b3412958e5fe0cceec4126aac730f0637bbd5800c45a7540643c9c2c37aec0fd2421ecaab72641bc72be3958a965740c910b05431206b3784e1f84519555df72fc585d1fe8bc9c7edb156ad0efe2e5af3837edfddc3b7b14e00cda27aef1b0cbdee00e73a16858db80462c0721e260eb71762c36d071ce2212930ef26fbad80c57ca5f20663efbd6221", ["", "", ""]}, 0xc0}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000000) fcntl$setstatus(r2, 0x4, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x100) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x48, 0x80, 0x3f, 0x1, 0x0, 0xc4, 0x4, 0x5, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f00000004c0)}, 0x880, 0x8, 0x4, 0x222db880e1fb0bed, 0x9, 0x8228, 0x3, 0x0, 0xfffffff8, 0x0, 0x7f}, 0xffffffffffffffff, 0x10, r0, 0xa) r4 = open(&(0x7f0000000140)='./file0\x00', 0x501400, 0x1e2) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x40, 0x9, 0x7, 0xf4, 0x0, 0x6, 0x8002, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f00000000c0), 0xe}, 0x800, 0x935, 0x2, 0x3, 0xc23, 0xff, 0x7, 0x0, 0x8, 0x0, 0x6}, 0x0, 0x5, r4, 0x0) socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000840)={'veth0_macvtap\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @local}, 0x14) writev(r3, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) mount$9p_rdma(&(0x7f0000000880), &(0x7f0000000200)='./file0\x00', &(0x7f0000000580), 0x12288b8, &(0x7f0000000a00)=ANY=[]) socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8936, &(0x7f0000000080)={@ipv4={'\x00', '\xff\xff', @empty}, 0x43, r5}) r6 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=@newlink={0xc8, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x242b8, 0x42a0a}, [@IFLA_LINKINFO={0x98, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x88, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_INGRESS_QOS={0x70, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x200004, 0x1f}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7, 0x10001}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3fc, 0x39e4}}, @IFLA_VLAN_QOS_MAPPING={0x2c, 0x1, {0x8, 0x49}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7ff, 0xc73}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xd1e7, 0x5}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xcaa3, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xfffffffc}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xa1ae}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1, 0x8}}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8}]}, 0xc8}}, 0x0) 05:04:25 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0xa4020000}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:04:25 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {0x8802}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:04:25 executing program 1: socket$rxrpc(0x21, 0x2, 0xa) openat2(0xffffffffffffffff, 0x0, &(0x7f0000000840)={0x0, 0x80}, 0x18) 05:04:25 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x1000000000000}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000033c0)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x84) openat$cgroup_freezer_state(r1, &(0x7f0000000ec0), 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000f00)='cpuacct.usage_sys\x00', 0x0, 0x0) tkill(0x0, 0x34) prlimit64(0x0, 0x0, &(0x7f0000000380)={0x3, 0x6}, &(0x7f00000003c0)) 05:04:25 executing program 2: syz_open_dev$dri(&(0x7f0000000000), 0x9, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) syz_open_dev$loop(&(0x7f0000000280), 0x0, 0xa901) openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/module/dvb_usb_ce6230', 0x10040, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000340), 0xffffffffffffffff) [ 1542.978438][ T5082] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 05:04:25 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0xa9030000}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:04:25 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {0x9101}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:04:25 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x8a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB="94000000000401030000000000000000000000007d39391a8bdf079f9f495a1fda171e3158f5c79ff5a4dfa267f9065b81eaa585529b1ed154c2e4de9fc975eb2bc712fe039df1a80dfb5986112b3f864dd6be18f185f6af53a91ef29a364869c075e208738464d03e023ce658bc45e51d0cd92f13dd19bed44b18c890ed907be58e2f0bcb02e3c1edb68f44d0d2c95d075a7ceddb3c8a0b063f62856a88e3e03f757467a06cf67105344eb3831130485e90b0e7d8317b2cdf3de6ff9b2c0307dc8d02d485923047d57b31d22a61abcc56"], 0x14}}, 0x0) r2 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x100000, 0x0) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000600)={0xc0, 0x464, 0x20, 0x70bd2b, 0x25dfdbff, "973f9703e43681c987947af3c1c8083de32ea8c59e17bb66fa1131bb71f62feb9d0e2d30dd5e0b3412958e5fe0cceec4126aac730f0637bbd5800c45a7540643c9c2c37aec0fd2421ecaab72641bc72be3958a965740c910b05431206b3784e1f84519555df72fc585d1fe8bc9c7edb156ad0efe2e5af3837edfddc3b7b14e00cda27aef1b0cbdee00e73a16858db80462c0721e260eb71762c36d071ce2212930ef26fbad80c57ca5f20663efbd6221", ["", "", ""]}, 0xc0}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000000) fcntl$setstatus(r2, 0x4, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x100) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x48, 0x80, 0x3f, 0x1, 0x0, 0xc4, 0x4, 0x5, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f00000004c0)}, 0x880, 0x8, 0x4, 0x222db880e1fb0bed, 0x9, 0x8228, 0x3, 0x0, 0xfffffff8, 0x0, 0x7f}, 0xffffffffffffffff, 0x10, r0, 0xa) r4 = open(&(0x7f0000000140)='./file0\x00', 0x501400, 0x1e2) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x40, 0x9, 0x7, 0xf4, 0x0, 0x6, 0x8002, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f00000000c0), 0xe}, 0x800, 0x935, 0x2, 0x3, 0xc23, 0xff, 0x7, 0x0, 0x8, 0x0, 0x6}, 0x0, 0x5, r4, 0x0) socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000840)={'veth0_macvtap\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @local}, 0x14) writev(r3, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) mount$9p_rdma(&(0x7f0000000880), &(0x7f0000000200)='./file0\x00', &(0x7f0000000580), 0x12288b8, &(0x7f0000000a00)=ANY=[]) socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8936, &(0x7f0000000080)={@ipv4={'\x00', '\xff\xff', @empty}, 0x43, r5}) r6 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=@newlink={0xc8, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x242b8, 0x42a0a}, [@IFLA_LINKINFO={0x98, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x88, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_INGRESS_QOS={0x70, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x200004, 0x1f}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7, 0x10001}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3fc, 0x39e4}}, @IFLA_VLAN_QOS_MAPPING={0x2c, 0x1, {0x8, 0x49}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7ff, 0xc73}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xd1e7, 0x5}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xcaa3, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xfffffffc}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xa1ae}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1, 0x8}}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8}]}, 0xc8}}, 0x0) 05:04:25 executing program 1: syz_mount_image$romfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x1, &(0x7f0000000500)=[{0x0, 0x0, 0xffffffff}], 0x0, &(0x7f0000000180)) 05:04:25 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x2000000000000}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000033c0)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x84) openat$cgroup_freezer_state(r1, &(0x7f0000000ec0), 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000f00)='cpuacct.usage_sys\x00', 0x0, 0x0) tkill(0x0, 0x34) prlimit64(0x0, 0x0, &(0x7f0000000380)={0x3, 0x6}, &(0x7f00000003c0)) 05:04:25 executing program 2: r0 = socket$l2tp6(0xa, 0x2, 0x73) sendto$l2tp6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x0, @private0, 0x3ff}, 0x20) [ 1543.342144][ T5110] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1543.370767][ T5113] loop1: detected capacity change from 0 to 264192 05:04:25 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {0x9c00}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() [ 1543.428749][ T5113] MTD: Attempt to mount non-MTD device "/dev/loop1" 05:04:25 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x4000000000000}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000033c0)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x84) openat$cgroup_freezer_state(r1, &(0x7f0000000ec0), 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000f00)='cpuacct.usage_sys\x00', 0x0, 0x0) tkill(0x0, 0x34) prlimit64(0x0, 0x0, &(0x7f0000000380)={0x3, 0x6}, &(0x7f00000003c0)) 05:04:25 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0xac020000}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:04:25 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x8a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB="94000000000401030000000000000000000000007d39391a8bdf079f9f495a1fda171e3158f5c79ff5a4dfa267f9065b81eaa585529b1ed154c2e4de9fc975eb2bc712fe039df1a80dfb5986112b3f864dd6be18f185f6af53a91ef29a364869c075e208738464d03e023ce658bc45e51d0cd92f13dd19bed44b18c890ed907be58e2f0bcb02e3c1edb68f44d0d2c95d075a7ceddb3c8a0b063f62856a88e3e03f757467a06cf67105344eb3831130485e90b0e7d8317b2cdf3de6ff9b2c0307dc8d02d485923047d57b31d22a61abcc56"], 0x14}}, 0x0) r2 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x100000, 0x0) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000600)={0xc0, 0x464, 0x20, 0x70bd2b, 0x25dfdbff, "973f9703e43681c987947af3c1c8083de32ea8c59e17bb66fa1131bb71f62feb9d0e2d30dd5e0b3412958e5fe0cceec4126aac730f0637bbd5800c45a7540643c9c2c37aec0fd2421ecaab72641bc72be3958a965740c910b05431206b3784e1f84519555df72fc585d1fe8bc9c7edb156ad0efe2e5af3837edfddc3b7b14e00cda27aef1b0cbdee00e73a16858db80462c0721e260eb71762c36d071ce2212930ef26fbad80c57ca5f20663efbd6221", ["", "", ""]}, 0xc0}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000000) fcntl$setstatus(r2, 0x4, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x100) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x48, 0x80, 0x3f, 0x1, 0x0, 0xc4, 0x4, 0x5, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f00000004c0)}, 0x880, 0x8, 0x4, 0x222db880e1fb0bed, 0x9, 0x8228, 0x3, 0x0, 0xfffffff8, 0x0, 0x7f}, 0xffffffffffffffff, 0x10, r0, 0xa) r4 = open(&(0x7f0000000140)='./file0\x00', 0x501400, 0x1e2) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x40, 0x9, 0x7, 0xf4, 0x0, 0x6, 0x8002, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f00000000c0), 0xe}, 0x800, 0x935, 0x2, 0x3, 0xc23, 0xff, 0x7, 0x0, 0x8, 0x0, 0x6}, 0x0, 0x5, r4, 0x0) socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000840)={'veth0_macvtap\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @local}, 0x14) writev(r3, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) mount$9p_rdma(&(0x7f0000000880), &(0x7f0000000200)='./file0\x00', &(0x7f0000000580), 0x12288b8, &(0x7f0000000a00)=ANY=[]) socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8936, &(0x7f0000000080)={@ipv4={'\x00', '\xff\xff', @empty}, 0x43, r5}) r6 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=@newlink={0xc8, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x242b8, 0x42a0a}, [@IFLA_LINKINFO={0x98, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x88, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_INGRESS_QOS={0x70, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x200004, 0x1f}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7, 0x10001}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3fc, 0x39e4}}, @IFLA_VLAN_QOS_MAPPING={0x2c, 0x1, {0x8, 0x49}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7ff, 0xc73}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xd1e7, 0x5}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xcaa3, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xfffffffc}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xa1ae}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1, 0x8}}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8}]}, 0xc8}}, 0x0) [ 1543.546346][ T5113] VFS: Can't find a romfs filesystem on dev loop1. [ 1543.546346][ T5113] 05:04:26 executing program 2: bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x7) 05:04:26 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {0x9d01}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() [ 1543.716208][ T5113] loop1: detected capacity change from 0 to 264192 [ 1543.782099][ T5113] MTD: Attempt to mount non-MTD device "/dev/loop1" [ 1543.901594][ T5113] VFS: Can't find a romfs filesystem on dev loop1. [ 1543.901594][ T5113] [ 1543.987109][ T5168] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 05:04:26 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0xe0ffff00000000}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000033c0)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x84) openat$cgroup_freezer_state(r1, &(0x7f0000000ec0), 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000f00)='cpuacct.usage_sys\x00', 0x0, 0x0) tkill(0x0, 0x34) prlimit64(0x0, 0x0, &(0x7f0000000380)={0x3, 0x6}, &(0x7f00000003c0)) 05:04:26 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0xc6010000}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:04:26 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_TESTMODE(r0, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000001300)={0x0}}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_CRIT_PROTOCOL_STOP(r1, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001600)={0x0}}, 0x0) 05:04:26 executing program 2: pipe(&(0x7f0000001940)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, 0x0) 05:04:26 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x8a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB="94000000000401030000000000000000000000007d39391a8bdf079f9f495a1fda171e3158f5c79ff5a4dfa267f9065b81eaa585529b1ed154c2e4de9fc975eb2bc712fe039df1a80dfb5986112b3f864dd6be18f185f6af53a91ef29a364869c075e208738464d03e023ce658bc45e51d0cd92f13dd19bed44b18c890ed907be58e2f0bcb02e3c1edb68f44d0d2c95d075a7ceddb3c8a0b063f62856a88e3e03f757467a06cf67105344eb3831130485e90b0e7d8317b2cdf3de6ff9b2c0307dc8d02d485923047d57b31d22a61abcc56"], 0x14}}, 0x0) r2 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x100000, 0x0) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000600)={0xc0, 0x464, 0x20, 0x70bd2b, 0x25dfdbff, "973f9703e43681c987947af3c1c8083de32ea8c59e17bb66fa1131bb71f62feb9d0e2d30dd5e0b3412958e5fe0cceec4126aac730f0637bbd5800c45a7540643c9c2c37aec0fd2421ecaab72641bc72be3958a965740c910b05431206b3784e1f84519555df72fc585d1fe8bc9c7edb156ad0efe2e5af3837edfddc3b7b14e00cda27aef1b0cbdee00e73a16858db80462c0721e260eb71762c36d071ce2212930ef26fbad80c57ca5f20663efbd6221", ["", "", ""]}, 0xc0}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000000) fcntl$setstatus(r2, 0x4, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x100) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x48, 0x80, 0x3f, 0x1, 0x0, 0xc4, 0x4, 0x5, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f00000004c0)}, 0x880, 0x8, 0x4, 0x222db880e1fb0bed, 0x9, 0x8228, 0x3, 0x0, 0xfffffff8, 0x0, 0x7f}, 0xffffffffffffffff, 0x10, r0, 0xa) r4 = open(&(0x7f0000000140)='./file0\x00', 0x501400, 0x1e2) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x40, 0x9, 0x7, 0xf4, 0x0, 0x6, 0x8002, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f00000000c0), 0xe}, 0x800, 0x935, 0x2, 0x3, 0xc23, 0xff, 0x7, 0x0, 0x8, 0x0, 0x6}, 0x0, 0x5, r4, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) writev(r3, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) mount$9p_rdma(&(0x7f0000000880), &(0x7f0000000200)='./file0\x00', &(0x7f0000000580), 0x12288b8, &(0x7f0000000a00)=ANY=[]) socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8936, &(0x7f0000000080)={@ipv4={'\x00', '\xff\xff', @empty}, 0x43}) r6 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=@newlink={0xc8, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x242b8, 0x42a0a}, [@IFLA_LINKINFO={0x98, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x88, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_INGRESS_QOS={0x70, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x200004, 0x1f}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7, 0x10001}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3fc, 0x39e4}}, @IFLA_VLAN_QOS_MAPPING={0x2c, 0x1, {0x8, 0x49}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7ff, 0xc73}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xd1e7, 0x5}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xcaa3, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xfffffffc}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xa1ae}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1, 0x8}}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0xc8}}, 0x0) 05:04:26 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {0x9d02}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:04:27 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0xc9010000}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:04:27 executing program 1: openat2(0xffffffffffffffff, 0x0, &(0x7f0000000840)={0x200080, 0x80}, 0x18) 05:04:27 executing program 2: bpf$BPF_PROG_QUERY(0x2, 0x0, 0x0) [ 1544.661876][ T5202] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 05:04:27 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {0xa402}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:04:27 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x100000000000000}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000033c0)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x84) openat$cgroup_freezer_state(r1, &(0x7f0000000ec0), 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000f00)='cpuacct.usage_sys\x00', 0x0, 0x0) tkill(0x0, 0x34) prlimit64(0x0, 0x0, &(0x7f0000000380)={0x3, 0x6}, &(0x7f00000003c0)) 05:04:27 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x8a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB="94000000000401030000000000000000000000007d39391a8bdf079f9f495a1fda171e3158f5c79ff5a4dfa267f9065b81eaa585529b1ed154c2e4de9fc975eb2bc712fe039df1a80dfb5986112b3f864dd6be18f185f6af53a91ef29a364869c075e208738464d03e023ce658bc45e51d0cd92f13dd19bed44b18c890ed907be58e2f0bcb02e3c1edb68f44d0d2c95d075a7ceddb3c8a0b063f62856a88e3e03f757467a06cf67105344eb3831130485e90b0e7d8317b2cdf3de6ff9b2c0307dc8d02d485923047d57b31d22a61abcc56"], 0x14}}, 0x0) r2 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x100000, 0x0) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000600)={0xc0, 0x464, 0x20, 0x70bd2b, 0x25dfdbff, "973f9703e43681c987947af3c1c8083de32ea8c59e17bb66fa1131bb71f62feb9d0e2d30dd5e0b3412958e5fe0cceec4126aac730f0637bbd5800c45a7540643c9c2c37aec0fd2421ecaab72641bc72be3958a965740c910b05431206b3784e1f84519555df72fc585d1fe8bc9c7edb156ad0efe2e5af3837edfddc3b7b14e00cda27aef1b0cbdee00e73a16858db80462c0721e260eb71762c36d071ce2212930ef26fbad80c57ca5f20663efbd6221", ["", "", ""]}, 0xc0}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000000) fcntl$setstatus(r2, 0x4, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x100) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x48, 0x80, 0x3f, 0x1, 0x0, 0xc4, 0x4, 0x5, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f00000004c0)}, 0x880, 0x8, 0x4, 0x222db880e1fb0bed, 0x9, 0x8228, 0x3, 0x0, 0xfffffff8, 0x0, 0x7f}, 0xffffffffffffffff, 0x10, r0, 0xa) r4 = open(&(0x7f0000000140)='./file0\x00', 0x501400, 0x1e2) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x40, 0x9, 0x7, 0xf4, 0x0, 0x6, 0x8002, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f00000000c0), 0xe}, 0x800, 0x935, 0x2, 0x3, 0xc23, 0xff, 0x7, 0x0, 0x8, 0x0, 0x6}, 0x0, 0x5, r4, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) writev(r3, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) mount$9p_rdma(&(0x7f0000000880), &(0x7f0000000200)='./file0\x00', &(0x7f0000000580), 0x12288b8, &(0x7f0000000a00)=ANY=[]) socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8936, &(0x7f0000000080)={@ipv4={'\x00', '\xff\xff', @empty}, 0x43}) r6 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=@newlink={0xc8, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x242b8, 0x42a0a}, [@IFLA_LINKINFO={0x98, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x88, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_INGRESS_QOS={0x70, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x200004, 0x1f}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7, 0x10001}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3fc, 0x39e4}}, @IFLA_VLAN_QOS_MAPPING={0x2c, 0x1, {0x8, 0x49}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7ff, 0xc73}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xd1e7, 0x5}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xcaa3, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xfffffffc}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xa1ae}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1, 0x8}}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0xc8}}, 0x0) 05:04:27 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {0xa903}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:04:27 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0xc9020000}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:04:27 executing program 2: syz_init_net_socket$netrom(0x6, 0x5, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) r0 = syz_open_dev$media(&(0x7f00000001c0), 0x7ab, 0x0) ioctl$MEDIA_IOC_REQUEST_ALLOC(r0, 0x80047c05, 0x0) openat$dlm_control(0xffffff9c, &(0x7f0000002600), 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f0000000040), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000380)={0x0, 0x989680}, 0x0) 05:04:27 executing program 1: syz_usb_connect$uac1(0x0, 0x79, &(0x7f0000000340)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x67, 0x3, 0x1, 0x0, 0x0, 0x0, {{}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {[@format_type_i_discrete={0x8}]}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}}}}]}}, 0x0) 05:04:27 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x103000000000000}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000033c0)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x84) openat$cgroup_freezer_state(r1, &(0x7f0000000ec0), 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000f00)='cpuacct.usage_sys\x00', 0x0, 0x0) tkill(0x0, 0x34) prlimit64(0x0, 0x0, &(0x7f0000000380)={0x3, 0x6}, &(0x7f00000003c0)) [ 1545.114478][ T5243] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 05:04:27 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {0xac02}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:04:27 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0xd5020000}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:04:27 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x8a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB="94000000000401030000000000000000000000007d39391a8bdf079f9f495a1fda171e3158f5c79ff5a4dfa267f9065b81eaa585529b1ed154c2e4de9fc975eb2bc712fe039df1a80dfb5986112b3f864dd6be18f185f6af53a91ef29a364869c075e208738464d03e023ce658bc45e51d0cd92f13dd19bed44b18c890ed907be58e2f0bcb02e3c1edb68f44d0d2c95d075a7ceddb3c8a0b063f62856a88e3e03f757467a06cf67105344eb3831130485e90b0e7d8317b2cdf3de6ff9b2c0307dc8d02d485923047d57b31d22a61abcc56"], 0x14}}, 0x0) r2 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x100000, 0x0) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000600)={0xc0, 0x464, 0x20, 0x70bd2b, 0x25dfdbff, "973f9703e43681c987947af3c1c8083de32ea8c59e17bb66fa1131bb71f62feb9d0e2d30dd5e0b3412958e5fe0cceec4126aac730f0637bbd5800c45a7540643c9c2c37aec0fd2421ecaab72641bc72be3958a965740c910b05431206b3784e1f84519555df72fc585d1fe8bc9c7edb156ad0efe2e5af3837edfddc3b7b14e00cda27aef1b0cbdee00e73a16858db80462c0721e260eb71762c36d071ce2212930ef26fbad80c57ca5f20663efbd6221", ["", "", ""]}, 0xc0}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000000) fcntl$setstatus(r2, 0x4, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x100) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x48, 0x80, 0x3f, 0x1, 0x0, 0xc4, 0x4, 0x5, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f00000004c0)}, 0x880, 0x8, 0x4, 0x222db880e1fb0bed, 0x9, 0x8228, 0x3, 0x0, 0xfffffff8, 0x0, 0x7f}, 0xffffffffffffffff, 0x10, r0, 0xa) r4 = open(&(0x7f0000000140)='./file0\x00', 0x501400, 0x1e2) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x40, 0x9, 0x7, 0xf4, 0x0, 0x6, 0x8002, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f00000000c0), 0xe}, 0x800, 0x935, 0x2, 0x3, 0xc23, 0xff, 0x7, 0x0, 0x8, 0x0, 0x6}, 0x0, 0x5, r4, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) writev(r3, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) mount$9p_rdma(&(0x7f0000000880), &(0x7f0000000200)='./file0\x00', &(0x7f0000000580), 0x12288b8, &(0x7f0000000a00)=ANY=[]) socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8936, &(0x7f0000000080)={@ipv4={'\x00', '\xff\xff', @empty}, 0x43}) r6 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=@newlink={0xc8, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x242b8, 0x42a0a}, [@IFLA_LINKINFO={0x98, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x88, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_INGRESS_QOS={0x70, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x200004, 0x1f}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7, 0x10001}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3fc, 0x39e4}}, @IFLA_VLAN_QOS_MAPPING={0x2c, 0x1, {0x8, 0x49}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7ff, 0xc73}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xd1e7, 0x5}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xcaa3, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xfffffffc}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xa1ae}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1, 0x8}}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0xc8}}, 0x0) 05:04:27 executing program 2: socket(0x1e, 0x0, 0x4) 05:04:27 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0xf8030000}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:04:27 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x200000000000000}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000033c0)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x84) openat$cgroup_freezer_state(r1, &(0x7f0000000ec0), 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000f00)='cpuacct.usage_sys\x00', 0x0, 0x0) tkill(0x0, 0x34) prlimit64(0x0, 0x0, &(0x7f0000000380)={0x3, 0x6}, &(0x7f00000003c0)) [ 1545.500243][T31899] usb 2-1: new high-speed USB device number 5 using dummy_hcd [ 1545.505625][ T1374] ieee802154 phy0 wpan0: encryption failed: -22 [ 1545.521302][ T1374] ieee802154 phy1 wpan1: encryption failed: -22 [ 1545.583382][ T5284] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 05:04:28 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x8a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB="94000000000401030000000000000000000000007d39391a8bdf079f9f495a1fda171e3158f5c79ff5a4dfa267f9065b81eaa585529b1ed154c2e4de9fc975eb2bc712fe039df1a80dfb5986112b3f864dd6be18f185f6af53a91ef29a364869c075e208738464d03e023ce658bc45e51d0cd92f13dd19bed44b18c890ed907be58e2f0bcb02e3c1edb68f44d0d2c95d075a7ceddb3c8a0b063f62856a88e3e03f757467a06cf67105344eb3831130485e90b0e7d8317b2cdf3de6ff9b2c0307dc8d02d485923047d57b31d22a61abcc56"], 0x14}}, 0x0) r2 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x100000, 0x0) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000600)={0xc0, 0x464, 0x20, 0x70bd2b, 0x25dfdbff, "973f9703e43681c987947af3c1c8083de32ea8c59e17bb66fa1131bb71f62feb9d0e2d30dd5e0b3412958e5fe0cceec4126aac730f0637bbd5800c45a7540643c9c2c37aec0fd2421ecaab72641bc72be3958a965740c910b05431206b3784e1f84519555df72fc585d1fe8bc9c7edb156ad0efe2e5af3837edfddc3b7b14e00cda27aef1b0cbdee00e73a16858db80462c0721e260eb71762c36d071ce2212930ef26fbad80c57ca5f20663efbd6221", ["", "", ""]}, 0xc0}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000000) fcntl$setstatus(r2, 0x4, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x100) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x48, 0x80, 0x3f, 0x1, 0x0, 0xc4, 0x4, 0x5, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f00000004c0)}, 0x880, 0x8, 0x4, 0x222db880e1fb0bed, 0x9, 0x8228, 0x3, 0x0, 0xfffffff8, 0x0, 0x7f}, 0xffffffffffffffff, 0x10, r0, 0xa) r4 = open(&(0x7f0000000140)='./file0\x00', 0x501400, 0x1e2) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x40, 0x9, 0x7, 0xf4, 0x0, 0x6, 0x8002, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f00000000c0), 0xe}, 0x800, 0x935, 0x2, 0x3, 0xc23, 0xff, 0x7, 0x0, 0x8, 0x0, 0x6}, 0x0, 0x5, r4, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000840)={'veth0_macvtap\x00', 0x0}) bind$packet(0xffffffffffffffff, 0x0, 0x0) writev(r3, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) mount$9p_rdma(&(0x7f0000000880), &(0x7f0000000200)='./file0\x00', &(0x7f0000000580), 0x12288b8, &(0x7f0000000a00)=ANY=[]) socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8936, &(0x7f0000000080)={@ipv4={'\x00', '\xff\xff', @empty}, 0x43, r6}) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=@newlink={0xc8, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x242b8, 0x42a0a}, [@IFLA_LINKINFO={0x98, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x88, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_INGRESS_QOS={0x70, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x200004, 0x1f}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7, 0x10001}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3fc, 0x39e4}}, @IFLA_VLAN_QOS_MAPPING={0x2c, 0x1, {0x8, 0x49}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7ff, 0xc73}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xd1e7, 0x5}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xcaa3, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xfffffffc}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xa1ae}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1, 0x8}}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0xc8}}, 0x0) 05:04:28 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {0xc601}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:04:28 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0xfb000000}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:04:28 executing program 2: write$vga_arbiter(0xffffffffffffffff, 0x0, 0x0) [ 1545.790115][T31899] usb 2-1: Using ep0 maxpacket: 32 [ 1545.886816][ T5303] set_target_v0_checkentry: 38 callbacks suppressed [ 1545.887087][ T5303] Cannot find add_set index 0 as target [ 1545.910233][T31899] usb 2-1: config 1 contains an unexpected descriptor of type 0x1, skipping [ 1545.938580][T31899] usb 2-1: config 1 has an invalid descriptor of length 1, skipping remainder of the config [ 1545.964495][ T5305] Cannot find add_set index 0 as target [ 1546.002727][T31899] usb 2-1: config 1 has 1 interface, different from the descriptor's value: 3 [ 1546.135848][ T5313] Cannot find add_set index 0 as target [ 1546.248685][T31899] usb 2-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 1546.260144][T31899] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1546.268151][T31899] usb 2-1: Product: syz [ 1546.284428][T31899] usb 2-1: Manufacturer: syz [ 1546.289292][T31899] usb 2-1: SerialNumber: syz 05:04:29 executing program 1: openat$rtc(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) 05:04:29 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {0xc901}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:04:29 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x300000000000000}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000033c0)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x84) openat$cgroup_freezer_state(r1, &(0x7f0000000ec0), 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000f00)='cpuacct.usage_sys\x00', 0x0, 0x0) tkill(0x0, 0x34) prlimit64(0x0, 0x0, &(0x7f0000000380)={0x3, 0x6}, &(0x7f00000003c0)) 05:04:29 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x8a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB="94000000000401030000000000000000000000007d39391a8bdf079f9f495a1fda171e3158f5c79ff5a4dfa267f9065b81eaa585529b1ed154c2e4de9fc975eb2bc712fe039df1a80dfb5986112b3f864dd6be18f185f6af53a91ef29a364869c075e208738464d03e023ce658bc45e51d0cd92f13dd19bed44b18c890ed907be58e2f0bcb02e3c1edb68f44d0d2c95d075a7ceddb3c8a0b063f62856a88e3e03f757467a06cf67105344eb3831130485e90b0e7d8317b2cdf3de6ff9b2c0307dc8d02d485923047d57b31d22a61abcc56"], 0x14}}, 0x0) r2 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x100000, 0x0) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000600)={0xc0, 0x464, 0x20, 0x70bd2b, 0x25dfdbff, "973f9703e43681c987947af3c1c8083de32ea8c59e17bb66fa1131bb71f62feb9d0e2d30dd5e0b3412958e5fe0cceec4126aac730f0637bbd5800c45a7540643c9c2c37aec0fd2421ecaab72641bc72be3958a965740c910b05431206b3784e1f84519555df72fc585d1fe8bc9c7edb156ad0efe2e5af3837edfddc3b7b14e00cda27aef1b0cbdee00e73a16858db80462c0721e260eb71762c36d071ce2212930ef26fbad80c57ca5f20663efbd6221", ["", "", ""]}, 0xc0}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000000) fcntl$setstatus(r2, 0x4, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x100) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x48, 0x80, 0x3f, 0x1, 0x0, 0xc4, 0x4, 0x5, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f00000004c0)}, 0x880, 0x8, 0x4, 0x222db880e1fb0bed, 0x9, 0x8228, 0x3, 0x0, 0xfffffff8, 0x0, 0x7f}, 0xffffffffffffffff, 0x10, r0, 0xa) r4 = open(&(0x7f0000000140)='./file0\x00', 0x501400, 0x1e2) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x40, 0x9, 0x7, 0xf4, 0x0, 0x6, 0x8002, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f00000000c0), 0xe}, 0x800, 0x935, 0x2, 0x3, 0xc23, 0xff, 0x7, 0x0, 0x8, 0x0, 0x6}, 0x0, 0x5, r4, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000840)={'veth0_macvtap\x00', 0x0}) bind$packet(0xffffffffffffffff, 0x0, 0x0) writev(r3, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) mount$9p_rdma(&(0x7f0000000880), &(0x7f0000000200)='./file0\x00', &(0x7f0000000580), 0x12288b8, &(0x7f0000000a00)=ANY=[]) socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8936, &(0x7f0000000080)={@ipv4={'\x00', '\xff\xff', @empty}, 0x43, r6}) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=@newlink={0xc8, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x242b8, 0x42a0a}, [@IFLA_LINKINFO={0x98, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x88, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_INGRESS_QOS={0x70, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x200004, 0x1f}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7, 0x10001}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3fc, 0x39e4}}, @IFLA_VLAN_QOS_MAPPING={0x2c, 0x1, {0x8, 0x49}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7ff, 0xc73}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xd1e7, 0x5}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xcaa3, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xfffffffc}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xa1ae}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1, 0x8}}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0xc8}}, 0x0) 05:04:29 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xe7}, 0x40) 05:04:29 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0xfd010000}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() [ 1546.680901][T31899] usb 2-1: 0:2 : does not exist [ 1546.719641][ T5336] Cannot find add_set index 0 as target [ 1546.729370][ T5338] __nla_validate_parse: 1 callbacks suppressed [ 1546.729388][ T5338] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1546.756070][ T5341] Cannot find add_set index 0 as target [ 1546.771225][ T5342] Cannot find add_set index 0 as target [ 1546.789405][T31899] usb 2-1: USB disconnect, device number 5 05:04:29 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x400000000000000}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000033c0)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x84) openat$cgroup_freezer_state(r1, &(0x7f0000000ec0), 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000f00)='cpuacct.usage_sys\x00', 0x0, 0x0) tkill(0x0, 0x34) prlimit64(0x0, 0x0, &(0x7f0000000380)={0x3, 0x6}, &(0x7f00000003c0)) 05:04:29 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0xffffe000}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:04:29 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {0xc902}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:04:29 executing program 2: add_key$user(&(0x7f0000001540), 0x0, &(0x7f00000015c0)='*', 0x1, 0xfffffffffffffffd) 05:04:29 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x8a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB="94000000000401030000000000000000000000007d39391a8bdf079f9f495a1fda171e3158f5c79ff5a4dfa267f9065b81eaa585529b1ed154c2e4de9fc975eb2bc712fe039df1a80dfb5986112b3f864dd6be18f185f6af53a91ef29a364869c075e208738464d03e023ce658bc45e51d0cd92f13dd19bed44b18c890ed907be58e2f0bcb02e3c1edb68f44d0d2c95d075a7ceddb3c8a0b063f62856a88e3e03f757467a06cf67105344eb3831130485e90b0e7d8317b2cdf3de6ff9b2c0307dc8d02d485923047d57b31d22a61abcc56"], 0x14}}, 0x0) r2 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x100000, 0x0) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000600)={0xc0, 0x464, 0x20, 0x70bd2b, 0x25dfdbff, "973f9703e43681c987947af3c1c8083de32ea8c59e17bb66fa1131bb71f62feb9d0e2d30dd5e0b3412958e5fe0cceec4126aac730f0637bbd5800c45a7540643c9c2c37aec0fd2421ecaab72641bc72be3958a965740c910b05431206b3784e1f84519555df72fc585d1fe8bc9c7edb156ad0efe2e5af3837edfddc3b7b14e00cda27aef1b0cbdee00e73a16858db80462c0721e260eb71762c36d071ce2212930ef26fbad80c57ca5f20663efbd6221", ["", "", ""]}, 0xc0}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000000) fcntl$setstatus(r2, 0x4, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x100) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x48, 0x80, 0x3f, 0x1, 0x0, 0xc4, 0x4, 0x5, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f00000004c0)}, 0x880, 0x8, 0x4, 0x222db880e1fb0bed, 0x9, 0x8228, 0x3, 0x0, 0xfffffff8, 0x0, 0x7f}, 0xffffffffffffffff, 0x10, r0, 0xa) r4 = open(&(0x7f0000000140)='./file0\x00', 0x501400, 0x1e2) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x40, 0x9, 0x7, 0xf4, 0x0, 0x6, 0x8002, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f00000000c0), 0xe}, 0x800, 0x935, 0x2, 0x3, 0xc23, 0xff, 0x7, 0x0, 0x8, 0x0, 0x6}, 0x0, 0x5, r4, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000840)={'veth0_macvtap\x00', 0x0}) bind$packet(0xffffffffffffffff, 0x0, 0x0) writev(r3, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) mount$9p_rdma(&(0x7f0000000880), &(0x7f0000000200)='./file0\x00', &(0x7f0000000580), 0x12288b8, &(0x7f0000000a00)=ANY=[]) socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8936, &(0x7f0000000080)={@ipv4={'\x00', '\xff\xff', @empty}, 0x43, r6}) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=@newlink={0xc8, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x242b8, 0x42a0a}, [@IFLA_LINKINFO={0x98, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x88, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_INGRESS_QOS={0x70, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x200004, 0x1f}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7, 0x10001}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3fc, 0x39e4}}, @IFLA_VLAN_QOS_MAPPING={0x2c, 0x1, {0x8, 0x49}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7ff, 0xc73}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xd1e7, 0x5}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xcaa3, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xfffffffc}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xa1ae}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1, 0x8}}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0xc8}}, 0x0) 05:04:29 executing program 1: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000480)='ns/cgroup\x00') ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, 0x0) 05:04:29 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x402000000000000}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000033c0)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x84) openat$cgroup_freezer_state(r1, &(0x7f0000000ec0), 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000f00)='cpuacct.usage_sys\x00', 0x0, 0x0) tkill(0x0, 0x34) prlimit64(0x0, 0x0, &(0x7f0000000380)={0x3, 0x6}, &(0x7f00000003c0)) 05:04:29 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x1000000000000}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:04:29 executing program 2: openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$reiserfs(&(0x7f00000016c0), &(0x7f0000001700)='./file0\x00', 0x0, 0x0, &(0x7f0000001980), 0x0, &(0x7f0000001b40)) 05:04:29 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {0xd502}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() [ 1547.102814][ T5380] Cannot find add_set index 0 as target [ 1547.123991][ T5378] Cannot find add_set index 0 as target [ 1547.165689][ T5393] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1547.237505][ T5396] Cannot find add_set index 0 as target 05:04:29 executing program 1: openat$nullb(0xffffffffffffff9c, &(0x7f0000000000), 0x442, 0x0) 05:04:29 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x500000000000000}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000033c0)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x84) openat$cgroup_freezer_state(r1, &(0x7f0000000ec0), 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000f00)='cpuacct.usage_sys\x00', 0x0, 0x0) tkill(0x0, 0x34) prlimit64(0x0, 0x0, &(0x7f0000000380)={0x3, 0x6}, &(0x7f00000003c0)) [ 1547.349502][ T5406] REISERFS warning (device loop2): sh-2021 reiserfs_fill_super: can not find reiserfs on loop2 [ 1547.374536][ T5411] Cannot find add_set index 0 as target 05:04:29 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x8a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB="94000000000401030000000000000000000000007d39391a8bdf079f9f495a1fda171e3158f5c79ff5a4dfa267f9065b81eaa585529b1ed154c2e4de9fc975eb2bc712fe039df1a80dfb5986112b3f864dd6be18f185f6af53a91ef29a364869c075e208738464d03e023ce658bc45e51d0cd92f13dd19bed44b18c890ed907be58e2f0bcb02e3c1edb68f44d0d2c95d075a7ceddb3c8a0b063f62856a88e3e03f757467a06cf67105344eb3831130485e90b0e7d8317b2cdf3de6ff9b2c0307dc8d02d485923047d57b31d22a61abcc56"], 0x14}}, 0x0) r2 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x100000, 0x0) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000600)={0xc0, 0x464, 0x20, 0x70bd2b, 0x25dfdbff, "973f9703e43681c987947af3c1c8083de32ea8c59e17bb66fa1131bb71f62feb9d0e2d30dd5e0b3412958e5fe0cceec4126aac730f0637bbd5800c45a7540643c9c2c37aec0fd2421ecaab72641bc72be3958a965740c910b05431206b3784e1f84519555df72fc585d1fe8bc9c7edb156ad0efe2e5af3837edfddc3b7b14e00cda27aef1b0cbdee00e73a16858db80462c0721e260eb71762c36d071ce2212930ef26fbad80c57ca5f20663efbd6221", ["", "", ""]}, 0xc0}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000000) fcntl$setstatus(r2, 0x4, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x100) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x48, 0x80, 0x3f, 0x1, 0x0, 0xc4, 0x4, 0x5, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f00000004c0)}, 0x880, 0x8, 0x4, 0x222db880e1fb0bed, 0x9, 0x8228, 0x3, 0x0, 0xfffffff8, 0x0, 0x7f}, 0xffffffffffffffff, 0x10, r0, 0xa) r4 = open(&(0x7f0000000140)='./file0\x00', 0x501400, 0x1e2) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x40, 0x9, 0x7, 0xf4, 0x0, 0x6, 0x8002, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f00000000c0), 0xe}, 0x800, 0x935, 0x2, 0x3, 0xc23, 0xff, 0x7, 0x0, 0x8, 0x0, 0x6}, 0x0, 0x5, r4, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000840)={'veth0_macvtap\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) writev(r3, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) mount$9p_rdma(&(0x7f0000000880), &(0x7f0000000200)='./file0\x00', &(0x7f0000000580), 0x12288b8, &(0x7f0000000a00)=ANY=[]) socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8936, &(0x7f0000000080)={@ipv4={'\x00', '\xff\xff', @empty}, 0x43, r6}) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=@newlink={0xc8, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x242b8, 0x42a0a}, [@IFLA_LINKINFO={0x98, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x88, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_INGRESS_QOS={0x70, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x200004, 0x1f}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7, 0x10001}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3fc, 0x39e4}}, @IFLA_VLAN_QOS_MAPPING={0x2c, 0x1, {0x8, 0x49}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7ff, 0xc73}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xd1e7, 0x5}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xcaa3, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xfffffffc}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xa1ae}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1, 0x8}}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0xc8}}, 0x0) 05:04:29 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {0xf803}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:04:29 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x2000000000000}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() [ 1547.647433][ T5427] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 05:04:30 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {0xfb00}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:04:30 executing program 2: openat$cuse(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) 05:04:30 executing program 1: syz_open_dev$loop(&(0x7f0000002740), 0x0, 0x0) 05:04:30 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x4000000000000}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:04:30 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x8a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB="94000000000401030000000000000000000000007d39391a8bdf079f9f495a1fda171e3158f5c79ff5a4dfa267f9065b81eaa585529b1ed154c2e4de9fc975eb2bc712fe039df1a80dfb5986112b3f864dd6be18f185f6af53a91ef29a364869c075e208738464d03e023ce658bc45e51d0cd92f13dd19bed44b18c890ed907be58e2f0bcb02e3c1edb68f44d0d2c95d075a7ceddb3c8a0b063f62856a88e3e03f757467a06cf67105344eb3831130485e90b0e7d8317b2cdf3de6ff9b2c0307dc8d02d485923047d57b31d22a61abcc56"], 0x14}}, 0x0) r2 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x100000, 0x0) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000600)={0xc0, 0x464, 0x20, 0x70bd2b, 0x25dfdbff, "973f9703e43681c987947af3c1c8083de32ea8c59e17bb66fa1131bb71f62feb9d0e2d30dd5e0b3412958e5fe0cceec4126aac730f0637bbd5800c45a7540643c9c2c37aec0fd2421ecaab72641bc72be3958a965740c910b05431206b3784e1f84519555df72fc585d1fe8bc9c7edb156ad0efe2e5af3837edfddc3b7b14e00cda27aef1b0cbdee00e73a16858db80462c0721e260eb71762c36d071ce2212930ef26fbad80c57ca5f20663efbd6221", ["", "", ""]}, 0xc0}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000000) fcntl$setstatus(r2, 0x4, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x100) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x48, 0x80, 0x3f, 0x1, 0x0, 0xc4, 0x4, 0x5, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f00000004c0)}, 0x880, 0x8, 0x4, 0x222db880e1fb0bed, 0x9, 0x8228, 0x3, 0x0, 0xfffffff8, 0x0, 0x7f}, 0xffffffffffffffff, 0x10, r0, 0xa) r4 = open(&(0x7f0000000140)='./file0\x00', 0x501400, 0x1e2) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x40, 0x9, 0x7, 0xf4, 0x0, 0x6, 0x8002, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f00000000c0), 0xe}, 0x800, 0x935, 0x2, 0x3, 0xc23, 0xff, 0x7, 0x0, 0x8, 0x0, 0x6}, 0x0, 0x5, r4, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000840)={'veth0_macvtap\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) writev(r3, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) mount$9p_rdma(&(0x7f0000000880), &(0x7f0000000200)='./file0\x00', &(0x7f0000000580), 0x12288b8, &(0x7f0000000a00)=ANY=[]) socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8936, &(0x7f0000000080)={@ipv4={'\x00', '\xff\xff', @empty}, 0x43, r6}) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=@newlink={0xc8, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x242b8, 0x42a0a}, [@IFLA_LINKINFO={0x98, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x88, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_INGRESS_QOS={0x70, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x200004, 0x1f}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7, 0x10001}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3fc, 0x39e4}}, @IFLA_VLAN_QOS_MAPPING={0x2c, 0x1, {0x8, 0x49}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7ff, 0xc73}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xd1e7, 0x5}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xcaa3, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xfffffffc}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xa1ae}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1, 0x8}}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0xc8}}, 0x0) 05:04:30 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x600000000000000}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000033c0)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x84) openat$cgroup_freezer_state(r1, &(0x7f0000000ec0), 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000f00)='cpuacct.usage_sys\x00', 0x0, 0x0) tkill(0x0, 0x34) prlimit64(0x0, 0x0, &(0x7f0000000380)={0x3, 0x6}, &(0x7f00000003c0)) 05:04:30 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {0xfd01}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:04:30 executing program 1: r0 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$BTRFS_IOC_DEV_REPLACE(r0, 0xca289435, 0x0) 05:04:30 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0xe0ffff00000000}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:04:30 executing program 2: syz_mount_image$reiserfs(&(0x7f00000016c0), &(0x7f0000001700)='./file0\x00', 0x0, 0x4, &(0x7f0000001980)=[{&(0x7f0000001740)="a7529cf4b9cce2ac", 0x8, 0x451a}, {&(0x7f00000017c0)="f4e6d24078b11f06384ee8bb5eb393ac0539a41e299af7a23859285c411e73120da2a57d1f", 0x25, 0xfffffffffffffff8}, {&(0x7f0000001840)="ad", 0x1, 0xc40}, {&(0x7f0000001880)="7d1b7a0bc04b90dc597891054b64f0e4debad59e0da42a872c4d3a4e40758bd64b6f5675f226dc", 0x27}], 0x4001000, &(0x7f0000001b40)={[{@commit={'commit', 0x3d, 0x3}}, {@nouser_xattr}, {@grpquota}], [{@euid_gt={'euid>', 0xffffffffffffffff}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@measure}, {@seclabel}, {@euid_lt}]}) [ 1548.163668][ T5465] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 05:04:30 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {0x20000}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:04:30 executing program 1: keyctl$dh_compute(0x17, 0x0, 0x0, 0x0, &(0x7f0000001500)={0x0}) 05:04:30 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x8a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB="94000000000401030000000000000000000000007d39391a8bdf079f9f495a1fda171e3158f5c79ff5a4dfa267f9065b81eaa585529b1ed154c2e4de9fc975eb2bc712fe039df1a80dfb5986112b3f864dd6be18f185f6af53a91ef29a364869c075e208738464d03e023ce658bc45e51d0cd92f13dd19bed44b18c890ed907be58e2f0bcb02e3c1edb68f44d0d2c95d075a7ceddb3c8a0b063f62856a88e3e03f757467a06cf67105344eb3831130485e90b0e7d8317b2cdf3de6ff9b2c0307dc8d02d485923047d57b31d22a61abcc56"], 0x14}}, 0x0) r2 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x100000, 0x0) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000600)={0xc0, 0x464, 0x20, 0x70bd2b, 0x25dfdbff, "973f9703e43681c987947af3c1c8083de32ea8c59e17bb66fa1131bb71f62feb9d0e2d30dd5e0b3412958e5fe0cceec4126aac730f0637bbd5800c45a7540643c9c2c37aec0fd2421ecaab72641bc72be3958a965740c910b05431206b3784e1f84519555df72fc585d1fe8bc9c7edb156ad0efe2e5af3837edfddc3b7b14e00cda27aef1b0cbdee00e73a16858db80462c0721e260eb71762c36d071ce2212930ef26fbad80c57ca5f20663efbd6221", ["", "", ""]}, 0xc0}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000000) fcntl$setstatus(r2, 0x4, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x100) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x48, 0x80, 0x3f, 0x1, 0x0, 0xc4, 0x4, 0x5, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f00000004c0)}, 0x880, 0x8, 0x4, 0x222db880e1fb0bed, 0x9, 0x8228, 0x3, 0x0, 0xfffffff8, 0x0, 0x7f}, 0xffffffffffffffff, 0x10, r0, 0xa) r4 = open(&(0x7f0000000140)='./file0\x00', 0x501400, 0x1e2) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x40, 0x9, 0x7, 0xf4, 0x0, 0x6, 0x8002, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f00000000c0), 0xe}, 0x800, 0x935, 0x2, 0x3, 0xc23, 0xff, 0x7, 0x0, 0x8, 0x0, 0x6}, 0x0, 0x5, r4, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000840)={'veth0_macvtap\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) writev(r3, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) mount$9p_rdma(&(0x7f0000000880), &(0x7f0000000200)='./file0\x00', &(0x7f0000000580), 0x12288b8, &(0x7f0000000a00)=ANY=[]) socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8936, &(0x7f0000000080)={@ipv4={'\x00', '\xff\xff', @empty}, 0x43, r6}) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=@newlink={0xc8, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x242b8, 0x42a0a}, [@IFLA_LINKINFO={0x98, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x88, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_INGRESS_QOS={0x70, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x200004, 0x1f}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7, 0x10001}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3fc, 0x39e4}}, @IFLA_VLAN_QOS_MAPPING={0x2c, 0x1, {0x8, 0x49}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7ff, 0xc73}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xd1e7, 0x5}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xcaa3, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xfffffffc}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xa1ae}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1, 0x8}}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0xc8}}, 0x0) [ 1548.364454][ T5641] loop2: detected capacity change from 0 to 16383 05:04:30 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x700000000000000}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000033c0)) sendmsg$unix(0xffffffffffffffff, 0x0, 0x84) openat$cgroup_freezer_state(r1, &(0x7f0000000ec0), 0x2, 0x0) openat$cgroup_ro(r1, &(0x7f0000000f00)='cpuacct.usage_sys\x00', 0x0, 0x0) tkill(0x0, 0x34) prlimit64(0x0, 0x0, &(0x7f0000000380)={0x3, 0x6}, &(0x7f00000003c0)) [ 1548.513052][ T5641] loop2: detected capacity change from 0 to 16383 05:04:31 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x100000000000000}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:04:31 executing program 1: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000007c0), 0x0, 0x0) connect$bt_l2cap(r0, &(0x7f0000000240)={0x1f, 0x0, @none}, 0xe) 05:04:31 executing program 2: syz_mount_image$cramfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000140)=[{&(0x7f00000004c0)="d1e93bc604f6acf46bfe9a387bf2b64c6e93707b49eb43a9958bed4e3be67c7c17e5e05aa6c41f943b88c18d485a33dade02d7a07ee5d1d416e6e32ff139f59b2bdea47907b769929f0c0a7a80f132beb40f12810490bf16ec48b43288abde9ad9108969c554aa4f7baea71b11497cde", 0x70, 0xffffffffffff7fff}, {&(0x7f0000000080)='K', 0x1}], 0x0, &(0x7f0000000180)={[{'-'}, {}, {'/dev/autofs\x00'}, {'/dev/autofs\x00'}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_user}, {@fscontext={'fscontext', 0x3d, 'system_u'}}]}) [ 1548.663410][ T5696] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 05:04:31 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {0x40000}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:04:45 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x8a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB="94000000000401030000000000000000000000007d39391a8bdf079f9f495a1fda171e3158f5c79ff5a4dfa267f9065b81eaa585529b1ed154c2e4de9fc975eb2bc712fe039df1a80dfb5986112b3f864dd6be18f185f6af53a91ef29a364869c075e208738464d03e023ce658bc45e51d0cd92f13dd19bed44b18c890ed907be58e2f0bcb02e3c1edb68f44d0d2c95d075a7ceddb3c8a0b063f62856a88e3e03f757467a06cf67105344eb3831130485e90b0e7d8317b2cdf3de6ff9b2c0307dc8d02d485923047d57b31d22a61abcc56"], 0x14}}, 0x0) r2 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x100000, 0x0) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000600)={0xc0, 0x464, 0x20, 0x70bd2b, 0x25dfdbff, "973f9703e43681c987947af3c1c8083de32ea8c59e17bb66fa1131bb71f62feb9d0e2d30dd5e0b3412958e5fe0cceec4126aac730f0637bbd5800c45a7540643c9c2c37aec0fd2421ecaab72641bc72be3958a965740c910b05431206b3784e1f84519555df72fc585d1fe8bc9c7edb156ad0efe2e5af3837edfddc3b7b14e00cda27aef1b0cbdee00e73a16858db80462c0721e260eb71762c36d071ce2212930ef26fbad80c57ca5f20663efbd6221", ["", "", ""]}, 0xc0}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000000) fcntl$setstatus(r2, 0x4, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x100) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x48, 0x80, 0x3f, 0x1, 0x0, 0xc4, 0x4, 0x5, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f00000004c0)}, 0x880, 0x8, 0x4, 0x222db880e1fb0bed, 0x9, 0x8228, 0x3, 0x0, 0xfffffff8, 0x0, 0x7f}, 0xffffffffffffffff, 0x10, r0, 0xa) r4 = open(&(0x7f0000000140)='./file0\x00', 0x501400, 0x1e2) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x40, 0x9, 0x7, 0xf4, 0x0, 0x6, 0x8002, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f00000000c0), 0xe}, 0x800, 0x935, 0x2, 0x3, 0xc23, 0xff, 0x7, 0x0, 0x8, 0x0, 0x6}, 0x0, 0x5, r4, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000840)={'veth0_macvtap\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) mount$9p_rdma(&(0x7f0000000880), &(0x7f0000000200)='./file0\x00', &(0x7f0000000580), 0x12288b8, &(0x7f0000000a00)=ANY=[]) socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8936, &(0x7f0000000080)={@ipv4={'\x00', '\xff\xff', @empty}, 0x43, r6}) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=@newlink={0xc8, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x242b8, 0x42a0a}, [@IFLA_LINKINFO={0x98, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x88, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_INGRESS_QOS={0x70, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x200004, 0x1f}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7, 0x10001}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3fc, 0x39e4}}, @IFLA_VLAN_QOS_MAPPING={0x2c, 0x1, {0x8, 0x49}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7ff, 0xc73}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xd1e7, 0x5}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xcaa3, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xfffffffc}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xa1ae}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1, 0x8}}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0xc8}}, 0x0) 05:05:05 executing program 1: perf_event_open(&(0x7f0000000900)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x9, 0xffffffffffffffff, 0xa) 05:05:09 executing program 2: syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000003e40)={0x0, 0x0, &(0x7f0000003e00)={&(0x7f0000002c40)={0xec4, 0x0, 0x0, 0x0, 0x0, {}, [@nested={0xead, 0x0, 0x0, 0x1, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @generic="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"]}]}, 0xec4}}, 0x0) syz_genetlink_get_family_id$nl80211(0x0, r0) 05:05:14 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {0x0, 0x103000000000000}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() 05:05:37 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffff7ffffffff, 0xffffffffffffffff, 0x0) clone(0x2000000002002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0xc01, 0x3, 0x298, 0x108, 0x5002004a, 0x0, 0x108, 0x0, 0x200, 0x3c8, 0x3c8, 0x200, 0x3c8, 0x3, 0x0, {[{{@ip={@empty, @broadcast, 0x0, 0x0, 'bridge_slave_1\x00', 'gretap0\x00'}, 0x0, 0xc0, 0x108, 0x0, {}, [@common=@ttl={{0x28}}, @inet=@rpfilter={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@dev, 'dummy0\x00'}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {0x1000000}, [@common=@unspec=@state={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2f8) getpid() [ 1615.356821][ T1374] ieee802154 phy0 wpan0: encryption failed: -22 [ 1615.363135][ T1374] ieee802154 phy1 wpan1: encryption failed: -22 05:06:08 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x8a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB="94000000000401030000000000000000000000007d39391a8bdf079f9f495a1fda171e3158f5c79ff5a4dfa267f9065b81eaa585529b1ed154c2e4de9fc975eb2bc712fe039df1a80dfb5986112b3f864dd6be18f185f6af53a91ef29a364869c075e208738464d03e023ce658bc45e51d0cd92f13dd19bed44b18c890ed907be58e2f0bcb02e3c1edb68f44d0d2c95d075a7ceddb3c8a0b063f62856a88e3e03f757467a06cf67105344eb3831130485e90b0e7d8317b2cdf3de6ff9b2c0307dc8d02d485923047d57b31d22a61abcc56"], 0x14}}, 0x0) r2 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x100000, 0x0) sendmsg$AUDIT_USER_TTY(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000600)={0xc0, 0x464, 0x20, 0x70bd2b, 0x25dfdbff, "973f9703e43681c987947af3c1c8083de32ea8c59e17bb66fa1131bb71f62feb9d0e2d30dd5e0b3412958e5fe0cceec4126aac730f0637bbd5800c45a7540643c9c2c37aec0fd2421ecaab72641bc72be3958a965740c910b05431206b3784e1f84519555df72fc585d1fe8bc9c7edb156ad0efe2e5af3837edfddc3b7b14e00cda27aef1b0cbdee00e73a16858db80462c0721e260eb71762c36d071ce2212930ef26fbad80c57ca5f20663efbd6221", ["", "", ""]}, 0xc0}, 0x1, 0x0, 0x0, 0x4000011}, 0x4000000) fcntl$setstatus(r2, 0x4, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x100) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x48, 0x80, 0x3f, 0x1, 0x0, 0xc4, 0x4, 0x5, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f00000004c0)}, 0x880, 0x8, 0x4, 0x222db880e1fb0bed, 0x9, 0x8228, 0x3, 0x0, 0xfffffff8, 0x0, 0x7f}, 0xffffffffffffffff, 0x10, r0, 0xa) r4 = open(&(0x7f0000000140)='./file0\x00', 0x501400, 0x1e2) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x40, 0x9, 0x7, 0xf4, 0x0, 0x6, 0x8002, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp={&(0x7f00000000c0), 0xe}, 0x800, 0x935, 0x2, 0x3, 0xc23, 0xff, 0x7, 0x0, 0x8, 0x0, 0x6}, 0x0, 0x5, r4, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000840)={'veth0_macvtap\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @local}, 0x14) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000008c0)="110eaa1a9896d57019effc8c79961d0f73ccf3afca3754e2e7a31f536bcb7204bed59311e29c96e1c2b663d61e5b0c0a76ea50cbddaa69f578b8600f77cf1a538ac900673696245b6de4283c979a2eccd71f9583dacf650575d1398678895da32663735b4d0cabfe7e972e59c2b4b4c9c89d0b82ca2267ad5062303e8abcb79600010506702eb912e3957e507aec4e2180699a738f6753509a12282a1d7181887f6c2e03de1da0dfe3b4efbb10e9b59301b4ef8a1d", 0xb5}, {&(0x7f0000000980)="34c30d95766fefbb7bdc40a3242505587bbc8584c2bc2003185f5ce116eea020efa91e2aae1eae2b8e848ac13c3dcedbbbc82adb1e70be8eecedba37be82545f2abda4f0a0e0fd0edd6bd03bb8e9bb91c39a2c828511aef3e684ad4c21ec0c146b9570139e31cd", 0x67}], 0x2) mount$9p_rdma(&(0x7f0000000880), &(0x7f0000000200)='./file0\x00', &(0x7f0000000580), 0x12288b8, &(0x7f0000000a00)=ANY=[]) socket(0x1, 0x803, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8936, &(0x7f0000000080)={@ipv4={'\x00', '\xff\xff', @empty}, 0x43, r6}) r7 = socket(0x10, 0x8000000803, 0x0) sendmsg$nl_route(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000740)=@newlink={0xc8, 0x10, 0x401, 0x0, 0x4, {0x0, 0x0, 0x0, 0x0, 0x242b8, 0x42a0a}, [@IFLA_LINKINFO={0x98, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x88, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}, @IFLA_VLAN_INGRESS_QOS={0x70, 0x4, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x200004, 0x1f}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7, 0x10001}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3fc, 0x39e4}}, @IFLA_VLAN_QOS_MAPPING={0x2c, 0x1, {0x8, 0x49}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7ff, 0xc73}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xd1e7, 0x5}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0xcaa3, 0x1}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xfffffffc}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x8, 0xa1ae}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x1, 0x8}}]}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8}]}, 0xc8}}, 0x0) 05:06:08 executing program 1: syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f0000000300)='./file0\x00', 0x0, 0x0, &(0x7f0000001780), 0x0, &(0x7f0000001840)) [ 1683.428494][ T1374] ieee802154 phy0 wpan0: encryption failed: -22 [ 1683.434860][ T1374] ieee802154 phy1 wpan1: encryption failed: -22 [ 1788.968435][ C0] rcu: INFO: rcu_preempt self-detected stall on CPU [ 1788.975057][ C0] rcu: 0-...!: (1 GPs behind) idle=4eb/1/0x4000000000000000 softirq=130173/130174 fqs=0 [ 1788.986295][ C0] (t=10500 jiffies g=258325 q=7898) [ 1788.991596][ C0] rcu: rcu_preempt kthread timer wakeup didn't happen for 10499 jiffies! g258325 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x402 [ 1789.004007][ C0] rcu: Possible timer handling issue on cpu=1 timer-softirq=95001 [ 1789.011890][ C0] rcu: rcu_preempt kthread starved for 10500 jiffies! g258325 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x402 ->cpu=1 [ 1789.023352][ C0] rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior. [ 1789.033319][ C0] rcu: RCU grace-period kthread stack dump: [ 1789.039205][ C0] task:rcu_preempt state:I stack:28712 pid: 14 ppid: 2 flags:0x00004000 [ 1789.048414][ C0] Call Trace: [ 1789.051701][ C0] __schedule+0x949/0x2710 [ 1789.056137][ C0] ? io_schedule_timeout+0x140/0x140 [ 1789.061433][ C0] ? debug_object_destroy+0x210/0x210 [ 1789.066886][ C0] schedule+0xd3/0x290 [ 1789.070962][ C0] schedule_timeout+0x14a/0x2a0 [ 1789.075824][ C0] ? usleep_range+0x170/0x170 [ 1789.080510][ C0] ? destroy_timer_on_stack+0x20/0x20 [ 1789.085962][ C0] ? regmap_irq_thread.cold+0x112/0x1c9 [ 1789.091533][ C0] ? _raw_spin_unlock_irqrestore+0x3d/0x70 [ 1789.097356][ C0] ? prepare_to_swait_event+0xee/0x470 [ 1789.102859][ C0] rcu_gp_fqs_loop+0x186/0x810 [ 1789.107667][ C0] ? force_qs_rnp+0x760/0x760 [ 1789.112357][ C0] ? rcu_gp_init+0x906/0x12a0 [ 1789.117051][ C0] rcu_gp_kthread+0x1de/0x320 [ 1789.121737][ C0] ? rcu_gp_init+0x12a0/0x12a0 [ 1789.126508][ C0] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 1789.132756][ C0] ? __kthread_parkme+0x15f/0x220 [ 1789.137825][ C0] ? rcu_gp_init+0x12a0/0x12a0 [ 1789.142601][ C0] kthread+0x3e5/0x4d0 [ 1789.146674][ C0] ? set_kthread_struct+0x130/0x130 [ 1789.151884][ C0] ret_from_fork+0x1f/0x30 [ 1789.156342][ C0] rcu: Stack dump where RCU GP kthread last ran: [ 1789.162656][ C0] Sending NMI from CPU 0 to CPUs 1: [ 1789.167859][ C1] NMI backtrace for cpu 1 [ 1789.167869][ C1] CPU: 1 PID: 23895 Comm: syz-executor.3 Not tainted 5.14.0-rc4-next-20210806-syzkaller #0 [ 1789.167894][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1789.167906][ C1] RIP: 0010:lock_release+0x217/0x720 [ 1789.167933][ C1] Code: e8 7e 08 ff ff 48 85 c0 48 89 c3 0f 84 85 03 00 00 48 8d 78 24 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 0f b6 14 02 <48> 89 f8 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 94 04 00 00 8b [ 1789.167953][ C1] RSP: 0018:ffffc90000dc0c38 EFLAGS: 00000807 [ 1789.167970][ C1] RAX: dffffc0000000000 RBX: ffff8881497c26f0 RCX: ffffc90000dc0c88 [ 1789.167986][ C1] RDX: 0000000000000000 RSI: ffffffff904c5338 RDI: ffff8881497c2714 [ 1789.168001][ C1] RBP: 1ffff920001b8189 R08: 0000000000000000 R09: 0000000000000000 [ 1789.168015][ C1] R10: 0000000000000001 R11: 0000000000000000 R12: ffffffff904c5338 [ 1789.168029][ C1] R13: 0000000000000004 R14: ffff8881497c2670 R15: ffff8881497c1c80 [ 1789.168044][ C1] FS: 0000000000000000(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000 [ 1789.168064][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1789.168079][ C1] CR2: 0000564f91b3a180 CR3: 0000000078609000 CR4: 00000000001506e0 [ 1789.168094][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1789.168107][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1789.168121][ C1] Call Trace: [ 1789.168126][ C1] [ 1789.168134][ C1] ? debug_object_activate+0x287/0x3e0 [ 1789.168163][ C1] ? lock_downgrade+0x6e0/0x6e0 [ 1789.168190][ C1] _raw_spin_unlock_irqrestore+0x16/0x70 [ 1789.168220][ C1] debug_object_activate+0x287/0x3e0 [ 1789.168249][ C1] ? debug_object_assert_init+0x2e0/0x2e0 [ 1789.168277][ C1] ? lock_release+0x720/0x720 [ 1789.168300][ C1] ? do_raw_spin_lock+0x120/0x2b0 [ 1789.168323][ C1] ? rwlock_bug.part.0+0x90/0x90 [ 1789.168347][ C1] enqueue_hrtimer+0x27/0x3e0 [ 1789.168375][ C1] __hrtimer_run_queues+0xb02/0xe50 [ 1789.168407][ C1] ? hrtimer_sleeper_start_expires+0x80/0x80 [ 1789.168436][ C1] ? ktime_get_update_offsets_now+0x3eb/0x5c0 [ 1789.168464][ C1] hrtimer_interrupt+0x330/0xa00 [ 1789.168491][ C1] __sysvec_apic_timer_interrupt+0x146/0x530 [ 1789.168535][ C1] sysvec_apic_timer_interrupt+0x8e/0xc0 [ 1789.168564][ C1] [ 1789.168570][ C1] asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1789.168595][ C1] RIP: 0010:rcu_is_watching+0x69/0xc0 [ 1789.168618][ C1] Code: 48 03 1c ed 80 98 32 8b be 04 00 00 00 48 89 df e8 7c cc 59 00 48 89 da 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 0f b6 14 02 <48> 89 d8 83 e0 07 83 c0 03 38 d0 7c 04 84 d2 75 19 8b 03 83 e0 01 [ 1789.168638][ C1] RSP: 0018:ffffc9001ac5f6e8 EFLAGS: 00000a06 [ 1789.168654][ C1] RAX: dffffc0000000000 RBX: ffff8880b9d329c8 RCX: ffffffff81619e54 [ 1789.168670][ C1] RDX: 0000000000000000 RSI: 0000000000000004 RDI: ffff8880b9d329c8 [ 1789.168683][ C1] RBP: 0000000000000001 R08: 0000000000000000 R09: ffff8880b9d329cb [ 1789.168697][ C1] R10: ffffed10173a6539 R11: 0000000000000000 R12: ffffea0000db3588 [ 1789.168711][ C1] R13: 0000000000000000 R14: dffffc0000000000 R15: 00007f5e4cd7b000 [ 1789.168730][ C1] ? rcu_is_watching+0x54/0xc0 [ 1789.168754][ C1] ? rcu_is_watching+0x54/0xc0 [ 1789.168775][ C1] folio_memcg_lock+0x3f/0x3e0 [ 1789.168851][ C1] ? folio_memcg+0x190/0x190 [ 1789.168872][ C1] ? vm_normal_page+0x146/0x2a0 [ 1789.168936][ C1] page_remove_rmap+0x25/0x1480 [ 1789.168965][ C1] ? __sanitizer_cov_trace_cmp4+0x1c/0x70 [ 1789.168992][ C1] unmap_page_range+0xed5/0x2a10 [ 1789.169026][ C1] ? vm_normal_page_pmd+0x550/0x550 [ 1789.169050][ C1] ? unmap_single_vma+0x97/0x310 [ 1789.169076][ C1] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 1789.169101][ C1] ? uprobe_munmap+0x95/0x560 [ 1789.169140][ C1] unmap_single_vma+0x198/0x310 [ 1789.169168][ C1] unmap_vmas+0x16d/0x2f0 [ 1789.169192][ C1] ? zap_vma_ptes+0x100/0x100 [ 1789.169224][ C1] exit_mmap+0x1d0/0x620 [ 1789.169246][ C1] ? __ia32_sys_remap_file_pages+0x150/0x150 [ 1789.169279][ C1] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 1789.169307][ C1] __mmput+0x122/0x470 [ 1789.169370][ C1] mmput+0x58/0x60 [ 1789.169394][ C1] do_exit+0xae2/0x2a60 [ 1789.169417][ C1] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1789.169441][ C1] ? lockdep_hardirqs_on+0x79/0x100 [ 1789.169467][ C1] ? mm_update_next_owner+0x7a0/0x7a0 [ 1789.169493][ C1] ? trace_hardirqs_on+0x38/0x1c0 [ 1789.169519][ C1] do_group_exit+0x125/0x310 [ 1789.169543][ C1] get_signal+0x47f/0x2160 [ 1789.169591][ C1] arch_do_signal_or_restart+0x2a9/0x1c40 [ 1789.169638][ C1] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1789.169664][ C1] ? irqentry_enter+0x28/0x50 [ 1789.169690][ C1] ? get_sigframe_size+0x10/0x10 [ 1789.169713][ C1] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1789.169737][ C1] ? lockdep_hardirqs_on+0x79/0x100 [ 1789.169763][ C1] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1789.169794][ C1] exit_to_user_mode_prepare+0x17d/0x290 [ 1789.169817][ C1] syscall_exit_to_user_mode+0x19/0x60 [ 1789.169849][ C1] do_syscall_64+0x42/0xb0 [ 1789.169872][ C1] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1789.169901][ C1] RIP: 0033:0x4665e9 [ 1789.169916][ C1] Code: Unable to access opcode bytes at RIP 0x4665bf. [ 1789.169925][ C1] RSP: 002b:00007f5e4bf9c218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 1789.169945][ C1] RAX: fffffffffffffe00 RBX: 000000000056bf88 RCX: 00000000004665e9 [ 1789.169960][ C1] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 000000000056bf88 [ 1789.169974][ C1] RBP: 000000000056bf80 R08: 0000000000000000 R09: 0000000000000000 [ 1789.169987][ C1] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf8c [ 1789.170001][ C1] R13: 00007fff9b9a343f R14: 00007f5e4bf9c300 R15: 0000000000022000 [ 1789.170887][ C0] NMI backtrace for cpu 0 [ 1789.725665][ C0] CPU: 0 PID: 31748 Comm: syz-executor.5 Not tainted 5.14.0-rc4-next-20210806-syzkaller #0 [ 1789.735650][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1789.745704][ C0] Call Trace: [ 1789.748980][ C0] [ 1789.751827][ C0] dump_stack_lvl+0xcd/0x134 [ 1789.756433][ C0] nmi_cpu_backtrace.cold+0x47/0x144 [ 1789.761731][ C0] ? lapic_can_unplug_cpu+0x80/0x80 [ 1789.767007][ C0] nmi_trigger_cpumask_backtrace+0x1ae/0x220 [ 1789.773084][ C0] rcu_dump_cpu_stacks+0x25e/0x3f0 [ 1789.778217][ C0] rcu_sched_clock_irq.cold+0x9d/0x746 [ 1789.783711][ C0] ? lock_downgrade+0x6e0/0x6e0 [ 1789.788606][ C0] ? rcutree_dead_cpu+0x30/0x30 [ 1789.793471][ C0] ? do_raw_spin_unlock+0x171/0x230 [ 1789.798698][ C0] update_process_times+0x16d/0x200 [ 1789.803911][ C0] tick_sched_handle+0x9b/0x180 [ 1789.808821][ C0] tick_sched_timer+0x1b0/0x2d0 [ 1789.813683][ C0] ? get_cpu_iowait_time_us+0x3f0/0x3f0 [ 1789.819234][ C0] __hrtimer_run_queues+0x1c0/0xe50 [ 1789.824459][ C0] ? hrtimer_sleeper_start_expires+0x80/0x80 [ 1789.830453][ C0] ? ktime_get_update_offsets_now+0x3eb/0x5c0 [ 1789.836550][ C0] hrtimer_interrupt+0x330/0xa00 [ 1789.841513][ C0] __sysvec_apic_timer_interrupt+0x146/0x530 [ 1789.847506][ C0] sysvec_apic_timer_interrupt+0x8e/0xc0 [ 1789.853149][ C0] [ 1789.856077][ C0] asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1789.862063][ C0] RIP: 0010:lock_acquire+0x1ef/0x510 [ 1789.867357][ C0] Code: b5 a6 7e 83 f8 01 0f 85 b4 02 00 00 9c 58 f6 c4 02 0f 85 9f 02 00 00 48 83 7c 24 08 00 74 01 fb 48 b8 00 00 00 00 00 fc ff df <48> 01 c3 48 c7 03 00 00 00 00 48 c7 43 08 00 00 00 00 48 8b 84 24 [ 1789.886967][ C0] RSP: 0018:ffffc9001c2bf618 EFLAGS: 00000206 [ 1789.893040][ C0] RAX: dffffc0000000000 RBX: 1ffff92003857ec5 RCX: 42f1125c69a15e59 [ 1789.901012][ C0] RDX: 1ffff1102ce78bee RSI: 0000000000000001 RDI: 0000000000000000 [ 1789.908983][ C0] RBP: 0000000000000000 R08: 0000000000000000 R09: ffffffff8fce18e7 [ 1789.916954][ C0] R10: fffffbfff1f9c31c R11: 0000000000000000 R12: 0000000000000002 [ 1789.925009][ C0] R13: 0000000000000000 R14: ffffffff8b97f140 R15: 0000000000000000 [ 1789.933003][ C0] ? lock_release+0x720/0x720 [ 1789.937695][ C0] ? mark_held_locks+0x9f/0xe0 [ 1789.942468][ C0] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1789.948636][ C0] folio_memcg_lock+0x3a/0x3e0 [ 1789.953407][ C0] ? folio_memcg+0x190/0x190 [ 1789.958011][ C0] page_remove_rmap+0x25/0x1480 [ 1789.962874][ C0] ? unmap_page_range+0xd7f/0x2a10 [ 1789.968001][ C0] unmap_page_range+0xed5/0x2a10 [ 1789.972970][ C0] ? vm_normal_page_pmd+0x550/0x550 [ 1789.978177][ C0] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1789.984336][ C0] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 1789.990582][ C0] ? uprobe_munmap+0x95/0x560 [ 1789.995353][ C0] unmap_single_vma+0x198/0x310 [ 1790.000219][ C0] unmap_vmas+0x16d/0x2f0 [ 1790.004557][ C0] ? zap_vma_ptes+0x100/0x100 [ 1790.009247][ C0] ? lockdep_hardirqs_on+0x79/0x100 [ 1790.014466][ C0] exit_mmap+0x1d0/0x620 [ 1790.018715][ C0] ? __ia32_sys_remap_file_pages+0x150/0x150 [ 1790.024723][ C0] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 1790.030981][ C0] __mmput+0x122/0x470 [ 1790.035062][ C0] mmput+0x58/0x60 [ 1790.038799][ C0] do_exit+0xae2/0x2a60 [ 1790.042965][ C0] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1790.049125][ C0] ? lockdep_hardirqs_on+0x79/0x100 [ 1790.054332][ C0] ? mm_update_next_owner+0x7a0/0x7a0 [ 1790.059720][ C0] ? trace_hardirqs_on+0x38/0x1c0 [ 1790.064755][ C0] do_group_exit+0x125/0x310 [ 1790.069363][ C0] get_signal+0x47f/0x2160 [ 1790.073810][ C0] arch_do_signal_or_restart+0x2a9/0x1c40 [ 1790.079547][ C0] ? find_held_lock+0x2d/0x110 [ 1790.084321][ C0] ? get_sigframe_size+0x10/0x10 [ 1790.089270][ C0] ? __do_sys_futex+0xdc/0x3b0 [ 1790.094101][ C0] ? do_futex+0x1770/0x1770 [ 1790.098647][ C0] exit_to_user_mode_prepare+0x17d/0x290 [ 1790.104286][ C0] syscall_exit_to_user_mode+0x19/0x60 [ 1790.109760][ C0] do_syscall_64+0x42/0xb0 [ 1790.114185][ C0] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1790.120086][ C0] RIP: 0033:0x4665e9 [ 1790.123978][ C0] Code: Unable to access opcode bytes at RIP 0x4665bf. [ 1790.130814][ C0] RSP: 002b:00007fcdc7a67218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 1790.139231][ C0] RAX: fffffffffffffe00 RBX: 000000000056bf88 RCX: 00000000004665e9 [ 1790.147201][ C0] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 000000000056bf88 [ 1790.155169][ C0] RBP: 000000000056bf80 R08: 0000000000000000 R09: 0000000000000000 [ 1790.163139][ C0] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf8c [ 1790.171109][ C0] R13: 00007fff6164da9f R14: 00007fcdc7a67300 R15: 0000000000022000 [ 1790.179104][ C0] Sending NMI from CPU 0 to CPUs 1: [ 1790.184312][ C1] NMI backtrace for cpu 1 [ 1790.184323][ C1] CPU: 1 PID: 18789 Comm: syz-executor.3 Not tainted 5.14.0-rc4-next-20210806-syzkaller #0 [ 1790.184348][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1790.184360][ C1] RIP: 0010:native_apic_mem_write+0x8/0x10 [ 1790.184389][ C1] Code: c7 00 f7 ec 8e e8 28 b9 88 00 eb b0 66 0f 1f 44 00 00 be 01 00 00 00 e9 96 01 2d 00 cc cc cc cc cc cc 89 ff 89 b7 00 c0 5f ff 0f 1f 80 00 00 00 00 48 b8 00 00 00 00 00 fc ff df 53 89 fb 48 [ 1790.184410][ C1] RSP: 0018:ffffc90000dc0ea8 EFLAGS: 00000046 [ 1790.184428][ C1] RAX: dffffc0000000000 RBX: ffffffff8b329a60 RCX: 0000000000000020 [ 1790.184443][ C1] RDX: 1ffffffff166534e RSI: 000000000000019c RDI: 0000000000000380 [ 1790.184458][ C1] RBP: ffff8880b9d1f2c0 R08: 000000000000003f R09: 0000000000000000 [ 1790.184472][ C1] R10: ffffffff8168b307 R11: 0000000000000000 R12: 000000000000019c [ 1790.184486][ C1] R13: 0000000000000020 R14: ffff8880b9d22380 R15: 7fffffffffffffff [ 1790.184502][ C1] FS: 0000000000000000(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000 [ 1790.184523][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1790.184538][ C1] CR2: 0000564f91b3a180 CR3: 0000000078609000 CR4: 00000000001506e0 [ 1790.184553][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1790.184566][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1790.184580][ C1] Call Trace: [ 1790.184586][ C1] [ 1790.184592][ C1] lapic_next_event+0x4d/0x80 [ 1790.184616][ C1] clockevents_program_event+0x254/0x370 [ 1790.184642][ C1] tick_program_event+0xac/0x140 [ 1790.184667][ C1] hrtimer_interrupt+0x414/0xa00 [ 1790.184695][ C1] __sysvec_apic_timer_interrupt+0x146/0x530 [ 1790.184723][ C1] sysvec_apic_timer_interrupt+0x8e/0xc0 [ 1790.184752][ C1] [ 1790.184758][ C1] asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1790.184782][ C1] RIP: 0010:__sanitizer_cov_trace_pc+0x37/0x60 [ 1790.184808][ C1] Code: 81 e1 00 01 00 00 65 48 8b 14 25 00 f0 01 00 a9 00 01 ff 00 74 0e 85 c9 74 35 8b 82 3c 15 00 00 85 c0 74 2b 8b 82 18 15 00 00 <83> f8 02 75 20 48 8b 8a 20 15 00 00 8b 92 1c 15 00 00 48 8b 01 48 [ 1790.184829][ C1] RSP: 0018:ffffc900201af758 EFLAGS: 00000246 [ 1790.184845][ C1] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000 [ 1790.184859][ C1] RDX: ffff88814daad580 RSI: ffffffff81aed833 RDI: 0000000000000003 [ 1790.184873][ C1] RBP: ffffea0000db15c0 R08: 0000000000000000 R09: ffffea0000db15c7 [ 1790.184888][ C1] R10: ffffffff81aed825 R11: 0000000000000000 R12: ffffea0000db15c8 [ 1790.184903][ C1] R13: 0000000000000000 R14: 0000000000000000 R15: 00007f5e4ccfc000 [ 1790.184920][ C1] ? page_remove_rmap+0x55/0x1480 [ 1790.184947][ C1] ? page_remove_rmap+0x63/0x1480 [ 1790.184974][ C1] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 1790.184999][ C1] page_remove_rmap+0x63/0x1480 [ 1790.185024][ C1] ? __sanitizer_cov_trace_cmp4+0x1c/0x70 [ 1790.185051][ C1] unmap_page_range+0xed5/0x2a10 [ 1790.185087][ C1] ? vm_normal_page_pmd+0x550/0x550 [ 1790.185114][ C1] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1790.185137][ C1] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 1790.185162][ C1] ? uprobe_munmap+0x95/0x560 [ 1790.185184][ C1] unmap_single_vma+0x198/0x310 [ 1790.185212][ C1] unmap_vmas+0x16d/0x2f0 [ 1790.185237][ C1] ? zap_vma_ptes+0x100/0x100 [ 1790.185264][ C1] ? lockdep_hardirqs_on+0x79/0x100 [ 1790.185300][ C1] exit_mmap+0x1d0/0x620 [ 1790.185324][ C1] ? __ia32_sys_remap_file_pages+0x150/0x150 [ 1790.185355][ C1] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 1790.185383][ C1] __mmput+0x122/0x470 [ 1790.185409][ C1] mmput+0x58/0x60 [ 1790.185433][ C1] do_exit+0xae2/0x2a60 [ 1790.185456][ C1] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1790.185481][ C1] ? lockdep_hardirqs_on+0x79/0x100 [ 1790.185506][ C1] ? mm_update_next_owner+0x7a0/0x7a0 [ 1790.185532][ C1] ? trace_hardirqs_on+0x38/0x1c0 [ 1790.185558][ C1] do_group_exit+0x125/0x310 [ 1790.185583][ C1] get_signal+0x47f/0x2160 [ 1790.185615][ C1] arch_do_signal_or_restart+0x2a9/0x1c40 [ 1790.185644][ C1] ? irqentry_enter+0x28/0x50 [ 1790.185669][ C1] ? get_sigframe_size+0x10/0x10 [ 1790.185693][ C1] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1790.185716][ C1] ? lockdep_hardirqs_on+0x79/0x100 [ 1790.185742][ C1] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1790.185767][ C1] ? trace_hardirqs_on+0x38/0x1c0 [ 1790.185793][ C1] exit_to_user_mode_prepare+0x17d/0x290 [ 1790.185817][ C1] syscall_exit_to_user_mode+0x19/0x60 [ 1790.185843][ C1] do_syscall_64+0x42/0xb0 [ 1790.185866][ C1] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1790.185898][ C1] RIP: 0033:0x4665e9 [ 1790.185912][ C1] Code: Unable to access opcode bytes at RIP 0x4665bf. [ 1790.185920][ C1] RSP: 002b:00007f5e4bf9c218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 1790.185940][ C1] RAX: fffffffffffffe00 RBX: 000000000056bf88 RCX: 00000000004665e9 [ 1790.185956][ C1] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 000000000056bf88 [ 1790.185969][ C1] RBP: 000000000056bf80 R08: 0000000000000000 R09: 0000000000000000 [ 1790.185983][ C1] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf8c [ 1790.185996][ C1] R13: 00007fff9b9a343f R14: 00007f5e4bf9c300 R15: 0000000000022000